CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-51399 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Back Button Widget allows Stored XSS.This issue affects Back Button Widget: from n/a through 1.6.3.
| https://patchstack.com/database/vulnerability/back-button-widget/wordpress-back-button-widget-plugin-1-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-18T22:08:57.076Z | 2023-12-29T10:20:21.296Z | 2023-12-29T10:20:21.296Z | {'Vendor': 'WPFactory', 'Product': 'Back Button Widget', 'Versions': 'n/a'} |
CVE-2023-51663 | Hail is an open-source, general-purpose, Python-based data analysis tool with additional data types and methods for working with genomic data. Hail relies on OpenID Connect (OIDC) email addresses from ID tokens to verify the validity of a user's domain, but because users have the ability to change their email address, they could create accounts and use resources in clusters that they should not have access to. For example, a user could create a Microsoft or Google account and then change their email to `[email protected]`. This account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is `example.org`. The attacker is not able to access private data or impersonate another user, but they would have the ability to run jobs if Hail Batch billing projects are enabled and create Azure Tenants if they have Azure Active Directory Administrator access. | https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw | 2023-12-21T14:14:26.224Z | 2023-12-29T16:53:36.692Z | 2023-12-29T16:53:36.692Z | {'Vendor': 'hail-is', 'Product': 'hail', 'Versions': '< 0.2.127'} |
CVE-2023-51049 | S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_bbsauth parameter at /admin/ajax.php. | https://www.notion.so/scms5-0-sql-injection-94c791a563d1481a9439fa98a1bc9a1b | 2023-12-18T00:00:00 | 2023-12-21T00:00:00 | 2023-12-21T15:18:47.218248 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51419 | Unrestricted Upload of File with Dangerous Type vulnerability in Bertha.Ai BERTHA AI. Your AI co-pilot for WordPress and Chrome.This issue affects BERTHA AI. Your AI co-pilot for WordPress and Chrome: from n/a through 1.11.10.7.
| https://patchstack.com/database/vulnerability/bertha-ai-free/wordpress-bertha-ai-plugin-1-11-10-7-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-12-19T00:04:39.260Z | 2023-12-29T13:30:24.561Z | 2023-12-29T13:30:24.561Z | {'Vendor': 'Bertha.ai', 'Product': 'BERTHA AI. Your AI co-pilot for WordPress and Chrome', 'Versions': 'n/a'} |
CVE-2023-51730 | This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the DDNS Password parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system.
Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013 | 2023-12-22T09:53:53.227Z | 2024-01-17T07:05:23.683Z | 2024-01-17T07:05:23.683Z | {'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'} |
CVE-2023-51675 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in AAM Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More.This issue affects Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.18.
| https://patchstack.com/database/vulnerability/advanced-access-manager/wordpress-advanced-access-manager-plugin-6-9-18-open-redirection-vulnerability?_s_id=cve | 2023-12-21T14:51:15.760Z | 2023-12-29T13:57:17.047Z | 2023-12-29T13:57:17.047Z | {'Vendor': 'AAM', 'Product': 'Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More', 'Versions': 'n/a'} |
CVE-2023-51767 | OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. | https://arxiv.org/abs/2309.02545 | 2023-12-24T00:00:00 | 2023-12-24T00:00:00 | 2024-01-25T14:06:38.770250 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51966 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-setIptvInfo-944beaf189db4bf49f99a7a7418c7bdd | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T15:09:46.186874 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51435 |
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.
| https://www.hihonor.com/global/security/cve-2023-51435/ | 2023-12-19T01:27:50.842Z | 2023-12-29T03:51:46.940Z | 2023-12-29T03:51:46.940Z | {'Vendor': 'Honor', 'Product': 'Magic UI', 'Versions': '6.0'} |
CVE-2023-51065 | Incorrect access control in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to obtain system backups and other sensitive information from the QStar Server. | https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51065.md | 2023-12-18T00:00:00 | 2024-01-13T00:00:00 | 2024-01-13T03:57:10.029301 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51989 | D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords. | https://github.com/funny-mud-peee/IoT-vuls/blob/main/dir822+/2/readme.md | 2023-12-26T00:00:00 | 2024-01-11T00:00:00 | 2024-01-11T15:33:41.231403 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51462 | Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html | 2023-12-19T17:03:41.382Z | 2023-12-20T14:02:55.519Z | 2023-12-20T14:02:55.519Z | {'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'} |
CVE-2023-51527 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Senol Sahin AI Power: Complete AI Pack – Powered by GPT-4.This issue affects AI Power: Complete AI Pack – Powered by GPT-4: from n/a through 1.8.2.
| https://patchstack.com/database/vulnerability/gpt3-ai-content-generator/wordpress-ai-power-complete-ai-pack-powered-by-gpt-4-plugin-1-8-2-sensitive-data-exposure-vulnerability?_s_id=cve | 2023-12-20T17:28:07.137Z | 2023-12-29T14:58:30.874Z | 2023-12-29T14:58:30.874Z | {'Vendor': 'Senol Sahin', 'Product': 'AI Power: Complete AI Pack – Powered by GPT-4', 'Versions': 'n/a'} |
CVE-2023-51927 | YonBIP v3_23.05 was discovered to contain a SQL injection vulnerability via the com.yonyou.hrcloud.attend.web.AttendScriptController.runScript() method. | https://www.yonyou.com/ | 2023-12-26T00:00:00 | 2024-01-20T00:00:00 | 2024-01-20T00:51:44.370906 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51024 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘tz’ parameter of the setNtpCfg interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setNtpCfg-tz/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:08:39.268617 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51073 | An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh. | https://www.buffalotech.com | 2023-12-18T00:00:00 | 2024-01-11T00:00:00 | 2024-01-11T02:30:21.202871 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51423 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder Team Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition.This issue affects Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition: from n/a through 3.05.0.
| https://patchstack.com/database/vulnerability/webinar-ignition/wordpress-webinarignition-plugin-3-05-0-unauthenticated-sql-injection-vulnerability?_s_id=cve | 2023-12-19T00:04:39.261Z | 2023-12-31T17:52:39.655Z | 2023-12-31T17:52:39.655Z | {'Vendor': 'Saleswonder Team', 'Product': 'Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition', 'Versions': 'n/a'} |
CVE-2023-51970 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv. | https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-getIptvInfo-f5918cc2828c49e78554f456bf7d4b36 | 2023-12-26T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T15:19:56.776295 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51136 | TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formRebootSchedule. | https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36 | 2023-12-18T00:00:00 | 2023-12-30T00:00:00 | 2023-12-30T15:28:15.062986 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51100 | Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formGetDiagnoseInfo . | https://github.com/GD008/TENDA/blob/main/W9/W9_getDiagnoseInfo/W9_getDiagnoseInfo.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T17:20:47.226829 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51946 | Multiple reflected cross-site scripting (XSS) vulnerabilities in nasSvr.php in actidata actiNAS-SL-2U-8 3.2.03-SP1 allow remote attackers to inject arbitrary web script or HTML. | http://actidata.com | 2023-12-26T00:00:00 | 2024-01-19T00:00:00 | 2024-01-19T13:53:55.934249 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51784 | Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.
[1] https://github.com/apache/inlong/pull/9329
| https://lists.apache.org/thread/4nxbyl6mh5jgh0plk0qposbxwn6w9h8j | 2023-12-26T01:58:34.359Z | 2024-01-03T09:39:23.382Z | 2024-01-03T09:39:23.382Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.5.0'} |
CVE-2023-51012 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanGateway parameter’ of the setLanConfig interface of the cstecgi .cgi. | https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanGateway/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T18:34:48.283740 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51442 | Navidrome is an open source web-based music collection server and streamer. A security vulnerability has been identified in navidrome's subsonic endpoint, allowing for authentication bypass. This exploit enables unauthorized access to any known account by utilizing a JSON Web Token (JWT) signed with the key "not so secret". The vulnerability can only be exploited on instances that have never been restarted. Navidrome supports an extension to the subsonic authentication scheme, where a JWT can be provided using a `jwt` query parameter instead of the traditional password or token and salt (corresponding to resp. the `p` or `t` and `s` query parameters). This authentication bypass vulnerability potentially affects all instances that don't protect the subsonic endpoint `/rest/`, which is expected to be most instances in a standard deployment, and most instances in the reverse proxy setup too (as the documentation mentions to leave that endpoint unprotected). This issue has been patched in version 0.50.2.
| https://github.com/navidrome/navidrome/security/advisories/GHSA-wq59-4q6r-635r | 2023-12-19T13:52:41.787Z | 2023-12-21T14:54:56.848Z | 2023-12-21T14:54:56.848Z | {'Vendor': 'navidrome', 'Product': 'navidrome', 'Versions': '<= 0.50.1'} |
CVE-2023-51655 | In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-12-21T09:56:59.233Z | 2023-12-21T09:57:04.395Z | 2023-12-21T09:57:04.395Z | {'Vendor': 'JetBrains', 'Product': 'IntelliJ IDEA', 'Versions': '0'} |
CVE-2023-51439 | A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-794653.pdf | 2023-12-19T11:47:14.991Z | 2024-01-09T10:00:14.394Z | 2024-01-09T10:00:14.394Z | {'Vendor': 'Siemens', 'Product': 'JT2Go', 'Versions': 'All versions < V14.3.0.6'} |
CVE-2023-51252 | PublicCMS 4.0 is vulnerable to Cross Site Scripting (XSS). Because files can be uploaded and online preview function is provided, pdf files and html files containing malicious code are uploaded, an XSS popup window is realized through online viewing. | https://github.com/sanluan/PublicCMS/issues/79 | 2023-12-18T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T08:32:36.503933 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51751 | ScaleFusion 10.5.2 does not properly limit users to the Edge application because Alt-F4 can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode. | https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59 | 2023-12-22T00:00:00 | 2024-01-11T00:00:00 | 2024-01-18T18:37:59.537379 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51028 | TOTOLINK EX1800T 9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the apcliChannel parameter of the setWiFiExtenderConfig interface of the cstecgi.cgi. | https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliChannel/ | 2023-12-18T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T17:54:32.089030 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-51090 | Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow via the function formGetWeiXinConfig. | https://github.com/GD008/TENDA/blob/main/M3/getWeiXinConfig/M3_getWeiXinConfig.md | 2023-12-18T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T17:16:17.932339 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34384 | Cross-Site Request Forgery (CSRF) vulnerability in Kebo Kebo Twitter Feed plugin <= 1.5.12 versions. | https://patchstack.com/database/vulnerability/kebo-twitter-feed/wordpress-kebo-twitter-feed-plugin-1-5-12-cross-site-request-forgery-csrf?_s_id=cve | 2023-06-02T15:48:00.545Z | 2023-11-13T00:58:11.841Z | 2023-11-13T00:58:11.841Z | {'Vendor': 'Kebo', 'Product': 'Kebo Twitter Feed', 'Versions': 'n/a'} |
CVE-2023-34107 | GLPI is a free asset and IT management software package. Versions of the software starting with 9.2.0 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user, allows access to the view all KnowbaseItems. Version 10.0.8 has a patch for this issue. | https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4 | 2023-05-25T21:56:51.246Z | 2023-07-05T19:15:31.060Z | 2023-07-05T19:15:31.060Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.2.0, < 10.0.8'} |
CVE-2023-34412 | A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an
authenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS). | https://cert.vde.com/en/advisories/VDE-2023-012/ | 2023-06-05T12:05:57.451Z | 2023-08-17T13:07:01.697Z | 2023-11-16T11:02:33.346Z | {'Vendor': 'Red Lion Europe', 'Product': 'mbNET', 'Versions': '0'} |
CVE-2023-34941 | A stored cross-site scripting (XSS) vulnerability in the urlFilterList function of Asus RT-N10LX Router v2.0.0.39 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL Keyword List text field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/OlivierLaflamme/cve/blob/main/ASUS-N10LX_2.0.0.39/StoredXSS_FirewallURLFilter.md | 2023-06-07T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34150 | ** UNSUPPORTED WHEN ASSIGNED ** Use of TikaEncodingDetector in Apache Any23 can cause excessive memory usage. | https://lists.apache.org/thread/713tk23khbtbg940pb2ql8ggd4cvh6j1 | 2023-05-28T15:27:56.797Z | 2023-07-05T07:28:35.592Z | 2023-07-14T08:51:48.453Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Any23', 'Versions': '0'} |
CVE-2023-34853 | Buffer Overflow vulnerability in Supermicro motherboard X12DPG-QR 1.4b allows local attackers to hijack control flow via manipulation of SmcSecurityEraseSetupVar variable. | https://www.supermicro.com/Bios/softfiles/17136/X12DPG-QR_1.4b_X1.02.61_SUM2.10.0.zip. | 2023-06-07T00:00:00 | 2023-08-22T00:00:00 | 2023-08-22T16:37:47.886601 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34916 | Fuge CMS v1.0 contains an Open Redirect vulnerability via /front/ProcessAct.java. | https://github.com/fuge/cms/issues/4 | 2023-06-07T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34015 | Cross-Site Request Forgery (CSRF) vulnerability in PI Websolution Conditional shipping & Advanced Flat rate shipping rates / Flexible shipping for WooCommerce shipping plugin <= 1.6.4.4 versions. | https://patchstack.com/database/vulnerability/advanced-free-flat-shipping-woocommerce/wordpress-advanced-flat-rate-shipping-woocommerce-plugin-1-6-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T11:26:00.464Z | 2023-07-11T08:36:04.177Z | 2023-07-11T08:36:04.177Z | {'Vendor': 'PI Websolution', 'Product': 'Conditional shipping & Advanced Flat rate shipping rates / Flexible shipping for WooCommerce shipping', 'Versions': 'n/a'} |
CVE-2023-34795 | xlsxio v0.1.2 to v0.2.34 was discovered to contain a free of uninitialized pointer in the xlsxioread_sheetlist_close() function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XLSX file. | https://github.com/brechtsanders/xlsxio/issues/121 | 2023-06-07T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34845 | Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | https://github.com/bludit/bludit/issues/1508 | 2023-06-07T00:00:00 | 2023-06-16T00:00:00 | 2023-12-30T20:54:11.278762 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34146 | An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34147 and CVE-2023-34148. | https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US | 2023-05-26T18:41:36.333Z | 2023-06-26T21:58:00.477Z | 2023-06-26T21:58:00.477Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019'} |
CVE-2023-34453 | snappy-java is a fast compressor/decompressor for Java. Due to unchecked multiplications, an integer overflow may occur in versions prior to 1.1.10.1, causing a fatal error.
The function `shuffle(int[] input)` in the file `BitShuffle.java` receives an array of integers and applies a bit shuffle on it. It does so by multiplying the length by 4 and passing it to the natively compiled shuffle function. Since the length is not tested, the multiplication by four can cause an integer overflow and become a smaller value than the true size, or even zero or negative. In the case of a negative value, a `java.lang.NegativeArraySizeException` exception will raise, which can crash the program. In a case of a value that is zero or too small, the code that afterwards references the shuffled array will assume a bigger size of the array, which might cause exceptions such as `java.lang.ArrayIndexOutOfBoundsException`.
The same issue exists also when using the `shuffle` functions that receive a double, float, long and short, each using a different multiplier that may cause the same issue.
Version 1.1.10.1 contains a patch for this vulnerability. | https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf | 2023-06-06T16:16:53.558Z | 2023-06-15T16:12:34.119Z | 2023-06-15T16:12:34.119Z | {'Vendor': 'xerial', 'Product': 'snappy-java', 'Versions': '< 1.1.10.1'} |
CVE-2023-34392 |
A Missing Authentication for Critical Function vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run arbitrary commands on managed devices by an authorized device operator.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-06-02T17:18:29.697Z | 2023-08-31T15:31:57.140Z | 2023-08-31T15:31:57.140Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5037 SEL Grid Configurator', 'Versions': '0'} |
CVE-2023-34238 | Gatsby is a free and open source framework based on React. The Gatsby framework prior to versions 4.25.7 and 5.9.1 contain a Local File Inclusion vulnerability in the `__file-code-frame` and `__original-stack-frame` paths, exposed when running the Gatsby develop server (`gatsby develop`). Any file in scope of the development server could potentially be exposed. It should be noted that by default `gatsby develop` is only accessible via the localhost `127.0.0.1`, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as `--host 0.0.0.0`, `-H 0.0.0.0`, or the `GATSBY_HOST=0.0.0.0` environment variable. A patch has been introduced in `[email protected]` and `[email protected]` which mitigates the issue. Users are advised to upgrade. Users unable to upgrade should avoid exposing their development server to the internet. | https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-c6f8-8r25-c4gc | 2023-05-31T13:51:51.169Z | 2023-06-07T23:24:49.724Z | 2023-06-07T23:24:49.724Z | {'Vendor': 'gatsbyjs', 'Product': 'gatsby', 'Versions': '>= 5.0.0, < 5.9.1, < 4.25.7'} |
CVE-2023-34111 | The `Release PR Merged` workflow in the github repo taosdata/grafanaplugin is subject to a command injection vulnerability which allows for arbitrary code execution within the github action context due to the insecure usage of `${{ github.event.pull_request.title }}` in a bash command within the GitHub workflow. Attackers can inject malicious commands which will be executed by the workflow. This happens because `${{ github.event.pull_request.title }}` is directly passed to bash command on like 25 of the workflow. This may allow an attacker to gain access to secrets which the github action has access to or to otherwise make use of the compute resources. | https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr | 2023-05-25T21:56:51.247Z | 2023-06-06T16:29:21.279Z | 2023-06-06T16:29:21.279Z | {'Vendor': 'taosdata', 'Product': 'grafanaplugin', 'Versions': '<= 2e4c82b002'} |
CVE-2023-34541 | Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt. | https://github.com/hwchase17/langchain/issues/4849 | 2023-06-07T00:00:00 | 2023-06-20T00:00:00 | 2023-06-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34054 |
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable if Reactor Netty HTTP Server built-in integration with Micrometer is enabled.
| https://spring.io/security/cve-2023-34054 | 2023-05-25T17:21:56.203Z | 2023-11-28T08:16:14.361Z | 2023-11-28T08:16:57.848Z | {'Vendor': 'Spring', 'Product': 'Reactor Netty', 'Versions': '1.1.0, 1.0.0, older unsupported versions'} |
CVE-2023-34613 | An issue was discovered sojo thru 1.1.1 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://github.com/maddingo/sojo/issues/15 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34243 | TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated. This issue has been addressed in version 5.12.5. Users are advised to upgrade. Users unable to upgrade may be mitigated by rate-limiting API calls with software that sits in front of TGS in the HTTP pipeline such as fail2ban. | https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93-76ph | 2023-05-31T13:51:51.172Z | 2023-06-08T21:09:14.628Z | 2023-06-08T21:09:14.628Z | {'Vendor': 'tgstation', 'Product': 'tgstation-server', 'Versions': '>= 4.0.0, < 5.12.5'} |
CVE-2023-34756 | bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the cid parameter at admin/index.php?mode=settings&page=charset&action=edit. | https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34185 | Cross-Site Request Forgery (CSRF) vulnerability in John Brien WordPress NextGen GalleryView plugin <= 0.5.5 versions. | https://patchstack.com/database/vulnerability/wordpress-nextgen-galleryview/wordpress-wordpress-nextgen-galleryview-plugin-0-5-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-29T13:52:39.505Z | 2023-07-11T11:17:41.340Z | 2023-07-11T11:17:41.340Z | {'Vendor': 'John Brien', 'Product': 'WordPress NextGen GalleryView', 'Versions': 'n/a'} |
CVE-2023-34869 | PHPJabbers Catering System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /index.php?controller=pjAdmin&action=pjActionForgot. | https://www.phpjabbers.com/catering-system/ | 2023-06-07T00:00:00 | 2023-08-01T00:00:00 | 2023-08-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34214 | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-generation function, which could potentially allow malicious users to execute remote code on affected devices. | https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities | 2023-05-31T08:58:06.149Z | 2023-08-17T02:26:05.428Z | 2023-10-20T07:03:28.811Z | {'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'} |
CVE-2023-34644 | Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth. | https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/ | 2023-06-07T00:00:00 | 2023-07-31T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34994 | An improper resource allocation vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to creation of an arbitrary directory. An attacker can send a sequence of requests to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773 | 2023-06-13T17:04:29.057Z | 2023-09-05T16:15:03.744Z | 2023-09-05T16:15:03.744Z | {'Vendor': 'Open Automation Software', 'Product': 'OAS Platform', 'Versions': 'v18.00.0072'} |
CVE-2023-34097 | hoppscotch is an open source API development ecosystem. In versions prior to 2023.4.5 the database password is exposed in the logs when showing the database connection string. Attackers with access to read system logs will be able to elevate privilege with full access to the database. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qpx8-wq6q-r833 | 2023-05-25T21:56:51.245Z | 2023-06-05T20:02:04.497Z | 2023-06-05T20:02:04.497Z | {'Vendor': 'hoppscotch', 'Product': 'hoppscotch', 'Versions': '< 2023.4.5'} |
CVE-2023-34652 | PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS) via Add New Course. | https://phpgurukul.com/hostel-management-system/ | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34347 |
Delta Electronics InfraSuite Device Master versions prior to 1.0.7 contains classes that cannot be deserialized, which could allow an attack to remotely execute arbitrary code.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-01 | 2023-06-06T14:32:07.383Z | 2023-07-10T18:59:30.158Z | 2023-07-10T18:59:30.158Z | {'Vendor': 'Delta Electronics', 'Product': 'Infrasuite Device Master', 'Versions': '0'} |
CVE-2023-34982 |
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01 | 2023-06-13T14:56:36.310Z | 2023-11-15T16:28:35.183Z | 2023-11-15T16:28:35.183Z | {'Vendor': 'AVEVA ', 'Product': 'SystemPlatform', 'Versions': '0'} |
CVE-2023-34255 | null | null | 2023-05-31T00:00:00 | null | 2023-06-05T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-34469 |
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the physical network. A successful exploit of this vulnerability may lead to a loss of confidentiality. | https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023007.pdf | 2023-06-07T03:10:19.973Z | 2023-09-12T15:21:11.450Z | 2023-09-25T15:58:14.117Z | {'Vendor': 'AMI', 'Product': 'AptioV', 'Versions': '*'} |
CVE-2023-34193 | File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function. | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | 2023-05-30T00:00:00 | 2023-07-06T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34039 | Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI. | https://www.vmware.com/security/advisories/VMSA-2023-0018.html | 2023-05-25T17:21:56.201Z | 2023-08-29T17:36:18.899Z | 2023-08-29T17:36:18.899Z | {'Vendor': 'n/a', 'Product': 'Aria Operations for Networks', 'Versions': 'Aria Operations for Networks 6.x'} |
CVE-2023-34486 | itsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote code execution can be achieved by entering malicious code in the date selection box. | https://github.com/JunyanYip/itsourcecode_justines_xss_vul | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34367 | Windows 7 is vulnerable to a full blind TCP/IP hijacking attack. The vulnerability exists in Windows 7 (any Windows until Windows 8) and in any implementation of TCP/IP, which is vulnerable to the Idle scan attack (including many IoT devices). NOTE: The vendor considers this a low severity issue. | http://blog.pi3.com.pl/?p=850 | 2023-06-02T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34672 | Improper Access Control leads to adding a high-privilege user affecting Elenos ETG150 FM transmitter running on version 3.12 by exploiting user's role within the admin profile. An attack could occur over the public Internet in some cases. | http://elenos.com | 2023-06-07T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34388 | An Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication.
See product Instruction Manual Appendix A dated 20230830 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-06-02T17:18:29.696Z | 2023-11-30T16:54:08.503Z | 2023-11-30T16:54:08.503Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-451', 'Versions': 'R315-V0, R316-V0, R317-V0, R318-V0, R320-V0, R321-V0, R322-V0, R323-V0, R324-V0, R325-V0, R326-V0, R327-V0'} |
CVE-2023-34222 | In JetBrains TeamCity before 2023.05 possible XSS in the Plugin Vendor URL was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:33.585Z | 2023-05-31T13:03:14.995Z | 2023-05-31T13:03:14.995Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34449 | ink! is an embedded domain specific language to write smart contracts in Rust for blockchains built on the Substrate framework. Starting in version 4.0.0 and prior to version 4.2.1, the return value when using delegate call mechanics, either through `CallBuilder::delegate` or `ink_env::invoke_contract_delegate`, is decoded incorrectly. This bug was related to the mechanics around decoding a call's return buffer, which was changed as part of pull request 1450. Since this feature was only released in ink! 4.0.0, no previous versions are affected. Users who have an ink! 4.x series contract should upgrade to 4.2.1 to receive a patch. | https://github.com/paritytech/ink/security/advisories/GHSA-853p-5678-hv8f | 2023-06-06T16:16:53.558Z | 2023-06-14T20:10:54.842Z | 2023-06-14T20:11:15.570Z | {'Vendor': 'paritytech', 'Product': 'ink', 'Versions': '>= 4.0.0, < 4.2.1'} |
CVE-2023-34330 |
AMI SPx contains a vulnerability in the BMC where a user may inject code which could be executed via a Dynamic Redfish Extension interface. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability. | https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf | 2023-06-01T16:05:31.611Z | 2023-07-18T17:12:09.153Z | 2023-07-19T21:02:49.594Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx12', 'Versions': '12.0'} |
CVE-2023-34625 | ShowMojo MojoBox Digital Lockbox 1.4 is vulnerable to Authentication Bypass. The implementation of the lock opening mechanism via Bluetooth Low Energy (BLE) is vulnerable to replay attacks. A malicious user is able to intercept BLE requests and replicate them to open the lock at any time. Alternatively, an attacker with physical access to the device on which the Android app is installed, can obtain the latest BLE messages via the app logs and use them for opening the lock. | https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock | 2023-06-07T00:00:00 | 2023-07-20T00:00:00 | 2023-07-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34849 | An unauthorized command injection vulnerability exists in the ActionLogin function of the webman.lua file in Ikuai router OS through 3.7.1. | https://github.com/cczzmm/IOT-POC/tree/main/Ikuai | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34326 | The caching invalidation guidelines from the AMD-Vi specification (48882—Rev
3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction
(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU
TLB is not flushed.
Such stale DMA mappings can point to memory ranges not owned by the guest, thus
allowing access to unindented memory regions.
| https://xenbits.xenproject.org/xsa/advisory-442.html | 2023-06-01T10:44:17.065Z | 2024-01-05T16:30:57.225Z | 2024-01-05T16:30:57.225Z | {'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-442'} |
CVE-2023-34408 | DokuWiki before 2023-04-04a allows XSS via RSS titles. | https://github.com/dokuwiki/dokuwiki/pull/3967 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34058 | VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html . | https://www.vmware.com/security/advisories/VMSA-2023-0024.html | 2023-05-25T17:21:56.204Z | 2023-10-27T04:53:09.935Z | 2023-11-17T04:34:05.439Z | {'Vendor': 'n/a', 'Product': 'VMware Tools', 'Versions': '12.x.x, 11.x.x, 10.3.x'} |
CVE-2023-34371 | Cross-Site Request Forgery (CSRF) vulnerability in Didier Sampaolo SpamReferrerBlock plugin <= 2.22 versions. | https://patchstack.com/database/vulnerability/spamreferrerblock/wordpress-spamreferrerblock-plugin-2-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-02T15:45:18.619Z | 2023-11-09T18:56:41.106Z | 2023-11-09T18:56:41.106Z | {'Vendor': 'Didier Sampaolo', 'Product': 'SpamReferrerBlock', 'Versions': 'n/a'} |
CVE-2023-34234 | OpenZeppelin Contracts is a library for smart contract development. By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all. This impacts the `Governor` contract in v4.9.0 only, and the `GovernorCompatibilityBravo` contract since v4.3.0. This problem has been patched in 4.9.1 by introducing opt-in frontrunning protection. Users are advised to upgrade. Users unable to upgrade may submit the proposal creation transaction to an endpoint with frontrunning protection as a workaround. | https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5h3x-9wvq-w4m2 | 2023-05-31T13:51:51.169Z | 2023-06-07T17:06:10.154Z | 2023-06-07T17:06:10.154Z | {'Vendor': 'OpenZeppelin', 'Product': 'openzeppelin-contracts', 'Versions': '>=4.3.0, < 4.9.1'} |
CVE-2023-34473 |
AMI SPx contains a vulnerability in the BMC where a valid user may cause a use of hard-coded credentials. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf | 2023-06-07T03:10:19.974Z | 2023-07-05T18:10:11.083Z | 2023-07-05T18:10:11.083Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0'} |
CVE-2023-34189 | Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. The attacker could use general users to delete and update the process, which only the admin can operate occurrences.
Users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8109 to solve it.
| https://lists.apache.org/thread/smxqyx43hxjvzv4w71n2n3rfho9p378s | 2023-05-30T01:48:40.322Z | 2023-07-25T07:08:53.608Z | 2023-07-25T07:08:53.608Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.4.0'} |
CVE-2023-34023 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Miled WordPress Social Login plugin <= 3.0.4 versions. | https://patchstack.com/database/vulnerability/wordpress-social-login/wordpress-wordpress-social-login-plugin-3-0-4-cross-site-scripting-xss-vulnerability-2?_s_id=cve | 2023-05-25T11:26:00.466Z | 2023-08-30T14:25:02.811Z | 2023-08-30T14:25:02.811Z | {'Vendor': 'Miled', 'Product': 'WordPress Social Login', 'Versions': 'n/a'} |
CVE-2023-34865 | Directory traversal vulnerability in ujcms 6.0.2 allows attackers to move files via the rename feature. | https://github.com/ujcms/ujcms/issues/5 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34166 | Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart. | https://consumer.huawei.com/en/support/bulletin/2023/6/ | 2023-05-29T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-34977 | A cross-site scripting (XSS) vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.
We have already fixed the vulnerability in the following version:
Video Station 5.7.0 ( 2023/07/27 ) and later
| https://www.qnap.com/en/security-advisory/qsa-23-52 | 2023-06-08T08:26:04.295Z | 2023-10-13T19:17:26.921Z | 2023-10-13T19:17:26.921Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'} |
CVE-2023-34131 | Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics enables an unauthenticated attacker to access restricted web pages. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.852Z | 2023-07-13T02:20:39.413Z | 2023-07-13T02:20:39.413Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34561 | A buffer overflow in the level parsing code of RobTop Games AB Geometry Dash v2.113 allows attackers to execute arbitrary code via entering a Geometry Dash level. | https://www.youtube.com/watch?v=DMxucOWfLPc | 2023-06-07T00:00:00 | 2023-07-11T00:00:00 | 2023-07-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34832 | TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4. | http://tp-link.com | 2023-06-07T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34998 | An authentication bypass vulnerability exists in the OAS Engine functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to arbitrary authentication. An attacker can sniff network traffic to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770 | 2023-06-13T16:58:36.846Z | 2023-09-05T16:15:05.068Z | 2023-09-05T16:15:05.068Z | {'Vendor': 'Open Automation Software', 'Product': 'OAS Platform', 'Versions': 'v18.00.0072'} |
CVE-2023-34648 | A Cross Site Scripting vulnerability in PHPgurukl User Registration Login and User Management System with admin panel v.1.0 allows a local attacker to execute arbitrary code via a crafted script to the signup.php. | https://github.com/ckalnarayan/Common-Vulnerabilities-and-Exposures/blob/main/CVE-2023-34648 | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34218 | In JetBrains TeamCity before 2023.05 bypass of permission checks allowing to perform admin actions was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:32.605Z | 2023-05-31T13:03:12.814Z | 2023-05-31T13:03:12.814Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34432 | A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure. | https://access.redhat.com/security/cve/CVE-2023-34432 | 2023-06-06T07:28:27.561Z | 2023-07-10T20:05:39.681Z | 2023-07-10T20:05:39.681Z | {'Vendor': 'n/a', 'Product': 'sox', 'Versions': ''} |
CVE-2023-34062 | In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack.
Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
| https://spring.io/security/cve-2023-34062 | 2023-05-25T17:21:56.204Z | 2023-11-15T09:46:42.975Z | 2023-11-15T09:46:42.975Z | {'Vendor': 'n/a', 'Product': 'Reactor Netty', 'Versions': '1.1.0, 1.0.0, older unsupported versions'} |
CVE-2023-34598 | Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response. | https://github.com/maddsec/CVE-2023-34598 | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34961 | Chamilo v1.11.x up to v1.11.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the /feedback/comment field. | https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-105-2023-04-15-Low-impact-Moderate-risk-XSS-in-student-work-comments | 2023-06-07T00:00:00 | 2023-06-08T00:00:00 | 2023-06-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34824 | fdkaac before 1.0.5 was discovered to contain a heap buffer overflow in caf_info function in caf_reader.c. | https://github.com/nu774/fdkaac/issues/55 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34577 | SQL injection vulnerability in Prestashop opartplannedpopup 1.4.11 and earlier allows remote attackers to run arbitrary SQL commands via OpartPlannedPopupModuleFrontController::prepareHook() method. | https://security.friendsofpresta.org/modules/2023/09/19/opartplannedpopup.html | 2023-06-07T00:00:00 | 2023-09-21T00:00:00 | 2023-09-21T16:03:40.438061 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34127 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.851Z | 2023-07-13T00:47:58.798Z | 2023-07-13T00:47:58.798Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34936 | A stack overflow in the UpdateMacClone function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34035 | Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.)
Specifically, an application is vulnerable when all of the following are true:
* Spring MVC is on the classpath
* Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet)
* The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints
An application is not vulnerable if any of the following is true:
* The application does not have Spring MVC on the classpath
* The application secures no servlets other than Spring MVC’s DispatcherServlet
* The application uses requestMatchers(String) only for Spring MVC endpoints
| https://spring.io/security/cve-2023-34035 | 2023-05-25T17:21:56.200Z | 2023-07-18T15:29:10.091Z | 2023-07-18T15:29:10.091Z | {'Vendor': 'n/a', 'Product': 'Spring Security', 'Versions': 'Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1'} |
CVE-2023-34465 | XWiki Platform is a generic wiki platform. Starting in version 11.8-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.2, `Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can change the mail obfuscation configuration and view and edit the mail sending configuration, including the smtp domain name and credentials. The problem has been patched in XWiki 14.4.8, 14.10.6, and 15.1. As a workaround, the rights of the `Mail.MailConfig` page can be manually updated so that only a set of trusted users can view, edit and delete it (e.g., the `XWiki.XWikiAdminGroup` group). | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc | 2023-06-06T16:16:53.560Z | 2023-06-23T15:07:59.732Z | 2023-06-23T15:07:59.732Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 11.8-rc-1, < 14.4.8, >= 14.5, < 14.10.6, >= 15.0-rc-1, < 15.1'} |
CVE-2023-34170 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Overnight Quick/Bulk Order Form for WooCommerce plugin <= 3.5.7 versions. | https://patchstack.com/database/vulnerability/woocommerce-bulk-order-form/wordpress-quick-bulk-order-form-for-woocommerce-plugin-3-5-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-29T13:52:11.723Z | 2023-06-22T14:26:25.793Z | 2023-06-22T14:26:25.793Z | {'Vendor': 'WP Overnight', 'Product': 'Quick/Bulk Order Form for WooCommerce', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.