CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-51399
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFactory Back Button Widget allows Stored XSS.This issue affects Back Button Widget: from n/a through 1.6.3.
https://patchstack.com/database/vulnerability/back-button-widget/wordpress-back-button-widget-plugin-1-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-18T22:08:57.076Z
2023-12-29T10:20:21.296Z
2023-12-29T10:20:21.296Z
{'Vendor': 'WPFactory', 'Product': 'Back Button Widget', 'Versions': 'n/a'}
CVE-2023-51663
Hail is an open-source, general-purpose, Python-based data analysis tool with additional data types and methods for working with genomic data. Hail relies on OpenID Connect (OIDC) email addresses from ID tokens to verify the validity of a user's domain, but because users have the ability to change their email address, they could create accounts and use resources in clusters that they should not have access to. For example, a user could create a Microsoft or Google account and then change their email to `[email protected]`. This account can then be used to create a Hail Batch account in Hail Batch clusters whose organization domain is `example.org`. The attacker is not able to access private data or impersonate another user, but they would have the ability to run jobs if Hail Batch billing projects are enabled and create Azure Tenants if they have Azure Active Directory Administrator access.
https://github.com/hail-is/hail/security/advisories/GHSA-487p-qx68-5vjw
2023-12-21T14:14:26.224Z
2023-12-29T16:53:36.692Z
2023-12-29T16:53:36.692Z
{'Vendor': 'hail-is', 'Product': 'hail', 'Versions': '< 0.2.127'}
CVE-2023-51049
S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_bbsauth parameter at /admin/ajax.php.
https://www.notion.so/scms5-0-sql-injection-94c791a563d1481a9439fa98a1bc9a1b
2023-12-18T00:00:00
2023-12-21T00:00:00
2023-12-21T15:18:47.218248
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51419
Unrestricted Upload of File with Dangerous Type vulnerability in Bertha.Ai BERTHA AI. Your AI co-pilot for WordPress and Chrome.This issue affects BERTHA AI. Your AI co-pilot for WordPress and Chrome: from n/a through 1.11.10.7.
https://patchstack.com/database/vulnerability/bertha-ai-free/wordpress-bertha-ai-plugin-1-11-10-7-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve
2023-12-19T00:04:39.260Z
2023-12-29T13:30:24.561Z
2023-12-29T13:30:24.561Z
{'Vendor': 'Bertha.ai', 'Product': 'BERTHA AI. Your AI co-pilot for WordPress and Chrome', 'Versions': 'n/a'}
CVE-2023-51730
This vulnerability exist in Skyworth Router CM5100, version 4.1.1.24, due to insufficient validation of user supplied input for the DDNS Password parameter at its web interface. A remote attacker could exploit this vulnerability by supplying specially crafted input to the parameter at the web interface of the vulnerable targeted system. Successful exploitation of this vulnerability could allow the attacker to perform stored XSS attacks on the targeted system.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0013
2023-12-22T09:53:53.227Z
2024-01-17T07:05:23.683Z
2024-01-17T07:05:23.683Z
{'Vendor': 'Hathway', 'Product': 'Skyworth Router CM5100', 'Versions': '0'}
CVE-2023-51675
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in AAM Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More.This issue affects Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: from n/a through 6.9.18.
https://patchstack.com/database/vulnerability/advanced-access-manager/wordpress-advanced-access-manager-plugin-6-9-18-open-redirection-vulnerability?_s_id=cve
2023-12-21T14:51:15.760Z
2023-12-29T13:57:17.047Z
2023-12-29T13:57:17.047Z
{'Vendor': 'AAM', 'Product': 'Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More', 'Versions': 'n/a'}
CVE-2023-51767
OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
https://arxiv.org/abs/2309.02545
2023-12-24T00:00:00
2023-12-24T00:00:00
2024-01-25T14:06:38.770250
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51966
Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in the function setIptvInfo.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-setIptvInfo-944beaf189db4bf49f99a7a7418c7bdd
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T15:09:46.186874
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51435
Some Honor products are affected by incorrect privilege assignment vulnerability, successful exploitation could cause information leak.
https://www.hihonor.com/global/security/cve-2023-51435/
2023-12-19T01:27:50.842Z
2023-12-29T03:51:46.940Z
2023-12-29T03:51:46.940Z
{'Vendor': 'Honor', 'Product': 'Magic UI', 'Versions': '6.0'}
CVE-2023-51065
Incorrect access control in QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 allows unauthenticated attackers to obtain system backups and other sensitive information from the QStar Server.
https://github.com/Oracle-Security/CVEs/blob/main/QStar%20Archive%20Solutions/CVE-2023-51065.md
2023-12-18T00:00:00
2024-01-13T00:00:00
2024-01-13T03:57:10.029301
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51989
D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attackers to log in to administrator accounts with empty passwords.
https://github.com/funny-mud-peee/IoT-vuls/blob/main/dir822+/2/readme.md
2023-12-26T00:00:00
2024-01-11T00:00:00
2024-01-11T15:33:41.231403
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51462
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-12-19T17:03:41.382Z
2023-12-20T14:02:55.519Z
2023-12-20T14:02:55.519Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-51527
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Senol Sahin AI Power: Complete AI Pack – Powered by GPT-4.This issue affects AI Power: Complete AI Pack – Powered by GPT-4: from n/a through 1.8.2.
https://patchstack.com/database/vulnerability/gpt3-ai-content-generator/wordpress-ai-power-complete-ai-pack-powered-by-gpt-4-plugin-1-8-2-sensitive-data-exposure-vulnerability?_s_id=cve
2023-12-20T17:28:07.137Z
2023-12-29T14:58:30.874Z
2023-12-29T14:58:30.874Z
{'Vendor': 'Senol Sahin', 'Product': 'AI Power: Complete AI Pack – Powered by GPT-4', 'Versions': 'n/a'}
CVE-2023-51927
YonBIP v3_23.05 was discovered to contain a SQL injection vulnerability via the com.yonyou.hrcloud.attend.web.AttendScriptController.runScript() method.
https://www.yonyou.com/
2023-12-26T00:00:00
2024-01-20T00:00:00
2024-01-20T00:51:44.370906
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51024
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘tz’ parameter of the setNtpCfg interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setNtpCfg-tz/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:08:39.268617
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51073
An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh.
https://www.buffalotech.com
2023-12-18T00:00:00
2024-01-11T00:00:00
2024-01-11T02:30:21.202871
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51423
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder Team Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition.This issue affects Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition: from n/a through 3.05.0.
https://patchstack.com/database/vulnerability/webinar-ignition/wordpress-webinarignition-plugin-3-05-0-unauthenticated-sql-injection-vulnerability?_s_id=cve
2023-12-19T00:04:39.261Z
2023-12-31T17:52:39.655Z
2023-12-31T17:52:39.655Z
{'Vendor': 'Saleswonder Team', 'Product': 'Webinar Plugin: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition', 'Versions': 'n/a'}
CVE-2023-51970
Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the function formSetIptv.
https://grove-laser-8ad.notion.site/Tenda-AX1803-Buffer-Overflow-in-getIptvInfo-f5918cc2828c49e78554f456bf7d4b36
2023-12-26T00:00:00
2024-01-10T00:00:00
2024-01-10T15:19:56.776295
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51136
TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formRebootSchedule.
https://totolink.cn/home/menu/detail.html?menu_listtpl=download&id=85&ids=36
2023-12-18T00:00:00
2023-12-30T00:00:00
2023-12-30T15:28:15.062986
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51100
Tenda W9 V1.0.0.7(4456)_CN was discovered to contain a command injection vulnerability via the function formGetDiagnoseInfo .
https://github.com/GD008/TENDA/blob/main/W9/W9_getDiagnoseInfo/W9_getDiagnoseInfo.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T17:20:47.226829
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51946
Multiple reflected cross-site scripting (XSS) vulnerabilities in nasSvr.php in actidata actiNAS-SL-2U-8 3.2.03-SP1 allow remote attackers to inject arbitrary web script or HTML.
http://actidata.com
2023-12-26T00:00:00
2024-01-19T00:00:00
2024-01-19T13:53:55.934249
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51784
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it. [1] https://github.com/apache/inlong/pull/9329
https://lists.apache.org/thread/4nxbyl6mh5jgh0plk0qposbxwn6w9h8j
2023-12-26T01:58:34.359Z
2024-01-03T09:39:23.382Z
2024-01-03T09:39:23.382Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.5.0'}
CVE-2023-51012
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanGateway parameter’ of the setLanConfig interface of the cstecgi .cgi.
https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setLanConfig-lanGateway/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T18:34:48.283740
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51442
Navidrome is an open source web-based music collection server and streamer. A security vulnerability has been identified in navidrome's subsonic endpoint, allowing for authentication bypass. This exploit enables unauthorized access to any known account by utilizing a JSON Web Token (JWT) signed with the key "not so secret". The vulnerability can only be exploited on instances that have never been restarted. Navidrome supports an extension to the subsonic authentication scheme, where a JWT can be provided using a `jwt` query parameter instead of the traditional password or token and salt (corresponding to resp. the `p` or `t` and `s` query parameters). This authentication bypass vulnerability potentially affects all instances that don't protect the subsonic endpoint `/rest/`, which is expected to be most instances in a standard deployment, and most instances in the reverse proxy setup too (as the documentation mentions to leave that endpoint unprotected). This issue has been patched in version 0.50.2.
https://github.com/navidrome/navidrome/security/advisories/GHSA-wq59-4q6r-635r
2023-12-19T13:52:41.787Z
2023-12-21T14:54:56.848Z
2023-12-21T14:54:56.848Z
{'Vendor': 'navidrome', 'Product': 'navidrome', 'Versions': '<= 0.50.1'}
CVE-2023-51655
In JetBrains IntelliJ IDEA before 2023.3.2 code execution was possible in Untrusted Project mode via a malicious plugin repository specified in the project configuration
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-12-21T09:56:59.233Z
2023-12-21T09:57:04.395Z
2023-12-21T09:57:04.395Z
{'Vendor': 'JetBrains', 'Product': 'IntelliJ IDEA', 'Versions': '0'}
CVE-2023-51439
A vulnerability has been identified in JT2Go (All versions < V14.3.0.6), Teamcenter Visualization V13.3 (All versions < V13.3.0.13), Teamcenter Visualization V14.1 (All versions < V14.1.0.12), Teamcenter Visualization V14.2 (All versions < V14.2.0.9), Teamcenter Visualization V14.3 (All versions < V14.3.0.6). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted CGM files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-794653.pdf
2023-12-19T11:47:14.991Z
2024-01-09T10:00:14.394Z
2024-01-09T10:00:14.394Z
{'Vendor': 'Siemens', 'Product': 'JT2Go', 'Versions': 'All versions < V14.3.0.6'}
CVE-2023-51252
PublicCMS 4.0 is vulnerable to Cross Site Scripting (XSS). Because files can be uploaded and online preview function is provided, pdf files and html files containing malicious code are uploaded, an XSS popup window is realized through online viewing.
https://github.com/sanluan/PublicCMS/issues/79
2023-12-18T00:00:00
2024-01-10T00:00:00
2024-01-10T08:32:36.503933
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51751
ScaleFusion 10.5.2 does not properly limit users to the Edge application because Alt-F4 can be used. This is fixed in 10.5.7 by preventing the launching of the file explorer in Agent-based Multi-App and Single App Kiosk mode.
https://medium.com/nestedif/vulnerability-disclosure-kiosk-mode-bypass-scalefusion-4752dfa2dc59
2023-12-22T00:00:00
2024-01-11T00:00:00
2024-01-18T18:37:59.537379
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51028
TOTOLINK EX1800T 9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the apcliChannel parameter of the setWiFiExtenderConfig interface of the cstecgi.cgi.
https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliChannel/
2023-12-18T00:00:00
2023-12-22T00:00:00
2023-12-22T17:54:32.089030
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-51090
Tenda M3 V1.0.0.12(4856) was discovered to contain a stack overflow via the function formGetWeiXinConfig.
https://github.com/GD008/TENDA/blob/main/M3/getWeiXinConfig/M3_getWeiXinConfig.md
2023-12-18T00:00:00
2023-12-26T00:00:00
2023-12-26T17:16:17.932339
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34384
Cross-Site Request Forgery (CSRF) vulnerability in Kebo Kebo Twitter Feed plugin <= 1.5.12 versions.
https://patchstack.com/database/vulnerability/kebo-twitter-feed/wordpress-kebo-twitter-feed-plugin-1-5-12-cross-site-request-forgery-csrf?_s_id=cve
2023-06-02T15:48:00.545Z
2023-11-13T00:58:11.841Z
2023-11-13T00:58:11.841Z
{'Vendor': 'Kebo', 'Product': 'Kebo Twitter Feed', 'Versions': 'n/a'}
CVE-2023-34107
GLPI is a free asset and IT management software package. Versions of the software starting with 9.2.0 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user, allows access to the view all KnowbaseItems. Version 10.0.8 has a patch for this issue.
https://github.com/glpi-project/glpi/security/advisories/GHSA-966h-xrf5-pmj4
2023-05-25T21:56:51.246Z
2023-07-05T19:15:31.060Z
2023-07-05T19:15:31.060Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.2.0, < 10.0.8'}
CVE-2023-34412
A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an authenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS).
https://cert.vde.com/en/advisories/VDE-2023-012/
2023-06-05T12:05:57.451Z
2023-08-17T13:07:01.697Z
2023-11-16T11:02:33.346Z
{'Vendor': 'Red Lion Europe', 'Product': 'mbNET', 'Versions': '0'}
CVE-2023-34941
A stored cross-site scripting (XSS) vulnerability in the urlFilterList function of Asus RT-N10LX Router v2.0.0.39 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL Keyword List text field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/OlivierLaflamme/cve/blob/main/ASUS-N10LX_2.0.0.39/StoredXSS_FirewallURLFilter.md
2023-06-07T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34150
** UNSUPPORTED WHEN ASSIGNED ** Use of TikaEncodingDetector in Apache Any23 can cause excessive memory usage.
https://lists.apache.org/thread/713tk23khbtbg940pb2ql8ggd4cvh6j1
2023-05-28T15:27:56.797Z
2023-07-05T07:28:35.592Z
2023-07-14T08:51:48.453Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Any23', 'Versions': '0'}
CVE-2023-34853
Buffer Overflow vulnerability in Supermicro motherboard X12DPG-QR 1.4b allows local attackers to hijack control flow via manipulation of SmcSecurityEraseSetupVar variable.
https://www.supermicro.com/Bios/softfiles/17136/X12DPG-QR_1.4b_X1.02.61_SUM2.10.0.zip.
2023-06-07T00:00:00
2023-08-22T00:00:00
2023-08-22T16:37:47.886601
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34916
Fuge CMS v1.0 contains an Open Redirect vulnerability via /front/ProcessAct.java.
https://github.com/fuge/cms/issues/4
2023-06-07T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34015
Cross-Site Request Forgery (CSRF) vulnerability in PI Websolution Conditional shipping & Advanced Flat rate shipping rates / Flexible shipping for WooCommerce shipping plugin <= 1.6.4.4 versions.
https://patchstack.com/database/vulnerability/advanced-free-flat-shipping-woocommerce/wordpress-advanced-flat-rate-shipping-woocommerce-plugin-1-6-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T11:26:00.464Z
2023-07-11T08:36:04.177Z
2023-07-11T08:36:04.177Z
{'Vendor': 'PI Websolution', 'Product': 'Conditional shipping & Advanced Flat rate shipping rates / Flexible shipping for WooCommerce shipping', 'Versions': 'n/a'}
CVE-2023-34795
xlsxio v0.1.2 to v0.2.34 was discovered to contain a free of uninitialized pointer in the xlsxioread_sheetlist_close() function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted XLSX file.
https://github.com/brechtsanders/xlsxio/issues/121
2023-06-07T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34845
Bludit v3.14.1 was discovered to contain an arbitrary file upload vulnerability in the component /admin/new-content. This vulnerability allows attackers to execute arbitrary web scripts or HTML via uploading a crafted SVG file. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
https://github.com/bludit/bludit/issues/1508
2023-06-07T00:00:00
2023-06-16T00:00:00
2023-12-30T20:54:11.278762
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34146
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34147 and CVE-2023-34148.
https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US
2023-05-26T18:41:36.333Z
2023-06-26T21:58:00.477Z
2023-06-26T21:58:00.477Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019'}
CVE-2023-34453
snappy-java is a fast compressor/decompressor for Java. Due to unchecked multiplications, an integer overflow may occur in versions prior to 1.1.10.1, causing a fatal error. The function `shuffle(int[] input)` in the file `BitShuffle.java` receives an array of integers and applies a bit shuffle on it. It does so by multiplying the length by 4 and passing it to the natively compiled shuffle function. Since the length is not tested, the multiplication by four can cause an integer overflow and become a smaller value than the true size, or even zero or negative. In the case of a negative value, a `java.lang.NegativeArraySizeException` exception will raise, which can crash the program. In a case of a value that is zero or too small, the code that afterwards references the shuffled array will assume a bigger size of the array, which might cause exceptions such as `java.lang.ArrayIndexOutOfBoundsException`. The same issue exists also when using the `shuffle` functions that receive a double, float, long and short, each using a different multiplier that may cause the same issue. Version 1.1.10.1 contains a patch for this vulnerability.
https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf
2023-06-06T16:16:53.558Z
2023-06-15T16:12:34.119Z
2023-06-15T16:12:34.119Z
{'Vendor': 'xerial', 'Product': 'snappy-java', 'Versions': '< 1.1.10.1'}
CVE-2023-34392
A Missing Authentication for Critical Function vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run arbitrary commands on managed devices by an authorized device operator. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
https://selinc.com/support/security-notifications/external-reports/
2023-06-02T17:18:29.697Z
2023-08-31T15:31:57.140Z
2023-08-31T15:31:57.140Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5037 SEL Grid Configurator', 'Versions': '0'}
CVE-2023-34238
Gatsby is a free and open source framework based on React. The Gatsby framework prior to versions 4.25.7 and 5.9.1 contain a Local File Inclusion vulnerability in the `__file-code-frame` and `__original-stack-frame` paths, exposed when running the Gatsby develop server (`gatsby develop`). Any file in scope of the development server could potentially be exposed. It should be noted that by default `gatsby develop` is only accessible via the localhost `127.0.0.1`, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as `--host 0.0.0.0`, `-H 0.0.0.0`, or the `GATSBY_HOST=0.0.0.0` environment variable. A patch has been introduced in `[email protected]` and `[email protected]` which mitigates the issue. Users are advised to upgrade. Users unable to upgrade should avoid exposing their development server to the internet.
https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-c6f8-8r25-c4gc
2023-05-31T13:51:51.169Z
2023-06-07T23:24:49.724Z
2023-06-07T23:24:49.724Z
{'Vendor': 'gatsbyjs', 'Product': 'gatsby', 'Versions': '>= 5.0.0, < 5.9.1, < 4.25.7'}
CVE-2023-34111
The `Release PR Merged` workflow in the github repo taosdata/grafanaplugin is subject to a command injection vulnerability which allows for arbitrary code execution within the github action context due to the insecure usage of `${{ github.event.pull_request.title }}` in a bash command within the GitHub workflow. Attackers can inject malicious commands which will be executed by the workflow. This happens because `${{ github.event.pull_request.title }}` is directly passed to bash command on like 25 of the workflow. This may allow an attacker to gain access to secrets which the github action has access to or to otherwise make use of the compute resources.
https://github.com/taosdata/grafanaplugin/security/advisories/GHSA-23wp-p848-hcgr
2023-05-25T21:56:51.247Z
2023-06-06T16:29:21.279Z
2023-06-06T16:29:21.279Z
{'Vendor': 'taosdata', 'Product': 'grafanaplugin', 'Versions': '<= 2e4c82b002'}
CVE-2023-34541
Langchain 0.0.171 is vulnerable to Arbitrary code execution in load_prompt.
https://github.com/hwchase17/langchain/issues/4849
2023-06-07T00:00:00
2023-06-20T00:00:00
2023-06-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34054
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable if Reactor Netty HTTP Server built-in integration with Micrometer is enabled.
https://spring.io/security/cve-2023-34054
2023-05-25T17:21:56.203Z
2023-11-28T08:16:14.361Z
2023-11-28T08:16:57.848Z
{'Vendor': 'Spring', 'Product': 'Reactor Netty', 'Versions': '1.1.0, 1.0.0, older unsupported versions'}
CVE-2023-34613
An issue was discovered sojo thru 1.1.1 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://github.com/maddingo/sojo/issues/15
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34243
TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated. This issue has been addressed in version 5.12.5. Users are advised to upgrade. Users unable to upgrade may be mitigated by rate-limiting API calls with software that sits in front of TGS in the HTTP pipeline such as fail2ban.
https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93-76ph
2023-05-31T13:51:51.172Z
2023-06-08T21:09:14.628Z
2023-06-08T21:09:14.628Z
{'Vendor': 'tgstation', 'Product': 'tgstation-server', 'Versions': '>= 4.0.0, < 5.12.5'}
CVE-2023-34756
bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the cid parameter at admin/index.php?mode=settings&page=charset&action=edit.
https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34185
Cross-Site Request Forgery (CSRF) vulnerability in John Brien WordPress NextGen GalleryView plugin <= 0.5.5 versions.
https://patchstack.com/database/vulnerability/wordpress-nextgen-galleryview/wordpress-wordpress-nextgen-galleryview-plugin-0-5-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-29T13:52:39.505Z
2023-07-11T11:17:41.340Z
2023-07-11T11:17:41.340Z
{'Vendor': 'John Brien', 'Product': 'WordPress NextGen GalleryView', 'Versions': 'n/a'}
CVE-2023-34869
PHPJabbers Catering System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /index.php?controller=pjAdmin&action=pjActionForgot.
https://www.phpjabbers.com/catering-system/
2023-06-07T00:00:00
2023-08-01T00:00:00
2023-08-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34214
TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-generation function, which could potentially allow malicious users to execute remote code on affected devices.
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
2023-05-31T08:58:06.149Z
2023-08-17T02:26:05.428Z
2023-10-20T07:03:28.811Z
{'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'}
CVE-2023-34644
Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth.
https://www.ruijie.com.cn/gy/xw-aqtg-gw/91389/
2023-06-07T00:00:00
2023-07-31T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34994
An improper resource allocation vulnerability exists in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to creation of an arbitrary directory. An attacker can send a sequence of requests to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1773
2023-06-13T17:04:29.057Z
2023-09-05T16:15:03.744Z
2023-09-05T16:15:03.744Z
{'Vendor': 'Open Automation Software', 'Product': 'OAS Platform', 'Versions': 'v18.00.0072'}
CVE-2023-34097
hoppscotch is an open source API development ecosystem. In versions prior to 2023.4.5 the database password is exposed in the logs when showing the database connection string. Attackers with access to read system logs will be able to elevate privilege with full access to the database. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qpx8-wq6q-r833
2023-05-25T21:56:51.245Z
2023-06-05T20:02:04.497Z
2023-06-05T20:02:04.497Z
{'Vendor': 'hoppscotch', 'Product': 'hoppscotch', 'Versions': '< 2023.4.5'}
CVE-2023-34652
PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS) via Add New Course.
https://phpgurukul.com/hostel-management-system/
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34347
​Delta Electronics InfraSuite Device Master versions prior to 1.0.7 contains classes that cannot be deserialized, which could allow an attack to remotely execute arbitrary code.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-01
2023-06-06T14:32:07.383Z
2023-07-10T18:59:30.158Z
2023-07-10T18:59:30.158Z
{'Vendor': 'Delta Electronics', 'Product': 'Infrasuite Device Master', 'Versions': '0'}
CVE-2023-34982
This external control vulnerability, if exploited, could allow a local OS-authenticated user with standard privileges to delete files with System privilege on the machine where these products are installed, resulting in denial of service.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-318-01
2023-06-13T14:56:36.310Z
2023-11-15T16:28:35.183Z
2023-11-15T16:28:35.183Z
{'Vendor': 'AVEVA ', 'Product': 'SystemPlatform', 'Versions': '0'}
CVE-2023-34255
null
null
2023-05-31T00:00:00
null
2023-06-05T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-34469
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the physical network. A successful exploit of this vulnerability may lead to a loss of confidentiality. 
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023007.pdf
2023-06-07T03:10:19.973Z
2023-09-12T15:21:11.450Z
2023-09-25T15:58:14.117Z
{'Vendor': 'AMI', 'Product': 'AptioV', 'Versions': '*'}
CVE-2023-34193
File Upload vulnerability in Zimbra ZCS 8.8.15 allows an authenticated privileged user to execute arbitrary code and obtain sensitive information via the ClientUploader function.
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
2023-05-30T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34039
Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.
https://www.vmware.com/security/advisories/VMSA-2023-0018.html
2023-05-25T17:21:56.201Z
2023-08-29T17:36:18.899Z
2023-08-29T17:36:18.899Z
{'Vendor': 'n/a', 'Product': 'Aria Operations for Networks', 'Versions': 'Aria Operations for Networks 6.x'}
CVE-2023-34486
itsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote code execution can be achieved by entering malicious code in the date selection box.
https://github.com/JunyanYip/itsourcecode_justines_xss_vul
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34367
Windows 7 is vulnerable to a full blind TCP/IP hijacking attack. The vulnerability exists in Windows 7 (any Windows until Windows 8) and in any implementation of TCP/IP, which is vulnerable to the Idle scan attack (including many IoT devices). NOTE: The vendor considers this a low severity issue.
http://blog.pi3.com.pl/?p=850
2023-06-02T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34672
Improper Access Control leads to adding a high-privilege user affecting Elenos ETG150 FM transmitter running on version 3.12 by exploiting user's role within the admin profile. An attack could occur over the public Internet in some cases.
http://elenos.com
2023-06-07T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34388
An Improper Authentication vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote unauthenticated attacker to potentially perform session hijacking attack and bypass authentication. See product Instruction Manual Appendix A dated 20230830 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-06-02T17:18:29.696Z
2023-11-30T16:54:08.503Z
2023-11-30T16:54:08.503Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-451', 'Versions': 'R315-V0, R316-V0, R317-V0, R318-V0, R320-V0, R321-V0, R322-V0, R323-V0, R324-V0, R325-V0, R326-V0, R327-V0'}
CVE-2023-34222
In JetBrains TeamCity before 2023.05 possible XSS in the Plugin Vendor URL was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:33.585Z
2023-05-31T13:03:14.995Z
2023-05-31T13:03:14.995Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34449
ink! is an embedded domain specific language to write smart contracts in Rust for blockchains built on the Substrate framework. Starting in version 4.0.0 and prior to version 4.2.1, the return value when using delegate call mechanics, either through `CallBuilder::delegate` or `ink_env::invoke_contract_delegate`, is decoded incorrectly. This bug was related to the mechanics around decoding a call's return buffer, which was changed as part of pull request 1450. Since this feature was only released in ink! 4.0.0, no previous versions are affected. Users who have an ink! 4.x series contract should upgrade to 4.2.1 to receive a patch.
https://github.com/paritytech/ink/security/advisories/GHSA-853p-5678-hv8f
2023-06-06T16:16:53.558Z
2023-06-14T20:10:54.842Z
2023-06-14T20:11:15.570Z
{'Vendor': 'paritytech', 'Product': 'ink', 'Versions': '>= 4.0.0, < 4.2.1'}
CVE-2023-34330
AMI SPx contains a vulnerability in the BMC where a user may inject code which could be executed via a Dynamic Redfish Extension interface. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability. 
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf
2023-06-01T16:05:31.611Z
2023-07-18T17:12:09.153Z
2023-07-19T21:02:49.594Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx12', 'Versions': '12.0'}
CVE-2023-34625
ShowMojo MojoBox Digital Lockbox 1.4 is vulnerable to Authentication Bypass. The implementation of the lock opening mechanism via Bluetooth Low Energy (BLE) is vulnerable to replay attacks. A malicious user is able to intercept BLE requests and replicate them to open the lock at any time. Alternatively, an attacker with physical access to the device on which the Android app is installed, can obtain the latest BLE messages via the app logs and use them for opening the lock.
https://www.whid.ninja/blog/mojobox-yet-another-not-so-smartlock
2023-06-07T00:00:00
2023-07-20T00:00:00
2023-07-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34849
An unauthorized command injection vulnerability exists in the ActionLogin function of the webman.lua file in Ikuai router OS through 3.7.1.
https://github.com/cczzmm/IOT-POC/tree/main/Ikuai
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34326
The caching invalidation guidelines from the AMD-Vi specification (48882—Rev 3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction (see stale DMA mappings) if some fields of the DTE are updated but the IOMMU TLB is not flushed. Such stale DMA mappings can point to memory ranges not owned by the guest, thus allowing access to unindented memory regions.
https://xenbits.xenproject.org/xsa/advisory-442.html
2023-06-01T10:44:17.065Z
2024-01-05T16:30:57.225Z
2024-01-05T16:30:57.225Z
{'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-442'}
CVE-2023-34408
DokuWiki before 2023-04-04a allows XSS via RSS titles.
https://github.com/dokuwiki/dokuwiki/pull/3967
2023-06-05T00:00:00
2023-06-05T00:00:00
2023-06-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34058
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
https://www.vmware.com/security/advisories/VMSA-2023-0024.html
2023-05-25T17:21:56.204Z
2023-10-27T04:53:09.935Z
2023-11-17T04:34:05.439Z
{'Vendor': 'n/a', 'Product': 'VMware Tools', 'Versions': '12.x.x, 11.x.x, 10.3.x'}
CVE-2023-34371
Cross-Site Request Forgery (CSRF) vulnerability in Didier Sampaolo SpamReferrerBlock plugin <= 2.22 versions.
https://patchstack.com/database/vulnerability/spamreferrerblock/wordpress-spamreferrerblock-plugin-2-22-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-02T15:45:18.619Z
2023-11-09T18:56:41.106Z
2023-11-09T18:56:41.106Z
{'Vendor': 'Didier Sampaolo', 'Product': 'SpamReferrerBlock', 'Versions': 'n/a'}
CVE-2023-34234
OpenZeppelin Contracts is a library for smart contract development. By frontrunning the creation of a proposal, an attacker can become the proposer and gain the ability to cancel it. The attacker can do this repeatedly to try to prevent a proposal from being proposed at all. This impacts the `Governor` contract in v4.9.0 only, and the `GovernorCompatibilityBravo` contract since v4.3.0. This problem has been patched in 4.9.1 by introducing opt-in frontrunning protection. Users are advised to upgrade. Users unable to upgrade may submit the proposal creation transaction to an endpoint with frontrunning protection as a workaround.
https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5h3x-9wvq-w4m2
2023-05-31T13:51:51.169Z
2023-06-07T17:06:10.154Z
2023-06-07T17:06:10.154Z
{'Vendor': 'OpenZeppelin', 'Product': 'openzeppelin-contracts', 'Versions': '>=4.3.0, < 4.9.1'}
CVE-2023-34473
AMI SPx contains a vulnerability in the BMC where a valid user may cause a use of hard-coded credentials. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf
2023-06-07T03:10:19.974Z
2023-07-05T18:10:11.083Z
2023-07-05T18:10:11.083Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0'}
CVE-2023-34189
Exposure of Resource to Wrong Sphere Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0. The attacker could use general users to delete and update the process, which only the admin can operate occurrences.  Users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8109  to solve it.
https://lists.apache.org/thread/smxqyx43hxjvzv4w71n2n3rfho9p378s
2023-05-30T01:48:40.322Z
2023-07-25T07:08:53.608Z
2023-07-25T07:08:53.608Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.4.0'}
CVE-2023-34023
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Miled WordPress Social Login plugin <= 3.0.4 versions.
https://patchstack.com/database/vulnerability/wordpress-social-login/wordpress-wordpress-social-login-plugin-3-0-4-cross-site-scripting-xss-vulnerability-2?_s_id=cve
2023-05-25T11:26:00.466Z
2023-08-30T14:25:02.811Z
2023-08-30T14:25:02.811Z
{'Vendor': 'Miled', 'Product': 'WordPress Social Login', 'Versions': 'n/a'}
CVE-2023-34865
Directory traversal vulnerability in ujcms 6.0.2 allows attackers to move files via the rename feature.
https://github.com/ujcms/ujcms/issues/5
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34166
Vulnerability of system restart triggered by abnormal callbacks passed to APIs.Successful exploitation of this vulnerability may cause the system to restart.
https://consumer.huawei.com/en/support/bulletin/2023/6/
2023-05-29T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-34977
A cross-site scripting (XSS) vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.0 ( 2023/07/27 ) and later
https://www.qnap.com/en/security-advisory/qsa-23-52
2023-06-08T08:26:04.295Z
2023-10-13T19:17:26.921Z
2023-10-13T19:17:26.921Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'}
CVE-2023-34131
Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics enables an unauthenticated attacker to access restricted web pages. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.852Z
2023-07-13T02:20:39.413Z
2023-07-13T02:20:39.413Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34561
A buffer overflow in the level parsing code of RobTop Games AB Geometry Dash v2.113 allows attackers to execute arbitrary code via entering a Geometry Dash level.
https://www.youtube.com/watch?v=DMxucOWfLPc
2023-06-07T00:00:00
2023-07-11T00:00:00
2023-07-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34832
TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4.
http://tp-link.com
2023-06-07T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34998
An authentication bypass vulnerability exists in the OAS Engine functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to arbitrary authentication. An attacker can sniff network traffic to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1770
2023-06-13T16:58:36.846Z
2023-09-05T16:15:05.068Z
2023-09-05T16:15:05.068Z
{'Vendor': 'Open Automation Software', 'Product': 'OAS Platform', 'Versions': 'v18.00.0072'}
CVE-2023-34648
A Cross Site Scripting vulnerability in PHPgurukl User Registration Login and User Management System with admin panel v.1.0 allows a local attacker to execute arbitrary code via a crafted script to the signup.php.
https://github.com/ckalnarayan/Common-Vulnerabilities-and-Exposures/blob/main/CVE-2023-34648
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34218
In JetBrains TeamCity before 2023.05 bypass of permission checks allowing to perform admin actions was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:32.605Z
2023-05-31T13:03:12.814Z
2023-05-31T13:03:12.814Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34432
A heap buffer overflow vulnerability was found in sox, in the lsx_readbuf function at sox/src/formats_i.c:98:16. This flaw can lead to a denial of service, code execution, or information disclosure.
https://access.redhat.com/security/cve/CVE-2023-34432
2023-06-06T07:28:27.561Z
2023-07-10T20:05:39.681Z
2023-07-10T20:05:39.681Z
{'Vendor': 'n/a', 'Product': 'sox', 'Versions': ''}
CVE-2023-34062
In Reactor Netty HTTP Server, versions 1.1.x prior to 1.1.13 and versions 1.0.x prior to 1.0.39, a malicious user can send a request using a specially crafted URL that can lead to a directory traversal attack. Specifically, an application is vulnerable if Reactor Netty HTTP Server is configured to serve static resources.
https://spring.io/security/cve-2023-34062
2023-05-25T17:21:56.204Z
2023-11-15T09:46:42.975Z
2023-11-15T09:46:42.975Z
{'Vendor': 'n/a', 'Product': 'Reactor Netty', 'Versions': '1.1.0, 1.0.0, older unsupported versions'}
CVE-2023-34598
Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.
https://github.com/maddsec/CVE-2023-34598
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34961
Chamilo v1.11.x up to v1.11.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the /feedback/comment field.
https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-105-2023-04-15-Low-impact-Moderate-risk-XSS-in-student-work-comments
2023-06-07T00:00:00
2023-06-08T00:00:00
2023-06-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34824
fdkaac before 1.0.5 was discovered to contain a heap buffer overflow in caf_info function in caf_reader.c.
https://github.com/nu774/fdkaac/issues/55
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34577
SQL injection vulnerability in Prestashop opartplannedpopup 1.4.11 and earlier allows remote attackers to run arbitrary SQL commands via OpartPlannedPopupModuleFrontController::prepareHook() method.
https://security.friendsofpresta.org/modules/2023/09/19/opartplannedpopup.html
2023-06-07T00:00:00
2023-09-21T00:00:00
2023-09-21T16:03:40.438061
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34127
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SonicWall GMS, SonicWall Analytics enables an authenticated attacker to execute arbitrary code with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.851Z
2023-07-13T00:47:58.798Z
2023-07-13T00:47:58.798Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34936
A stack overflow in the UpdateMacClone function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34936.md
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34035
Spring Security versions 5.8 prior to 5.8.5, 6.0 prior to 6.0.5, and 6.1 prior to 6.1.2 could be susceptible to authorization rule misconfiguration if the application uses requestMatchers(String) and multiple servlets, one of them being Spring MVC’s DispatcherServlet. (DispatcherServlet is a Spring MVC component that maps HTTP endpoints to methods on @Controller-annotated classes.) Specifically, an application is vulnerable when all of the following are true: * Spring MVC is on the classpath * Spring Security is securing more than one servlet in a single application (one of them being Spring MVC’s DispatcherServlet) * The application uses requestMatchers(String) to refer to endpoints that are not Spring MVC endpoints An application is not vulnerable if any of the following is true: * The application does not have Spring MVC on the classpath * The application secures no servlets other than Spring MVC’s DispatcherServlet * The application uses requestMatchers(String) only for Spring MVC endpoints
https://spring.io/security/cve-2023-34035
2023-05-25T17:21:56.200Z
2023-07-18T15:29:10.091Z
2023-07-18T15:29:10.091Z
{'Vendor': 'n/a', 'Product': 'Spring Security', 'Versions': 'Spring Security 5.8.0 to 5.8.4, Spring Security 6.0.0 to 6.0.4, Spring Security 6.1.0 to 6.1.1'}
CVE-2023-34465
XWiki Platform is a generic wiki platform. Starting in version 11.8-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.2, `Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can change the mail obfuscation configuration and view and edit the mail sending configuration, including the smtp domain name and credentials. The problem has been patched in XWiki 14.4.8, 14.10.6, and 15.1. As a workaround, the rights of the `Mail.MailConfig` page can be manually updated so that only a set of trusted users can view, edit and delete it (e.g., the `XWiki.XWikiAdminGroup` group).
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc
2023-06-06T16:16:53.560Z
2023-06-23T15:07:59.732Z
2023-06-23T15:07:59.732Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 11.8-rc-1, < 14.4.8, >= 14.5, < 14.10.6, >= 15.0-rc-1, < 15.1'}
CVE-2023-34170
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Overnight Quick/Bulk Order Form for WooCommerce plugin <= 3.5.7 versions.
https://patchstack.com/database/vulnerability/woocommerce-bulk-order-form/wordpress-quick-bulk-order-form-for-woocommerce-plugin-3-5-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-29T13:52:11.723Z
2023-06-22T14:26:25.793Z
2023-06-22T14:26:25.793Z
{'Vendor': 'WP Overnight', 'Product': 'Quick/Bulk Order Form for WooCommerce', 'Versions': 'n/a'}