CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-34332
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause an untrusted pointer to dereference by a local network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023010.pdf
2023-06-01T16:05:31.611Z
2024-01-09T22:14:28.892Z
2024-01-09T22:14:28.892Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12, 13'}
CVE-2023-34220
In JetBrains TeamCity before 2023.05 stored XSS in the Commit Status Publisher window was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:33.129Z
2023-05-31T13:03:13.956Z
2023-05-31T13:03:13.956Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34735
Property Cloud Platform Management Center 1.0 is vulnerable to error-based SQL injection.
https://github.com/prismbreak/vulnerabilities/issues/4
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34365
A stack-based buffer overflow vulnerability exists in the libutils.so nvram_restore functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a buffer overflow. An attacker can send a network request to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763
2023-06-12T16:02:35.314Z
2023-10-11T15:14:30.818Z
2023-10-11T17:00:10.408Z
{'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'}
CVE-2023-34109
zxcvbn-ts is an open source password strength estimator written in typescript. This vulnerability affects users running on the nodeJS platform which are using the second argument of the zxcvbn function. It can result in an unbounded resource consumption as the user inputs array is extended with every function call. Browsers are impacted, too but a single user need to do a lot of input changes so that it affects the browser, while the node process gets the inputs of every user of a platform and can be killed that way. This problem has been patched in version 3.0.2. Users are advised to upgrade. Users unable to upgrade should stop using the second argument of the zxcvbn function and use the zxcvbnOptions.setOptions function.
https://github.com/zxcvbn-ts/zxcvbn/security/advisories/GHSA-38hx-x5hq-5fg4
2023-05-25T21:56:51.246Z
2023-06-07T17:11:21.949Z
2023-06-07T17:11:21.949Z
{'Vendor': 'zxcvbn-ts', 'Product': 'zxcvbn', 'Versions': '< 3.0.2'}
CVE-2023-34108
mailcow is a mail server suite based on Dovecot, Postfix and other open source software, that provides a modern web UI for user/server administration. A vulnerability has been discovered in mailcow which allows an attacker to manipulate internal Dovecot variables by using specially crafted passwords during the authentication process. The issue arises from the behavior of the `passwd-verify.lua` script, which is responsible for verifying user passwords during login attempts. Upon a successful login, the script returns a response in the format of "password=<valid-password>", indicating the successful authentication. By crafting a password with additional key-value pairs appended to it, an attacker can manipulate the returned string and influence the internal behavior of Dovecot. For example, using the password "123 mail_crypt_save_version=0" would cause the `passwd-verify.lua` script to return the string "password=123 mail_crypt_save_version=0". Consequently, Dovecot will interpret this string and set the internal variables accordingly, leading to unintended consequences. This vulnerability can be exploited by an authenticated attacker who has the ability to set their own password. Successful exploitation of this vulnerability could result in unauthorized access to user accounts, bypassing security controls, or other malicious activities. This issue has been patched in version `2023-05a`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-mhh4-qchc-pv22
2023-05-25T21:56:51.246Z
2023-06-07T17:16:54.206Z
2023-06-07T17:16:54.206Z
{'Vendor': 'mailcow', 'Product': 'mailcow-dockerized', 'Versions': '< 2023-05a'}
CVE-2023-34671
Improper Access Control leads to privilege escalation affecting Elenos ETG150 FM transmitter running on version 3.12 by exploiting user's role in the user profile. An attack could occur over the public Internet in some cases.
http://elenos.com
2023-06-07T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34221
In JetBrains TeamCity before 2023.05 stored XSS in the Show Connection page was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:33.365Z
2023-05-31T13:03:14.464Z
2023-05-31T13:03:14.464Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34734
Annet AC Centralized Management Platform 1.02.040 is vulnerable to Stored Cross-Site Scripting (XSS) .
https://github.com/prismbreak/vulnerabilities/issues/3
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34364
A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
https://progress.com
2023-06-02T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34626
Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function.
https://github.com/Piwigo/Piwigo/issues/1924
2023-06-07T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34333
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause an untrusted pointer to dereference via a local network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023010.pdf
2023-06-01T16:05:31.611Z
2024-01-09T22:17:06.695Z
2024-01-09T22:17:06.695Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12, 13'}
CVE-2023-34149
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater.
https://cwiki.apache.org/confluence/display/WW/S2-063
2023-05-28T09:33:09.462Z
2023-06-14T07:48:54.926Z
2023-06-14T07:48:54.926Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Struts', 'Versions': '0, 0'}
CVE-2023-34260
Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow a denial of service (service outage) via /wlmdeu%2f%2e%2e%2f%2e%2e followed by a directory reference such as %2fetc%00index.htm to try to read the /etc directory.
https://sec-consult.com/vulnerability-lab/
2023-05-31T00:00:00
2023-11-03T00:00:00
2023-11-03T03:52:07.682828
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34325
[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] libfsimage contains parsing code for several filesystems, most of them based on grub-legacy code. libfsimage is used by pygrub to inspect guest disks. Pygrub runs as the same user as the toolstack (root in a priviledged domain). At least one issue has been reported to the Xen Security Team that allows an attacker to trigger a stack buffer overflow in libfsimage. After further analisys the Xen Security Team is no longer confident in the suitability of libfsimage when run against guest controlled input with super user priviledges. In order to not affect current deployments that rely on pygrub patches are provided in the resolution section of the advisory that allow running pygrub in deprivileged mode. CVE-2023-4949 refers to the original issue in the upstream grub project ("An attacker with local access to a system (either through a disk or external drive) can present a modified XFS partition to grub-legacy in such a way to exploit a memory corruption in grub’s XFS file system implementation.") CVE-2023-34325 refers specifically to the vulnerabilities in Xen's copy of libfsimage, which is decended from a very old version of grub.
https://xenbits.xenproject.org/xsa/advisory-443.html
2023-06-01T10:44:17.065Z
2024-01-05T16:31:09.660Z
2024-01-05T16:31:09.660Z
{'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-443'}
CVE-2023-34958
Incorrect access control in Chamilo 1.11.* up to 1.11.18 allows a student subscribed to a given course to download documents belonging to another student if they know the document's ID.
https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-109-2023-04-15-Moderate-impact-Moderate-risk-IDOR-in-workstudent-publication
2023-06-07T00:00:00
2023-06-08T00:00:00
2023-06-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34237
SABnzbd is an open source automated Usenet download tool. A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users[exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface. This issue has been patched in commits `e3a722` and `422b4f` which have been included in the 4.0.2 release. Users are advised to upgrade. Users unable to upgrade should ensure that a username and password have been set if their instance is web accessible.
https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-hhgh-xgh3-985r
2023-05-31T13:51:51.169Z
2023-06-07T19:50:50.417Z
2023-06-07T19:50:50.417Z
{'Vendor': 'sabnzbd', 'Product': 'sabnzbd', 'Versions': '>= 1.1.0, < 4.0.2RC1'}
CVE-2023-34372
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Didier Sampaolo SpamReferrerBlock plugin <= 2.22 versions.
https://patchstack.com/database/vulnerability/spamreferrerblock/wordpress-spamreferrerblock-plugin-2-22-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-02T15:45:18.619Z
2023-08-30T15:04:19.949Z
2023-08-30T15:04:19.949Z
{'Vendor': 'Didier Sampaolo', 'Product': 'SpamReferrerBlock', 'Versions': 'n/a'}
CVE-2023-34165
Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions.
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672
2023-05-29T09:03:29.119Z
2023-06-16T06:54:59.538Z
2023-06-16T06:54:59.538Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.1.0'}
CVE-2023-34923
XML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation.
https://char49.com/articles/topdesk-vulnerable-to-xml-signature-wrapping-attacks
2023-06-07T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34470
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023007.pdf
2023-06-07T03:10:19.973Z
2023-09-12T15:21:58.331Z
2023-09-25T15:57:52.826Z
{'Vendor': 'AMI', 'Product': 'AptioV', 'Versions': '*'}
CVE-2023-34831
The "Submission Web Form" of Turnitin LTI tool/plugin version 1.3 is affected by HTML Injection attacks. The security issue affects the submission web form ("id" and "title" HTTP POST parameters) where the students submit their reports for similarity/plagiarism checks.
https://github.com/IthacaLabs/Turnitin/blob/main/Turnitin_Submission_Web_Form/
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34132
Use of password hash instead of password for authentication vulnerability in SonicWall GMS and Analytics allows Pass-the-Hash attacks. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.852Z
2023-07-13T02:24:25.820Z
2023-07-13T02:24:25.820Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34098
Shopware is an open source e-commerce software. Due to an incorrect configuration in the `.htaccess` file, the configuration file of the Javascript could be read in production environments (`themes/package-lock.json`). With this information, the specific Shopware version in a deployment might be determined by an attacker, which could be used for further attacks. Users are advised to update to version 5.7.18. There are no known workarounds for this vulnerability.
https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9
2023-05-25T21:56:51.245Z
2023-06-27T16:25:15.157Z
2023-06-27T16:25:15.157Z
{'Vendor': 'shopware', 'Product': 'shopware', 'Versions': '< 5.7.18'}
CVE-2023-34427
Protection mechanism failure in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html
2023-06-06T03:00:05.035Z
2023-08-11T02:37:24.682Z
2023-08-11T02:37:24.682Z
{'Vendor': 'n/a', 'Product': 'Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA', 'Versions': 'version 0.25.0'}
CVE-2023-34124
The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.851Z
2023-07-13T00:14:16.861Z
2023-07-13T00:14:16.861Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34962
Incorrect access control in Chamilo v1.11.x up to v1.11.18 allows a student to arbitrarily access and modify another student's personal notes.
https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-106-2023-04-15-Moderate-impact-Moderate-risk-A-student-can-access-and-modify-another-students-personal-notes
2023-06-07T00:00:00
2023-06-08T00:00:00
2023-06-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34431
Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html
2023-06-06T03:00:05.087Z
2023-11-14T19:05:08.245Z
2023-11-14T19:05:08.245Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BIOS firmware', 'Versions': 'See references'}
CVE-2023-34061
Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
https://www.cloudfoundry.org/blog/cve-2023-34061-gorouter-route-pruning/
2023-05-25T17:21:56.204Z
2024-01-12T07:01:49.532Z
2024-01-12T07:01:49.532Z
{'Vendor': 'Cloud Foundry', 'Product': 'Routing Release', 'Versions': '0.163.0'}
CVE-2023-34348
AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01
2023-07-12T18:40:13.110Z
2024-01-18T17:16:50.038Z
2024-01-18T17:16:50.038Z
{'Vendor': 'Aveva', 'Product': 'PI Server', 'Versions': '2023, 0'}
CVE-2023-34173
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alexander Semikashev Yandex Metrica Counter plugin <= 1.4.3 versions.
https://patchstack.com/database/vulnerability/counter-yandex-metrica/wordpress-yandex-metrica-counter-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-29T13:52:11.723Z
2023-08-30T14:04:10.829Z
2023-08-30T14:04:10.829Z
{'Vendor': 'Alexander Semikashev', 'Product': 'Yandex Metrica Counter', 'Versions': 'n/a'}
CVE-2023-34036
Reactive web applications that use Spring HATEOAS to produce hypermedia-based responses might be exposed to malicious forwarded headers if they are not behind a trusted proxy that ensures correctness of such headers, or if they don't have anything else in place to handle (and possibly discard) forwarded headers either in WebFlux or at the level of the underlying HTTP server. For the application to be affected, it needs to satisfy the following requirements: * It needs to use the reactive web stack (Spring WebFlux) and Spring HATEOAS to create links in hypermedia-based responses. * The application infrastructure does not guard against clients submitting (X-)Forwarded… headers.
https://spring.io/security/cve-2023-34036
2023-05-25T17:21:56.200Z
2023-07-17T10:00:43.245Z
2023-07-17T10:00:43.245Z
{'Vendor': 'Spring', 'Product': 'Spring HATEOAS', 'Versions': '1.5.4 or older, 2.0.4 or older, 2.1.0'}
CVE-2023-34466
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.0-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, tags from pages not viewable to the current user are leaked by the tags API. This information can also be exploited to infer the document reference of non-viewable pages. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0-rc-1.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7f2f-pcv3-j2r7
2023-06-06T16:16:53.560Z
2023-06-23T15:26:11.453Z
2023-06-23T15:26:11.453Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 5.0-milestone-1, < 14.4.8, >= 14.5, < 14.10.4'}
CVE-2023-34935
A stack overflow in the AddWlanMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34935.md
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34368
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kanban for WordPress Kanban Boards for WordPress plugin <= 2.5.20 versions.
https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-20-cross-site-scripting-xss-vulnerability-2?_s_id=cve
2023-06-02T15:45:18.619Z
2023-06-22T12:12:37.605Z
2023-06-22T12:12:37.605Z
{'Vendor': 'Kanban for WordPress', 'Product': 'Kanban Boards for WordPress', 'Versions': 'n/a'}
CVE-2023-34738
Chemex through 3.7.1 is vulnerable to arbitrary file upload.
https://github.com/celaraze/chemex/issues/64
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34942
Asus RT-N10LX Router v2.0.0.39 was discovered to contain a stack overflow via the mac parameter at /start-apply.html. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/OlivierLaflamme/cve/blob/main/ASUS-N10LX_2.0.0.39/MAC_Address_StackBOF.md
2023-06-07T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34411
The xml-rs crate before 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid <! token (such as <!DOCTYPEs/%<!A nesting) in an XML document. The earliest affected version is 0.8.9.
https://github.com/netvl/xml-rs/pull/226
2023-06-05T00:00:00
2023-06-05T00:00:00
2023-06-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34041
Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
https://www.cloudfoundry.org/blog/abuse-of-http-hop-by-hop-headers-in-cloud-foundry-gorouter/
2023-05-25T17:21:56.201Z
2023-09-08T07:22:00.607Z
2023-09-08T07:22:00.607Z
{'Vendor': 'Cloud Foundry', 'Product': 'Routing', 'Versions': 'all'}
CVE-2023-34104
fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option.
https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw
2023-05-25T21:56:51.246Z
2023-06-06T17:35:54.699Z
2024-01-22T17:25:26.760Z
{'Vendor': 'NaturalIntelligence', 'Product': 'fast-xml-parser', 'Versions': '>= 4.1.3, < 4.2.4'}
CVE-2023-34446
iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, when displaying `pages/preferences.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.
https://github.com/Combodo/iTop/security/advisories/GHSA-q4pp-j46r-gm68
2023-06-06T16:16:53.557Z
2023-10-25T15:35:21.187Z
2023-10-25T15:35:21.187Z
{'Vendor': 'Combodo', 'Product': 'iTop', 'Versions': '< 3.0.4'}
CVE-2023-34153
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
https://github.com/ImageMagick/ImageMagick/issues/6338
2023-05-29T00:00:00
2023-05-30T00:00:00
2023-08-31T02:07:17.015329
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'ImageMagick-6.7'}
CVE-2023-34796
Cross site scripting (XSS) vulnerabiliy in dmarcts-report-viewer dashboard versions 1.1 and thru commit 8a1d882b4c481a05e296e9b38a7961e912146a0f, allows unauthenticated attackers to execute arbitrary code via the org_name or domain values.
https://xmit.xyz/security/dmarcd-for-death/
2023-06-07T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34329
AMI MegaRAC SPx12 contains a vulnerability in BMC where a User may cause an authentication bypass by spoofing the HTTP header. A successful exploit of this vulnerability may lead to loss of confidentiality, integrity, and availability.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf
2023-06-01T16:05:31.611Z
2023-07-18T17:11:10.532Z
2023-07-19T20:54:03.741Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx12', 'Versions': '12.0'}
CVE-2023-34450
CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. An internal modification made in versions 0.34.28 and 0.37.1 to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places. The first is via logs, setting the `consensus` logging module to "debug" level (should not happen in production), and setting the log output format to JSON. The second is via RPC `dump_consensus_state`. Case 1, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node. In case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded. The theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated. As the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with two nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that "for" loop to never be reached). This regression was fixed in versions 0.34.29 and 0.37.2. Some workarounds are available. For case 1 (hitting the deadlock via logs), either don't set the log output to "json", leave at "plain", or don't set the consensus logging module to "debug", leave it at "info" or higher. For case 2 (hitting the deadlock via RPC `dump_consensus_state`), do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in one's nginx setup).
https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr
2023-06-06T16:16:53.558Z
2023-07-03T16:36:34.419Z
2023-07-03T16:36:34.419Z
{'Vendor': 'cometbft', 'Product': 'cometbft', 'Versions': '= 0.34.28, = 0.37.1'}
CVE-2023-34000
Unauth. IDOR vulnerability leading to PII Disclosure in WooCommerce Stripe Payment Gateway plugin <= 7.4.0 versions.
https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-payment-gateway-plugin-7-4-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve
2023-05-25T11:25:11.062Z
2023-06-14T07:30:11.268Z
2023-06-14T07:30:11.268Z
{'Vendor': 'WooCommerce', 'Product': 'WooCommerce Stripe Payment Gateway', 'Versions': 'n/a'}
CVE-2023-34145
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34144.
https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US
2023-05-26T18:41:36.333Z
2023-06-26T21:57:50.324Z
2023-06-26T21:57:50.324Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019'}
CVE-2023-34391
Insecure Inherited Permissions vulnerability in Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software on Windows allows Leveraging/Manipulating Configuration File Search Paths. See Instruction Manual Appendix A [Cybersecurity] tag dated 20230522 for more details. This issue affects SEL-5033 AcSELerator RTAC Software: before 1.35.151.21000.
https://selinc.com/support/security-notifications/external-reports/
2023-06-02T17:18:29.697Z
2023-08-31T15:31:45.454Z
2023-08-31T15:31:45.454Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5033 AcSELerator RTAC Software', 'Versions': '0'}
CVE-2023-34057
VMware Tools contains a local privilege escalation vulnerability. A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.
https://www.vmware.com/security/advisories/VMSA-2023-0024.html
2023-05-25T17:21:56.203Z
2023-10-27T04:52:55.280Z
2023-10-27T04:52:55.280Z
{'Vendor': 'n/a', 'Product': 'VMware Tools', 'Versions': '12.x.x, 11.x.x, 10.3.x'}
CVE-2023-34407
OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\ in a URL.
https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/
2023-06-05T00:00:00
2023-06-05T00:00:00
2023-06-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34112
JavaCPP Presets is a project providing Java distributions of native C++ libraries. All the actions in the `bytedeco/javacpp-presets` use the `github.event.head_commit.message​` parameter in an insecure way. For example, the commit message is used in a run statement - resulting in a command injection vulnerability due to string interpolation. No exploitation has been reported. This issue has been addressed in version 1.5.9. Users of JavaCPP Presets are advised to upgrade as a precaution.
https://github.com/bytedeco/javacpp-presets/security/advisories/GHSA-36rx-hq22-jm5x
2023-05-25T21:56:51.247Z
2023-06-08T23:05:36.423Z
2023-06-08T23:05:36.423Z
{'Vendor': 'bytedeco', 'Product': 'javacpp-presets', 'Versions': '< 1.5.9'}
CVE-2023-34755
bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the userid parameter at admin/index.php?mode=user&action=edit.
https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34610
An issue was discovered json-io thru 4.14.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://github.com/jdereg/json-io/issues/169
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34240
Cloudexplorer-lite is an open source cloud software stack. Weak passwords can be easily guessed and are an easy target for brute force attacks. This can lead to an authentication system failure and compromise system security. Versions of cloudexplorer-lite prior to 1.2.0 did not enforce strong passwords. This vulnerability has been fixed in version 1.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-px4m-5j22-5mw4
2023-05-31T13:51:51.171Z
2023-06-27T16:34:15.157Z
2023-06-27T16:34:15.157Z
{'Vendor': 'CloudExplorer-Dev', 'Product': 'CloudExplorer-Lite', 'Versions': '< 1.2.0'}
CVE-2023-34169
Cross-Site Request Forgery (CSRF) vulnerability in SAKURA Internet Inc. TS Webfonts for さくらのレンタルサーバ plugin <= 3.1.2 versions.
https://patchstack.com/database/vulnerability/ts-webfonts-for-sakura/wordpress-ts-webfonts-for-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-29T13:52:11.723Z
2023-11-09T19:27:46.935Z
2023-11-09T19:27:46.935Z
{'Vendor': 'SAKURA Internet Inc.', 'Product': 'TS Webfonts for さくらのレンタルサーバ', 'Versions': 'n/a'}
CVE-2023-34352
A permissions issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, watchOS 9.5. An attacker may be able to leak user account emails.
https://support.apple.com/en-us/HT213758
2023-07-20T15:04:15.880Z
2023-09-06T01:36:42.163Z
2023-09-06T01:36:42.163Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-34217
TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-delete function, which could potentially allow malicious users to delete arbitrary files.
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
2023-05-31T08:58:06.149Z
2023-08-17T06:48:38.770Z
2023-10-20T07:12:20.397Z
{'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'}
CVE-2023-34647
PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS).
https://github.com/ckalnarayan/Common-Vulnerabilities-and-Exposures/blob/main/CVE-2023-34647
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34094
ChuanhuChatGPT is a graphical user interface for ChatGPT and many large language models. A vulnerability in versions 20230526 and prior allows unauthorized access to the config.json file of the privately deployed ChuanghuChatGPT project, when authentication is not configured. The attacker can exploit this vulnerability to steal the API keys in the configuration file. The vulnerability has been fixed in commit bfac445. As a workaround, setting up access authentication can help mitigate the vulnerability.
https://github.com/GaiZhenbiao/ChuanhuChatGPT/security/advisories/GHSA-j34w-9xr4-m9p8
2023-05-25T21:56:51.244Z
2023-06-02T15:19:45.596Z
2023-06-02T15:19:45.596Z
{'Vendor': 'GaiZhenbiao', 'Product': 'ChuanhuChatGPT', 'Versions': '<= 20230526'}
CVE-2023-34997
Insecure inherited permissions in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html
2023-06-22T03:00:04.902Z
2023-11-14T19:04:40.233Z
2023-11-14T19:04:40.233Z
{'Vendor': 'n/a', 'Product': 'Intel Server Configuration Utility software', 'Versions': 'before version 16.0.9'}
CVE-2023-34581
Sourcecodester Service Provider Management System v1.0 is vulnerable to SQL Injection via the ID parameter in /php-spms/?page=services/view&id=2
https://github.com/ashikkunjumon/cve-reports/blob/main/README.md
2023-06-07T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34344
AMI BMC contains a vulnerability in the IPMI handler, where an unauthorized attacker can use certain oracles to guess a valid username, which may lead to information disclosure.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023005.pdf
2023-06-01T20:50:32.675Z
2023-06-12T16:54:19.265Z
2023-06-12T16:54:19.265Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0, 13.0'}
CVE-2023-34651
PHPgurukl Hospital Management System v.1.0 is vulnerable to Cross Site Scripting (XSS).
https://phpgurukul.com/hospital-management-system-in-php/
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34981
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.
https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz
2023-06-08T12:48:27.995Z
2023-06-21T10:26:16.916Z
2023-06-21T10:26:16.916Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M5, 10.1.8, 9.0.74, 8.5.88'}
CVE-2023-34128
Tomcat application credentials are hardcoded in SonicWall GMS and Analytics configuration file. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.851Z
2023-07-13T00:58:35.946Z
2023-07-13T00:58:35.946Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34597
A vulnerability in Fibaro Motion Sensor firmware v3.4 allows attackers to cause a Denial of Service (DoS) via a crafted Z-Wave message.
https://www.fibaro.com/en/products/motion-sensor/%3B
2023-06-07T00:00:00
2023-06-20T00:00:00
2023-06-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34256
An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.
https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-10-19T23:06:52.874138
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34939
Onlyoffice Community Server before v12.5.2 was discovered to contain a remote code execution (RCE) vulnerability via the component UploadProgress.ashx.
https://github.com/firsov/onlyoffice
2023-06-07T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24384
Cross-Site Request Forgery (CSRF) vulnerability in WpDevArt Organization chart <= 1.4.4 versions.
https://patchstack.com/database/vulnerability/organization-chart/wordpress-wpdevart-organization-chart-plugin-1-4-4-cross-site-request-forgery-csrf?_s_id=cve
2023-01-23T18:16:48.762Z
2023-02-23T14:55:17.893Z
2023-02-23T14:55:17.893Z
{'Vendor': 'WpDevArt', 'Product': 'Organization chart', 'Versions': 'n/a'}
CVE-2023-24557
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.400Z
2023-02-14T10:36:34.877Z
2023-03-14T09:31:24.502Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24107
hour_of_code_python_2015 commit 520929797b9ca43bb818b2e8f963fb2025459fa3 was discovered to contain a code execution backdoor via the request package (requirements.txt). This vulnerability allows attackers to access sensitive user information and execute arbitrary code.
https://mirrors.neusoft.edu.cn/pypi/web/simple/request/
2023-01-23T00:00:00
2023-02-22T00:00:00
2023-02-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24804
The ownCloud Android app allows ownCloud users to access, share, and edit files and folders. Prior to version 3.0, the app has an incomplete fix for a path traversal issue and is vulnerable to two bypass methods. The bypasses may lead to information disclosure when uploading the app’s internal files, and to arbitrary file write when uploading plain text files (although limited by the .txt extension). Version 3.0 fixes the reported bypasses.
https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/
2023-01-30T14:43:33.702Z
2023-02-13T16:28:43.705Z
null
{'Vendor': 'ownCloud', 'Product': 'Android', 'Versions': '< 3.0'}
CVE-2023-24941
Windows Network File System Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24941
2023-01-31T20:37:47.258Z
2023-05-09T17:02:53.781Z
2023-12-14T19:06:04.296Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-24412
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Web-Settler Image Social Feed plugin <= 1.7.6 versions.
https://patchstack.com/database/vulnerability/add-instagram/wordpress-image-social-feed-plugin-plugin-1-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:53.496Z
2023-09-01T10:44:49.784Z
2023-09-01T10:44:49.784Z
{'Vendor': 'Web-Settler', 'Product': 'Image Social Feed', 'Versions': 'n/a'}
CVE-2023-24042
A race condition in LightFTP through 2.2 allows an attacker to achieve path traversal via a malformed FTP request. A handler thread can use an overwritten context->FileName.
https://github.com/hfiref0x/LightFTP/issues/25
2023-01-21T00:00:00
2023-01-21T00:00:00
2023-01-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24279
A cross-site scripting (XSS) vulnerability in Open Networking Foundation ONOS from version v1.9.0 to v2.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter of the API documentation dashboard.
https://www.edoardoottavianelli.it/
2023-01-23T00:00:00
2023-03-14T00:00:00
2023-03-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24853
Memory Corruption in HLOS while registering for key provisioning notify.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T16:25:23.369Z
2023-10-03T05:00:33.133Z
2023-10-03T05:00:33.133Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, FSM10056, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCC710, QCM4490, QCM8550, QCN6224, QCN6274, QCS4490, QCS8155, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, QSM8350, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8650P, SA9000P, SD 8 Gen1 5G, SD865 5G, SG8275P, SM7250P, SM8550P, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, SRV1H, SSG2115P, SSG2125P, SXR1230P, SXR2130, SXR2230P, WCD9340, WCD9370, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24150
A command injection vulnerability in the serverIp parameter in the function meshSlaveDlfw of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveDlfw/meshSlaveDlfw.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24500
Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Electra', 'Product': 'Electra Central AC unit', 'Versions': 'Update to the latest version'}
CVE-2023-24015
A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null. The reports section will be partially unavailable for all later attempts to use it, with the report list seemingly stuck on loading.
https://security.nozominetworks.com/NN-2023:6-01
2023-01-24T10:39:24.266Z
2023-08-09T09:05:16.765Z
2023-08-09T09:05:16.765Z
{'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'}
CVE-2023-24445
Jenkins OpenID Plugin 2.4 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2997
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:36.594Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenID Plugin', 'Versions': 'unspecified, next of 2.4'}
CVE-2023-24795
Command execution vulnerability was discovered in JHR-N916R router firmware version<=21.11.1.1483.
https://gist.github.com/yinfei6/25b30ba88396408ff85200eaf3413f0c
2023-01-30T00:00:00
2023-03-16T00:00:00
2023-03-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24516
Cross-site Scripting (XSS) vulnerability in the Pandora FMS Special Days component allows an attacker to use it to steal the session cookie value of admin users easily with little user interaction. This issue affects Pandora FMS v767 version and prior versions on all platforms.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-01-25T13:49:34.265Z
2023-08-22T13:03:39.181Z
2023-10-16T09:48:30.086Z
{'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'}
CVE-2023-24146
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the minute parameter in the setRebootScheCfg function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setRebootScheCfg_minute/setRebootScheCfg_minute.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24845
A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network. An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior.
https://cert-portal.siemens.com/productcert/pdf/ssa-908185.pdf
2023-01-31T15:35:57.667Z
2023-08-08T09:20:14.156Z
2023-11-14T11:03:17.333Z
{'Vendor': 'Siemens', 'Product': 'RUGGEDCOM i800', 'Versions': 'All versions < V4.3.8'}
CVE-2023-24900
Windows NTLM Security Support Provider Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24900
2023-01-31T20:32:35.472Z
2023-05-09T17:02:52.201Z
2023-12-14T19:06:02.784Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24453
A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:45.988Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestQuality Updater Plugin', 'Versions': 'unspecified, next of 1.3'}
CVE-2023-24003
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Timersys WP Popups – WordPress Popup plugin <= 2.1.4.8 versions.
https://patchstack.com/database/vulnerability/wp-popups-lite/wordpress-wp-popups-wordpress-popup-builder-plugin-2-1-4-8-cross-site-scripting-xss?_s_id=cve
2023-01-20T09:29:08.377Z
2023-04-06T08:09:14.646Z
2023-04-06T08:09:14.646Z
{'Vendor': 'Timersys', 'Product': 'WP Popups – WordPress Popup builder', 'Versions': 'n/a'}
CVE-2023-24687
Mojoportal v2.7.0.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Company Info Settings component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtCompanyName parameter.
https://www.mojoportal.com/
2023-01-30T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24392
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Full Width Banner Slider Wp plugin <= 1.1.7 versions.
https://patchstack.com/database/vulnerability/full-width-responsive-slider-wp/wordpress-full-width-banner-slider-wp-plugin-1-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:50.469Z
2023-05-10T07:01:36.349Z
2023-05-10T07:01:36.349Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'Full Width Banner Slider Wp', 'Versions': 'n/a'}
CVE-2023-24238
TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the city parameter at setting/delStaticDhcpRules.
https://github.com/Am1ngl/ttt/tree/main/20
2023-01-23T00:00:00
2023-02-16T00:00:00
2023-02-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24812
Misskey is an open source, decentralized social media platform. In versions prior to 13.3.3 SQL injection is possible due to insufficient parameter validation in the note search API by tag (notes/search-by-tag). This has been fixed in version 13.3.3. Users are advised to upgrade. Users unable to upgrade should block access to the `api/notes/search-by-tag` endpoint.
https://github.com/misskey-dev/misskey/security/advisories/GHSA-cgwp-vmr4-wx4q
2023-01-30T14:43:33.704Z
2023-02-22T19:10:16.148Z
2023-02-22T19:10:16.148Z
{'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.3.3'}
CVE-2023-24054
null
null
2023-01-21T00:00:00
null
2023-01-26T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-24404
Reflected Cross-Site Scripting (XSS) vulnerability in VryaSage Marketing Performance plugin <= 2.0.0 versions.
https://patchstack.com/database/vulnerability/marketing-performance/wordpress-marketing-performance-plugin-2-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:51.989Z
2023-04-23T09:45:18.091Z
2023-04-23T09:45:18.091Z
{'Vendor': 'VryaSage', 'Product': 'Marketing Performance', 'Versions': 'n/a'}
CVE-2023-24957
IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 246115.
https://www.ibm.com/support/pages/node/6965776
2023-02-01T02:39:37.386Z
2023-05-06T02:05:46.959Z
2023-05-06T02:05:46.959Z
{'Vendor': 'IBM', 'Product': 'Business Automation Workflow', 'Versions': '18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, 22.0.1, 22.0.2'}
CVE-2023-24613
The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit could leverage this vulnerability in the backend binary file that handles the user interface to a cause denial of service attack. This is fixed in AG 9.4.0.481.
https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_UI_Stack_Overflow_Vulnerability_ID-128285_V1.0.pdf
2023-01-30T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24243
CData RSB Connect v22.0.8336 was discovered to contain a Server-Side Request Forgery (SSRF).
https://arc.cdata.com/
2023-01-23T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24756
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_unweighted_pred_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
https://github.com/strukturag/libde265/issues/380
2023-01-30T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24886
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24886
2023-01-31T20:32:35.468Z
2023-04-11T19:13:30.977Z
2023-12-14T18:59:29.794Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24869
Remote Procedure Call Runtime Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24869
2023-01-31T20:32:35.464Z
2023-03-14T16:55:54.849Z
2023-12-14T18:31:50.295Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}