CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-34332 |
AMI’s SPx contains
a vulnerability in the BMC where an Attacker
may cause an untrusted pointer to dereference by a local network. A successful
exploitation of this vulnerability may lead to a loss of confidentiality,
integrity, and/or availability.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023010.pdf | 2023-06-01T16:05:31.611Z | 2024-01-09T22:14:28.892Z | 2024-01-09T22:14:28.892Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12, 13'} |
CVE-2023-34220 | In JetBrains TeamCity before 2023.05 stored XSS in the Commit Status Publisher window was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:33.129Z | 2023-05-31T13:03:13.956Z | 2023-05-31T13:03:13.956Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34735 | Property Cloud Platform Management Center 1.0 is vulnerable to error-based SQL injection. | https://github.com/prismbreak/vulnerabilities/issues/4 | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34365 | A stack-based buffer overflow vulnerability exists in the libutils.so nvram_restore functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a buffer overflow. An attacker can send a network request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1763 | 2023-06-12T16:02:35.314Z | 2023-10-11T15:14:30.818Z | 2023-10-11T17:00:10.408Z | {'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'} |
CVE-2023-34109 | zxcvbn-ts is an open source password strength estimator written in typescript. This vulnerability affects users running on the nodeJS platform which are using the second argument of the zxcvbn function. It can result in an unbounded resource consumption as the user inputs array is extended with every function call. Browsers are impacted, too but a single user need to do a lot of input changes so that it affects the browser, while the node process gets the inputs of every user of a platform and can be killed that way. This problem has been patched in version 3.0.2. Users are advised to upgrade. Users unable to upgrade should stop using the second argument of the zxcvbn function and use the zxcvbnOptions.setOptions function. | https://github.com/zxcvbn-ts/zxcvbn/security/advisories/GHSA-38hx-x5hq-5fg4 | 2023-05-25T21:56:51.246Z | 2023-06-07T17:11:21.949Z | 2023-06-07T17:11:21.949Z | {'Vendor': 'zxcvbn-ts', 'Product': 'zxcvbn', 'Versions': '< 3.0.2'} |
CVE-2023-34108 | mailcow is a mail server suite based on Dovecot, Postfix and other open source software, that provides a modern web UI for user/server administration. A vulnerability has been discovered in mailcow which allows an attacker to manipulate internal Dovecot variables by using specially crafted passwords during the authentication process. The issue arises from the behavior of the `passwd-verify.lua` script, which is responsible for verifying user passwords during login attempts. Upon a successful login, the script returns a response in the format of "password=<valid-password>", indicating the successful authentication. By crafting a password with additional key-value pairs appended to it, an attacker can manipulate the returned string and influence the internal behavior of Dovecot. For example, using the password "123 mail_crypt_save_version=0" would cause the `passwd-verify.lua` script to return the string "password=123 mail_crypt_save_version=0". Consequently, Dovecot will interpret this string and set the internal variables accordingly, leading to unintended consequences. This vulnerability can be exploited by an authenticated attacker who has the ability to set their own password. Successful exploitation of this vulnerability could result in unauthorized access to user accounts, bypassing security controls, or other malicious activities. This issue has been patched in version `2023-05a`. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-mhh4-qchc-pv22 | 2023-05-25T21:56:51.246Z | 2023-06-07T17:16:54.206Z | 2023-06-07T17:16:54.206Z | {'Vendor': 'mailcow', 'Product': 'mailcow-dockerized', 'Versions': '< 2023-05a'} |
CVE-2023-34671 | Improper Access Control leads to privilege escalation affecting Elenos ETG150 FM transmitter running on version 3.12 by exploiting user's role in the user profile. An attack could occur over the public Internet in some cases. | http://elenos.com | 2023-06-07T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34221 | In JetBrains TeamCity before 2023.05 stored XSS in the Show Connection page was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:33.365Z | 2023-05-31T13:03:14.464Z | 2023-05-31T13:03:14.464Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34734 | Annet AC Centralized Management Platform 1.02.040 is vulnerable to Stored Cross-Site Scripting (XSS) . | https://github.com/prismbreak/vulnerabilities/issues/3 | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34364 | A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code. | https://progress.com | 2023-06-02T00:00:00 | 2023-06-09T00:00:00 | 2023-06-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34626 | Piwigo 13.7.0 is vulnerable to SQL Injection via the "Users" function. | https://github.com/Piwigo/Piwigo/issues/1924 | 2023-06-07T00:00:00 | 2023-06-15T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34333 |
AMI’s SPx contains
a vulnerability in the BMC where an Attacker may cause an
untrusted pointer to dereference via a local network. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023010.pdf | 2023-06-01T16:05:31.611Z | 2024-01-09T22:17:06.695Z | 2024-01-09T22:17:06.695Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12, 13'} |
CVE-2023-34149 | Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater.
| https://cwiki.apache.org/confluence/display/WW/S2-063 | 2023-05-28T09:33:09.462Z | 2023-06-14T07:48:54.926Z | 2023-06-14T07:48:54.926Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Struts', 'Versions': '0, 0'} |
CVE-2023-34260 | Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow a denial of service (service outage) via /wlmdeu%2f%2e%2e%2f%2e%2e followed by a directory reference such as %2fetc%00index.htm to try to read the /etc directory. | https://sec-consult.com/vulnerability-lab/ | 2023-05-31T00:00:00 | 2023-11-03T00:00:00 | 2023-11-03T03:52:07.682828 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34325 |
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]
libfsimage contains parsing code for several filesystems, most of them based on
grub-legacy code. libfsimage is used by pygrub to inspect guest disks.
Pygrub runs as the same user as the toolstack (root in a priviledged domain).
At least one issue has been reported to the Xen Security Team that allows an
attacker to trigger a stack buffer overflow in libfsimage. After further
analisys the Xen Security Team is no longer confident in the suitability of
libfsimage when run against guest controlled input with super user priviledges.
In order to not affect current deployments that rely on pygrub patches are
provided in the resolution section of the advisory that allow running pygrub in
deprivileged mode.
CVE-2023-4949 refers to the original issue in the upstream grub
project ("An attacker with local access to a system (either through a
disk or external drive) can present a modified XFS partition to
grub-legacy in such a way to exploit a memory corruption in grub’s XFS
file system implementation.") CVE-2023-34325 refers specifically to
the vulnerabilities in Xen's copy of libfsimage, which is decended
from a very old version of grub.
| https://xenbits.xenproject.org/xsa/advisory-443.html | 2023-06-01T10:44:17.065Z | 2024-01-05T16:31:09.660Z | 2024-01-05T16:31:09.660Z | {'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-443'} |
CVE-2023-34958 | Incorrect access control in Chamilo 1.11.* up to 1.11.18 allows a student subscribed to a given course to download documents belonging to another student if they know the document's ID. | https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-109-2023-04-15-Moderate-impact-Moderate-risk-IDOR-in-workstudent-publication | 2023-06-07T00:00:00 | 2023-06-08T00:00:00 | 2023-06-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34237 | SABnzbd is an open source automated Usenet download tool. A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users[exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface. This issue has been patched in commits `e3a722` and `422b4f` which have been included in the 4.0.2 release. Users are advised to upgrade. Users unable to upgrade should ensure that a username and password have been set if their instance is web accessible. | https://github.com/sabnzbd/sabnzbd/security/advisories/GHSA-hhgh-xgh3-985r | 2023-05-31T13:51:51.169Z | 2023-06-07T19:50:50.417Z | 2023-06-07T19:50:50.417Z | {'Vendor': 'sabnzbd', 'Product': 'sabnzbd', 'Versions': '>= 1.1.0, < 4.0.2RC1'} |
CVE-2023-34372 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Didier Sampaolo SpamReferrerBlock plugin <= 2.22 versions. | https://patchstack.com/database/vulnerability/spamreferrerblock/wordpress-spamreferrerblock-plugin-2-22-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-02T15:45:18.619Z | 2023-08-30T15:04:19.949Z | 2023-08-30T15:04:19.949Z | {'Vendor': 'Didier Sampaolo', 'Product': 'SpamReferrerBlock', 'Versions': 'n/a'} |
CVE-2023-34165 | Unauthorized access vulnerability in the Save for later feature provided by AI Touch.Successful exploitation of this vulnerability may cause third-party apps to forge a URI for unauthorized access with zero permissions. | https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672 | 2023-05-29T09:03:29.119Z | 2023-06-16T06:54:59.538Z | 2023-06-16T06:54:59.538Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.1.0'} |
CVE-2023-34923 | XML Signature Wrapping (XSW) in SAML-based Single Sign-on feature in TOPdesk v12.10.12 allows bad actors with credentials to authenticate with the Identity Provider (IP) to impersonate any TOPdesk user via SAML Response manipulation. | https://char49.com/articles/topdesk-vulnerable-to-xml-signature-wrapping-attacks | 2023-06-07T00:00:00 | 2023-06-22T00:00:00 | 2023-06-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34470 |
AMI AptioV contains a vulnerability in BIOS where an Attacker may use an improper access control via the local network. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity and availability.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023007.pdf | 2023-06-07T03:10:19.973Z | 2023-09-12T15:21:58.331Z | 2023-09-25T15:57:52.826Z | {'Vendor': 'AMI', 'Product': 'AptioV', 'Versions': '*'} |
CVE-2023-34831 | The "Submission Web Form" of Turnitin LTI tool/plugin version 1.3 is affected by HTML Injection attacks. The security issue affects the submission web form ("id" and "title" HTTP POST parameters) where the students submit their reports for similarity/plagiarism checks. | https://github.com/IthacaLabs/Turnitin/blob/main/Turnitin_Submission_Web_Form/ | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34132 | Use of password hash instead of password for authentication vulnerability in SonicWall GMS and Analytics allows Pass-the-Hash attacks. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.852Z | 2023-07-13T02:24:25.820Z | 2023-07-13T02:24:25.820Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34098 | Shopware is an open source e-commerce software. Due to an incorrect configuration in the `.htaccess` file, the configuration file of the Javascript could be read in production environments (`themes/package-lock.json`). With this information, the specific Shopware version in a deployment might be determined by an attacker, which could be used for further attacks. Users are advised to update to version 5.7.18. There are no known workarounds for this vulnerability.
| https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9 | 2023-05-25T21:56:51.245Z | 2023-06-27T16:25:15.157Z | 2023-06-27T16:25:15.157Z | {'Vendor': 'shopware', 'Product': 'shopware', 'Versions': '< 5.7.18'} |
CVE-2023-34427 | Protection mechanism failure in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html | 2023-06-06T03:00:05.035Z | 2023-08-11T02:37:24.682Z | 2023-08-11T02:37:24.682Z | {'Vendor': 'n/a', 'Product': 'Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA', 'Versions': 'version 0.25.0'} |
CVE-2023-34124 | The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.851Z | 2023-07-13T00:14:16.861Z | 2023-07-13T00:14:16.861Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34962 | Incorrect access control in Chamilo v1.11.x up to v1.11.18 allows a student to arbitrarily access and modify another student's personal notes. | https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-106-2023-04-15-Moderate-impact-Moderate-risk-A-student-can-access-and-modify-another-students-personal-notes | 2023-06-07T00:00:00 | 2023-06-08T00:00:00 | 2023-06-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34431 | Improper input validation in some Intel(R) Server Board BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00719.html | 2023-06-06T03:00:05.087Z | 2023-11-14T19:05:08.245Z | 2023-11-14T19:05:08.245Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BIOS firmware', 'Versions': 'See references'} |
CVE-2023-34061 | Cloud Foundry routing release versions from v0.163.0 to v0.283.0 are vulnerable to a DOS attack. An unauthenticated attacker can use this vulnerability to force route pruning and therefore degrade the service availability of the Cloud Foundry deployment.
| https://www.cloudfoundry.org/blog/cve-2023-34061-gorouter-route-pruning/ | 2023-05-25T17:21:56.204Z | 2024-01-12T07:01:49.532Z | 2024-01-12T07:01:49.532Z | {'Vendor': 'Cloud Foundry', 'Product': 'Routing Release', 'Versions': '0.163.0'} |
CVE-2023-34348 |
AVEVA PI Server versions 2023 and 2018 SP3 P05 and prior contain a vulnerability that could allow an unauthenticated user to remotely crash the PI Message Subsystem of a PI Server, resulting in a denial-of-service condition.
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01 | 2023-07-12T18:40:13.110Z | 2024-01-18T17:16:50.038Z | 2024-01-18T17:16:50.038Z | {'Vendor': 'Aveva', 'Product': 'PI Server', 'Versions': '2023, 0'} |
CVE-2023-34173 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alexander Semikashev Yandex Metrica Counter plugin <= 1.4.3 versions. | https://patchstack.com/database/vulnerability/counter-yandex-metrica/wordpress-yandex-metrica-counter-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-29T13:52:11.723Z | 2023-08-30T14:04:10.829Z | 2023-08-30T14:04:10.829Z | {'Vendor': 'Alexander Semikashev', 'Product': 'Yandex Metrica Counter', 'Versions': 'n/a'} |
CVE-2023-34036 |
Reactive web applications that use Spring HATEOAS to produce hypermedia-based responses might be exposed to malicious forwarded headers if they are not behind a trusted proxy that ensures correctness of such headers, or if they don't have anything else in place to handle (and possibly discard) forwarded headers either in WebFlux or at the level of the underlying HTTP server.
For the application to be affected, it needs to satisfy the following requirements:
* It needs to use the reactive web stack (Spring WebFlux) and Spring HATEOAS to create links in hypermedia-based responses.
* The application infrastructure does not guard against clients submitting (X-)Forwarded… headers.
| https://spring.io/security/cve-2023-34036 | 2023-05-25T17:21:56.200Z | 2023-07-17T10:00:43.245Z | 2023-07-17T10:00:43.245Z | {'Vendor': 'Spring', 'Product': 'Spring HATEOAS', 'Versions': '1.5.4 or older, 2.0.4 or older, 2.1.0'} |
CVE-2023-34466 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 5.0-milestone-1 and prior to versions 14.4.8, 14.10.4, and 15.0-rc-1, tags from pages not viewable to the current user are leaked by the tags API. This information can also be exploited to infer the document reference of non-viewable pages. This vulnerability has been patched in XWiki 14.4.8, 14.10.4, and 15.0-rc-1.
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7f2f-pcv3-j2r7 | 2023-06-06T16:16:53.560Z | 2023-06-23T15:26:11.453Z | 2023-06-23T15:26:11.453Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 5.0-milestone-1, < 14.4.8, >= 14.5, < 14.10.4'} |
CVE-2023-34935 | A stack overflow in the AddWlanMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34935.md | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34368 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kanban for WordPress Kanban Boards for WordPress plugin <= 2.5.20 versions. | https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-20-cross-site-scripting-xss-vulnerability-2?_s_id=cve | 2023-06-02T15:45:18.619Z | 2023-06-22T12:12:37.605Z | 2023-06-22T12:12:37.605Z | {'Vendor': 'Kanban for WordPress', 'Product': 'Kanban Boards for WordPress', 'Versions': 'n/a'} |
CVE-2023-34738 | Chemex through 3.7.1 is vulnerable to arbitrary file upload. | https://github.com/celaraze/chemex/issues/64 | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34942 | Asus RT-N10LX Router v2.0.0.39 was discovered to contain a stack overflow via the mac parameter at /start-apply.html. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/OlivierLaflamme/cve/blob/main/ASUS-N10LX_2.0.0.39/MAC_Address_StackBOF.md | 2023-06-07T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34411 | The xml-rs crate before 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid <! token (such as <!DOCTYPEs/%<!A nesting) in an XML document. The earliest affected version is 0.8.9. | https://github.com/netvl/xml-rs/pull/226 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34041 | Cloud foundry routing release versions prior to 0.278.0 are vulnerable to abuse of HTTP Hop-by-Hop Headers. An unauthenticated attacker can use this vulnerability for headers like B3 or X-B3-SpanID to affect the identification value recorded in the logs in foundations.
| https://www.cloudfoundry.org/blog/abuse-of-http-hop-by-hop-headers-in-cloud-foundry-gorouter/ | 2023-05-25T17:21:56.201Z | 2023-09-08T07:22:00.607Z | 2023-09-08T07:22:00.607Z | {'Vendor': 'Cloud Foundry', 'Product': 'Routing', 'Versions': 'all'} |
CVE-2023-34104 | fast-xml-parser is an open source, pure javascript xml parser. fast-xml-parser allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for denial of service (DoS) attacks. By crafting an entity name that results in an intentionally bad performing regex and utilizing it in the entity replacement step of the parser, this can cause the parser to stall for an indefinite amount of time. This problem has been resolved in v4.2.4. Users are advised to upgrade. Users unable to upgrade should avoid using DOCTYPE parsing by setting the `processEntities: false` option. | https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw | 2023-05-25T21:56:51.246Z | 2023-06-06T17:35:54.699Z | 2024-01-22T17:25:26.760Z | {'Vendor': 'NaturalIntelligence', 'Product': 'fast-xml-parser', 'Versions': '>= 4.1.3, < 4.2.4'} |
CVE-2023-34446 | iTop is an open source, web-based IT service management platform. Prior to versions 3.0.4 and 3.1.0, when displaying `pages/preferences.php`, cross site scripting is possible. This issue is fixed in versions 3.0.4 and 3.1.0.
| https://github.com/Combodo/iTop/security/advisories/GHSA-q4pp-j46r-gm68 | 2023-06-06T16:16:53.557Z | 2023-10-25T15:35:21.187Z | 2023-10-25T15:35:21.187Z | {'Vendor': 'Combodo', 'Product': 'iTop', 'Versions': '< 3.0.4'} |
CVE-2023-34153 | A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding. | https://github.com/ImageMagick/ImageMagick/issues/6338 | 2023-05-29T00:00:00 | 2023-05-30T00:00:00 | 2023-08-31T02:07:17.015329 | {'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'ImageMagick-6.7'} |
CVE-2023-34796 | Cross site scripting (XSS) vulnerabiliy in dmarcts-report-viewer dashboard versions 1.1 and thru commit 8a1d882b4c481a05e296e9b38a7961e912146a0f, allows unauthenticated attackers to execute arbitrary code via the org_name or domain values. | https://xmit.xyz/security/dmarcd-for-death/ | 2023-06-07T00:00:00 | 2023-06-22T00:00:00 | 2023-06-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34329 |
AMI MegaRAC SPx12 contains a vulnerability in BMC where a User may cause an authentication bypass by spoofing the HTTP header. A successful exploit of this vulnerability may lead to loss of confidentiality, integrity, and availability.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf | 2023-06-01T16:05:31.611Z | 2023-07-18T17:11:10.532Z | 2023-07-19T20:54:03.741Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx12', 'Versions': '12.0'} |
CVE-2023-34450 | CometBFT is a Byzantine Fault Tolerant (BFT) middleware that takes a state transition machine and replicates it on many machines. An internal modification made in versions 0.34.28 and 0.37.1 to the way struct `PeerState` is serialized to JSON introduced a deadlock when new function MarshallJSON is called. This function can be called from two places. The first is via logs, setting the `consensus` logging module to "debug" level (should not happen in production), and setting the log output format to JSON. The second is via RPC `dump_consensus_state`.
Case 1, which should not be hit in production, will eventually hit the deadlock in most goroutines, effectively halting the node.
In case 2, only the data structures related to the first peer will be deadlocked, together with the thread(s) dealing with the RPC request(s). This means that only one of the channels of communication to the node's peers will be blocked. Eventually the peer will timeout and excluded from the list (typically after 2 minutes). The goroutines involved in the deadlock will not be garbage collected, but they will not interfere with the system after the peer is excluded.
The theoretical worst case for case 2, is a network with only two validator nodes. In this case, each of the nodes only has one `PeerState` struct. If `dump_consensus_state` is called in either node (or both), the chain will halt until the peer connections time out, after which the nodes will reconnect (with different `PeerState` structs) and the chain will progress again. Then, the same process can be repeated.
As the number of nodes in a network increases, and thus, the number of peer struct each node maintains, the possibility of reproducing the perturbation visible with two nodes decreases. Only the first `PeerState` struct will deadlock, and not the others (RPC `dump_consensus_state` accesses them in a for loop, so the deadlock at the first iteration causes the rest of the iterations of that "for" loop to never be reached).
This regression was fixed in versions 0.34.29 and 0.37.2. Some workarounds are available. For case 1 (hitting the deadlock via logs), either don't set the log output to "json", leave at "plain", or don't set the consensus logging module to "debug", leave it at "info" or higher. For case 2 (hitting the deadlock via RPC `dump_consensus_state`), do not expose `dump_consensus_state` RPC endpoint to the public internet (e.g., via rules in one's nginx setup). | https://github.com/cometbft/cometbft/security/advisories/GHSA-mvj3-qrqh-cjvr | 2023-06-06T16:16:53.558Z | 2023-07-03T16:36:34.419Z | 2023-07-03T16:36:34.419Z | {'Vendor': 'cometbft', 'Product': 'cometbft', 'Versions': '= 0.34.28, = 0.37.1'} |
CVE-2023-34000 | Unauth. IDOR vulnerability leading to PII Disclosure in WooCommerce Stripe Payment Gateway plugin <= 7.4.0 versions. | https://patchstack.com/database/vulnerability/woocommerce-gateway-stripe/wordpress-woocommerce-stripe-payment-gateway-plugin-7-4-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve | 2023-05-25T11:25:11.062Z | 2023-06-14T07:30:11.268Z | 2023-06-14T07:30:11.268Z | {'Vendor': 'WooCommerce', 'Product': 'WooCommerce Stripe Payment Gateway', 'Versions': 'n/a'} |
CVE-2023-34145 | An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34144. | https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US | 2023-05-26T18:41:36.333Z | 2023-06-26T21:57:50.324Z | 2023-06-26T21:57:50.324Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019'} |
CVE-2023-34391 | Insecure Inherited Permissions vulnerability in Schweitzer Engineering Laboratories SEL-5033 AcSELerator RTAC Software on Windows allows Leveraging/Manipulating Configuration File Search Paths.
See Instruction Manual Appendix A [Cybersecurity] tag dated 20230522 for more details.
This issue affects SEL-5033 AcSELerator RTAC Software: before 1.35.151.21000.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-06-02T17:18:29.697Z | 2023-08-31T15:31:45.454Z | 2023-08-31T15:31:45.454Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5033 AcSELerator RTAC Software', 'Versions': '0'} |
CVE-2023-34057 | VMware Tools contains a local privilege escalation vulnerability. A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.
| https://www.vmware.com/security/advisories/VMSA-2023-0024.html | 2023-05-25T17:21:56.203Z | 2023-10-27T04:52:55.280Z | 2023-10-27T04:52:55.280Z | {'Vendor': 'n/a', 'Product': 'VMware Tools', 'Versions': '12.x.x, 11.x.x, 10.3.x'} |
CVE-2023-34407 | OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\ in a URL. | https://cybir.com/2023/cve/proof-of-concept-checkpoint-learning-harbinger-systems-offline-player-multiple-poc-for-cl-4-0-6-0-2-lfi-excessive-rights/ | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34112 | JavaCPP Presets is a project providing Java distributions of native C++ libraries. All the actions in the `bytedeco/javacpp-presets` use the `github.event.head_commit.message` parameter in an insecure way. For example, the commit message is used in a run statement - resulting in a command injection vulnerability due to string interpolation. No exploitation has been reported. This issue has been addressed in version 1.5.9. Users of JavaCPP Presets are advised to upgrade as a precaution. | https://github.com/bytedeco/javacpp-presets/security/advisories/GHSA-36rx-hq22-jm5x | 2023-05-25T21:56:51.247Z | 2023-06-08T23:05:36.423Z | 2023-06-08T23:05:36.423Z | {'Vendor': 'bytedeco', 'Product': 'javacpp-presets', 'Versions': '< 1.5.9'} |
CVE-2023-34755 | bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the userid parameter at admin/index.php?mode=user&action=edit. | https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34610 | An issue was discovered json-io thru 4.14.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://github.com/jdereg/json-io/issues/169 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34240 | Cloudexplorer-lite is an open source cloud software stack. Weak passwords can be easily guessed and are an easy target for brute force attacks. This can lead to an authentication system failure and compromise system security. Versions of cloudexplorer-lite prior to 1.2.0 did not enforce strong passwords. This vulnerability has been fixed in version 1.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-px4m-5j22-5mw4 | 2023-05-31T13:51:51.171Z | 2023-06-27T16:34:15.157Z | 2023-06-27T16:34:15.157Z | {'Vendor': 'CloudExplorer-Dev', 'Product': 'CloudExplorer-Lite', 'Versions': '< 1.2.0'} |
CVE-2023-34169 | Cross-Site Request Forgery (CSRF) vulnerability in SAKURA Internet Inc. TS Webfonts for さくらのレンタルサーバ plugin <= 3.1.2 versions. | https://patchstack.com/database/vulnerability/ts-webfonts-for-sakura/wordpress-ts-webfonts-for-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-29T13:52:11.723Z | 2023-11-09T19:27:46.935Z | 2023-11-09T19:27:46.935Z | {'Vendor': 'SAKURA Internet Inc.', 'Product': 'TS Webfonts for さくらのレンタルサーバ', 'Versions': 'n/a'} |
CVE-2023-34352 | A permissions issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, watchOS 9.5. An attacker may be able to leak user account emails. | https://support.apple.com/en-us/HT213758 | 2023-07-20T15:04:15.880Z | 2023-09-06T01:36:42.163Z | 2023-09-06T01:36:42.163Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-34217 | TN-4900 Series firmware versions v1.2.4 and prior and TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation in the certificate-delete function, which could potentially allow malicious users to delete arbitrary files. | https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities | 2023-05-31T08:58:06.149Z | 2023-08-17T06:48:38.770Z | 2023-10-20T07:12:20.397Z | {'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'} |
CVE-2023-34647 | PHPgurukl Hostel Management System v.1.0 is vulnerable to Cross Site Scripting (XSS). | https://github.com/ckalnarayan/Common-Vulnerabilities-and-Exposures/blob/main/CVE-2023-34647 | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34094 | ChuanhuChatGPT is a graphical user interface for ChatGPT and many large language models. A vulnerability in versions 20230526 and prior allows unauthorized access to the config.json file of the privately deployed ChuanghuChatGPT project, when authentication is not configured. The attacker can exploit this vulnerability to steal the API keys in the configuration file. The vulnerability has been fixed in commit bfac445. As a workaround, setting up access authentication can help mitigate the vulnerability. | https://github.com/GaiZhenbiao/ChuanhuChatGPT/security/advisories/GHSA-j34w-9xr4-m9p8 | 2023-05-25T21:56:51.244Z | 2023-06-02T15:19:45.596Z | 2023-06-02T15:19:45.596Z | {'Vendor': 'GaiZhenbiao', 'Product': 'ChuanhuChatGPT', 'Versions': '<= 20230526'} |
CVE-2023-34997 | Insecure inherited permissions in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html | 2023-06-22T03:00:04.902Z | 2023-11-14T19:04:40.233Z | 2023-11-14T19:04:40.233Z | {'Vendor': 'n/a', 'Product': 'Intel Server Configuration Utility software', 'Versions': 'before version 16.0.9'} |
CVE-2023-34581 | Sourcecodester Service Provider Management System v1.0 is vulnerable to SQL Injection via the ID parameter in /php-spms/?page=services/view&id=2 | https://github.com/ashikkunjumon/cve-reports/blob/main/README.md | 2023-06-07T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34344 | AMI BMC contains a vulnerability in the IPMI
handler, where an unauthorized attacker can use certain oracles to guess a
valid username, which may lead to information disclosure.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023005.pdf | 2023-06-01T20:50:32.675Z | 2023-06-12T16:54:19.265Z | 2023-06-12T16:54:19.265Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0, 13.0'} |
CVE-2023-34651 | PHPgurukl Hospital Management System v.1.0 is vulnerable to Cross Site Scripting (XSS). | https://phpgurukul.com/hospital-management-system-in-php/ | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34981 | A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. | https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz | 2023-06-08T12:48:27.995Z | 2023-06-21T10:26:16.916Z | 2023-06-21T10:26:16.916Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M5, 10.1.8, 9.0.74, 8.5.88'} |
CVE-2023-34128 | Tomcat application credentials are hardcoded in SonicWall GMS and Analytics configuration file. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.851Z | 2023-07-13T00:58:35.946Z | 2023-07-13T00:58:35.946Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34597 | A vulnerability in Fibaro Motion Sensor firmware v3.4 allows attackers to cause a Denial of Service (DoS) via a crafted Z-Wave message. | https://www.fibaro.com/en/products/motion-sensor/%3B | 2023-06-07T00:00:00 | 2023-06-20T00:00:00 | 2023-06-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34256 | An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access. | https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-10-19T23:06:52.874138 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34939 | Onlyoffice Community Server before v12.5.2 was discovered to contain a remote code execution (RCE) vulnerability via the component UploadProgress.ashx. | https://github.com/firsov/onlyoffice | 2023-06-07T00:00:00 | 2023-06-22T00:00:00 | 2023-06-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24384 | Cross-Site Request Forgery (CSRF) vulnerability in WpDevArt Organization chart <= 1.4.4 versions. | https://patchstack.com/database/vulnerability/organization-chart/wordpress-wpdevart-organization-chart-plugin-1-4-4-cross-site-request-forgery-csrf?_s_id=cve | 2023-01-23T18:16:48.762Z | 2023-02-23T14:55:17.893Z | 2023-02-23T14:55:17.893Z | {'Vendor': 'WpDevArt', 'Product': 'Organization chart', 'Versions': 'n/a'} |
CVE-2023-24557 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.400Z | 2023-02-14T10:36:34.877Z | 2023-03-14T09:31:24.502Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24107 | hour_of_code_python_2015 commit 520929797b9ca43bb818b2e8f963fb2025459fa3 was discovered to contain a code execution backdoor via the request package (requirements.txt). This vulnerability allows attackers to access sensitive user information and execute arbitrary code. | https://mirrors.neusoft.edu.cn/pypi/web/simple/request/ | 2023-01-23T00:00:00 | 2023-02-22T00:00:00 | 2023-02-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24804 | The ownCloud Android app allows ownCloud users to access, share, and edit files and folders. Prior to version 3.0, the app has an incomplete fix for a path traversal issue and is vulnerable to two bypass methods. The bypasses may lead to information disclosure when uploading the app’s internal files, and to arbitrary file write when uploading plain text files (although limited by the .txt extension). Version 3.0 fixes the reported bypasses. | https://securitylab.github.com/advisories/GHSL-2022-059_GHSL-2022-060_Owncloud_Android_app/ | 2023-01-30T14:43:33.702Z | 2023-02-13T16:28:43.705Z | null | {'Vendor': 'ownCloud', 'Product': 'Android', 'Versions': '< 3.0'} |
CVE-2023-24941 | Windows Network File System Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24941 | 2023-01-31T20:37:47.258Z | 2023-05-09T17:02:53.781Z | 2023-12-14T19:06:04.296Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-24412 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Web-Settler Image Social Feed plugin <= 1.7.6 versions. | https://patchstack.com/database/vulnerability/add-instagram/wordpress-image-social-feed-plugin-plugin-1-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:53.496Z | 2023-09-01T10:44:49.784Z | 2023-09-01T10:44:49.784Z | {'Vendor': 'Web-Settler', 'Product': 'Image Social Feed', 'Versions': 'n/a'} |
CVE-2023-24042 | A race condition in LightFTP through 2.2 allows an attacker to achieve path traversal via a malformed FTP request. A handler thread can use an overwritten context->FileName. | https://github.com/hfiref0x/LightFTP/issues/25 | 2023-01-21T00:00:00 | 2023-01-21T00:00:00 | 2023-01-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24279 | A cross-site scripting (XSS) vulnerability in Open Networking Foundation ONOS from version v1.9.0 to v2.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter of the API documentation dashboard. | https://www.edoardoottavianelli.it/ | 2023-01-23T00:00:00 | 2023-03-14T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24853 | Memory Corruption in HLOS while registering for key provisioning notify. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T16:25:23.369Z | 2023-10-03T05:00:33.133Z | 2023-10-03T05:00:33.133Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, FSM10056, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCC710, QCM4490, QCM8550, QCN6224, QCN6274, QCS4490, QCS8155, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, QSM8350, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8650P, SA9000P, SD 8 Gen1 5G, SD865 5G, SG8275P, SM7250P, SM8550P, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, SRV1H, SSG2115P, SSG2125P, SXR1230P, SXR2130, SXR2230P, WCD9340, WCD9370, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24150 | A command injection vulnerability in the serverIp parameter in the function meshSlaveDlfw of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveDlfw/meshSlaveDlfw.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24500 | Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Electra', 'Product': 'Electra Central AC unit', 'Versions': 'Update to the latest version'} |
CVE-2023-24015 | A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null.
The reports section will be partially unavailable for all later attempts to use it, with the report list seemingly stuck on loading.
| https://security.nozominetworks.com/NN-2023:6-01 | 2023-01-24T10:39:24.266Z | 2023-08-09T09:05:16.765Z | 2023-08-09T09:05:16.765Z | {'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'} |
CVE-2023-24445 | Jenkins OpenID Plugin 2.4 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2997 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:36.594Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenID Plugin', 'Versions': 'unspecified, next of 2.4'} |
CVE-2023-24795 | Command execution vulnerability was discovered in JHR-N916R router firmware version<=21.11.1.1483. | https://gist.github.com/yinfei6/25b30ba88396408ff85200eaf3413f0c | 2023-01-30T00:00:00 | 2023-03-16T00:00:00 | 2023-03-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24516 | Cross-site Scripting (XSS) vulnerability in the Pandora FMS Special Days component allows an attacker to use it to steal the session cookie value of admin users easily with little user interaction. This issue affects Pandora FMS v767 version and prior versions on all platforms. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-01-25T13:49:34.265Z | 2023-08-22T13:03:39.181Z | 2023-10-16T09:48:30.086Z | {'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'} |
CVE-2023-24146 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the minute parameter in the setRebootScheCfg function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setRebootScheCfg_minute/setRebootScheCfg_minute.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24845 | A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The affected products insufficiently block data from being forwarded over the mirror port into the mirrored network.
An attacker could use this behavior to transmit malicious packets to systems in the mirrored network, possibly influencing their configuration and runtime behavior. | https://cert-portal.siemens.com/productcert/pdf/ssa-908185.pdf | 2023-01-31T15:35:57.667Z | 2023-08-08T09:20:14.156Z | 2023-11-14T11:03:17.333Z | {'Vendor': 'Siemens', 'Product': 'RUGGEDCOM i800', 'Versions': 'All versions < V4.3.8'} |
CVE-2023-24900 | Windows NTLM Security Support Provider Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24900 | 2023-01-31T20:32:35.472Z | 2023-05-09T17:02:52.201Z | 2023-12-14T19:06:02.784Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24453 | A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:45.988Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestQuality Updater Plugin', 'Versions': 'unspecified, next of 1.3'} |
CVE-2023-24003 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Timersys WP Popups – WordPress Popup plugin <= 2.1.4.8 versions. | https://patchstack.com/database/vulnerability/wp-popups-lite/wordpress-wp-popups-wordpress-popup-builder-plugin-2-1-4-8-cross-site-scripting-xss?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-04-06T08:09:14.646Z | 2023-04-06T08:09:14.646Z | {'Vendor': 'Timersys', 'Product': 'WP Popups – WordPress Popup builder', 'Versions': 'n/a'} |
CVE-2023-24687 | Mojoportal v2.7.0.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Company Info Settings component. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the txtCompanyName parameter. | https://www.mojoportal.com/ | 2023-01-30T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24392 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Full Width Banner Slider Wp plugin <= 1.1.7 versions. | https://patchstack.com/database/vulnerability/full-width-responsive-slider-wp/wordpress-full-width-banner-slider-wp-plugin-1-1-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:50.469Z | 2023-05-10T07:01:36.349Z | 2023-05-10T07:01:36.349Z | {'Vendor': 'I Thirteen Web Solution', 'Product': 'Full Width Banner Slider Wp', 'Versions': 'n/a'} |
CVE-2023-24238 | TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the city parameter at setting/delStaticDhcpRules. | https://github.com/Am1ngl/ttt/tree/main/20 | 2023-01-23T00:00:00 | 2023-02-16T00:00:00 | 2023-02-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24812 | Misskey is an open source, decentralized social media platform. In versions prior to 13.3.3 SQL injection is possible due to insufficient parameter validation in the note search API by tag (notes/search-by-tag). This has been fixed in version 13.3.3. Users are advised to upgrade. Users unable to upgrade should block access to the `api/notes/search-by-tag` endpoint. | https://github.com/misskey-dev/misskey/security/advisories/GHSA-cgwp-vmr4-wx4q | 2023-01-30T14:43:33.704Z | 2023-02-22T19:10:16.148Z | 2023-02-22T19:10:16.148Z | {'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.3.3'} |
CVE-2023-24054 | null | null | 2023-01-21T00:00:00 | null | 2023-01-26T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-24404 | Reflected Cross-Site Scripting (XSS) vulnerability in VryaSage Marketing Performance plugin <= 2.0.0 versions. | https://patchstack.com/database/vulnerability/marketing-performance/wordpress-marketing-performance-plugin-2-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:51.989Z | 2023-04-23T09:45:18.091Z | 2023-04-23T09:45:18.091Z | {'Vendor': 'VryaSage', 'Product': 'Marketing Performance', 'Versions': 'n/a'} |
CVE-2023-24957 | IBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 246115. | https://www.ibm.com/support/pages/node/6965776 | 2023-02-01T02:39:37.386Z | 2023-05-06T02:05:46.959Z | 2023-05-06T02:05:46.959Z | {'Vendor': 'IBM', 'Product': 'Business Automation Workflow', 'Versions': '18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3, 20.0.0.1, 20.0.0.2, 21.0.2, 21.0.3, 22.0.1, 22.0.2'} |
CVE-2023-24613 | The user interface of Array Networks AG Series and vxAG through 9.4.0.470 could allow a remote attacker to use the gdb tool to overwrite the backend function call stack after accessing the system with administrator privileges. A successful exploit could leverage this vulnerability in the backend binary file that handles the user interface to a cause denial of service attack. This is fixed in AG 9.4.0.481. | https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_UI_Stack_Overflow_Vulnerability_ID-128285_V1.0.pdf | 2023-01-30T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24243 | CData RSB Connect v22.0.8336 was discovered to contain a Server-Side Request Forgery (SSRF). | https://arc.cdata.com/ | 2023-01-23T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24756 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_unweighted_pred_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | https://github.com/strukturag/libde265/issues/380 | 2023-01-30T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24886 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24886 | 2023-01-31T20:32:35.468Z | 2023-04-11T19:13:30.977Z | 2023-12-14T18:59:29.794Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24869 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24869 | 2023-01-31T20:32:35.464Z | 2023-03-14T16:55:54.849Z | 2023-12-14T18:31:50.295Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.