CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-24490
Users with only access to launch VDA applications can launch an unauthorized desktop
https://support.citrix.com/article/CTX559370/windows-and-linux-virtual-delivery-agent-for-cvad-and-citrix-daas-security-bulletin-cve202324490
2023-01-24T15:49:52.579Z
2023-07-10T21:06:05.934Z
2023-07-10T21:06:05.934Z
{'Vendor': 'Citrix', 'Product': 'Virtual Delivery Agents for Windows for CVAD and Citrix DaaS Security', 'Versions': 'Current Release (CR) 0, Long Term Service Release (LTSR) 0, Long Term Service Release (LTSR) 0'}
CVE-2023-24351
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the FILECODE parameter at /goform/formLogin.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24428
A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket OAuth Plugin 0.12 and earlier allows attackers to trick users into logging in to the attacker's account.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2981
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:17.192Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Bitbucket OAuth Plugin', 'Versions': 'unspecified'}
CVE-2023-24582
Two OS command injection vulnerabilities exist in the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This OS command injection is triggered through a TCP packet.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710
2023-01-27T17:45:31.172Z
2023-07-06T14:53:29.848Z
2023-07-06T17:00:05.707Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-24078
Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/.
https://github.com/ojan2021/Fuguhub-8.1-RCE
2023-01-23T00:00:00
2023-02-17T00:00:00
2023-07-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24097
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formPasswordAuth. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/03/README.md
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24994
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19816)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.544Z
2023-02-14T10:37:05.417Z
2023-03-14T09:31:52.093Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24652
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the Description parameter under the Create ticket function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24202
Raffle Draw System v1.0 was discovered to contain a local file inclusion vulnerability via the page parameter in index.php.
https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24347
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formSetWanDhcpplus.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24594
When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
https://my.f5.com/manage/s/article/K000133132
2023-04-14T23:08:02.590Z
2023-05-03T14:31:16.883Z
2023-05-03T14:31:16.883Z
{'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.0.0, 16.1.2, 15.1.4.1, 14.1.5'}
CVE-2023-24828
Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing normal users (or everyone if it allows self-registration) may exploit this to elevate privilege to obtain administrator permission. This issue is has been addressed in version 7.9.12. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/theonedev/onedev/security/advisories/GHSA-jf5c-9r77-3j5j
2023-01-30T14:43:33.706Z
2023-02-07T23:25:11.397Z
null
{'Vendor': 'theonedev', 'Product': 'onedev', 'Versions': '< 7.9.12'}
CVE-2023-24982
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19804)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.542Z
2023-02-14T10:36:51.881Z
2023-03-14T09:31:39.937Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24081
Multiple stored cross-site scripting (XSS) vulnerabilities in Redrock Software TutorTrac before v4.2.170210 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the reason and location fields of the visits listing page.
https://brackish.io/tutortrac-multiple-stored-xss/
2023-01-23T00:00:00
2023-02-21T00:00:00
2023-02-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24605
OX App Suite before backend 7.10.6-rev37 does not enforce 2FA for all endpoints, e.g., reading from a drive, reading contact data, and renaming tokens.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24890
Microsoft OneDrive for iOS Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24890
2023-01-31T20:32:35.469Z
2023-03-14T16:55:59.921Z
2023-12-14T18:31:55.247Z
{'Vendor': 'Microsoft', 'Product': 'OneDrive for iOS', 'Versions': '1.0.0'}
CVE-2023-24469
Potential Cross-Site Scripting in ArcSight Logger versions prior to 7.3.0
https://www.microfocus.com/support/downloads/
2023-01-23T00:00:00
2023-06-13T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'ArcSight Logger', 'Versions': 'versions prior to 7.3.0'}
CVE-2023-24039
A stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6 can be exploited by local low-privileged users via the dtprintinfo setuid binary to escalate their privileges to root on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt
2023-01-21T00:00:00
2023-01-21T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24486
A vulnerability has been identified in Citrix Workspace app for Linux that, if exploited, may result in a malicious local user being able to gain access to the Citrix Virtual Apps and Desktops session of another user who is using the same computer from which the ICA session is launched.
https://support.citrix.com/article/CTX477618/citrix-workspace-app-for-linux-security-bulletin-for-cve202324486
2023-01-24T15:49:52.578Z
2023-07-10T20:36:01.889Z
2023-07-10T20:36:01.889Z
{'Vendor': 'Citrix', 'Product': 'Citrix Workspace app for Linux', 'Versions': '0'}
CVE-2023-24808
PDFio is a C library for reading and writing PDF files. In versions prior to 1.1.0 a denial of service (DOS) vulnerability exists in the pdfio parser. Crafted pdf files can cause the program to run at 100% utilization and never terminate. The pdf which causes this crash found in testing is about 28kb in size and was discovered via fuzzing. Anyone who uses this library either as a standalone binary or as a library can be DOSed when attempting to parse this type of file. Web servers or other automated processes which rely on this code to turn pdf submissions into plaintext can be DOSed when an attacker uploads the pdf. Please see the linked GHSA for an example pdf. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf
2023-01-30T14:43:33.703Z
2023-02-07T00:02:35.052Z
null
{'Vendor': 'michaelrsweet', 'Product': 'pdfio', 'Versions': '< 1.1.0'}
CVE-2023-24737
PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950.php.
https://github.com/AetherBlack/CVE/tree/main/PMB
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24367
null
null
2023-01-23T00:00:00
null
2023-04-07T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-24388
Cross-Site Request Forgery (CSRF) vulnerability in WpDevArt Booking calendar, Appointment Booking System plugin <= 3.2.3 versions affects plugin forms actions (create, duplicate, edit, delete).
https://patchstack.com/database/vulnerability/booking-calendar/wordpress-booking-calendar-appointment-booking-system-plugin-3-2-3-cross-site-request-forgery-csrf?_s_id=cve
2023-01-23T18:16:48.762Z
2023-02-17T14:25:11.347Z
2023-02-17T14:25:11.347Z
{'Vendor': 'WpDevArt', 'Product': 'Booking calendar, Appointment Booking System', 'Versions': 'n/a'}
CVE-2023-24449
Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2985
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:41.284Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins PWauth Security Realm Plugin', 'Versions': 'unspecified, next of 0.4'}
CVE-2023-24019
A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718
2023-02-06T21:20:16.643Z
2023-07-06T14:53:22.537Z
2023-07-17T20:30:34.801Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-24760
An issue found in Ofcms v.1.1.4 allows a remote attacker to to escalate privileges via the respwd method in SysUserController.
https://gitee.com/oufu/ofcms/issues/I6BD2Q
2023-01-30T00:00:00
2023-03-16T00:00:00
2023-03-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24625
Faveo 5.0.1 allows remote attackers to obtain sensitive information via a modified user ID in an Insecure Direct Object Reference (IDOR) attack.
https://www.faveohelpdesk.com/servicedesk/
2023-01-30T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24849
Information Disclosure in data Modem while parsing an FMTP line in an SDP message.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T16:25:23.368Z
2023-10-03T05:00:30.792Z
2023-10-03T05:00:30.792Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9206 LTE Modem, 9207 LTE Modem, APQ8017, APQ8037, AQT1000, AR6003, AR8035, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9215, MDM9250, MDM9310, MDM9615, MDM9615M, MDM9628, MDM9640, MDM9650, MSM8108, MSM8209, MSM8608, MSM8909W, MSM8996AU, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595AU, QCA6696, QCA6698AQ, QCA8081, QCA8337, QCA9367, QCA9377, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8550, QFW7114, QFW7124, Qualcomm 205 Mobile Platform, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SC8180X+SDX55, SD 455, SD 675, SD460, SD660, SD662, SD670, SD675, SD730, SD820, SD835, SD855, SD865 5G, SD888, SDM429W, SDX55, SDX57M, SG4150P, SG8275P, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Snapdragon 1100 Wearable Platform, Snapdragon 1200 Wearable Platform, Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 2100 Platform, Snapdragon Wear 2500 Platform, Snapdragon Wear 3100 Platform, Snapdragon Wear 4100+ Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X5 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24776
Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component \controller\Addon.php.
https://github.com/funadmin/funadmin/issues/7
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24799
D-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_48AF78 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://www.dlink.com/en/security-bulletin/
2023-01-30T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24408
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Ecwid Ecommerce Ecwid Ecommerce Shopping Cart plugin <= 6.11.4 versions.
https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-11-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:51.989Z
2023-05-08T14:36:18.332Z
2023-05-08T14:36:18.332Z
{'Vendor': 'Ecwid Ecommerce', 'Product': 'Ecwid Ecommerce Shopping Cart', 'Versions': 'n/a'}
CVE-2023-24058
Booked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014; the latest version of Booked Scheduler is not affected. However, LabArchives Scheduler (Sep 6, 2022 Feature Release) is affected.
https://s1n1st3r.gitbook.io/theb10g/booked-scheduler-v2.5.5-vulnerability
2023-01-22T00:00:00
2023-01-22T00:00:00
2023-01-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24721
A cross-site scripting (XSS) vulnerability in LiveAction LiveSP v21.1.2 allows attackers to execute arbitrary web scripts or HTML.
http://liveaction.com
2023-01-30T00:00:00
2023-04-10T00:00:00
2023-04-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24234
A stored cross-site scripting (XSS) vulnerability in the component php-inventory-management-system/brand.php of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Brand Name parameter.
https://github.com/stemword/php-inventory-management-system
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24920
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24920
2023-01-31T20:37:47.253Z
2023-03-14T16:55:31.726Z
2023-12-14T18:31:27.130Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.1', 'Versions': '9.1.0'}
CVE-2023-24189
An XML External Entity (XXE) vulnerability in urule v2.1.7 allows attackers to execute arbitrary code via uploading a crafted XML file to /urule/common/saveFile.
https://github.com/youseries/urule
2023-01-23T00:00:00
2023-02-24T00:00:00
2023-02-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24473
An information disclosure vulnerability exists in the TGAInput::read_tga2_header functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted targa file can lead to a disclosure of sensitive information. An attacker can provide a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707
2023-01-25T21:42:04.728Z
2023-03-30T15:47:41.052Z
2023-03-30T15:47:41.052Z
{'Vendor': 'OpenImageIO Project', 'Product': 'OpenImageIO', 'Versions': 'v2.4.7.1'}
CVE-2023-24023
Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/
2023-01-20T00:00:00
2023-11-28T00:00:00
2023-11-28T06:55:49.765703
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24536
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=.
https://go.dev/issue/59153
2023-01-25T21:19:20.642Z
2023-04-06T15:50:24.879Z
2023-06-12T19:14:05.111Z
{'Vendor': 'Go standard library', 'Product': 'mime/multipart', 'Versions': '0, 1.20.0-0'}
CVE-2023-24166
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/formWifiBasicSet.
https://github.com/DrizzlingSun/Tenda/blob/main/AC18/2/2.md
2023-01-23T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24865
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24865
2023-01-31T20:32:35.463Z
2023-03-14T16:55:51.325Z
2023-12-14T18:31:46.762Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24424
Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2978
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:12.723Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenId Connect Authentication Plugin', 'Versions': 'unspecified'}
CVE-2023-24977
Out-of-bounds Read vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7214 https://github.com/apache/inlong/pull/7214  to solve it.
https://lists.apache.org/thread/ggozxorctn3tdll7bgmpwwcbjnd0s6w7
2023-02-01T03:17:36.560Z
2023-02-01T09:09:55.963Z
null
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.1.0'}
CVE-2023-24832
A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
https://www.facebook.com/security/advisories/cve-2023-24832
2023-01-30T21:12:47.476Z
2023-05-18T21:24:01.747Z
2023-05-18T21:24:01.747Z
{'Vendor': 'Facebook', 'Product': 'Hermes', 'Versions': '0'}
CVE-2023-24998
Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.
https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy
2023-02-01T10:32:05.492Z
2023-02-20T15:57:07.372Z
2023-02-23T09:34:44.714Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Commons FileUpload', 'Versions': '0'}
CVE-2023-24131
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey1_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24561
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.401Z
2023-02-14T10:36:39.446Z
2023-03-14T09:31:28.643Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24648
Zstore v6.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /index.php.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/zippy/zstore-6.6.0
2023-01-30T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24432
A cross-site request forgery (CSRF) vulnerability in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:21.719Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Orka by MacStadium Plugin', 'Versions': 'unspecified'}
CVE-2023-24598
OX App Suite before backend 7.10.6-rev37 has an information leak in the handling of distribution lists, e.g., partial disclosure of the private contacts of another user.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24577
McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys. This could enable a user with lower privileges to execute unauthorized tasks.
https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html
2023-01-27T00:00:00
2023-03-13T00:00:00
2023-03-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24127
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey1 parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24824
cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `>` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources.
https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh
2023-01-30T14:43:33.705Z
2023-03-31T22:01:18.220Z
2023-03-31T22:01:18.220Z
{'Vendor': 'github', 'Product': 'cmark-gfm', 'Versions': '< 0.29.0.gfm.10'}
CVE-2023-24465
Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash.
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md
2023-03-07T03:52:10.691Z
2023-03-10T10:45:12.940Z
2023-03-10T10:45:12.940Z
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': '3.1, 3.0'}
CVE-2023-24936
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936
2023-01-31T20:37:47.257Z
2023-06-14T14:52:19.301Z
2024-01-09T17:39:14.791Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2022 version 17.2', 'Versions': '17.2.0'}
CVE-2023-24170
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/fromSetWirelessRepeat.
https://github.com/DrizzlingSun/Tenda/blob/main/AC18/3/3.md
2023-01-23T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24520
Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the trace tool utility.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706
2023-01-25T15:05:01.030Z
2023-07-06T14:53:30.444Z
2023-07-06T17:00:09.776Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-24609
Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.
https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842
2023-01-30T00:00:00
2023-12-22T00:00:00
2023-12-22T03:45:20.227468
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24258
SPIP v4.1.5 and earlier was discovered to contain a SQL injection vulnerability via the _oups parameter. This vulnerability allows attackers to execute arbitrary code via a crafted POST request.
https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.5/SPIP_4.1.5_AND_BEFORE_AUTH_SQLi_Abyss_Watcher.md
2023-01-23T00:00:00
2023-02-27T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24464
Stored-cross-site scripting vulnerability in Buffalo network devices allows an attacker with access to the web management console of the product to execute arbitrary JavaScript on a legitimate user's web browser. The affected products and versions are as follows: BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier
https://www.buffalo.jp/news/detail/20230310-01.html
2023-02-26T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'BUFFALO INC.', 'Product': 'BS-GS series', 'Versions': 'BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier'}
CVE-2023-24937
Windows CryptoAPI Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24937
2023-01-31T20:37:47.257Z
2023-06-14T02:05:49.908Z
2024-01-09T17:39:03.763Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24872
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24872
2023-01-31T20:32:35.464Z
2023-03-14T16:55:57.927Z
2023-12-14T18:31:53.272Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24521
Due to insufficient input sanitization, SAP NetWeaver AS ABAP (BSP Framework) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an unauthenticated user to alter the current session of the user by injecting the malicious code over the network and gain access to the unintended data. This may lead to a limited impact on the confidentiality and the integrity of the application.
https://launchpad.support.sap.com/#/notes/3269151
2023-01-25T15:46:55.580Z
2023-02-14T03:16:44.948Z
2023-04-11T21:23:43.830Z
{'Vendor': 'SAP', 'Product': 'NetWeaver AS ABAP (BSP Framework)', 'Versions': '700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757'}
CVE-2023-24960
IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 246333
https://www.ibm.com/support/pages/node/6953521
2023-02-01T02:39:37.387Z
2023-02-17T18:26:32.622Z
2023-02-17T18:26:32.622Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-24433
Missing permission checks in Jenkins Orka by MacStadium Plugin 1.31 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:22.860Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Orka by MacStadium Plugin', 'Versions': 'unspecified'}
CVE-2023-24599
OX App Suite before backend 7.10.6-rev37 allows authenticated users to change the appointments of arbitrary users via conflicting ID numbers, aka "ID confusion."
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24576
EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the NetWorker Client execution service (nsrexecd) irrespective of any auth used.
https://www.dell.com/support/kbdoc/en-us/000208258/dsa-2023-041-dell-networker-security-update-for-nsrdump-vulnerability
2023-01-26T16:27:33.569Z
2023-02-03T17:21:30.059Z
2023-02-24T05:18:58.725Z
{'Vendor': 'Dell', 'Product': 'NetWorker, NVE', 'Versions': '0'}
CVE-2023-24126
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey4_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24825
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device to trigger a NULL pointer dereference leading to denial of service. This issue is fixed in version 2023.04. There are no known workarounds.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xqm8-xj74-fjw2
2023-01-30T14:43:33.705Z
2023-05-30T15:54:49.930Z
2023-05-30T15:54:49.930Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2023.04'}
CVE-2023-24219
LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/UserMapper.xml.
https://github.com/seagull1985/LuckyFrameWeb/issues/24
2023-01-23T00:00:00
2023-02-17T00:00:00
2023-02-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24425
Jenkins Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and earlier does not set the appropriate context for Kubernetes credentials lookup, allowing attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3022
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:13.832Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Kubernetes Credentials Provider Plugin', 'Versions': 'unspecified'}
CVE-2023-24833
A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
https://www.facebook.com/security/advisories/cve-2023-24833
2023-01-30T21:50:00.539Z
2023-05-18T21:24:11.057Z
2023-05-18T21:24:11.057Z
{'Vendor': 'Facebook', 'Product': 'Hermes', 'Versions': '0'}
CVE-2023-24999
HashiCorp Vault and Vault Enterprise’s approle auth method allowed any authenticated user with access to an approle destroy endpoint to destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability is fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above.
https://discuss.hashicorp.com/t/hcsec-2023-07-vault-fails-to-verify-if-approle-secretid-belongs-to-role-during-a-destroy-operation/51305
2023-02-01T17:54:13.893Z
2023-03-10T23:12:47.638Z
2023-03-10T23:12:47.638Z
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.12.0, 1.11.0, 0'}
CVE-2023-24130
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24560
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.401Z
2023-02-14T10:36:38.321Z
2023-03-14T09:31:27.615Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24921
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24921
2023-01-31T20:37:47.253Z
2023-03-14T16:55:32.232Z
2023-12-14T18:31:27.614Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'}
CVE-2023-24188
ureport v2.2.9 was discovered to contain a directory traversal vulnerability via the deletion function which allows for arbitrary files to be deleted.
http://ureport.com
2023-01-23T00:00:00
2023-02-13T00:00:00
2023-02-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24472
A denial of service vulnerability exists in the FitsOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide malicious input to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709
2023-01-25T21:50:10.624Z
2023-03-30T15:47:40.229Z
2023-03-30T15:47:40.229Z
{'Vendor': 'OpenImageIO Project', 'Product': 'OpenImageIO', 'Versions': 'v2.4.7.1'}
CVE-2023-24022
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability
2023-01-20T19:38:53.748Z
2023-01-24T15:51:17.731Z
2023-01-26T06:03:10.975661Z
{'Vendor': 'Baicells', 'Product': 'Nova 227', 'Versions': '0'}
CVE-2023-24537
Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
https://go.dev/issue/59180
2023-01-25T21:19:20.642Z
2023-04-06T15:50:49.556Z
2023-06-12T19:08:00.683Z
{'Vendor': 'Go standard library', 'Product': 'go/scanner', 'Versions': '0, 1.20.0-0'}
CVE-2023-24167
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/add_white_node.
https://github.com/DrizzlingSun/Tenda/blob/main/AC18/1/1.md
2023-01-23T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24864
Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24864
2023-01-31T20:32:35.463Z
2023-03-14T16:55:50.814Z
2023-12-14T18:31:46.170Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24720
An arbitrary file upload vulnerability in readium-js v0.32.0 allows attackers to execute arbitrary code via uploading a crafted EPUB file.
https://infosec.zeyu2001.com/2023/readiumjs-cloud-reader-everybody-gets-an-xss
2023-01-30T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24409
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs plugin <= 1.1.15 versions.
https://patchstack.com/database/vulnerability/responsive-horizontal-vertical-and-accordion-tabs/wordpress-wp-responsive-tabs-horizontal-vertical-and-accordion-tabs-plugin-1-1-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:51.989Z
2023-08-08T11:19:44.427Z
2023-08-08T11:19:44.427Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'WP Responsive Tabs horizontal vertical and accordion Tabs', 'Versions': 'n/a'}
CVE-2023-24059
Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.
https://support.rockstargames.com/community/200063373/13252523900819
2023-01-22T00:00:00
2023-01-22T00:00:00
2023-01-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24777
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/list.
https://github.com/funadmin/funadmin/issues/5
2023-01-30T00:00:00
2023-03-08T00:00:00
2023-03-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24798
D-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_475FB0 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://www.dlink.com/en/security-bulletin/
2023-01-30T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24848
Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T16:25:23.368Z
2023-10-03T05:00:29.170Z
2023-10-03T05:00:29.170Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9206 LTE Modem, 9207 LTE Modem, APQ8017, APQ8037, AQT1000, AR6003, AR8035, C-V2X 9150, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9215, MDM9230, MDM9250, MDM9310, MDM9330, MDM9615, MDM9615M, MDM9628, MDM9630, MDM9640, MSM8108, MSM8209, MSM8608, MSM8909W, MSM8996AU, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595AU, QCA6696, QCA6698AQ, QCA8081, QCA8337, QCA9367, QCA9377, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8550, QFW7114, QFW7124, Qualcomm 205 Mobile Platform, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SC8180X+SDX55, SD 455, SD 675, SD460, SD626, SD660, SD662, SD670, SD675, SD730, SD820, SD835, SD855, SD865 5G, SD888, SDM429W, SDX55, SDX57M, SG4150P, SG8275P, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 1100 Wearable Platform, Snapdragon 1200 Wearable Platform, Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 2100 Platform, Snapdragon Wear 2500 Platform, Snapdragon Wear 3100 Platform, Snapdragon Wear 4100+ Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X5 LTE Modem, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24448
A missing permission check in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2778
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:40.115Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins RabbitMQ Consumer Plugin', 'Versions': 'unspecified, next of 2.8'}
CVE-2023-24018
A stack-based buffer overflow vulnerability exists in the libzebra.so.0.0.0 security_decrypt_password functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to a buffer overflow. An authenticated attacker can send an HTTP request to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1715
2023-02-02T20:00:37.715Z
2023-07-06T14:53:27.818Z
2023-07-17T19:24:01.646Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-24736
PMB v7.4.6 was discovered to contain a remote code execution (RCE) vulnerability via the component /sauvegarde/restaure_act.php.
https://github.com/AetherBlack/CVE/tree/main/PMB
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24366
An arbitrary file download vulnerability in rConfig v6.8.0 allows attackers to download sensitive files via a crafted HTTP request.
https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md
2023-01-23T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24389
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in brandiD Social Proof (Testimonial) Slider plugin <= 2.2.3 versions.
https://patchstack.com/database/vulnerability/social-proof-testimonials-slider/wordpress-social-proof-testimonial-slider-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:48.763Z
2023-08-10T09:01:02.006Z
2023-08-10T09:01:02.006Z
{'Vendor': 'brandiD', 'Product': 'Social Proof (Testimonial) Slider', 'Versions': 'n/a'}
CVE-2023-24809
NetHack is a single player dungeon exploration game. Starting with version 3.6.2 and prior to version 3.6.7, illegal input to the "C" (call) command can cause a buffer overflow and crash the NetHack process. This vulnerability may be a security issue for systems that have NetHack installed suid/sgid and for shared systems. For all systems, it may result in a process crash. This issue is resolved in NetHack 3.6.7. There are no known workarounds.
https://github.com/NetHack/NetHack/security/advisories/GHSA-2cqv-5w4v-mgch
2023-01-30T14:43:33.703Z
2023-02-17T19:41:24.248Z
2023-02-17T19:41:24.248Z
{'Vendor': 'NetHack', 'Product': 'NetHack', 'Versions': '>= 3.6.2, < 3.6.7'}
CVE-2023-24891
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24891
2023-01-31T20:32:35.470Z
2023-03-14T16:55:34.827Z
2023-12-14T18:31:30.103Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.1', 'Versions': '9.1.0'}
CVE-2023-24192
Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the redirect parameter in login.php.
https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24468
Broken access control in Advanced Authentication versions prior to 6.4.1.1 and 6.3.7.2
https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6372/data/advanced-authentication-releasenotes-6372.html
2023-01-23T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'NetIQ Advanced Authentication', 'Versions': 'versions prior to 6.4.1.1 and 6.3.7.2'}
CVE-2023-24038
The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes.
https://github.com/clintongormley/perl-html-stripscripts/issues/3
2023-01-21T00:00:00
2023-01-21T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24487
Arbitrary file read in Citrix ADC and Citrix Gateway 
https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488
2023-01-24T15:49:52.579Z
2023-07-10T20:51:59.630Z
2023-07-10T20:51:59.630Z
{'Vendor': 'Citrix', 'Product': 'Citrix ADC and Citrix Gateway\u202f', 'Versions': '13.1, 13.0, 12.1, 12.1-FIPS , 13.1-FIPS , 12.1-NDcPP'}
CVE-2023-24604
OX App Suite before backend 7.10.6-rev37 does not check HTTP header lengths when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of header data.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}