CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-24490 | Users with only access to launch VDA applications can launch an unauthorized desktop
| https://support.citrix.com/article/CTX559370/windows-and-linux-virtual-delivery-agent-for-cvad-and-citrix-daas-security-bulletin-cve202324490 | 2023-01-24T15:49:52.579Z | 2023-07-10T21:06:05.934Z | 2023-07-10T21:06:05.934Z | {'Vendor': 'Citrix', 'Product': 'Virtual Delivery Agents for Windows for CVAD and Citrix DaaS Security', 'Versions': 'Current Release (CR) 0, Long Term Service Release (LTSR) 0, Long Term Service Release (LTSR) 0'} |
CVE-2023-24351 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the FILECODE parameter at /goform/formLogin. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24428 | A cross-site request forgery (CSRF) vulnerability in Jenkins Bitbucket OAuth Plugin 0.12 and earlier allows attackers to trick users into logging in to the attacker's account. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2981 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:17.192Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Bitbucket OAuth Plugin', 'Versions': 'unspecified'} |
CVE-2023-24582 | Two OS command injection vulnerabilities exist in the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This OS command injection is triggered through a TCP packet. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710 | 2023-01-27T17:45:31.172Z | 2023-07-06T14:53:29.848Z | 2023-07-06T17:00:05.707Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-24078 | Real Time Logic FuguHub v8.1 and earlier was discovered to contain a remote code execution (RCE) vulnerability via the component /FuguHub/cmsdocs/. | https://github.com/ojan2021/Fuguhub-8.1-RCE | 2023-01-23T00:00:00 | 2023-02-17T00:00:00 | 2023-07-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24097 | TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formPasswordAuth. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/03/README.md | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24994 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19816) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.544Z | 2023-02-14T10:37:05.417Z | 2023-03-14T09:31:52.093Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24652 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the Description parameter under the Create ticket function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24202 | Raffle Draw System v1.0 was discovered to contain a local file inclusion vulnerability via the page parameter in index.php. | https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24347 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formSetWanDhcpplus. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24594 |
When an SSL profile is configured on a Virtual Server, undisclosed traffic can cause an increase in CPU or SSL accelerator resource utilization.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | https://my.f5.com/manage/s/article/K000133132 | 2023-04-14T23:08:02.590Z | 2023-05-03T14:31:16.883Z | 2023-05-03T14:31:16.883Z | {'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.0.0, 16.1.2, 15.1.4.1, 14.1.5'} |
CVE-2023-24828 | Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing normal users (or everyone if it allows self-registration) may exploit this to elevate privilege to obtain administrator permission. This issue is has been addressed in version 7.9.12. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/theonedev/onedev/security/advisories/GHSA-jf5c-9r77-3j5j | 2023-01-30T14:43:33.706Z | 2023-02-07T23:25:11.397Z | null | {'Vendor': 'theonedev', 'Product': 'onedev', 'Versions': '< 7.9.12'} |
CVE-2023-24982 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19804) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.542Z | 2023-02-14T10:36:51.881Z | 2023-03-14T09:31:39.937Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24081 | Multiple stored cross-site scripting (XSS) vulnerabilities in Redrock Software TutorTrac before v4.2.170210 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the reason and location fields of the visits listing page. | https://brackish.io/tutortrac-multiple-stored-xss/ | 2023-01-23T00:00:00 | 2023-02-21T00:00:00 | 2023-02-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24605 | OX App Suite before backend 7.10.6-rev37 does not enforce 2FA for all endpoints, e.g., reading from a drive, reading contact data, and renaming tokens. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24890 | Microsoft OneDrive for iOS Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24890 | 2023-01-31T20:32:35.469Z | 2023-03-14T16:55:59.921Z | 2023-12-14T18:31:55.247Z | {'Vendor': 'Microsoft', 'Product': 'OneDrive for iOS', 'Versions': '1.0.0'} |
CVE-2023-24469 | Potential Cross-Site Scripting in ArcSight Logger versions prior to 7.3.0 | https://www.microfocus.com/support/downloads/ | 2023-01-23T00:00:00 | 2023-06-13T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'ArcSight Logger', 'Versions': 'versions prior to 7.3.0'} |
CVE-2023-24039 | A stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6 can be exploited by local low-privileged users via the dtprintinfo setuid binary to escalate their privileges to root on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt | 2023-01-21T00:00:00 | 2023-01-21T00:00:00 | 2023-01-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24486 | A vulnerability has been identified in Citrix Workspace app for Linux that, if exploited, may result in a malicious local user being able to gain access to the Citrix Virtual Apps and Desktops session of another user who is using the same computer from which the ICA session is launched. | https://support.citrix.com/article/CTX477618/citrix-workspace-app-for-linux-security-bulletin-for-cve202324486 | 2023-01-24T15:49:52.578Z | 2023-07-10T20:36:01.889Z | 2023-07-10T20:36:01.889Z | {'Vendor': 'Citrix', 'Product': 'Citrix Workspace app for Linux', 'Versions': '0'} |
CVE-2023-24808 | PDFio is a C library for reading and writing PDF files. In versions prior to 1.1.0 a denial of service (DOS) vulnerability exists in the pdfio parser. Crafted pdf files can cause the program to run at 100% utilization and never terminate. The pdf which causes this crash found in testing is about 28kb in size and was discovered via fuzzing. Anyone who uses this library either as a standalone binary or as a library can be DOSed when attempting to parse this type of file. Web servers or other automated processes which rely on this code to turn pdf submissions into plaintext can be DOSed when an attacker uploads the pdf. Please see the linked GHSA for an example pdf. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-cjc4-x96x-fvgf | 2023-01-30T14:43:33.703Z | 2023-02-07T00:02:35.052Z | null | {'Vendor': 'michaelrsweet', 'Product': 'pdfio', 'Versions': '< 1.1.0'} |
CVE-2023-24737 | PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950.php. | https://github.com/AetherBlack/CVE/tree/main/PMB | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24367 | null | null | 2023-01-23T00:00:00 | null | 2023-04-07T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-24388 | Cross-Site Request Forgery (CSRF) vulnerability in WpDevArt Booking calendar, Appointment Booking System plugin <= 3.2.3 versions affects plugin forms actions (create, duplicate, edit, delete). | https://patchstack.com/database/vulnerability/booking-calendar/wordpress-booking-calendar-appointment-booking-system-plugin-3-2-3-cross-site-request-forgery-csrf?_s_id=cve | 2023-01-23T18:16:48.762Z | 2023-02-17T14:25:11.347Z | 2023-02-17T14:25:11.347Z | {'Vendor': 'WpDevArt', 'Product': 'Booking calendar, Appointment Booking System', 'Versions': 'n/a'} |
CVE-2023-24449 | Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2985 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:41.284Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins PWauth Security Realm Plugin', 'Versions': 'unspecified, next of 0.4'} |
CVE-2023-24019 | A stack-based buffer overflow vulnerability exists in the urvpn_client http_connection_readcb functionality of Milesight UR32L v32.3.0.5. A specially crafted network packet can lead to a buffer overflow. An attacker can send a malicious packet to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1718 | 2023-02-06T21:20:16.643Z | 2023-07-06T14:53:22.537Z | 2023-07-17T20:30:34.801Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-24760 | An issue found in Ofcms v.1.1.4 allows a remote attacker to to escalate privileges via the respwd method in SysUserController. | https://gitee.com/oufu/ofcms/issues/I6BD2Q | 2023-01-30T00:00:00 | 2023-03-16T00:00:00 | 2023-03-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24625 | Faveo 5.0.1 allows remote attackers to obtain sensitive information via a modified user ID in an Insecure Direct Object Reference (IDOR) attack. | https://www.faveohelpdesk.com/servicedesk/ | 2023-01-30T00:00:00 | 2023-03-24T00:00:00 | 2023-03-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24849 | Information Disclosure in data Modem while parsing an FMTP line in an SDP message. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T16:25:23.368Z | 2023-10-03T05:00:30.792Z | 2023-10-03T05:00:30.792Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9206 LTE Modem, 9207 LTE Modem, APQ8017, APQ8037, AQT1000, AR6003, AR8035, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9215, MDM9250, MDM9310, MDM9615, MDM9615M, MDM9628, MDM9640, MDM9650, MSM8108, MSM8209, MSM8608, MSM8909W, MSM8996AU, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595AU, QCA6696, QCA6698AQ, QCA8081, QCA8337, QCA9367, QCA9377, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8550, QFW7114, QFW7124, Qualcomm 205 Mobile Platform, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SC8180X+SDX55, SD 455, SD 675, SD460, SD660, SD662, SD670, SD675, SD730, SD820, SD835, SD855, SD865 5G, SD888, SDM429W, SDX55, SDX57M, SG4150P, SG8275P, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Snapdragon 1100 Wearable Platform, Snapdragon 1200 Wearable Platform, Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 2100 Platform, Snapdragon Wear 2500 Platform, Snapdragon Wear 3100 Platform, Snapdragon Wear 4100+ Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X5 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24776 | Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component \controller\Addon.php. | https://github.com/funadmin/funadmin/issues/7 | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24799 | D-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_48AF78 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://www.dlink.com/en/security-bulletin/ | 2023-01-30T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24408 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Ecwid Ecommerce Ecwid Ecommerce Shopping Cart plugin <= 6.11.4 versions. | https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-11-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:51.989Z | 2023-05-08T14:36:18.332Z | 2023-05-08T14:36:18.332Z | {'Vendor': 'Ecwid Ecommerce', 'Product': 'Ecwid Ecommerce Shopping Cart', 'Versions': 'n/a'} |
CVE-2023-24058 | Booked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014; the latest version of Booked Scheduler is not affected. However, LabArchives Scheduler (Sep 6, 2022 Feature Release) is affected. | https://s1n1st3r.gitbook.io/theb10g/booked-scheduler-v2.5.5-vulnerability | 2023-01-22T00:00:00 | 2023-01-22T00:00:00 | 2023-01-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24721 | A cross-site scripting (XSS) vulnerability in LiveAction LiveSP v21.1.2 allows attackers to execute arbitrary web scripts or HTML. | http://liveaction.com | 2023-01-30T00:00:00 | 2023-04-10T00:00:00 | 2023-04-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24234 | A stored cross-site scripting (XSS) vulnerability in the component php-inventory-management-system/brand.php of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Brand Name parameter. | https://github.com/stemword/php-inventory-management-system | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24920 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24920 | 2023-01-31T20:37:47.253Z | 2023-03-14T16:55:31.726Z | 2023-12-14T18:31:27.130Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.1', 'Versions': '9.1.0'} |
CVE-2023-24189 | An XML External Entity (XXE) vulnerability in urule v2.1.7 allows attackers to execute arbitrary code via uploading a crafted XML file to /urule/common/saveFile. | https://github.com/youseries/urule | 2023-01-23T00:00:00 | 2023-02-24T00:00:00 | 2023-02-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24473 | An information disclosure vulnerability exists in the TGAInput::read_tga2_header functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted targa file can lead to a disclosure of sensitive information. An attacker can provide a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1707 | 2023-01-25T21:42:04.728Z | 2023-03-30T15:47:41.052Z | 2023-03-30T15:47:41.052Z | {'Vendor': 'OpenImageIO Project', 'Product': 'OpenImageIO', 'Versions': 'v2.4.7.1'} |
CVE-2023-24023 | Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS. | https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/ | 2023-01-20T00:00:00 | 2023-11-28T00:00:00 | 2023-11-28T06:55:49.765703 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24536 | Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=. | https://go.dev/issue/59153 | 2023-01-25T21:19:20.642Z | 2023-04-06T15:50:24.879Z | 2023-06-12T19:14:05.111Z | {'Vendor': 'Go standard library', 'Product': 'mime/multipart', 'Versions': '0, 1.20.0-0'} |
CVE-2023-24166 | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/formWifiBasicSet. | https://github.com/DrizzlingSun/Tenda/blob/main/AC18/2/2.md | 2023-01-23T00:00:00 | 2023-01-26T00:00:00 | 2023-01-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24865 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24865 | 2023-01-31T20:32:35.463Z | 2023-03-14T16:55:51.325Z | 2023-12-14T18:31:46.762Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24424 | Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2978 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:12.723Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenId Connect Authentication Plugin', 'Versions': 'unspecified'} |
CVE-2023-24977 | Out-of-bounds Read vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7214 https://github.com/apache/inlong/pull/7214 to solve it.
| https://lists.apache.org/thread/ggozxorctn3tdll7bgmpwwcbjnd0s6w7 | 2023-02-01T03:17:36.560Z | 2023-02-01T09:09:55.963Z | null | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.1.0'} |
CVE-2023-24832 | A null pointer dereference bug in Hermes prior to commit 5cae9f72975cf0e5a62b27fdd8b01f103e198708 could have been used by an attacker to crash an Hermes runtime where the EnableHermesInternal config option was set to true. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. | https://www.facebook.com/security/advisories/cve-2023-24832 | 2023-01-30T21:12:47.476Z | 2023-05-18T21:24:01.747Z | 2023-05-18T21:24:01.747Z | {'Vendor': 'Facebook', 'Product': 'Hermes', 'Versions': '0'} |
CVE-2023-24998 | Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.
Note that, like all of the file upload limits, the
new configuration option (FileUploadBase#setFileCountMax) is not
enabled by default and must be explicitly configured.
| https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy | 2023-02-01T10:32:05.492Z | 2023-02-20T15:57:07.372Z | 2023-02-23T09:34:44.714Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Commons FileUpload', 'Versions': '0'} |
CVE-2023-24131 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey1_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24561 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.401Z | 2023-02-14T10:36:39.446Z | 2023-03-14T09:31:28.643Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24648 | Zstore v6.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /index.php. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/zippy/zstore-6.6.0 | 2023-01-30T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24432 | A cross-site request forgery (CSRF) vulnerability in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:21.719Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Orka by MacStadium Plugin', 'Versions': 'unspecified'} |
CVE-2023-24598 | OX App Suite before backend 7.10.6-rev37 has an information leak in the handling of distribution lists, e.g., partial disclosure of the private contacts of another user. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24577 | McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys. This could enable a user with lower privileges to execute unauthorized tasks. | https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html | 2023-01-27T00:00:00 | 2023-03-13T00:00:00 | 2023-03-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24127 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey1 parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24824 | cmark-gfm is GitHub's fork of cmark, a CommonMark parsing and rendering library and program in C. A polynomial time complexity issue in cmark-gfm may lead to unbounded resource exhaustion and subsequent denial of service. This CVE covers quadratic complexity issues when parsing text which leads with either large numbers of `>` or `-` characters. This issue has been addressed in version 0.29.0.gfm.10. Users are advised to upgrade. Users unable to upgrade should validate that their input comes from trusted sources. | https://github.com/github/cmark-gfm/security/advisories/GHSA-66g8-4hjf-77xh | 2023-01-30T14:43:33.705Z | 2023-03-31T22:01:18.220Z | 2023-03-31T22:01:18.220Z | {'Vendor': 'github', 'Product': 'cmark-gfm', 'Versions': '< 0.29.0.gfm.10'} |
CVE-2023-24465 | Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions
has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash.
| https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-03.md | 2023-03-07T03:52:10.691Z | 2023-03-10T10:45:12.940Z | 2023-03-10T10:45:12.940Z | {'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': '3.1, 3.0'} |
CVE-2023-24936 | .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24936 | 2023-01-31T20:37:47.257Z | 2023-06-14T14:52:19.301Z | 2024-01-09T17:39:14.791Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2022 version 17.2', 'Versions': '17.2.0'} |
CVE-2023-24170 | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/fromSetWirelessRepeat. | https://github.com/DrizzlingSun/Tenda/blob/main/AC18/3/3.md | 2023-01-23T00:00:00 | 2023-01-26T00:00:00 | 2023-01-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24520 | Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the trace tool utility. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706 | 2023-01-25T15:05:01.030Z | 2023-07-06T14:53:30.444Z | 2023-07-06T17:00:09.776Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-24609 | Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate. | https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842 | 2023-01-30T00:00:00 | 2023-12-22T00:00:00 | 2023-12-22T03:45:20.227468 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24258 | SPIP v4.1.5 and earlier was discovered to contain a SQL injection vulnerability via the _oups parameter. This vulnerability allows attackers to execute arbitrary code via a crafted POST request. | https://github.com/Abyss-W4tcher/ab4yss-wr4iteups/blob/ffa980faa9e3598d49d6fb7def4f7a67cfb5f427/SPIP%20-%20Pentest/SPIP%204.1.5/SPIP_4.1.5_AND_BEFORE_AUTH_SQLi_Abyss_Watcher.md | 2023-01-23T00:00:00 | 2023-02-27T00:00:00 | 2023-03-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24464 | Stored-cross-site scripting vulnerability in Buffalo network devices allows an attacker with access to the web management console of the product to execute arbitrary JavaScript on a legitimate user's web browser. The affected products and versions are as follows: BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier | https://www.buffalo.jp/news/detail/20230310-01.html | 2023-02-26T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'BUFFALO INC.', 'Product': 'BS-GS series', 'Versions': 'BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier'} |
CVE-2023-24937 | Windows CryptoAPI Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24937 | 2023-01-31T20:37:47.257Z | 2023-06-14T02:05:49.908Z | 2024-01-09T17:39:03.763Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24872 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24872 | 2023-01-31T20:32:35.464Z | 2023-03-14T16:55:57.927Z | 2023-12-14T18:31:53.272Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24521 | Due to insufficient input sanitization, SAP NetWeaver AS ABAP (BSP Framework) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an unauthenticated user to alter the current session of the user by injecting the malicious code over the network and gain access to the unintended data. This may lead to a limited impact on the confidentiality and the integrity of the application.
| https://launchpad.support.sap.com/#/notes/3269151 | 2023-01-25T15:46:55.580Z | 2023-02-14T03:16:44.948Z | 2023-04-11T21:23:43.830Z | {'Vendor': 'SAP', 'Product': 'NetWeaver AS ABAP (BSP Framework)', 'Versions': '700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757'} |
CVE-2023-24960 | IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 246333 | https://www.ibm.com/support/pages/node/6953521 | 2023-02-01T02:39:37.387Z | 2023-02-17T18:26:32.622Z | 2023-02-17T18:26:32.622Z | {'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'} |
CVE-2023-24433 | Missing permission checks in Jenkins Orka by MacStadium Plugin 1.31 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:22.860Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Orka by MacStadium Plugin', 'Versions': 'unspecified'} |
CVE-2023-24599 | OX App Suite before backend 7.10.6-rev37 allows authenticated users to change the appointments of arbitrary users via conflicting ID numbers, aka "ID confusion." | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24576 |
EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the NetWorker Client execution service (nsrexecd) irrespective of any auth used.
| https://www.dell.com/support/kbdoc/en-us/000208258/dsa-2023-041-dell-networker-security-update-for-nsrdump-vulnerability | 2023-01-26T16:27:33.569Z | 2023-02-03T17:21:30.059Z | 2023-02-24T05:18:58.725Z | {'Vendor': 'Dell', 'Product': 'NetWorker, NVE', 'Versions': '0'} |
CVE-2023-24126 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey4_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24825 | RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device to trigger a NULL pointer dereference leading to denial of service. This issue is fixed in version 2023.04. There are no known workarounds. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xqm8-xj74-fjw2 | 2023-01-30T14:43:33.705Z | 2023-05-30T15:54:49.930Z | 2023-05-30T15:54:49.930Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2023.04'} |
CVE-2023-24219 | LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/UserMapper.xml. | https://github.com/seagull1985/LuckyFrameWeb/issues/24 | 2023-01-23T00:00:00 | 2023-02-17T00:00:00 | 2023-02-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24425 | Jenkins Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and earlier does not set the appropriate context for Kubernetes credentials lookup, allowing attackers with Item/Configure permission to access and potentially capture Kubernetes credentials they are not entitled to. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3022 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:13.832Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Kubernetes Credentials Provider Plugin', 'Versions': 'unspecified'} |
CVE-2023-24833 | A use-after-free in BigIntPrimitive addition in Hermes prior to commit a6dcafe6ded8e61658b40f5699878cd19a481f80 could have been used by an attacker to leak raw data from Hermes VM’s heap. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. | https://www.facebook.com/security/advisories/cve-2023-24833 | 2023-01-30T21:50:00.539Z | 2023-05-18T21:24:11.057Z | 2023-05-18T21:24:11.057Z | {'Vendor': 'Facebook', 'Product': 'Hermes', 'Versions': '0'} |
CVE-2023-24999 | HashiCorp Vault and Vault Enterprise’s approle auth method allowed any authenticated user with access to an approle destroy endpoint to destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability is fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above. | https://discuss.hashicorp.com/t/hcsec-2023-07-vault-fails-to-verify-if-approle-secretid-belongs-to-role-during-a-destroy-operation/51305 | 2023-02-01T17:54:13.893Z | 2023-03-10T23:12:47.638Z | 2023-03-10T23:12:47.638Z | {'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.12.0, 1.11.0, 0'} |
CVE-2023-24130 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24560 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.401Z | 2023-02-14T10:36:38.321Z | 2023-03-14T09:31:27.615Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24921 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24921 | 2023-01-31T20:37:47.253Z | 2023-03-14T16:55:32.232Z | 2023-12-14T18:31:27.614Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'} |
CVE-2023-24188 | ureport v2.2.9 was discovered to contain a directory traversal vulnerability via the deletion function which allows for arbitrary files to be deleted. | http://ureport.com | 2023-01-23T00:00:00 | 2023-02-13T00:00:00 | 2023-02-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24472 | A denial of service vulnerability exists in the FitsOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.7.1. A specially crafted ImageOutput Object can lead to denial of service. An attacker can provide malicious input to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1709 | 2023-01-25T21:50:10.624Z | 2023-03-30T15:47:40.229Z | 2023-03-30T15:47:40.229Z | {'Vendor': 'OpenImageIO Project', 'Product': 'OpenImageIO', 'Versions': 'v2.4.7.1'} |
CVE-2023-24022 | Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.7.11.3 have hardcoded credentials that are easily discovered and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
| https://baicells.zendesk.com/hc/en-us/articles/6188324645780-2023-1-17-Hard-Coded-Credential-Crypt-Vulnerability | 2023-01-20T19:38:53.748Z | 2023-01-24T15:51:17.731Z | 2023-01-26T06:03:10.975661Z | {'Vendor': 'Baicells', 'Product': 'Nova 227', 'Versions': '0'} |
CVE-2023-24537 | Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow. | https://go.dev/issue/59180 | 2023-01-25T21:19:20.642Z | 2023-04-06T15:50:49.556Z | 2023-06-12T19:08:00.683Z | {'Vendor': 'Go standard library', 'Product': 'go/scanner', 'Versions': '0, 1.20.0-0'} |
CVE-2023-24167 | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/add_white_node. | https://github.com/DrizzlingSun/Tenda/blob/main/AC18/1/1.md | 2023-01-23T00:00:00 | 2023-01-26T00:00:00 | 2023-01-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24864 | Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24864 | 2023-01-31T20:32:35.463Z | 2023-03-14T16:55:50.814Z | 2023-12-14T18:31:46.170Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24720 | An arbitrary file upload vulnerability in readium-js v0.32.0 allows attackers to execute arbitrary code via uploading a crafted EPUB file. | https://infosec.zeyu2001.com/2023/readiumjs-cloud-reader-everybody-gets-an-xss | 2023-01-30T00:00:00 | 2023-04-05T00:00:00 | 2023-04-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24409 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs plugin <= 1.1.15 versions. | https://patchstack.com/database/vulnerability/responsive-horizontal-vertical-and-accordion-tabs/wordpress-wp-responsive-tabs-horizontal-vertical-and-accordion-tabs-plugin-1-1-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:51.989Z | 2023-08-08T11:19:44.427Z | 2023-08-08T11:19:44.427Z | {'Vendor': 'I Thirteen Web Solution', 'Product': 'WP Responsive Tabs horizontal vertical and accordion Tabs', 'Versions': 'n/a'} |
CVE-2023-24059 | Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023. | https://support.rockstargames.com/community/200063373/13252523900819 | 2023-01-22T00:00:00 | 2023-01-22T00:00:00 | 2023-01-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24777 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/list. | https://github.com/funadmin/funadmin/issues/5 | 2023-01-30T00:00:00 | 2023-03-08T00:00:00 | 2023-03-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24798 | D-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_475FB0 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://www.dlink.com/en/security-bulletin/ | 2023-01-30T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24848 | Information Disclosure in Data Modem while performing a VoLTE call with an undefined RTCP FB line value. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T16:25:23.368Z | 2023-10-03T05:00:29.170Z | 2023-10-03T05:00:29.170Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9206 LTE Modem, 9207 LTE Modem, APQ8017, APQ8037, AQT1000, AR6003, AR8035, C-V2X 9150, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, MDM8207, MDM8215, MDM8215M, MDM8615M, MDM9215, MDM9230, MDM9250, MDM9310, MDM9330, MDM9615, MDM9615M, MDM9628, MDM9630, MDM9640, MSM8108, MSM8209, MSM8608, MSM8909W, MSM8996AU, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595AU, QCA6696, QCA6698AQ, QCA8081, QCA8337, QCA9367, QCA9377, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8550, QFW7114, QFW7124, Qualcomm 205 Mobile Platform, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SC8180X+SDX55, SD 455, SD 675, SD460, SD626, SD660, SD662, SD670, SD675, SD730, SD820, SD835, SD855, SD865 5G, SD888, SDM429W, SDX55, SDX57M, SG4150P, SG8275P, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 1100 Wearable Platform, Snapdragon 1200 Wearable Platform, Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 2100 Platform, Snapdragon Wear 2500 Platform, Snapdragon Wear 3100 Platform, Snapdragon Wear 4100+ Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X5 LTE Modem, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24448 | A missing permission check in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2778 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:40.115Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins RabbitMQ Consumer Plugin', 'Versions': 'unspecified, next of 2.8'} |
CVE-2023-24018 | A stack-based buffer overflow vulnerability exists in the libzebra.so.0.0.0 security_decrypt_password functionality of Milesight UR32L v32.3.0.5. A specially crafted HTTP request can lead to a buffer overflow. An authenticated attacker can send an HTTP request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1715 | 2023-02-02T20:00:37.715Z | 2023-07-06T14:53:27.818Z | 2023-07-17T19:24:01.646Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-24736 | PMB v7.4.6 was discovered to contain a remote code execution (RCE) vulnerability via the component /sauvegarde/restaure_act.php. | https://github.com/AetherBlack/CVE/tree/main/PMB | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24366 | An arbitrary file download vulnerability in rConfig v6.8.0 allows attackers to download sensitive files via a crafted HTTP request. | https://github.com/mrojz/rconfig-exploit/blob/main/rconfigV6_Local_File_Disclosure.md | 2023-01-23T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24389 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in brandiD Social Proof (Testimonial) Slider plugin <= 2.2.3 versions. | https://patchstack.com/database/vulnerability/social-proof-testimonials-slider/wordpress-social-proof-testimonial-slider-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:48.763Z | 2023-08-10T09:01:02.006Z | 2023-08-10T09:01:02.006Z | {'Vendor': 'brandiD', 'Product': 'Social Proof (Testimonial) Slider', 'Versions': 'n/a'} |
CVE-2023-24809 | NetHack is a single player dungeon exploration game. Starting with version 3.6.2 and prior to version 3.6.7, illegal input to the "C" (call) command can cause a buffer overflow and crash the NetHack process. This vulnerability may be a security issue for systems that have NetHack installed suid/sgid and for shared systems. For all systems, it may result in a process crash. This issue is resolved in NetHack 3.6.7. There are no known workarounds. | https://github.com/NetHack/NetHack/security/advisories/GHSA-2cqv-5w4v-mgch | 2023-01-30T14:43:33.703Z | 2023-02-17T19:41:24.248Z | 2023-02-17T19:41:24.248Z | {'Vendor': 'NetHack', 'Product': 'NetHack', 'Versions': '>= 3.6.2, < 3.6.7'} |
CVE-2023-24891 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24891 | 2023-01-31T20:32:35.470Z | 2023-03-14T16:55:34.827Z | 2023-12-14T18:31:30.103Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.1', 'Versions': '9.1.0'} |
CVE-2023-24192 | Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the redirect parameter in login.php. | https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24468 | Broken access control in Advanced Authentication versions prior to 6.4.1.1 and 6.3.7.2 | https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6372/data/advanced-authentication-releasenotes-6372.html | 2023-01-23T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'NetIQ Advanced Authentication', 'Versions': 'versions prior to 6.4.1.1 and 6.3.7.2'} |
CVE-2023-24038 | The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes. | https://github.com/clintongormley/perl-html-stripscripts/issues/3 | 2023-01-21T00:00:00 | 2023-01-21T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24487 | Arbitrary file read in Citrix ADC and Citrix Gateway | https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488 | 2023-01-24T15:49:52.579Z | 2023-07-10T20:51:59.630Z | 2023-07-10T20:51:59.630Z | {'Vendor': 'Citrix', 'Product': 'Citrix ADC and Citrix Gateway\u202f', 'Versions': '13.1, 13.0, 12.1, 12.1-FIPS , 13.1-FIPS , 12.1-NDcPP'} |
CVE-2023-24604 | OX App Suite before backend 7.10.6-rev37 does not check HTTP header lengths when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of header data. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.