CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-24595 | An OS command injection vulnerability exists in the ys_thirdparty system_user_script functionality of Milesight UR32L v32.3.0.5. A specially crafted series of network requests can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713 | 2023-01-27T18:05:46.317Z | 2023-07-06T14:53:28.636Z | 2023-07-06T17:00:10.336Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-24829 | Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This issue affects the iotdb-web-workbench component from 0.13.0 before 0.13.3. iotdb-web-workbench is an optional component of IoTDB, providing a web console of the database.
This problem is fixed from version 0.13.3 of iotdb-web-workbench onwards.
| https://lists.apache.org/thread/l0b59hh046tyn4gqot0bdrpg8gxlksmo | 2023-01-30T14:45:51.213Z | 2023-01-31T09:22:41.587Z | 2023-03-08T16:15:06.910Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache IoTDB Workbench', 'Versions': '0.13.0'} |
CVE-2023-24983 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19805) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.543Z | 2023-02-14T10:36:53.001Z | 2023-03-14T09:31:41.019Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24080 | A lack of rate limiting on the password reset endpoint of Chamberlain myQ v5.222.0.32277 (on iOS) allows attackers to compromise user accounts via a bruteforce attack. | http://chamberlain.com | 2023-01-23T00:00:00 | 2023-02-21T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24653 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the oldpass parameter under the Change Password function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24346 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the wan_connected parameter at /goform/formEasySetupWizard3. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24429 | Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%281%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:18.317Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Semantic Versioning Plugin', 'Versions': 'unspecified'} |
CVE-2023-24583 | Two OS command injection vulnerabilities exist in the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This OS command injection is triggered through a UDP packet. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710 | 2023-01-27T17:45:31.172Z | 2023-07-06T14:53:29.946Z | 2023-07-06T17:00:05.823Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-24096 | TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the newpass parameter at /formPasswordSetup. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/06/README.md | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24995 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19817) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.544Z | 2023-02-14T10:37:06.480Z | 2023-03-14T09:31:53.089Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24350 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the config.smtp_email_subject parameter at /goform/formSetEmail. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24184 | TOTOLink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability. | https://github.com/fuxianghah/IOT/tree/main/Motorala/MR2600/13 | 2023-01-23T00:00:00 | 2023-02-21T00:00:00 | 2023-02-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24887 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24887 | 2023-01-31T20:32:35.468Z | 2023-04-11T19:13:32.059Z | 2023-12-14T18:59:30.790Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24868 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24868 | 2023-01-31T20:32:35.464Z | 2023-03-14T16:55:53.858Z | 2023-12-14T18:31:49.273Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24491 |
A vulnerability has been discovered in the Citrix Secure Access client for Windows
which, if exploited, could allow an attacker with access to an endpoint with Standard User Account that has the vulnerable client installed to escalate their local privileges to that of NT AUTHORITY\SYSTEM.
| https://support.citrix.com/article/CTX561480/citrix-secure-access-client-for-windows-security-bulletin-for-cve202324491 | 2023-01-24T15:49:52.579Z | 2023-07-11T21:13:05.305Z | 2023-07-11T21:13:05.305Z | {'Vendor': 'Citrix', 'Product': 'Citrix Secure Access client for Windows', 'Versions': '0'} |
CVE-2023-24612 | The PdfBook extension through 2.0.5 before b07b6a64 for MediaWiki allows command injection via an option. | https://gitlab.com/organicdesign/PdfBook/-/merge_requests/6 | 2023-01-30T00:00:00 | 2023-01-30T00:00:00 | 2023-01-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24757 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | https://github.com/strukturag/libde265/issues/385 | 2023-01-30T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24813 | Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75 | 2023-01-30T14:43:33.704Z | 2023-02-07T18:05:14.541Z | null | {'Vendor': 'dompdf', 'Product': 'dompdf', 'Versions': '= 2.0.2'} |
CVE-2023-24540 | Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution. | https://go.dev/issue/59721 | 2023-01-25T21:19:20.642Z | 2023-05-11T15:29:31.947Z | 2023-06-12T19:08:26.127Z | {'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'} |
CVE-2023-24055 | KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC. | https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/ | 2023-01-21T00:00:00 | 2023-01-22T00:00:00 | 2023-02-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24405 | Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Contact Form 7 – PayPal & Stripe Add-on plugin <= 1.9.3 versions. | https://patchstack.com/database/vulnerability/contact-form-7-paypal-add-on/wordpress-contact-form-7-paypal-stripe-add-on-plugin-1-9-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-23T18:16:51.989Z | 2023-07-10T11:58:08.993Z | 2023-07-10T11:58:08.993Z | {'Vendor': 'Scott Paterson', 'Product': 'Contact Form 7 – PayPal & Stripe Add-on', 'Versions': 'n/a'} |
CVE-2023-24956 | Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /cha.php. | https://github.com/Mortalwangxin/lives/issues/1 | 2023-01-31T00:00:00 | 2023-01-31T00:00:00 | 2023-01-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24686 | An issue in the CSV Import function of ChurchCRM v4.5.3 and below allows attackers to execute arbitrary code via importing a crafted CSV file. | https://github.com/ChurchCRM/CRM | 2023-01-30T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24393 | Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Sk. Abul Hasan Animated Number Counters plugin <= 1.6 versions. | https://patchstack.com/database/vulnerability/animated-number-counters/wordpress-animated-number-counters-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:50.470Z | 2023-08-10T12:32:28.987Z | 2023-08-10T12:32:28.987Z | {'Vendor': 'Sk. Abul Hasan', 'Product': 'Animated Number Counters', 'Versions': 'n/a'} |
CVE-2023-24517 | Unrestricted Upload of File with Dangerous Type vulnerability in the Pandora FMS File Manager component, allows an attacker to make make use of this issue ( unrestricted file upload ) to execute arbitrary system commands. This issue affects Pandora FMS v767 version and prior versions on all platforms. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-01-25T13:49:34.265Z | 2023-08-22T13:05:17.554Z | 2023-10-16T09:47:57.373Z | {'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'} |
CVE-2023-24147 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for the telnet service which is stored in the component /etc/config/product.ini. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/telnet_hard_code/telnet_hard_code.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24844 | Memory Corruption in Core while invoking a call to Access Control core library with hardware protected address range. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T13:26:08.512Z | 2023-10-03T05:00:26.163Z | 2023-10-03T05:00:26.163Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6700, FastConnect 6900, FastConnect 7800, QCA8081, QCA8337, QCM4490, QCM8550, QCN6024, QCN9024, QCS4490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QRU1032, QRU1052, QRU1062, SG8275P, SM8550P, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, WCD9370, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24901 | Windows NFS Portmapper Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24901 | 2023-01-31T20:32:35.472Z | 2023-05-09T17:02:53.241Z | 2023-12-14T19:06:03.798Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24452 | A cross-site request forgery (CSRF) vulnerability in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:44.786Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestQuality Updater Plugin', 'Versions': 'unspecified, next of 1.3'} |
CVE-2023-24002 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPdevart YouTube Embed, Playlist and Popup by WpDevArt plugin <= 2.6.3 versions. | https://patchstack.com/database/vulnerability/youtube-video-player/wordpress-youtube-embed-playlist-and-popup-by-wpdevart-plugin-2-6-3-cross-site-scripting-xss?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-04-06T08:04:24.910Z | 2023-04-06T08:04:24.910Z | {'Vendor': 'WPdevart', 'Product': 'YouTube Embed, Playlist and Popup by WpDevArt', 'Versions': 'n/a'} |
CVE-2023-24852 | Memory Corruption in Core due to secure memory access by user while loading modem image. | https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin | 2023-01-31T16:25:23.369Z | 2023-11-07T05:26:31.358Z | 2023-11-07T05:26:31.358Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, AQT1000, AR8031, AR8035, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, FSM10056, Immersive Home 3210 Platform, Immersive Home 326 Platform, IPQ5332, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ9008, IPQ9554, IPQ9570, IPQ9574, MDM9205S, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QCA0000, QCA4004, QCA4024, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9377, QCA9984, QCC710, QCF8000, QCF8001, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5052, QCN5121, QCN5122, QCN5152, QCN6023, QCN6024, QCN6224, QCN6274, QCN7606, QCN9000, QCN9011, QCN9012, QCN9013, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS7230, QCS8155, QCS8250, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRB5165M, QRB5165N, QRU1032, QRU1052, QRU1062, QSM8250, QSM8350, QTS110, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8650P, SA9000P, SC8180X+SDX55, SC8380XP, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD662, SD670, SD675, SD730, SD855, SD865 5G, SD888, SDX55, SDX57M, SDX65M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon X24 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SRV1H, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24151 | A command injection vulnerability in the ip parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24501 | Electra Central AC unit – Hardcoded Credentials in unspecified code used by the unit. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Electra', 'Product': 'Electra Central AC unit', 'Versions': 'Update to the latest version'} |
CVE-2023-24014 | Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are
vulnerable to heap-based buffer overflow, which could allow an attacker
to execute arbitrary code.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-157-01 | 2023-02-08T21:31:13.064Z | 2023-06-07T20:50:29.115Z | 2023-06-07T20:50:29.115Z | {'Vendor': 'Delta Electronics', 'Product': 'CNCSoft-B DOPSoft', 'Versions': '0'} |
CVE-2023-24444 | Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2996 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:35.403Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenID Plugin', 'Versions': 'unspecified, next of 2.4'} |
CVE-2023-24782 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit. | https://github.com/funadmin/funadmin/issues/3 | 2023-01-30T00:00:00 | 2023-03-08T00:00:00 | 2023-03-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24278 | Squidex before 7.4.0 was discovered to contain a squid.svg cross-site scripting (XSS) vulnerability. | https://www.openwall.com/lists/oss-security/2023/03/16/1 | 2023-01-23T00:00:00 | 2023-03-18T00:00:00 | 2023-03-18T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24556 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.400Z | 2023-02-14T10:36:33.749Z | 2023-03-14T09:31:23.467Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24805 | cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime. | https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x | 2023-01-30T14:43:33.703Z | 2023-05-17T17:33:41.714Z | 2023-05-17T17:33:41.714Z | {'Vendor': 'OpenPrinting', 'Product': 'cups-filters', 'Versions': '<= 2.0rc1 '} |
CVE-2023-24940 | Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940 | 2023-01-31T20:37:47.257Z | 2023-05-09T17:02:52.727Z | 2023-12-14T19:06:03.304Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24413 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WordPress vertical image slider plugin <= 1.2.16 versions. | https://patchstack.com/database/vulnerability/wp-vertical-image-slider/wordpress-wordpress-vertical-image-slider-plugin-plugin-1-2-16-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:53.496Z | 2023-08-08T11:28:20.333Z | 2023-08-08T11:28:20.333Z | {'Vendor': 'I Thirteen Web Solution', 'Product': 'WordPress vertical image slider plugin', 'Versions': 'n/a'} |
CVE-2023-24690 | ChurchCRM 4.5.3 and below was discovered to contain a stored cross-site scripting (XSS) vulnerability at /api/public/register/family. | http://churchcrm.io/ | 2023-01-30T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24385 | Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in David Lingren Media Library Assistant plugin <= 3.11 versions. | https://patchstack.com/database/vulnerability/media-library-assistant/wordpress-media-library-assistant-plugin-3-11-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:48.762Z | 2023-10-17T08:58:24.999Z | 2023-10-17T08:58:24.999Z | {'Vendor': 'David Lingren', 'Product': 'Media Library Assistant', 'Versions': 'n/a'} |
CVE-2023-24048 | Cross Site Request Forgery (CSRF) vulnerability in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain control of the device via crafted GET request to /man_password.htm. | https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ | 2023-01-21T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T22:45:08.301548 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24418 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Tiny carousel horizontal slider plus plugin <= 3.2 versions. | https://patchstack.com/database/vulnerability/tiny-carousel-horizontal-slider-plus/wordpress-tiny-carousel-horizontal-slider-plus-plugin-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:53.497Z | 2023-05-10T07:43:07.768Z | 2023-05-10T07:43:07.768Z | {'Vendor': 'Gopi Ramasamy', 'Product': 'Tiny carousel horizontal slider plus', 'Versions': 'n/a'} |
CVE-2023-24731 | Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the query parameter in the user profile update function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24674 | Permissions vulnerability found in Bludit CMS v.4.0.0 allows local attackers to escalate privileges via the role:admin parameter. | https://medium.com/%40cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107 | 2023-01-30T00:00:00 | 2023-09-01T00:00:00 | 2023-09-01T09:48:27.721562 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24859 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24859 | 2023-01-31T20:32:35.462Z | 2023-03-14T16:55:48.755Z | 2023-12-14T18:31:44.158Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24789 | jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component. | https://github.com/jeecgboot/jeecg-boot/issues/4511 | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24623 | Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses. | https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19 | 2023-01-30T00:00:00 | 2023-01-30T00:00:00 | 2023-01-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24009 | Auth. (subscriber+) Reflected Cross-site Scripting (XSS) vulnerability in Wpazure Themes Upfrontwp theme <= 1.1 versions. | https://patchstack.com/database/vulnerability/upfrontwp/wordpress-upfrontwp-theme-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-20T09:29:08.378Z | 2023-08-10T10:14:58.875Z | 2023-08-10T10:14:58.875Z | {'Vendor': 'Wpazure Themes', 'Product': 'Upfrontwp', 'Versions': 'n/a'} |
CVE-2023-24459 | A missing permission check in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2745 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:52.825Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins BearyChat Plugin', 'Versions': 'unspecified, next of 3.0.2'} |
CVE-2023-24320 | An access control issue in Axcora POS #0~gitf77ec09 allows unauthenticated attackers to execute arbitrary commands via unspecified vectors. | https://www.youtube.com/watch?v=1FhPL3erWd4 | 2023-01-23T00:00:00 | 2023-02-21T00:00:00 | 2023-05-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24818 | RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference. During forwarding of a fragment an uninitialized entry in the reassembly buffer is used. The NULL pointer dereference triggers a hard fault exception resulting in denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-69h9-vj5r-xcg6 | 2023-01-30T14:43:33.704Z | 2023-04-24T14:23:44.280Z | 2023-04-24T14:23:44.280Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'} |
CVE-2023-24377 | Cross-Site Request Forgery (CSRF) vulnerability in Ecwid Ecommerce Ecwid Ecommerce Shopping Cart plugin <= 6.11.3 versions. | https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-11-3-cross-site-request-forgery-csrf?_s_id=cve | 2023-01-23T18:16:47.036Z | 2023-02-14T11:18:14.424Z | 2023-02-14T11:18:14.424Z | {'Vendor': 'Ecwid Ecommerce', 'Product': 'Ecwid Ecommerce Shopping Cart', 'Versions': 'n/a'} |
CVE-2023-24232 | A stored cross-site scripting (XSS) vulnerability in the component /php-inventory-management-system/product.php of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Product Name parameter. | https://github.com/stemword/php-inventory-management-system | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24398 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Snap Creek Software EZP Coming Soon Page plugin <= 1.0.7.3 versions. | https://patchstack.com/database/vulnerability/easy-pie-coming-soon/wordpress-ezp-coming-soon-page-plugin-1-0-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:50.470Z | 2023-04-07T09:20:14.499Z | 2023-04-07T09:20:14.499Z | {'Vendor': 'Snap Creek Software', 'Product': 'EZP Coming Soon Page', 'Versions': 'n/a'} |
CVE-2023-24475 | Out of bounds read in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html | 2023-02-15T04:00:02.948Z | 2023-05-10T13:17:07.225Z | 2023-05-10T13:17:07.225Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BMC firmware', 'Versions': 'before version 2.90'} |
CVE-2023-24025 | CRYSTALS-DILITHIUM (in Post-Quantum Cryptography Selected Algorithms 2022) in PQClean d03da30 may allow universal forgeries of digital signatures via a template side-channel attack because of intermediate data leakage of one vector. | https://github.com/PQClean/PQClean/tree/d03da3053491e767ef842deaef43fc5bdb6bc911 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24926 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24926 | 2023-01-31T20:37:47.255Z | 2023-04-11T19:13:29.385Z | 2023-12-14T18:59:28.248Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24863 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24863 | 2023-01-31T20:32:35.463Z | 2023-03-14T16:55:50.299Z | 2023-12-14T18:31:45.675Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24530 | SAP BusinessObjects Business Intelligence Platform (CMC) - versions 420, 430, allows an authenticated admin user to upload malicious code that can be executed by the application over the network. On successful exploitation, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integrity and availability of the application.
| https://launchpad.support.sap.com/#/notes/3256787 | 2023-01-25T15:46:55.582Z | 2023-02-14T03:19:44.905Z | 2023-04-11T21:27:38.517Z | {'Vendor': 'SAP', 'Product': 'BusinessObjects Business Intelligence Platform (CMC)', 'Versions': '420, 430'} |
CVE-2023-24160 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admuser parameter in the setPasswordCfg function. | https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admuser/setPasswordCfg_admuser.md | 2023-01-23T00:00:00 | 2023-02-14T00:00:00 | 2023-02-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24249 | An arbitrary file upload vulnerability in laravel-admin v1.8.19 allows attackers to execute arbitrary code via a crafted PHP file. | https://laravel-admin.org/ | 2023-01-23T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24619 | Redpanda before 22.3.12 discloses cleartext AWS credentials. The import functionality in the rpk binary logs an AWS Access Key ID and Secret in cleartext to standard output, allowing a local user to view the key in the console, or in Kubernetes logs if stdout output is collected. The fixed versions are 22.3.12, 22.2.10, and 22.1.12. | https://github.com/redpanda-data/redpanda/pull/8339 | 2023-01-30T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24971 |
IBM B2B Advanced Communications 1.0.0.0 and IBM Multi-Enterprise Integration Gateway 1.0.0.1 could allow a user to cause a denial of service due to the deserializing of untrusted serialized Java objects. IBM X-Force ID: 246976.
| https://www.ibm.com/support/pages/node/7014933 | 2023-02-01T02:59:27.687Z | 2023-07-31T01:16:37.346Z | 2023-07-31T01:16:37.346Z | {'Vendor': 'IBM', 'Product': 'B2B Advanced Communications', 'Versions': '1.0.0.0'} |
CVE-2023-24588 | Exposure of sensitive information to an unauthorized actor in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html | 2023-03-08T04:00:03.646Z | 2023-11-14T19:04:57.506Z | 2023-11-14T19:04:57.506Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Optane(TM) SSD products', 'Versions': 'firmware for some Intel(R) Optane(TM) SSD products'} |
CVE-2023-24422 | A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:10.460Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Script Security Plugin', 'Versions': 'unspecified, 1175.1180.v36a_3fb_2dec9c'} |
CVE-2023-24567 |
Dell NetWorker versions 19.5 and earlier contain 'RabbitMQ' version disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and may launch target-specific attacks.
| https://www.dell.com/support/kbdoc/en-us/000210471/dsa-2023-058-dell-networker-security-update-for-version-disclosure-vulnerability | 2023-01-26T16:27:33.567Z | 2023-03-01T14:22:55.088Z | 2023-03-01T14:22:55.088Z | {'Vendor': 'Dell', 'Product': 'Dell NetWorker, NVE', 'Versions': '19.5 and earlier versions'} |
CVE-2023-24834 | WisdomGarden Tronclass has improper access control when uploading file. An authenticated remote attacker with general user privilege can exploit this vulnerability to access files belonging to other users by modifying the file ID within URL. | https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'WisdomGarden', 'Product': 'Tronclass ilearn', 'Versions': '2.3.2'} |
CVE-2023-24434 | A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:24.000Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Builder Plugin', 'Versions': 'unspecified, next of 1.42.2'} |
CVE-2023-24988 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19810) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.543Z | 2023-02-14T10:36:58.514Z | 2023-03-14T09:31:46.168Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24822 | RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference while encoding a 6LoWPAN IPHC header. The NULL pointer dereference causes a hard fault exception, leading to denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patches manually. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-8x69-5fhj-72wh | 2023-01-30T14:43:33.705Z | 2023-04-24T15:24:26.836Z | 2023-04-24T15:24:26.836Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'} |
CVE-2023-24571 |
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with administrator privileges could potentially exploit this vulnerability to perform arbitrary code execution.
| https://www.dell.com/support/kbdoc/en-us/000210955/dsa-2023-046 | 2023-01-26T16:27:33.568Z | 2023-03-16T09:55:59.328Z | 2023-03-16T09:55:59.328Z | {'Vendor': 'Dell', 'Product': 'Embedded Box PC 3000 , CPG BIOS', 'Versions': 'All BIOS Versions'} |
CVE-2023-24121 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24930 | Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24930 | 2023-01-31T20:37:47.256Z | 2023-03-14T16:55:34.306Z | 2023-12-14T18:31:29.591Z | {'Vendor': 'Microsoft', 'Product': 'OneDrive for MacOS Installer', 'Versions': '22.0.0.0'} |
CVE-2023-24033 | The Samsung Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, and Exynos Auto T512 baseband modem chipsets do not properly check format types specified by the Session Description Protocol (SDP) module, which can lead to a denial of service. | https://semiconductor.samsung.com/processor/modem/ | 2023-01-20T00:00:00 | 2023-03-13T00:00:00 | 2023-05-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24199 | Raffle Draw System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at delete_ticket.php. | https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24526 | SAP NetWeaver Application Server Java for Classload Service - version 7.50, does not perform any authentication checks for functionalities that require user identity, resulting in escalation of privileges. This failure has a low impact on confidentiality of the data such that an unassigned user can read non-sensitive server data.
| https://launchpad.support.sap.com/#/notes/3288394 | 2023-01-25T15:46:55.581Z | 2023-03-14T04:38:03.702Z | 2023-04-11T21:25:36.326Z | {'Vendor': 'SAP', 'Product': 'NetWeaver AS Java for Classload Service', 'Versions': '7.50'} |
CVE-2023-24382 | Cross-Site Request Forgery (CSRF) vulnerability in Photon WP Material Design Icons for Page Builders plugin <= 1.4.2 versions. | https://patchstack.com/database/vulnerability/material-design-icons-for-elementor/wordpress-material-design-icons-for-page-builders-plugin-1-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-23T18:16:48.761Z | 2023-02-14T11:32:52.824Z | 2023-02-14T11:32:52.824Z | {'Vendor': 'Photon WP', 'Product': 'Material Design Icons for Page Builders', 'Versions': 'n/a'} |
CVE-2023-24678 | A vulnerability in Centralite Pearl Thermostat 0x04075010 allows attackers to cause a Denial of Service (DoS) via a crafted Zigbee message. | https://www.centralite.com/%3B | 2023-01-30T00:00:00 | 2023-03-17T00:00:00 | 2023-03-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24551 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to heap-based buffer underflow while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.399Z | 2023-02-14T10:36:28.028Z | 2023-03-14T09:31:18.230Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24414 | Cross-Site Request Forgery (CSRF) vulnerability in RoboSoft Photo Gallery, Images, Slider in Rbs Image Gallery plugin <= 3.2.11 versions. | https://patchstack.com/database/vulnerability/robo-gallery/wordpress-photo-gallery-images-slider-in-rbs-image-gallery-plugin-3-2-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-23T18:16:53.496Z | 2023-05-20T22:08:55.700Z | 2023-05-20T22:08:55.700Z | {'Vendor': 'RoboSoft', 'Product': 'Photo Gallery, Images, Slider in Rbs Image Gallery', 'Versions': 'n/a'} |
CVE-2023-24044 | A Host Header Injection issue on the Login page of Plesk Obsidian through 18.0.49 allows attackers to redirect users to malicious websites via a Host request header. NOTE: the vendor's position is "the ability to use arbitrary domain names to access the panel is an intended feature." | https://gist.github.com/TJetnipat/02b3854543b7ec95d54a8de811f2e8ae | 2023-01-21T00:00:00 | 2023-01-22T00:00:00 | 2023-02-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24947 | Windows Bluetooth Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24947 | 2023-01-31T20:37:47.260Z | 2023-05-09T17:02:58.663Z | 2023-12-14T19:06:08.817Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24785 | An issue in Giorgio Tani peazip v.9.0.0 allows attackers to cause a denial of service via the End of Archive tag function of the peazip/pea UNPEA feature. | https://sourceforge.net/p/peazip/tickets/734/ | 2023-01-30T00:00:00 | 2023-02-17T00:00:00 | 2023-02-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24156 | A command injection vulnerability in the ip parameter in the function recvSlaveUpgstatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveUpgstatus/recvSlaveUpgstatus.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24506 |
Milesight NCR/camera version 71.8.0.6-r5 exposes credentials through an unspecified request.
| https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T19:41:19.106Z | 2023-05-08T00:00:00 | 2023-05-17T21:36:17.798Z | {'Vendor': 'Milesight ', 'Product': 'NCR/Camera', 'Versions': '71.8.0.6-r5'} |
CVE-2023-24855 | Memory corruption in Modem while processing security related configuration before AS Security Exchange. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T16:25:23.370Z | 2023-10-03T05:00:34.243Z | 2023-10-03T05:00:34.243Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6200, FastConnect 6700, FastConnect 6900, FastConnect 7800, QCA6391, QCA8081, QCA8337, QCC710, QCM4490, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS4490, QCS6490, QCS8550, QFW7114, QFW7124, Qualcomm Video Collaboration VC3 Platform, SDX57M, SG8275P, SM7325P, SM8550P, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 695 5G Mobile Platform, Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, WCD9340, WCD9370, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24910 | Windows Graphics Component Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24910 | 2023-01-31T20:37:47.251Z | 2023-03-14T16:55:55.876Z | 2023-12-14T18:31:51.292Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24443 | Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2741 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:34.231Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestComplete support Plugin', 'Versions': 'unspecified, next of 2.8.1'} |
CVE-2023-24269 | An arbitrary file upload vulnerability in the plugin upload function of Textpattern v4.8.8 allows attackers to execute arbitrary code via a crafted Zip file. | https://github.com/s4n-h4xor/CVE-Publications/blob/main/CVE-2023-24269/CVE-2023-24269.md | 2023-01-23T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24843 | Transient DOS in Modem while triggering a camping on an 5G cell. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T13:26:08.512Z | 2023-10-03T05:00:24.982Z | 2023-10-03T05:00:24.982Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AR8035, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6595AU, QCA6696, QCA8081, QCA8337, QCM6490, QCN6024, QCN9024, QCS6490, Qualcomm Video Collaboration VC3 Platform, SD855, SD865 5G, SDX55, SM7250P, SM7325P, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon Auto 5G Modem-RF, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, SXR2130, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3988, WCN6740, WSA8810, WSA8815, WSA8830, WSA8835'} |
CVE-2023-24510 | On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart. | https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087 | 2023-01-24T00:00:00 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | {'Vendor': 'Arista Networks', 'Product': 'Arista EOS', 'Versions': '4.25.0F, 4.26.0F, 4.27.0F, 4.28.0F, 4.29.0F'} |
CVE-2023-24140 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingNum parameter in the setNetworkDiag function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagPingNum/setNetworkDiag_NetDiagPingNum.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24455 | Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2709 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:48.294Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins visualexpert Plugin', 'Versions': 'unspecified, next of 1.3'} |
CVE-2023-24005 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media Inline Tweet Sharer – Twitter Sharing Plugin plugin <= 2.5.3 versions. | https://patchstack.com/database/vulnerability/inline-tweet-sharer/wordpress-inline-tweet-sharer-twitter-sharing-plugin-plugin-2-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-04-25T19:45:36.878Z | 2023-04-25T19:45:36.878Z | {'Vendor': 'Winwar Media', 'Product': 'Inline Tweet Sharer – Twitter Sharing Plugin', 'Versions': 'n/a'} |
CVE-2023-24906 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24906 | 2023-01-31T20:37:47.251Z | 2023-03-14T16:55:52.346Z | 2023-12-14T18:31:47.766Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24394 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy iframe popup plugin <= 3.3 versions. | https://patchstack.com/database/vulnerability/iframe-popup/wordpress-iframe-popup-plugin-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:50.470Z | 2023-08-25T10:23:55.096Z | 2023-08-25T10:23:55.096Z | {'Vendor': 'Gopi Ramasamy', 'Product': 'iframe popup', 'Versions': 'n/a'} |
CVE-2023-24117 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.