CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-24595
An OS command injection vulnerability exists in the ys_thirdparty system_user_script functionality of Milesight UR32L v32.3.0.5. A specially crafted series of network requests can lead to command execution. An attacker can send a sequence of requests to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1713
2023-01-27T18:05:46.317Z
2023-07-06T14:53:28.636Z
2023-07-06T17:00:10.336Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-24829
Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This issue affects the iotdb-web-workbench component from 0.13.0 before 0.13.3. iotdb-web-workbench is an optional component of IoTDB, providing a web console of the database. This problem is fixed from version 0.13.3 of iotdb-web-workbench onwards.
https://lists.apache.org/thread/l0b59hh046tyn4gqot0bdrpg8gxlksmo
2023-01-30T14:45:51.213Z
2023-01-31T09:22:41.587Z
2023-03-08T16:15:06.910Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache IoTDB Workbench', 'Versions': '0.13.0'}
CVE-2023-24983
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19805)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.543Z
2023-02-14T10:36:53.001Z
2023-03-14T09:31:41.019Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24080
A lack of rate limiting on the password reset endpoint of Chamberlain myQ v5.222.0.32277 (on iOS) allows attackers to compromise user accounts via a bruteforce attack.
http://chamberlain.com
2023-01-23T00:00:00
2023-02-21T00:00:00
2023-03-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24653
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the oldpass parameter under the Change Password function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24346
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the wan_connected parameter at /goform/formEasySetupWizard3.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24429
Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%281%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:18.317Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Semantic Versioning Plugin', 'Versions': 'unspecified'}
CVE-2023-24583
Two OS command injection vulnerabilities exist in the urvpn_client cmd_name_action functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This OS command injection is triggered through a UDP packet.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1710
2023-01-27T17:45:31.172Z
2023-07-06T14:53:29.946Z
2023-07-06T17:00:05.823Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-24096
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the newpass parameter at /formPasswordSetup. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/06/README.md
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24995
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19817)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.544Z
2023-02-14T10:37:06.480Z
2023-03-14T09:31:53.089Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24350
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the config.smtp_email_subject parameter at /goform/formSetEmail.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24184
TOTOLink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vulnerability.
https://github.com/fuxianghah/IOT/tree/main/Motorala/MR2600/13
2023-01-23T00:00:00
2023-02-21T00:00:00
2023-02-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24887
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24887
2023-01-31T20:32:35.468Z
2023-04-11T19:13:32.059Z
2023-12-14T18:59:30.790Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24868
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24868
2023-01-31T20:32:35.464Z
2023-03-14T16:55:53.858Z
2023-12-14T18:31:49.273Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24491
A vulnerability has been discovered in the Citrix Secure Access client for Windows which, if exploited, could allow an attacker with access to an endpoint with Standard User Account that has the vulnerable client installed to escalate their local privileges to that of NT AUTHORITY\SYSTEM.
https://support.citrix.com/article/CTX561480/citrix-secure-access-client-for-windows-security-bulletin-for-cve202324491
2023-01-24T15:49:52.579Z
2023-07-11T21:13:05.305Z
2023-07-11T21:13:05.305Z
{'Vendor': 'Citrix', 'Product': 'Citrix Secure Access client for Windows', 'Versions': '0'}
CVE-2023-24612
The PdfBook extension through 2.0.5 before b07b6a64 for MediaWiki allows command injection via an option.
https://gitlab.com/organicdesign/PdfBook/-/merge_requests/6
2023-01-30T00:00:00
2023-01-30T00:00:00
2023-01-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24757
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
https://github.com/strukturag/libde265/issues/385
2023-01-30T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24813
Dompdf is an HTML to PDF converter written in php. Due to the difference in the attribute parser of Dompdf and php-svg-lib, an attacker can still call arbitrary URLs with arbitrary protocols. Dompdf parses the href attribute of `image` tags and respects `xlink:href` even if `href` is specified. However, php-svg-lib, which is later used to parse the svg file, parses the href attribute. Since `href` is respected if both `xlink:href` and `href` is specified, it's possible to bypass the protection on the Dompdf side by providing an empty `xlink:href` attribute. An attacker can exploit the vulnerability to call arbitrary URLs with arbitrary protocols if they provide an SVG file to the Dompdf. In PHP versions before 8.0.0, it leads to arbitrary unserialize, which will lead, at the very least, to arbitrary file deletion and might lead to remote code execution, depending on available classes. This vulnerability has been addressed in commit `95009ea98` which has been included in release version 2.0.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/dompdf/dompdf/security/advisories/GHSA-56gj-mvh6-rp75
2023-01-30T14:43:33.704Z
2023-02-07T18:05:14.541Z
null
{'Vendor': 'dompdf', 'Product': 'dompdf', 'Versions': '= 2.0.2'}
CVE-2023-24540
Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
https://go.dev/issue/59721
2023-01-25T21:19:20.642Z
2023-05-11T15:29:31.947Z
2023-06-12T19:08:26.127Z
{'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'}
CVE-2023-24055
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
2023-01-21T00:00:00
2023-01-22T00:00:00
2023-02-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24405
Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Contact Form 7 – PayPal & Stripe Add-on plugin <= 1.9.3 versions.
https://patchstack.com/database/vulnerability/contact-form-7-paypal-add-on/wordpress-contact-form-7-paypal-stripe-add-on-plugin-1-9-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-23T18:16:51.989Z
2023-07-10T11:58:08.993Z
2023-07-10T11:58:08.993Z
{'Vendor': 'Scott Paterson', 'Product': 'Contact Form 7 – PayPal & Stripe Add-on', 'Versions': 'n/a'}
CVE-2023-24956
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /cha.php.
https://github.com/Mortalwangxin/lives/issues/1
2023-01-31T00:00:00
2023-01-31T00:00:00
2023-01-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24686
An issue in the CSV Import function of ChurchCRM v4.5.3 and below allows attackers to execute arbitrary code via importing a crafted CSV file.
https://github.com/ChurchCRM/CRM
2023-01-30T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24393
Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Sk. Abul Hasan Animated Number Counters plugin <= 1.6 versions.
https://patchstack.com/database/vulnerability/animated-number-counters/wordpress-animated-number-counters-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:50.470Z
2023-08-10T12:32:28.987Z
2023-08-10T12:32:28.987Z
{'Vendor': 'Sk. Abul Hasan', 'Product': 'Animated Number Counters', 'Versions': 'n/a'}
CVE-2023-24517
Unrestricted Upload of File with Dangerous Type vulnerability in the Pandora FMS File Manager component, allows an attacker to make make use of this issue ( unrestricted file upload ) to execute arbitrary system commands. This issue affects Pandora FMS v767 version and prior versions on all platforms.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-01-25T13:49:34.265Z
2023-08-22T13:05:17.554Z
2023-10-16T09:47:57.373Z
{'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'}
CVE-2023-24147
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for the telnet service which is stored in the component /etc/config/product.ini.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/telnet_hard_code/telnet_hard_code.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24844
Memory Corruption in Core while invoking a call to Access Control core library with hardware protected address range.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T13:26:08.512Z
2023-10-03T05:00:26.163Z
2023-10-03T05:00:26.163Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6700, FastConnect 6900, FastConnect 7800, QCA8081, QCA8337, QCM4490, QCM8550, QCN6024, QCN9024, QCS4490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QRU1032, QRU1052, QRU1062, SG8275P, SM8550P, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, WCD9370, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24901
Windows NFS Portmapper Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24901
2023-01-31T20:32:35.472Z
2023-05-09T17:02:53.241Z
2023-12-14T19:06:03.798Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24452
A cross-site request forgery (CSRF) vulnerability in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:44.786Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestQuality Updater Plugin', 'Versions': 'unspecified, next of 1.3'}
CVE-2023-24002
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPdevart YouTube Embed, Playlist and Popup by WpDevArt plugin <= 2.6.3 versions.
https://patchstack.com/database/vulnerability/youtube-video-player/wordpress-youtube-embed-playlist-and-popup-by-wpdevart-plugin-2-6-3-cross-site-scripting-xss?_s_id=cve
2023-01-20T09:29:08.377Z
2023-04-06T08:04:24.910Z
2023-04-06T08:04:24.910Z
{'Vendor': 'WPdevart', 'Product': 'YouTube Embed, Playlist and Popup by WpDevArt', 'Versions': 'n/a'}
CVE-2023-24852
Memory Corruption in Core due to secure memory access by user while loading modem image.
https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin
2023-01-31T16:25:23.369Z
2023-11-07T05:26:31.358Z
2023-11-07T05:26:31.358Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, AQT1000, AR8031, AR8035, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, FSM10056, Immersive Home 3210 Platform, Immersive Home 326 Platform, IPQ5332, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ9008, IPQ9554, IPQ9570, IPQ9574, MDM9205S, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QCA0000, QCA4004, QCA4024, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9377, QCA9984, QCC710, QCF8000, QCF8001, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5052, QCN5121, QCN5122, QCN5152, QCN6023, QCN6024, QCN6224, QCN6274, QCN7606, QCN9000, QCN9011, QCN9012, QCN9013, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS7230, QCS8155, QCS8250, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRB5165M, QRB5165N, QRU1032, QRU1052, QRU1062, QSM8250, QSM8350, QTS110, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8650P, SA9000P, SC8180X+SDX55, SC8380XP, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD662, SD670, SD675, SD730, SD855, SD865 5G, SD888, SDX55, SDX57M, SDX65M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon X24 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SRV1H, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24151
A command injection vulnerability in the ip parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24501
Electra Central AC unit – Hardcoded Credentials in unspecified code used by the unit.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Electra', 'Product': 'Electra Central AC unit', 'Versions': 'Update to the latest version'}
CVE-2023-24014
Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to heap-based buffer overflow, which could allow an attacker to execute arbitrary code.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-157-01
2023-02-08T21:31:13.064Z
2023-06-07T20:50:29.115Z
2023-06-07T20:50:29.115Z
{'Vendor': 'Delta Electronics', 'Product': 'CNCSoft-B DOPSoft', 'Versions': '0'}
CVE-2023-24444
Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2996
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:35.403Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenID Plugin', 'Versions': 'unspecified, next of 2.4'}
CVE-2023-24782
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit.
https://github.com/funadmin/funadmin/issues/3
2023-01-30T00:00:00
2023-03-08T00:00:00
2023-03-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24278
Squidex before 7.4.0 was discovered to contain a squid.svg cross-site scripting (XSS) vulnerability.
https://www.openwall.com/lists/oss-security/2023/03/16/1
2023-01-23T00:00:00
2023-03-18T00:00:00
2023-03-18T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24556
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.400Z
2023-02-14T10:36:33.749Z
2023-03-14T09:31:23.467Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24805
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.
https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x
2023-01-30T14:43:33.703Z
2023-05-17T17:33:41.714Z
2023-05-17T17:33:41.714Z
{'Vendor': 'OpenPrinting', 'Product': 'cups-filters', 'Versions': '<= 2.0rc1 '}
CVE-2023-24940
Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940
2023-01-31T20:37:47.257Z
2023-05-09T17:02:52.727Z
2023-12-14T19:06:03.304Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24413
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WordPress vertical image slider plugin <= 1.2.16 versions.
https://patchstack.com/database/vulnerability/wp-vertical-image-slider/wordpress-wordpress-vertical-image-slider-plugin-plugin-1-2-16-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:53.496Z
2023-08-08T11:28:20.333Z
2023-08-08T11:28:20.333Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'WordPress vertical image slider plugin', 'Versions': 'n/a'}
CVE-2023-24690
ChurchCRM 4.5.3 and below was discovered to contain a stored cross-site scripting (XSS) vulnerability at /api/public/register/family.
http://churchcrm.io/
2023-01-30T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24385
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in David Lingren Media Library Assistant plugin <= 3.11 versions.
https://patchstack.com/database/vulnerability/media-library-assistant/wordpress-media-library-assistant-plugin-3-11-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:48.762Z
2023-10-17T08:58:24.999Z
2023-10-17T08:58:24.999Z
{'Vendor': 'David Lingren', 'Product': 'Media Library Assistant', 'Versions': 'n/a'}
CVE-2023-24048
Cross Site Request Forgery (CSRF) vulnerability in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain control of the device via crafted GET request to /man_password.htm.
https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
2023-01-21T00:00:00
2023-12-04T00:00:00
2023-12-04T22:45:08.301548
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24418
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Tiny carousel horizontal slider plus plugin <= 3.2 versions.
https://patchstack.com/database/vulnerability/tiny-carousel-horizontal-slider-plus/wordpress-tiny-carousel-horizontal-slider-plus-plugin-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:53.497Z
2023-05-10T07:43:07.768Z
2023-05-10T07:43:07.768Z
{'Vendor': 'Gopi Ramasamy', 'Product': 'Tiny carousel horizontal slider plus', 'Versions': 'n/a'}
CVE-2023-24731
Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the query parameter in the user profile update function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24674
Permissions vulnerability found in Bludit CMS v.4.0.0 allows local attackers to escalate privileges via the role:admin parameter.
https://medium.com/%40cupc4k3/privilege-scalation-in-bludit-cms-dcf86c41107
2023-01-30T00:00:00
2023-09-01T00:00:00
2023-09-01T09:48:27.721562
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24859
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24859
2023-01-31T20:32:35.462Z
2023-03-14T16:55:48.755Z
2023-12-14T18:31:44.158Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24789
jeecg-boot v3.4.4 was discovered to contain an authenticated SQL injection vulnerability via the building block report component.
https://github.com/jeecgboot/jeecg-boot/issues/4511
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24623
Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses.
https://github.com/hakobe/paranoidhttp/blob/master/CHANGELOG.md#v030-2023-01-19
2023-01-30T00:00:00
2023-01-30T00:00:00
2023-01-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24009
Auth. (subscriber+) Reflected Cross-site Scripting (XSS) vulnerability in Wpazure Themes Upfrontwp theme <= 1.1 versions.
https://patchstack.com/database/vulnerability/upfrontwp/wordpress-upfrontwp-theme-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-20T09:29:08.378Z
2023-08-10T10:14:58.875Z
2023-08-10T10:14:58.875Z
{'Vendor': 'Wpazure Themes', 'Product': 'Upfrontwp', 'Versions': 'n/a'}
CVE-2023-24459
A missing permission check in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2745
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:52.825Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins BearyChat Plugin', 'Versions': 'unspecified, next of 3.0.2'}
CVE-2023-24320
An access control issue in Axcora POS #0~gitf77ec09 allows unauthenticated attackers to execute arbitrary commands via unspecified vectors.
https://www.youtube.com/watch?v=1FhPL3erWd4
2023-01-23T00:00:00
2023-02-21T00:00:00
2023-05-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24818
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference. During forwarding of a fragment an uninitialized entry in the reassembly buffer is used. The NULL pointer dereference triggers a hard fault exception resulting in denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-69h9-vj5r-xcg6
2023-01-30T14:43:33.704Z
2023-04-24T14:23:44.280Z
2023-04-24T14:23:44.280Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'}
CVE-2023-24377
Cross-Site Request Forgery (CSRF) vulnerability in Ecwid Ecommerce Ecwid Ecommerce Shopping Cart plugin <= 6.11.3 versions.
https://patchstack.com/database/vulnerability/ecwid-shopping-cart/wordpress-ecwid-ecommerce-shopping-cart-plugin-6-11-3-cross-site-request-forgery-csrf?_s_id=cve
2023-01-23T18:16:47.036Z
2023-02-14T11:18:14.424Z
2023-02-14T11:18:14.424Z
{'Vendor': 'Ecwid Ecommerce', 'Product': 'Ecwid Ecommerce Shopping Cart', 'Versions': 'n/a'}
CVE-2023-24232
A stored cross-site scripting (XSS) vulnerability in the component /php-inventory-management-system/product.php of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Product Name parameter.
https://github.com/stemword/php-inventory-management-system
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24398
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Snap Creek Software EZP Coming Soon Page plugin <= 1.0.7.3 versions.
https://patchstack.com/database/vulnerability/easy-pie-coming-soon/wordpress-ezp-coming-soon-page-plugin-1-0-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:50.470Z
2023-04-07T09:20:14.499Z
2023-04-07T09:20:14.499Z
{'Vendor': 'Snap Creek Software', 'Product': 'EZP Coming Soon Page', 'Versions': 'n/a'}
CVE-2023-24475
Out of bounds read in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html
2023-02-15T04:00:02.948Z
2023-05-10T13:17:07.225Z
2023-05-10T13:17:07.225Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BMC firmware', 'Versions': 'before version 2.90'}
CVE-2023-24025
CRYSTALS-DILITHIUM (in Post-Quantum Cryptography Selected Algorithms 2022) in PQClean d03da30 may allow universal forgeries of digital signatures via a template side-channel attack because of intermediate data leakage of one vector.
https://github.com/PQClean/PQClean/tree/d03da3053491e767ef842deaef43fc5bdb6bc911
2023-01-20T00:00:00
2023-01-20T00:00:00
2023-01-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24926
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24926
2023-01-31T20:37:47.255Z
2023-04-11T19:13:29.385Z
2023-12-14T18:59:28.248Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24863
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24863
2023-01-31T20:32:35.463Z
2023-03-14T16:55:50.299Z
2023-12-14T18:31:45.675Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24530
SAP BusinessObjects Business Intelligence Platform (CMC) - versions 420, 430, allows an authenticated admin user to upload malicious code that can be executed by the application over the network. On successful exploitation, attacker can perform operations that may completely compromise the application causing high impact on confidentiality, integrity and availability of the application.
https://launchpad.support.sap.com/#/notes/3256787
2023-01-25T15:46:55.582Z
2023-02-14T03:19:44.905Z
2023-04-11T21:27:38.517Z
{'Vendor': 'SAP', 'Product': 'BusinessObjects Business Intelligence Platform (CMC)', 'Versions': '420, 430'}
CVE-2023-24160
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admuser parameter in the setPasswordCfg function.
https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admuser/setPasswordCfg_admuser.md
2023-01-23T00:00:00
2023-02-14T00:00:00
2023-02-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24249
An arbitrary file upload vulnerability in laravel-admin v1.8.19 allows attackers to execute arbitrary code via a crafted PHP file.
https://laravel-admin.org/
2023-01-23T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24619
Redpanda before 22.3.12 discloses cleartext AWS credentials. The import functionality in the rpk binary logs an AWS Access Key ID and Secret in cleartext to standard output, allowing a local user to view the key in the console, or in Kubernetes logs if stdout output is collected. The fixed versions are 22.3.12, 22.2.10, and 22.1.12.
https://github.com/redpanda-data/redpanda/pull/8339
2023-01-30T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24971
IBM B2B Advanced Communications 1.0.0.0 and IBM Multi-Enterprise Integration Gateway 1.0.0.1 could allow a user to cause a denial of service due to the deserializing of untrusted serialized Java objects. IBM X-Force ID: 246976.
https://www.ibm.com/support/pages/node/7014933
2023-02-01T02:59:27.687Z
2023-07-31T01:16:37.346Z
2023-07-31T01:16:37.346Z
{'Vendor': 'IBM', 'Product': 'B2B Advanced Communications', 'Versions': '1.0.0.0'}
CVE-2023-24588
Exposure of sensitive information to an unauthorized actor in firmware for some Intel(R) Optane(TM) SSD products may allow an unauthenticated user to potentially enable information disclosure via physical access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html
2023-03-08T04:00:03.646Z
2023-11-14T19:04:57.506Z
2023-11-14T19:04:57.506Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Optane(TM) SSD products', 'Versions': 'firmware for some Intel(R) Optane(TM) SSD products'}
CVE-2023-24422
A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:10.460Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Script Security Plugin', 'Versions': 'unspecified, 1175.1180.v36a_3fb_2dec9c'}
CVE-2023-24567
Dell NetWorker versions 19.5 and earlier contain 'RabbitMQ' version disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and may launch target-specific attacks.
https://www.dell.com/support/kbdoc/en-us/000210471/dsa-2023-058-dell-networker-security-update-for-version-disclosure-vulnerability
2023-01-26T16:27:33.567Z
2023-03-01T14:22:55.088Z
2023-03-01T14:22:55.088Z
{'Vendor': 'Dell', 'Product': 'Dell NetWorker, NVE', 'Versions': '19.5 and earlier versions'}
CVE-2023-24834
WisdomGarden Tronclass has improper access control when uploading file. An authenticated remote attacker with general user privilege can exploit this vulnerability to access files belonging to other users by modifying the file ID within URL.
https://www.twcert.org.tw/tw/cp-132-6954-ed16b-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'WisdomGarden', 'Product': 'Tronclass ilearn', 'Versions': '2.3.2'}
CVE-2023-24434
A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:24.000Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Builder Plugin', 'Versions': 'unspecified, next of 1.42.2'}
CVE-2023-24988
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19810)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.543Z
2023-02-14T10:36:58.514Z
2023-03-14T09:31:46.168Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24822
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a NULL pointer dereference while encoding a 6LoWPAN IPHC header. The NULL pointer dereference causes a hard fault exception, leading to denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patches manually.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-8x69-5fhj-72wh
2023-01-30T14:43:33.705Z
2023-04-24T15:24:26.836Z
2023-04-24T15:24:26.836Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'}
CVE-2023-24571
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with administrator privileges could potentially exploit this vulnerability to perform arbitrary code execution.
https://www.dell.com/support/kbdoc/en-us/000210955/dsa-2023-046
2023-01-26T16:27:33.568Z
2023-03-16T09:55:59.328Z
2023-03-16T09:55:59.328Z
{'Vendor': 'Dell', 'Product': 'Embedded Box PC 3000 , CPG BIOS', 'Versions': 'All BIOS Versions'}
CVE-2023-24121
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24930
Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24930
2023-01-31T20:37:47.256Z
2023-03-14T16:55:34.306Z
2023-12-14T18:31:29.591Z
{'Vendor': 'Microsoft', 'Product': 'OneDrive for MacOS Installer', 'Versions': '22.0.0.0'}
CVE-2023-24033
The Samsung Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, and Exynos Auto T512 baseband modem chipsets do not properly check format types specified by the Session Description Protocol (SDP) module, which can lead to a denial of service.
https://semiconductor.samsung.com/processor/modem/
2023-01-20T00:00:00
2023-03-13T00:00:00
2023-05-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24199
Raffle Draw System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at delete_ticket.php.
https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24526
SAP NetWeaver Application Server Java for Classload Service - version 7.50, does not perform any authentication checks for functionalities that require user identity, resulting in escalation of privileges. This failure has a low impact on confidentiality of the data such that an unassigned user can read non-sensitive server data.
https://launchpad.support.sap.com/#/notes/3288394
2023-01-25T15:46:55.581Z
2023-03-14T04:38:03.702Z
2023-04-11T21:25:36.326Z
{'Vendor': 'SAP', 'Product': 'NetWeaver AS Java for Classload Service', 'Versions': '7.50'}
CVE-2023-24382
Cross-Site Request Forgery (CSRF) vulnerability in Photon WP Material Design Icons for Page Builders plugin <= 1.4.2 versions.
https://patchstack.com/database/vulnerability/material-design-icons-for-elementor/wordpress-material-design-icons-for-page-builders-plugin-1-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-23T18:16:48.761Z
2023-02-14T11:32:52.824Z
2023-02-14T11:32:52.824Z
{'Vendor': 'Photon WP', 'Product': 'Material Design Icons for Page Builders', 'Versions': 'n/a'}
CVE-2023-24678
A vulnerability in Centralite Pearl Thermostat 0x04075010 allows attackers to cause a Denial of Service (DoS) via a crafted Zigbee message.
https://www.centralite.com/%3B
2023-01-30T00:00:00
2023-03-17T00:00:00
2023-03-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24551
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to heap-based buffer underflow while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.399Z
2023-02-14T10:36:28.028Z
2023-03-14T09:31:18.230Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24414
Cross-Site Request Forgery (CSRF) vulnerability in RoboSoft Photo Gallery, Images, Slider in Rbs Image Gallery plugin <= 3.2.11 versions.
https://patchstack.com/database/vulnerability/robo-gallery/wordpress-photo-gallery-images-slider-in-rbs-image-gallery-plugin-3-2-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-23T18:16:53.496Z
2023-05-20T22:08:55.700Z
2023-05-20T22:08:55.700Z
{'Vendor': 'RoboSoft', 'Product': 'Photo Gallery, Images, Slider in Rbs Image Gallery', 'Versions': 'n/a'}
CVE-2023-24044
A Host Header Injection issue on the Login page of Plesk Obsidian through 18.0.49 allows attackers to redirect users to malicious websites via a Host request header. NOTE: the vendor's position is "the ability to use arbitrary domain names to access the panel is an intended feature."
https://gist.github.com/TJetnipat/02b3854543b7ec95d54a8de811f2e8ae
2023-01-21T00:00:00
2023-01-22T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24947
Windows Bluetooth Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24947
2023-01-31T20:37:47.260Z
2023-05-09T17:02:58.663Z
2023-12-14T19:06:08.817Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24785
An issue in Giorgio Tani peazip v.9.0.0 allows attackers to cause a denial of service via the End of Archive tag function of the peazip/pea UNPEA feature.
https://sourceforge.net/p/peazip/tickets/734/
2023-01-30T00:00:00
2023-02-17T00:00:00
2023-02-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24156
A command injection vulnerability in the ip parameter in the function recvSlaveUpgstatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveUpgstatus/recvSlaveUpgstatus.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24506
Milesight NCR/camera version 71.8.0.6-r5 exposes credentials through an unspecified request.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T19:41:19.106Z
2023-05-08T00:00:00
2023-05-17T21:36:17.798Z
{'Vendor': 'Milesight ', 'Product': 'NCR/Camera', 'Versions': '71.8.0.6-r5'}
CVE-2023-24855
Memory corruption in Modem while processing security related configuration before AS Security Exchange.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T16:25:23.370Z
2023-10-03T05:00:34.243Z
2023-10-03T05:00:34.243Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6200, FastConnect 6700, FastConnect 6900, FastConnect 7800, QCA6391, QCA8081, QCA8337, QCC710, QCM4490, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS4490, QCS6490, QCS8550, QFW7114, QFW7124, Qualcomm Video Collaboration VC3 Platform, SDX57M, SG8275P, SM7325P, SM8550P, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 695 5G Mobile Platform, Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, WCD9340, WCD9370, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24910
Windows Graphics Component Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24910
2023-01-31T20:37:47.251Z
2023-03-14T16:55:55.876Z
2023-12-14T18:31:51.292Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24443
Jenkins TestComplete support Plugin 2.8.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2741
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:34.231Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestComplete support Plugin', 'Versions': 'unspecified, next of 2.8.1'}
CVE-2023-24269
An arbitrary file upload vulnerability in the plugin upload function of Textpattern v4.8.8 allows attackers to execute arbitrary code via a crafted Zip file.
https://github.com/s4n-h4xor/CVE-Publications/blob/main/CVE-2023-24269/CVE-2023-24269.md
2023-01-23T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24843
Transient DOS in Modem while triggering a camping on an 5G cell.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T13:26:08.512Z
2023-10-03T05:00:24.982Z
2023-10-03T05:00:24.982Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AR8035, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6574A, QCA6595AU, QCA6696, QCA8081, QCA8337, QCM6490, QCN6024, QCN9024, QCS6490, Qualcomm Video Collaboration VC3 Platform, SD855, SD865 5G, SDX55, SM7250P, SM7325P, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon Auto 5G Modem-RF, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, SXR2130, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3988, WCN6740, WSA8810, WSA8815, WSA8830, WSA8835'}
CVE-2023-24510
On the affected platforms running EOS, a malformed DHCP packet might cause the DHCP relay agent to restart.
https://www.arista.com/en/support/advisories-notices/security-advisory/17445-security-advisory-0087
2023-01-24T00:00:00
2023-06-05T00:00:00
2023-06-05T00:00:00
{'Vendor': 'Arista Networks', 'Product': 'Arista EOS', 'Versions': '4.25.0F, 4.26.0F, 4.27.0F, 4.28.0F, 4.29.0F'}
CVE-2023-24140
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingNum parameter in the setNetworkDiag function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagPingNum/setNetworkDiag_NetDiagPingNum.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24455
Jenkins visualexpert Plugin 1.3 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Item/Configure permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2709
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:48.294Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins visualexpert Plugin', 'Versions': 'unspecified, next of 1.3'}
CVE-2023-24005
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media Inline Tweet Sharer – Twitter Sharing Plugin plugin <= 2.5.3 versions.
https://patchstack.com/database/vulnerability/inline-tweet-sharer/wordpress-inline-tweet-sharer-twitter-sharing-plugin-plugin-2-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-20T09:29:08.377Z
2023-04-25T19:45:36.878Z
2023-04-25T19:45:36.878Z
{'Vendor': 'Winwar Media', 'Product': 'Inline Tweet Sharer – Twitter Sharing Plugin', 'Versions': 'n/a'}
CVE-2023-24906
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24906
2023-01-31T20:37:47.251Z
2023-03-14T16:55:52.346Z
2023-12-14T18:31:47.766Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24394
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy iframe popup plugin <= 3.3 versions.
https://patchstack.com/database/vulnerability/iframe-popup/wordpress-iframe-popup-plugin-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:50.470Z
2023-08-25T10:23:55.096Z
2023-08-25T10:23:55.096Z
{'Vendor': 'Gopi Ramasamy', 'Product': 'iframe popup', 'Versions': 'n/a'}
CVE-2023-24117
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}