CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-24547 | On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config.
| https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090 | 2023-01-26T11:37:43.827Z | 2023-12-05T23:29:01.375Z | 2023-12-05T23:29:01.375Z | {'Vendor': 'Arista Networks', 'Product': 'MOS', 'Versions': '0.13.0'} |
CVE-2023-24814 | TYPO3 is a free and open source Content Management Framework released under the GNU General Public License. In affected versions the TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting `config.absRefPrefix=auto`, attackers can inject malicious HTML code to pages that have not been rendered and cached, yet. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of `GeneralUtility::getIndpEnv('SCRIPT_NAME')` and corresponding usages (as shown below) are vulnerable as well. Additional investigations confirmed that at least Apache web server deployments using CGI (FPM, FCGI/FastCGI, and similar) are affected. However, there still might be the risk that other scenarios like nginx, IIS, or Apache/mod_php are vulnerable. The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability. Users are advised to update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.35 LTS, 11.5.23 LTS and 12.2.0 which fix this problem. For users who are unable to patch in a timely manner the TypoScript setting `config.absRefPrefix` should at least be set to a static path value, instead of using auto - e.g. `config.absRefPrefix=/`. This workaround **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation. | https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3 | 2023-01-30T14:43:33.704Z | 2023-02-07T18:14:29.388Z | null | {'Vendor': 'TYPO3', 'Product': 'typo3', 'Versions': '>= 8.7.0, < 8.7.51, >= 9.0.0, < 9.5.40, >= 10.0.0, < 10.4.36, 11.0.0, < 11.5.23, >= 12.0.0, < 12.2.0'} |
CVE-2023-24052 | An issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain control of the device via the change password functionality as it does not prompt for the current password. | https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ | 2023-01-21T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T23:10:04.145802 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24402 | Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Veribo, Roland Murg WP Booking System – Booking Calendar plugin <= 2.0.18 versions. | https://patchstack.com/database/vulnerability/wp-booking-system/wordpress-wp-booking-system-booking-calendar-plugin-2-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:51.988Z | 2023-04-07T08:48:19.936Z | 2023-04-07T08:48:19.936Z | {'Vendor': 'Veribo, Roland Murg', 'Product': 'WP Booking System – Booking Calendar', 'Versions': 'n/a'} |
CVE-2023-24880 | Windows SmartScreen Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880 | 2023-01-31T20:32:35.465Z | 2023-03-14T16:55:59.434Z | 2023-12-14T18:31:54.757Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24029 | In Progress WS_FTP Server before 8.8, it is possible for a host administrator to elevate their privileges via the administrative interface due to insufficient authorization controls applied on user modification workflows. | https://www.progress.com/ws_ftp | 2023-01-20T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24479 | An authentication bypass vulnerability exists in the httpd nvram.cgi functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762 | 2023-06-12T16:00:05.976Z | 2023-10-11T15:14:31.297Z | 2023-10-11T17:00:09.445Z | {'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'} |
CVE-2023-24496 | Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the name field of the database. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704 | 2023-01-24T19:20:44.636Z | 2023-07-06T14:53:31.258Z | 2023-07-17T18:49:06.317Z | {'Vendor': 'Milesight', 'Product': 'MilesightVPN', 'Versions': 'v2.0.2'} |
CVE-2023-24212 | Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the timeType function at /goform/SetSysTimeCfg. | https://github.com/w0x68y/cve-lists/blob/main/Tenda/vuln/readme.md | 2023-01-23T00:00:00 | 2023-02-23T00:00:00 | 2023-03-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24642 | Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the sid parameter at /php-jms/updateTxtview.php. | https://github.com/594238758/mycve/blob/main/judging-management-system/SQLi-2.md | 2023-01-30T00:00:00 | 2023-03-03T00:00:00 | 2023-03-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24584 |
Controller 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature.
This issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a, all versions of vCR8.40 and prior.
| https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2023-24584 | 2023-02-03T20:38:05.230Z | 2023-06-01T04:08:35.754Z | 2023-06-01T04:08:35.754Z | {'Vendor': 'Gallagher', 'Product': 'Controller 6000', 'Versions': '0, 0, 0, 0'} |
CVE-2023-24992 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19814) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.544Z | 2023-02-14T10:37:03.196Z | 2023-03-14T09:31:50.120Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24838 | HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator's credential. This credential can then be used to login PowerStation or Secure Shell to achieve remote code execution. | https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'HGiga', 'Product': 'PowerStation', 'Versions': 'unspecified'} |
CVE-2023-24654 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter under the Request a Quote function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24592 | Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html | 2023-04-01T03:00:04.505Z | 2023-11-14T19:05:04.547Z | 2023-11-14T19:05:04.547Z | {'Vendor': 'n/a', 'Product': 'Intel(R) oneAPI Toolkits and Component software', 'Versions': 'before version 2023.1'} |
CVE-2023-24068 | Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file. NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access. | https://signal.org/en/download/windows | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24438 | A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:28.552Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'} |
CVE-2023-24984 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19806) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.543Z | 2023-02-14T10:36:54.131Z | 2023-03-14T09:31:42.061Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24253 | Domotica Labs srl Ikon Server before v2.8.6 was discovered to contain a SQL injection vulnerability. | https://www.swascan.com/it/security-advisory-domotica-labs-ikon-server/ | 2023-01-23T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24603 | OX App Suite before backend 7.10.6-rev37 does not check size limits when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of data. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24195 | Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the page parameter in index.php. | https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24896 | Dynamics 365 Finance Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24896 | 2023-01-31T20:32:35.471Z | 2023-07-14T17:30:30.307Z | 2024-01-09T17:39:02.613Z | {'Vendor': 'Microsoft', 'Product': 'Dynamics 365 for Finance and Operations', 'Versions': '10.0.0'} |
CVE-2023-24879 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24879 | 2023-01-31T20:32:35.465Z | 2023-03-14T16:55:31.221Z | 2023-12-14T18:31:26.639Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'} |
CVE-2023-24480 | Controller DoS due to stack overflow when decoding a message from the server | https://process.honeywell.com | 2023-02-28T23:51:16.652Z | 2023-07-13T10:57:46.879Z | 2023-07-13T10:57:46.879Z | {'Vendor': 'Honeywell', 'Product': 'C300', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'} |
CVE-2023-24194 | Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the page parameter in navbar.php. | https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24897 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897 | 2023-01-31T20:32:35.472Z | 2023-06-14T14:52:10.089Z | 2024-01-09T17:39:03.147Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)', 'Versions': '15.9.0'} |
CVE-2023-24602 | OX App Suite before frontend 7.10.6-rev24 allows XSS via data to the Tumblr portal widget, such as a post title. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24317 | Judging Management System 1.0 was discovered to contain an arbitrary file upload vulnerability via the component edit_organizer.php. | http://sourcecodester.com | 2023-01-23T00:00:00 | 2023-02-23T00:00:00 | 2023-02-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24747 | Jfinal CMS v5.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /system/dict/list. | https://gist.github.com/Threonic/a262c19ed5027e5a7fe0b97b62b10a08 | 2023-01-30T00:00:00 | 2023-04-05T00:00:00 | 2023-04-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24593 | null | null | 2023-03-23T08:54:23.446Z | null | 2023-07-20T20:27:34.167Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-24069 | Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.) NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access. | https://signal.org/en/download/windows | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24439 | Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2774 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:29.672Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'} |
CVE-2023-24086 | SLIMS v9.5.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /customs/loan_by_class.php?reportView. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/slims.web.id/SLIMS-9.5.2 | 2023-01-23T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24985 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19807) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.543Z | 2023-02-14T10:36:55.207Z | 2023-03-14T09:31:43.090Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24655 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter under the Profile Update function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-03-23T00:00:00 | 2023-03-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24205 | Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml). | https://github.com/Fndroid/clash_for_windows_pkg | 2023-01-23T00:00:00 | 2023-02-23T00:00:00 | 2023-02-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24585 | An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725 | 2023-02-13T18:12:54.125Z | 2023-11-14T09:14:53.950Z | 2023-11-14T18:00:07.178Z | {'Vendor': 'Silicon Labs', 'Product': 'Gecko Platform', 'Versions': '4.3.1.0'} |
CVE-2023-24993 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19815) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.544Z | 2023-02-14T10:37:04.297Z | 2023-03-14T09:31:51.106Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24839 | HGiga MailSherlock’s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack. | https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-user-4.5, iSherlock-antispam-4.5'} |
CVE-2023-24643 | Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the sid parameter at /php-jms/updateBlankTxtview.php. | https://github.com/594238758/mycve/blob/main/judging-management-system/SQLi-3.md | 2023-01-30T00:00:00 | 2023-03-03T00:00:00 | 2023-03-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24881 | Microsoft Teams Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24881 | 2023-01-31T20:32:35.465Z | 2023-07-11T16:37:55.391Z | 2023-12-14T19:05:59.629Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Teams', 'Versions': '2.0.0'} |
CVE-2023-24028 | In MISP 2.4.167, app/Controller/Component/ACLComponent.php has incorrect access control for the decaying import function. | https://github.com/MISP/MISP/commit/93bf15d3bd703a32ebfe86cb6c1c9b735cf23e30 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24182 | LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component /system/sshkeys.js. | https://github.com/openwrt/luci/commit/0186d7eae0e123a409e9919a83fdfecc7945c984 | 2023-01-23T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24478 | Use of insufficiently random values for some Intel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux before version 22.4 may allow an authenticated user to potentially enable information disclosure via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00850.html | 2023-03-01T18:23:25.229Z | 2023-08-15T12:42:18.308Z | 2023-08-15T12:42:18.308Z | {'Vendor': 'n/a', 'Product': 'Intel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux', 'Versions': 'before version 22.4'} |
CVE-2023-24497 | Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the remote_subnet field of the database | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704 | 2023-01-24T19:20:44.638Z | 2023-07-06T14:53:31.342Z | 2023-07-17T18:49:06.435Z | {'Vendor': 'Milesight', 'Product': 'MilesightVPN', 'Versions': 'v2.0.2'} |
CVE-2023-24751 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | https://github.com/strukturag/libde265/issues/379 | 2023-01-30T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24546 | On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service. | https://www.arista.com/en/support/advisories-notices/security-advisory/17022-security-advisory-0083 | 2023-01-26T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'CloudVision', 'Versions': '<2021.1.0, <2021.2.0, <2021.3.0,'} |
CVE-2023-24815 | Vert.x-Web is a set of building blocks for building web applications in the java programming language. When running vertx web applications that serve files using `StaticHandler` on Windows Operating Systems and Windows File Systems, if the mount point is a wildcard (`*`) then an attacker can exfiltrate any class path resource. When computing the relative path to locate the resource, in case of wildcards, the code: `return "/" + rest;` from `Utils.java` returns the user input (without validation) as the segment to lookup. Even though checks are performed to avoid escaping the sandbox, given that the input was not sanitized `\` are not properly handled and an attacker can build a path that is valid within the classpath. This issue only affects users deploying in windows environments and upgrading is the advised remediation path. There are no known workarounds for this vulnerability. | https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38 | 2023-01-30T14:43:33.704Z | 2023-02-09T17:36:32.589Z | null | {'Vendor': 'vert-x3', 'Product': 'vertx-web', 'Versions': '>= 4.0.0, < 4.3.8'} |
CVE-2023-24950 | Microsoft SharePoint Server Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24950 | 2023-01-31T20:37:47.261Z | 2023-05-09T17:03:00.251Z | 2023-12-14T19:06:10.327Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Enterprise Server 2016', 'Versions': '16.0.0'} |
CVE-2023-24403 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP For The Win bbPress Voting plugin <= 2.1.11.0 versions. | https://patchstack.com/database/vulnerability/bbp-voting/wordpress-bbpress-voting-plugin-2-1-11-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:51.988Z | 2023-04-06T10:32:52.271Z | 2023-04-06T10:32:52.271Z | {'Vendor': 'WP For The Win', 'Product': 'bbPress Voting', 'Versions': 'n/a'} |
CVE-2023-24395 | Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Contact Form 7 Redirect & Thank You Page plugin <= 1.0.3 versions. | https://patchstack.com/database/vulnerability/cf7-redirect-thank-you-page/wordpress-contact-form-7-redirect-thank-you-page-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-23T18:16:50.470Z | 2023-07-10T10:40:43.878Z | 2023-07-10T10:40:43.878Z | {'Vendor': 'Scott Paterson', 'Product': 'Contact Form 7 Redirect & Thank You Page', 'Versions': 'n/a'} |
CVE-2023-24842 | HGiga MailSherlock has vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to access partial content of another user’s mail by changing user ID and mail ID within URL. | https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-user-4.5, iSherlock-antispam-4.5'} |
CVE-2023-24511 | On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system. | https://www.arista.com/en/support/advisories-notices/security-advisory/17239-security-advisory-0084 | 2023-01-24T00:00:00 | 2023-04-12T00:00:00 | 2023-04-12T00:00:00 | {'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.28.0 4.28.5.1M, 4.27.0 4.27.8.1M, 4.26.0 4.26.9M, 4.25.0 4.25.10M, 4.24.0 4.24.11M, 4.29.0'} |
CVE-2023-24141 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingTimeOut parameter in the setNetworkDiag function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagPingTimeOut/setNetworkDiag_NetDiagPingTimeOut.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24454 | Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2091 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:47.130Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestQuality Updater Plugin', 'Versions': 'unspecified, next of 1.3'} |
CVE-2023-24004 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPdevart Image and Video Lightbox, Image PopUp plugin <= 2.1.5 versions. | https://patchstack.com/database/vulnerability/lightbox-popup/wordpress-image-and-video-lightbox-image-popup-plugin-2-1-5-cross-site-scripting-xss?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-04-06T08:00:22.034Z | 2023-04-06T08:00:22.034Z | {'Vendor': 'WPdevart', 'Product': 'Image and Video Lightbox, Image PopUp', 'Versions': 'n/a'} |
CVE-2023-24907 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24907 | 2023-01-31T20:37:47.251Z | 2023-03-14T16:55:53.362Z | 2023-12-14T18:31:48.770Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24157 | A command injection vulnerability in the serverIp parameter in the function updateWifiInfo of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/updateWifiInfo/updateWifiInfo.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24507 |
AgilePoint NX v8.0 SU2.2 & SU2.3 – Insecure File Upload - Vulnerability allows insecure file upload, by an unspecified request.
| https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T19:41:19.106Z | 2023-05-08T00:00:00 | 2023-05-17T21:43:50.116Z | {'Vendor': 'AgilePoint', 'Product': 'NX', 'Versions': 'v8.0 SU2.2 & SU2.3'} |
CVE-2023-24854 | Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. | https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin | 2023-01-31T16:25:23.370Z | 2023-07-04T04:46:43.332Z | 2023-07-04T04:46:43.332Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ6018, IPQ8074A, IPQ8174, IPQ9574, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4024, QCA6174A, QCA6310, QCA6320, QCA6391, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8337, QCA9377, QCM2290, QCM4290, QCM4325, QCM4490, QCM6490, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5152, QCN6024, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9024, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6490, QRB5165M, QRB5165N, QSM8350, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8255P, SA8295P, SD 8 Gen1 5G, SD660, SD835, SD865 5G, SD888, SG4150P, SM4125, SM7250P, SM7315, SM7325P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X12 LTE Modem, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2230P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-24911 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24911 | 2023-01-31T20:37:47.251Z | 2023-03-14T16:55:56.908Z | 2023-12-14T18:31:52.282Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24442 | Jenkins GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier stores the GitHub Personal Access Token, Sonar access token and Sonar password unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2767 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:33.064Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Coverage Status Plugin', 'Versions': 'unspecified, next of 2.2.0'} |
CVE-2023-24550 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to heap-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.398Z | 2023-02-14T10:36:26.898Z | 2023-03-14T09:31:17.103Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24415 | Cross-Site Request Forgery (CSRF) vulnerability in QuantumCloud AI ChatBot plugin <= 4.2.8 versions. | https://patchstack.com/database/vulnerability/chatbot/wordpress-chatbot-plugin-4-2-8-cross-site-request-forgery-csrf?_s_id=cve | 2023-01-23T18:16:53.496Z | 2023-02-23T15:03:24.804Z | 2023-12-01T15:08:32.967Z | {'Vendor': 'QuantumCloud', 'Product': 'AI ChatBot', 'Versions': 'n/a'} |
CVE-2023-24045 | In Dataiku DSS 11.2.1, an attacker can download other Dataiku files that were uploaded to the myfiles section by specifying the target username in a download request. | https://dataiku.com | 2023-01-21T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24946 | Windows Backup Service Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946 | 2023-01-31T20:37:47.259Z | 2023-05-09T17:02:58.108Z | 2023-12-14T19:06:08.330Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24229 | DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the web management interface to inject operating system commands via the mainfunction.cgi 'parameter' parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://www.draytek.com/ | 2023-01-23T00:00:00 | 2023-03-15T00:00:00 | 2023-11-22T19:06:06.237548 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24383 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Namaste! LMS plugin <= 2.5.9.1 versions. | https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-5-9-1-cross-site-scripting-xss?_s_id=cve | 2023-01-23T18:16:48.761Z | 2023-04-06T10:12:30.042Z | 2023-04-06T10:12:30.042Z | {'Vendor': 'Kiboko Labs', 'Product': 'Namaste! LMS', 'Versions': 'n/a'} |
CVE-2023-24931 | Windows Secure Channel Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24931 | 2023-01-31T20:37:47.256Z | 2023-04-11T19:13:13.443Z | 2023-12-14T18:59:12.521Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24032 | In Zimbra Collaboration Suite through 9.0 and 8.8.15, an attacker (who has initial user access to a Zimbra server instance) can execute commands as root by passing one of JVM arguments, leading to local privilege escalation (LPE). | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | 2023-01-20T00:00:00 | 2023-06-15T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24198 | Raffle Draw System v1.0 was discovered to contain multiple SQL injection vulnerabilities at save_winner.php via the ticket_id and draw parameters. | https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24527 | SAP NetWeaver AS Java for Deploy Service - version 7.5, does not perform any access control checks for functionalities that require user identity enabling an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability and integrity.
| https://launchpad.support.sap.com/#/notes/3287784 | 2023-01-25T15:46:55.581Z | 2023-04-11T02:33:38.624Z | 2023-04-11T21:25:19.634Z | {'Vendor': 'SAP', 'Product': 'NetWeaver AS Java for Deploy Service', 'Versions': '7.50'} |
CVE-2023-24435 | A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:25.137Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Builder Plugin', 'Versions': 'unspecified, next of 1.42.2'} |
CVE-2023-24065 | NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting. | https://github.com/shihjay2/docker-nosh | 2023-01-23T00:00:00 | 2023-01-29T00:00:00 | 2023-01-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24966 | IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 246904. | https://www.ibm.com/support/pages/node/6986333 | 2023-02-01T02:39:37.389Z | 2023-04-27T13:08:42.186Z | 2023-04-27T13:08:42.186Z | {'Vendor': 'IBM', 'Product': 'WebSphere Application Server', 'Versions': '8.5, 9.0'} |
CVE-2023-24989 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19811) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.543Z | 2023-02-14T10:36:59.619Z | 2023-03-14T09:31:47.161Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24823 | RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a type confusion between IPv6 extension headers and a UDP header. This occurs while encoding a 6LoWPAN IPHC header. The type confusion manifests in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, apply the patches manually. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-jwmv-47p2-hgq2 | 2023-01-30T14:43:33.705Z | 2023-04-24T15:27:55.864Z | 2023-04-24T15:27:55.864Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'} |
CVE-2023-24120 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wrlEn_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24423 | A cross-site request forgery (CSRF) vulnerability in Jenkins Gerrit Trigger Plugin 2.38.0 and earlier allows attackers to rebuild previous builds triggered by Gerrit. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2137 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:11.595Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Gerrit Trigger Plugin', 'Versions': 'unspecified'} |
CVE-2023-24566 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to stack-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19472) | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T16:20:20.792Z | 2023-02-14T10:36:45.233Z | 2023-03-14T09:31:33.773Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24835 | Softnext Technologies Corp.’s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Softnext', 'Product': 'SPAM SQR', 'Versions': 'unspecified'} |
CVE-2023-24474 | Experion server may experience a DoS due to a heap overflow which could occur when handling a specially crafted message | https://process.honeywell.com | 2023-02-28T23:51:16.673Z | 2023-07-13T10:56:01.848Z | 2023-07-13T10:56:01.848Z | {'Vendor': 'Honeywell', 'Product': 'Experion Server', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'} |
CVE-2023-24927 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24927 | 2023-01-31T20:37:47.255Z | 2023-04-11T19:13:30.449Z | 2023-12-14T18:59:29.278Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24862 | Windows Secure Channel Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24862 | 2023-01-31T20:32:35.463Z | 2023-03-14T16:55:49.764Z | 2023-12-14T18:31:45.168Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24161 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the webWlanIdx parameter in the setWebWlanIdx function. | https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setWebWlanIdx/setWebWlanIdx.md | 2023-01-23T00:00:00 | 2023-02-14T00:00:00 | 2023-02-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24376 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Nico Graff WP Simple Events plugin <= 1.0 versions. | https://patchstack.com/database/vulnerability/wp-simple-events/wordpress-wp-simple-events-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:47.036Z | 2023-05-08T21:37:11.138Z | 2023-05-08T21:37:11.138Z | {'Vendor': 'Nico Graff', 'Product': 'WP Simple Events', 'Versions': 'n/a'} |
CVE-2023-24726 | Art Gallery Management System v1.0 was discovered to contain a SQL injection vulnerability via the viewid parameter on the enquiry page. | https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip | 2023-01-30T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24233 | A stored cross-site scripting (XSS) vulnerability in the component /php-inventory-management-system/orders.php?o=add of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Client Name parameter. | https://github.com/stemword/php-inventory-management-system | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24399 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin <= 2.1.2 versions. | https://patchstack.com/database/vulnerability/ocean-extra/wordpress-ocean-extra-plugin-2-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:50.470Z | 2023-03-30T11:14:55.929Z | 2023-03-30T11:14:55.929Z | {'Vendor': 'OceanWP', 'Product': 'Ocean Extra', 'Versions': 'n/a'} |
CVE-2023-24819 | RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-fv97-2448-gcf6 | 2023-01-30T14:43:33.705Z | 2023-04-24T14:42:44.016Z | 2023-04-24T14:42:44.016Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'} |
CVE-2023-24008 | Cross-Site Request Forgery (CSRF) vulnerability in yonifre Maspik – Spam Blacklist plugin <= 0.7.8 versions. | https://patchstack.com/database/vulnerability/contact-forms-anti-spam/wordpress-maspik-spam-blacklist-plugin-0-7-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-05-26T12:15:02.398Z | 2023-05-26T12:15:02.398Z | {'Vendor': 'yonifre', 'Product': 'Maspik – Spam Blacklist', 'Versions': 'n/a'} |
CVE-2023-24458 | A cross-site request forgery (CSRF) vulnerability in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers to connect to an attacker-specified URL. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2745 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:51.691Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins BearyChat Plugin', 'Versions': 'unspecified, next of 3.0.2'} |
CVE-2023-24788 | NotrinosERP v0.7 was discovered to contain a SQL injection vulnerability via the OrderNumber parameter at /NotrinosERP/sales/customer_delivery.php. | https://github.com/notrinos/NotrinosERP | 2023-01-30T00:00:00 | 2023-03-23T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24622 | isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF. | https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7 | 2023-01-30T00:00:00 | 2023-01-30T00:00:00 | 2023-01-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24858 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24858 | 2023-01-31T20:32:35.462Z | 2023-03-14T16:55:48.260Z | 2023-12-14T18:31:43.673Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24730 | Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the company parameter in the user profile update function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24675 | Cross Site Scripting Vulnerability in BluditCMS v.3.14.1 allows attackers to execute arbitrary code via the Categories Friendly URL. | https://medium.com/%40cupc4k3/xss-stored-in-friendly-url-field-on-bludit-cms-641a9dd653f | 2023-01-30T00:00:00 | 2023-09-01T00:00:00 | 2023-09-01T09:48:43.729342 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24049 | An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges on the device via poor credential management. | https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ | 2023-01-21T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T22:52:46.683034 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24419 | Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Form Builder Team Formidable Forms plugin <= 5.5.6 versions. | https://patchstack.com/database/vulnerability/formidable/wordpress-formidable-forms-plugin-5-5-6-cross-site-request-forgery-csrf?_s_id=cve | 2023-01-23T18:16:53.497Z | 2023-02-28T13:35:36.994Z | 2023-02-28T13:35:36.994Z | {'Vendor': 'Strategy11 Form Builder Team', 'Product': 'Formidable Forms', 'Versions': 'n/a'} |
CVE-2023-24524 | SAP S/4 HANA Map Treasury Correspondence Format Data does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to delete the data with a high impact to availability.
| https://launchpad.support.sap.com/#/notes/2985905 | 2023-01-25T15:46:55.581Z | 2023-02-14T03:17:59.139Z | 2023-04-11T21:26:06.960Z | {'Vendor': 'SAP', 'Product': 'S/4 HANA (Map Treasury Correspondence Format Data)', 'Versions': '104, 105'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.