CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-24547
On affected platforms running Arista MOS, the configuration of a BGP password will cause the password to be logged in clear text that can be revealed in local logs or remote logging servers by authenticated users, as well as appear in clear text in the device’s running config.
https://www.arista.com/en/support/advisories-notices/security-advisory/18644-security-advisory-0090
2023-01-26T11:37:43.827Z
2023-12-05T23:29:01.375Z
2023-12-05T23:29:01.375Z
{'Vendor': 'Arista Networks', 'Product': 'MOS', 'Versions': '0.13.0'}
CVE-2023-24814
TYPO3 is a free and open source Content Management Framework released under the GNU General Public License. In affected versions the TYPO3 core component `GeneralUtility::getIndpEnv()` uses the unfiltered server environment variable `PATH_INFO`, which allows attackers to inject malicious content. In combination with the TypoScript setting `config.absRefPrefix=auto`, attackers can inject malicious HTML code to pages that have not been rendered and cached, yet. As a result, injected values would be cached and delivered to other website visitors (persisted cross-site scripting). Individual code which relies on the resolved value of `GeneralUtility::getIndpEnv('SCRIPT_NAME')` and corresponding usages (as shown below) are vulnerable as well. Additional investigations confirmed that at least Apache web server deployments using CGI (FPM, FCGI/FastCGI, and similar) are affected. However, there still might be the risk that other scenarios like nginx, IIS, or Apache/mod_php are vulnerable. The usage of server environment variable `PATH_INFO` has been removed from corresponding processings in `GeneralUtility::getIndpEnv()`. Besides that, the public property `TypoScriptFrontendController::$absRefPrefix` is encoded for both being used as a URI component and for being used as a prefix in an HTML context. This mitigates the cross-site scripting vulnerability. Users are advised to update to TYPO3 versions 8.7.51 ELTS, 9.5.40 ELTS, 10.4.35 LTS, 11.5.23 LTS and 12.2.0 which fix this problem. For users who are unable to patch in a timely manner the TypoScript setting `config.absRefPrefix` should at least be set to a static path value, instead of using auto - e.g. `config.absRefPrefix=/`. This workaround **does not fix all aspects of the vulnerability**, and is just considered to be an intermediate mitigation to the most prominent manifestation.
https://github.com/TYPO3/typo3/security/advisories/GHSA-r4f8-f93x-5qh3
2023-01-30T14:43:33.704Z
2023-02-07T18:14:29.388Z
null
{'Vendor': 'TYPO3', 'Product': 'typo3', 'Versions': '>= 8.7.0, < 8.7.51, >= 9.0.0, < 9.5.40, >= 10.0.0, < 10.4.36, 11.0.0, < 11.5.23, >= 12.0.0, < 12.2.0'}
CVE-2023-24052
An issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain control of the device via the change password functionality as it does not prompt for the current password.
https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
2023-01-21T00:00:00
2023-12-04T00:00:00
2023-12-04T23:10:04.145802
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24402
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Veribo, Roland Murg WP Booking System – Booking Calendar plugin <= 2.0.18 versions.
https://patchstack.com/database/vulnerability/wp-booking-system/wordpress-wp-booking-system-booking-calendar-plugin-2-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:51.988Z
2023-04-07T08:48:19.936Z
2023-04-07T08:48:19.936Z
{'Vendor': 'Veribo, Roland Murg', 'Product': 'WP Booking System – Booking Calendar', 'Versions': 'n/a'}
CVE-2023-24880
Windows SmartScreen Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880
2023-01-31T20:32:35.465Z
2023-03-14T16:55:59.434Z
2023-12-14T18:31:54.757Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24029
In Progress WS_FTP Server before 8.8, it is possible for a host administrator to elevate their privileges via the administrative interface due to insufficient authorization controls applied on user modification workflows.
https://www.progress.com/ws_ftp
2023-01-20T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24479
An authentication bypass vulnerability exists in the httpd nvram.cgi functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1762
2023-06-12T16:00:05.976Z
2023-10-11T15:14:31.297Z
2023-10-11T17:00:09.445Z
{'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'}
CVE-2023-24496
Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the name field of the database.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
2023-01-24T19:20:44.636Z
2023-07-06T14:53:31.258Z
2023-07-17T18:49:06.317Z
{'Vendor': 'Milesight', 'Product': 'MilesightVPN', 'Versions': 'v2.0.2'}
CVE-2023-24212
Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the timeType function at /goform/SetSysTimeCfg.
https://github.com/w0x68y/cve-lists/blob/main/Tenda/vuln/readme.md
2023-01-23T00:00:00
2023-02-23T00:00:00
2023-03-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24642
Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the sid parameter at /php-jms/updateTxtview.php.
https://github.com/594238758/mycve/blob/main/judging-management-system/SQLi-2.md
2023-01-30T00:00:00
2023-03-03T00:00:00
2023-03-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24584
Controller 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature. This issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a, all versions of vCR8.40 and prior.
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2023-24584
2023-02-03T20:38:05.230Z
2023-06-01T04:08:35.754Z
2023-06-01T04:08:35.754Z
{'Vendor': 'Gallagher', 'Product': 'Controller 6000', 'Versions': '0, 0, 0, 0'}
CVE-2023-24992
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19814)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.544Z
2023-02-14T10:37:03.196Z
2023-03-14T09:31:50.120Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24838
HGiga PowerStation has a vulnerability of Information Leakage. An unauthenticated remote attacker can exploit this vulnerability to obtain the administrator's credential. This credential can then be used to login PowerStation or Secure Shell to achieve remote code execution.
https://www.twcert.org.tw/tw/cp-132-6957-d8f67-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-05-15T00:00:00
{'Vendor': 'HGiga', 'Product': 'PowerStation', 'Versions': 'unspecified'}
CVE-2023-24654
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter under the Request a Quote function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24592
Path traversal in the some Intel(R) oneAPI Toolkits and Component software before version 2023.1 may allow authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00841.html
2023-04-01T03:00:04.505Z
2023-11-14T19:05:04.547Z
2023-11-14T19:05:04.547Z
{'Vendor': 'n/a', 'Product': 'Intel(R) oneAPI Toolkits and Component software', 'Versions': 'before version 2023.1'}
CVE-2023-24068
Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file. NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.
https://signal.org/en/download/windows
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24438
A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:28.552Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'}
CVE-2023-24984
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19806)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.543Z
2023-02-14T10:36:54.131Z
2023-03-14T09:31:42.061Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24253
Domotica Labs srl Ikon Server before v2.8.6 was discovered to contain a SQL injection vulnerability.
https://www.swascan.com/it/security-advisory-domotica-labs-ikon-server/
2023-01-23T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24603
OX App Suite before backend 7.10.6-rev37 does not check size limits when downloading, e.g., potentially allowing a crafted iCal feed to provide an unlimited amount of data.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24195
Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the page parameter in index.php.
https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24896
Dynamics 365 Finance Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24896
2023-01-31T20:32:35.471Z
2023-07-14T17:30:30.307Z
2024-01-09T17:39:02.613Z
{'Vendor': 'Microsoft', 'Product': 'Dynamics 365 for Finance and Operations', 'Versions': '10.0.0'}
CVE-2023-24879
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24879
2023-01-31T20:32:35.465Z
2023-03-14T16:55:31.221Z
2023-12-14T18:31:26.639Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'}
CVE-2023-24480
Controller DoS due to stack overflow when decoding a message from the server
https://process.honeywell.com
2023-02-28T23:51:16.652Z
2023-07-13T10:57:46.879Z
2023-07-13T10:57:46.879Z
{'Vendor': 'Honeywell', 'Product': 'C300', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'}
CVE-2023-24194
Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the page parameter in navbar.php.
https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24897
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24897
2023-01-31T20:32:35.472Z
2023-06-14T14:52:10.089Z
2024-01-09T17:39:03.147Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)', 'Versions': '15.9.0'}
CVE-2023-24602
OX App Suite before frontend 7.10.6-rev24 allows XSS via data to the Tumblr portal widget, such as a post title.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24317
Judging Management System 1.0 was discovered to contain an arbitrary file upload vulnerability via the component edit_organizer.php.
http://sourcecodester.com
2023-01-23T00:00:00
2023-02-23T00:00:00
2023-02-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24747
Jfinal CMS v5.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /system/dict/list.
https://gist.github.com/Threonic/a262c19ed5027e5a7fe0b97b62b10a08
2023-01-30T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24593
null
null
2023-03-23T08:54:23.446Z
null
2023-07-20T20:27:34.167Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-24069
Signal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.) NOTE: the vendor disputes the relevance of this finding because the product is not intended to protect against adversaries with this degree of local access.
https://signal.org/en/download/windows
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24439
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2774
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:29.672Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'}
CVE-2023-24086
SLIMS v9.5.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /customs/loan_by_class.php?reportView.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/slims.web.id/SLIMS-9.5.2
2023-01-23T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24985
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19807)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.543Z
2023-02-14T10:36:55.207Z
2023-03-14T09:31:43.090Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24655
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter under the Profile Update function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-03-23T00:00:00
2023-03-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24205
Clash for Windows v0.20.12 was discovered to contain a remote code execution (RCE) vulnerability which is exploited via overwriting the configuration file (cfw-setting.yaml).
https://github.com/Fndroid/clash_for_windows_pkg
2023-01-23T00:00:00
2023-02-23T00:00:00
2023-02-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24585
An out-of-bounds write vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to memory corruption. An attacker can send a network request to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1725
2023-02-13T18:12:54.125Z
2023-11-14T09:14:53.950Z
2023-11-14T18:00:07.178Z
{'Vendor': 'Silicon Labs', 'Product': 'Gecko Platform', 'Versions': '4.3.1.0'}
CVE-2023-24993
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19815)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.544Z
2023-02-14T10:37:04.297Z
2023-03-14T09:31:51.106Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24839
HGiga MailSherlock’s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack.
https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-user-4.5, iSherlock-antispam-4.5'}
CVE-2023-24643
Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the sid parameter at /php-jms/updateBlankTxtview.php.
https://github.com/594238758/mycve/blob/main/judging-management-system/SQLi-3.md
2023-01-30T00:00:00
2023-03-03T00:00:00
2023-03-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24881
Microsoft Teams Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24881
2023-01-31T20:32:35.465Z
2023-07-11T16:37:55.391Z
2023-12-14T19:05:59.629Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Teams', 'Versions': '2.0.0'}
CVE-2023-24028
In MISP 2.4.167, app/Controller/Component/ACLComponent.php has incorrect access control for the decaying import function.
https://github.com/MISP/MISP/commit/93bf15d3bd703a32ebfe86cb6c1c9b735cf23e30
2023-01-20T00:00:00
2023-01-20T00:00:00
2023-01-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24182
LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component /system/sshkeys.js.
https://github.com/openwrt/luci/commit/0186d7eae0e123a409e9919a83fdfecc7945c984
2023-01-23T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24478
Use of insufficiently random values for some Intel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux before version 22.4 may allow an authenticated user to potentially enable information disclosure via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00850.html
2023-03-01T18:23:25.229Z
2023-08-15T12:42:18.308Z
2023-08-15T12:42:18.308Z
{'Vendor': 'n/a', 'Product': 'Intel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux', 'Versions': 'before version 22.4'}
CVE-2023-24497
Cross-site scripting (xss) vulnerabilities exist in the requestHandlers.js detail_device functionality of Milesight VPN v2.0.2. A specially-crafted HTTP request can lead to arbitrary Javascript code injection. An attacker can send an HTTP request to trigger these vulnerabilities.This XSS is exploited through the remote_subnet field of the database
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1704
2023-01-24T19:20:44.638Z
2023-07-06T14:53:31.342Z
2023-07-17T18:49:06.435Z
{'Vendor': 'Milesight', 'Product': 'MilesightVPN', 'Versions': 'v2.0.2'}
CVE-2023-24751
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the mc_chroma function at motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
https://github.com/strukturag/libde265/issues/379
2023-01-30T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24546
On affected versions of the CloudVision Portal improper access controls on the connection from devices to CloudVision could enable a malicious actor with network access to CloudVision to get broader access to telemetry and configuration data within the system than intended. This advisory impacts the Arista CloudVision Portal product when run on-premise. It does not impact CloudVision as-a-Service.
https://www.arista.com/en/support/advisories-notices/security-advisory/17022-security-advisory-0083
2023-01-26T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'n/a', 'Product': 'CloudVision', 'Versions': '<2021.1.0, <2021.2.0, <2021.3.0,'}
CVE-2023-24815
Vert.x-Web is a set of building blocks for building web applications in the java programming language. When running vertx web applications that serve files using `StaticHandler` on Windows Operating Systems and Windows File Systems, if the mount point is a wildcard (`*`) then an attacker can exfiltrate any class path resource. When computing the relative path to locate the resource, in case of wildcards, the code: `return "/" + rest;` from `Utils.java` returns the user input (without validation) as the segment to lookup. Even though checks are performed to avoid escaping the sandbox, given that the input was not sanitized `\` are not properly handled and an attacker can build a path that is valid within the classpath. This issue only affects users deploying in windows environments and upgrading is the advised remediation path. There are no known workarounds for this vulnerability.
https://github.com/vert-x3/vertx-web/security/advisories/GHSA-53jx-vvf9-4x38
2023-01-30T14:43:33.704Z
2023-02-09T17:36:32.589Z
null
{'Vendor': 'vert-x3', 'Product': 'vertx-web', 'Versions': '>= 4.0.0, < 4.3.8'}
CVE-2023-24950
Microsoft SharePoint Server Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24950
2023-01-31T20:37:47.261Z
2023-05-09T17:03:00.251Z
2023-12-14T19:06:10.327Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Enterprise Server 2016', 'Versions': '16.0.0'}
CVE-2023-24403
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP For The Win bbPress Voting plugin <= 2.1.11.0 versions.
https://patchstack.com/database/vulnerability/bbp-voting/wordpress-bbpress-voting-plugin-2-1-11-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:51.988Z
2023-04-06T10:32:52.271Z
2023-04-06T10:32:52.271Z
{'Vendor': 'WP For The Win', 'Product': 'bbPress Voting', 'Versions': 'n/a'}
CVE-2023-24395
Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Contact Form 7 Redirect & Thank You Page plugin <= 1.0.3 versions.
https://patchstack.com/database/vulnerability/cf7-redirect-thank-you-page/wordpress-contact-form-7-redirect-thank-you-page-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-23T18:16:50.470Z
2023-07-10T10:40:43.878Z
2023-07-10T10:40:43.878Z
{'Vendor': 'Scott Paterson', 'Product': 'Contact Form 7 Redirect & Thank You Page', 'Versions': 'n/a'}
CVE-2023-24842
HGiga MailSherlock has vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to access partial content of another user’s mail by changing user ID and mail ID within URL.
https://www.twcert.org.tw/tw/cp-132-6961-12444-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-user-4.5, iSherlock-antispam-4.5'}
CVE-2023-24511
On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
https://www.arista.com/en/support/advisories-notices/security-advisory/17239-security-advisory-0084
2023-01-24T00:00:00
2023-04-12T00:00:00
2023-04-12T00:00:00
{'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.28.0 4.28.5.1M, 4.27.0 4.27.8.1M, 4.26.0 4.26.9M, 4.25.0 4.25.10M, 4.24.0 4.24.11M, 4.29.0'}
CVE-2023-24141
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingTimeOut parameter in the setNetworkDiag function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagPingTimeOut/setNetworkDiag_NetDiagPingTimeOut.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24454
Jenkins TestQuality Updater Plugin 1.3 and earlier stores the TestQuality Updater password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2091
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:47.130Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins TestQuality Updater Plugin', 'Versions': 'unspecified, next of 1.3'}
CVE-2023-24004
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPdevart Image and Video Lightbox, Image PopUp plugin <= 2.1.5 versions.
https://patchstack.com/database/vulnerability/lightbox-popup/wordpress-image-and-video-lightbox-image-popup-plugin-2-1-5-cross-site-scripting-xss?_s_id=cve
2023-01-20T09:29:08.377Z
2023-04-06T08:00:22.034Z
2023-04-06T08:00:22.034Z
{'Vendor': 'WPdevart', 'Product': 'Image and Video Lightbox, Image PopUp', 'Versions': 'n/a'}
CVE-2023-24907
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24907
2023-01-31T20:37:47.251Z
2023-03-14T16:55:53.362Z
2023-12-14T18:31:48.770Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24157
A command injection vulnerability in the serverIp parameter in the function updateWifiInfo of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/updateWifiInfo/updateWifiInfo.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24507
AgilePoint NX v8.0 SU2.2 & SU2.3 – Insecure File Upload - Vulnerability allows insecure file upload, by an unspecified request.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T19:41:19.106Z
2023-05-08T00:00:00
2023-05-17T21:43:50.116Z
{'Vendor': 'AgilePoint', 'Product': 'NX', 'Versions': 'v8.0 SU2.2 & SU2.3'}
CVE-2023-24854
Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message.
https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin
2023-01-31T16:25:23.370Z
2023-07-04T04:46:43.332Z
2023-07-04T04:46:43.332Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ6018, IPQ8074A, IPQ8174, IPQ9574, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4024, QCA6174A, QCA6310, QCA6320, QCA6391, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8337, QCA9377, QCM2290, QCM4290, QCM4325, QCM4490, QCM6490, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5152, QCN6024, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9024, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6490, QRB5165M, QRB5165N, QSM8350, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8255P, SA8295P, SD 8 Gen1 5G, SD660, SD835, SD865 5G, SD888, SG4150P, SM4125, SM7250P, SM7315, SM7325P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X12 LTE Modem, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2230P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'}
CVE-2023-24911
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24911
2023-01-31T20:37:47.251Z
2023-03-14T16:55:56.908Z
2023-12-14T18:31:52.282Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24442
Jenkins GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier stores the GitHub Personal Access Token, Sonar access token and Sonar password unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2767
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:33.064Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Coverage Status Plugin', 'Versions': 'unspecified, next of 2.2.0'}
CVE-2023-24550
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to heap-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.398Z
2023-02-14T10:36:26.898Z
2023-03-14T09:31:17.103Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24415
Cross-Site Request Forgery (CSRF) vulnerability in QuantumCloud AI ChatBot plugin <= 4.2.8 versions.
https://patchstack.com/database/vulnerability/chatbot/wordpress-chatbot-plugin-4-2-8-cross-site-request-forgery-csrf?_s_id=cve
2023-01-23T18:16:53.496Z
2023-02-23T15:03:24.804Z
2023-12-01T15:08:32.967Z
{'Vendor': 'QuantumCloud', 'Product': 'AI ChatBot', 'Versions': 'n/a'}
CVE-2023-24045
In Dataiku DSS 11.2.1, an attacker can download other Dataiku files that were uploaded to the myfiles section by specifying the target username in a download request.
https://dataiku.com
2023-01-21T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24946
Windows Backup Service Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946
2023-01-31T20:37:47.259Z
2023-05-09T17:02:58.108Z
2023-12-14T19:06:08.330Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24229
DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the web management interface to inject operating system commands via the mainfunction.cgi 'parameter' parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://www.draytek.com/
2023-01-23T00:00:00
2023-03-15T00:00:00
2023-11-22T19:06:06.237548
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24383
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Namaste! LMS plugin <= 2.5.9.1 versions.
https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-5-9-1-cross-site-scripting-xss?_s_id=cve
2023-01-23T18:16:48.761Z
2023-04-06T10:12:30.042Z
2023-04-06T10:12:30.042Z
{'Vendor': 'Kiboko Labs', 'Product': 'Namaste! LMS', 'Versions': 'n/a'}
CVE-2023-24931
Windows Secure Channel Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24931
2023-01-31T20:37:47.256Z
2023-04-11T19:13:13.443Z
2023-12-14T18:59:12.521Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24032
In Zimbra Collaboration Suite through 9.0 and 8.8.15, an attacker (who has initial user access to a Zimbra server instance) can execute commands as root by passing one of JVM arguments, leading to local privilege escalation (LPE).
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
2023-01-20T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24198
Raffle Draw System v1.0 was discovered to contain multiple SQL injection vulnerabilities at save_winner.php via the ticket_id and draw parameters.
https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24527
SAP NetWeaver AS Java for Deploy Service - version 7.5, does not perform any access control checks for functionalities that require user identity enabling an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability and integrity.
https://launchpad.support.sap.com/#/notes/3287784
2023-01-25T15:46:55.581Z
2023-04-11T02:33:38.624Z
2023-04-11T21:25:19.634Z
{'Vendor': 'SAP', 'Product': 'NetWeaver AS Java for Deploy Service', 'Versions': '7.50'}
CVE-2023-24435
A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:25.137Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Builder Plugin', 'Versions': 'unspecified, next of 1.42.2'}
CVE-2023-24065
NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting.
https://github.com/shihjay2/docker-nosh
2023-01-23T00:00:00
2023-01-29T00:00:00
2023-01-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24966
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 246904.
https://www.ibm.com/support/pages/node/6986333
2023-02-01T02:39:37.389Z
2023-04-27T13:08:42.186Z
2023-04-27T13:08:42.186Z
{'Vendor': 'IBM', 'Product': 'WebSphere Application Server', 'Versions': '8.5, 9.0'}
CVE-2023-24989
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19811)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.543Z
2023-02-14T10:36:59.619Z
2023-03-14T09:31:47.161Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24823
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a type confusion between IPv6 extension headers and a UDP header. This occurs while encoding a 6LoWPAN IPHC header. The type confusion manifests in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, apply the patches manually.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-jwmv-47p2-hgq2
2023-01-30T14:43:33.705Z
2023-04-24T15:27:55.864Z
2023-04-24T15:27:55.864Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'}
CVE-2023-24120
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wrlEn_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24423
A cross-site request forgery (CSRF) vulnerability in Jenkins Gerrit Trigger Plugin 2.38.0 and earlier allows attackers to rebuild previous builds triggered by Gerrit.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2137
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:11.595Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Gerrit Trigger Plugin', 'Versions': 'unspecified'}
CVE-2023-24566
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to stack-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19472)
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T16:20:20.792Z
2023-02-14T10:36:45.233Z
2023-03-14T09:31:33.773Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24835
Softnext Technologies Corp.’s SPAM SQR has a vulnerability of Code Injection within its specific function. An authenticated remote attacker with administrator privilege can exploit this vulnerability to execute arbitrary system command to perform arbitrary system operation or disrupt service.
https://www.twcert.org.tw/tw/cp-132-6955-c7612-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Softnext', 'Product': 'SPAM SQR', 'Versions': 'unspecified'}
CVE-2023-24474
Experion server may experience a DoS due to a heap overflow which could occur when handling a specially crafted message
https://process.honeywell.com
2023-02-28T23:51:16.673Z
2023-07-13T10:56:01.848Z
2023-07-13T10:56:01.848Z
{'Vendor': 'Honeywell', 'Product': 'Experion Server', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'}
CVE-2023-24927
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24927
2023-01-31T20:37:47.255Z
2023-04-11T19:13:30.449Z
2023-12-14T18:59:29.278Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24862
Windows Secure Channel Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24862
2023-01-31T20:32:35.463Z
2023-03-14T16:55:49.764Z
2023-12-14T18:31:45.168Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24161
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the webWlanIdx parameter in the setWebWlanIdx function.
https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setWebWlanIdx/setWebWlanIdx.md
2023-01-23T00:00:00
2023-02-14T00:00:00
2023-02-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24376
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Nico Graff WP Simple Events plugin <= 1.0 versions.
https://patchstack.com/database/vulnerability/wp-simple-events/wordpress-wp-simple-events-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:47.036Z
2023-05-08T21:37:11.138Z
2023-05-08T21:37:11.138Z
{'Vendor': 'Nico Graff', 'Product': 'WP Simple Events', 'Versions': 'n/a'}
CVE-2023-24726
Art Gallery Management System v1.0 was discovered to contain a SQL injection vulnerability via the viewid parameter on the enquiry page.
https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip
2023-01-30T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24233
A stored cross-site scripting (XSS) vulnerability in the component /php-inventory-management-system/orders.php?o=add of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Client Name parameter.
https://github.com/stemword/php-inventory-management-system
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24399
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin <= 2.1.2 versions.
https://patchstack.com/database/vulnerability/ocean-extra/wordpress-ocean-extra-plugin-2-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:50.470Z
2023-03-30T11:14:55.929Z
2023-03-30T11:14:55.929Z
{'Vendor': 'OceanWP', 'Product': 'Ocean Extra', 'Versions': 'n/a'}
CVE-2023-24819
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in an out of bounds write in the packet buffer. The overflow can be used to corrupt other packets and the allocator metadata. Corrupting a pointer will easily lead to denial of service. While carefully manipulating the allocator metadata gives an attacker the possibility to write data to arbitrary locations and thus execute arbitrary code. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-fv97-2448-gcf6
2023-01-30T14:43:33.705Z
2023-04-24T14:42:44.016Z
2023-04-24T14:42:44.016Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'}
CVE-2023-24008
Cross-Site Request Forgery (CSRF) vulnerability in yonifre Maspik – Spam Blacklist plugin <= 0.7.8 versions.
https://patchstack.com/database/vulnerability/contact-forms-anti-spam/wordpress-maspik-spam-blacklist-plugin-0-7-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-20T09:29:08.377Z
2023-05-26T12:15:02.398Z
2023-05-26T12:15:02.398Z
{'Vendor': 'yonifre', 'Product': 'Maspik – Spam Blacklist', 'Versions': 'n/a'}
CVE-2023-24458
A cross-site request forgery (CSRF) vulnerability in Jenkins BearyChat Plugin 3.0.2 and earlier allows attackers to connect to an attacker-specified URL.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2745
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:51.691Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins BearyChat Plugin', 'Versions': 'unspecified, next of 3.0.2'}
CVE-2023-24788
NotrinosERP v0.7 was discovered to contain a SQL injection vulnerability via the OrderNumber parameter at /NotrinosERP/sales/customer_delivery.php.
https://github.com/notrinos/NotrinosERP
2023-01-30T00:00:00
2023-03-23T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24622
isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF.
https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7
2023-01-30T00:00:00
2023-01-30T00:00:00
2023-01-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24858
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24858
2023-01-31T20:32:35.462Z
2023-03-14T16:55:48.260Z
2023-12-14T18:31:43.673Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24730
Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the company parameter in the user profile update function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24675
Cross Site Scripting Vulnerability in BluditCMS v.3.14.1 allows attackers to execute arbitrary code via the Categories Friendly URL.
https://medium.com/%40cupc4k3/xss-stored-in-friendly-url-field-on-bludit-cms-641a9dd653f
2023-01-30T00:00:00
2023-09-01T00:00:00
2023-09-01T09:48:43.729342
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24049
An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges on the device via poor credential management.
https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
2023-01-21T00:00:00
2023-12-04T00:00:00
2023-12-04T22:52:46.683034
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24419
Cross-Site Request Forgery (CSRF) vulnerability in Strategy11 Form Builder Team Formidable Forms plugin <= 5.5.6 versions.
https://patchstack.com/database/vulnerability/formidable/wordpress-formidable-forms-plugin-5-5-6-cross-site-request-forgery-csrf?_s_id=cve
2023-01-23T18:16:53.497Z
2023-02-28T13:35:36.994Z
2023-02-28T13:35:36.994Z
{'Vendor': 'Strategy11 Form Builder Team', 'Product': 'Formidable Forms', 'Versions': 'n/a'}
CVE-2023-24524
SAP S/4 HANA Map Treasury Correspondence Format Data does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. This could allow an attacker to delete the data with a high impact to availability.
https://launchpad.support.sap.com/#/notes/2985905
2023-01-25T15:46:55.581Z
2023-02-14T03:17:59.139Z
2023-04-11T21:26:06.960Z
{'Vendor': 'SAP', 'Product': 'S/4 HANA (Map Treasury Correspondence Format Data)', 'Versions': '104, 105'}