CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-24031
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 8.8.15. XSS can occur, via one of attributes of the webmail /h/ endpoint, to execute arbitrary JavaScript code, leading to information disclosure.
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
2023-01-20T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24461
An improper certificate validation vulnerability exists in the BIG-IP Edge Client for Windows and macOS and may allow an attacker to impersonate a BIG-IP APM system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
https://my.f5.com/manage/s/article/K000132539
2023-04-14T23:08:02.602Z
2023-05-03T14:31:08.249Z
2023-05-03T14:31:08.249Z
{'Vendor': 'F5', 'Product': 'BIG-IP Edge Client', 'Versions': '7.2.2'}
CVE-2023-24932
Secure Boot Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932
2023-01-31T20:37:47.256Z
2023-05-09T17:03:07.282Z
2023-12-14T19:06:16.980Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24898
Windows SMB Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24898
2023-01-31T20:32:35.472Z
2023-05-09T17:02:50.556Z
2023-12-14T19:06:00.795Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'}
CVE-2023-24573
Dell Command | Monitor versions prior to 10.9 contain an arbitrary folder delete vulnerability during uninstallation. A locally authenticated malicious user may potentially exploit this vulnerability leading to arbitrary folder deletion.
https://www.dell.com/support/kbdoc/en-us/000207973/dsa-2023-033
2023-01-26T16:27:33.569Z
2023-02-10T12:30:41.698Z
2023-02-10T12:31:39.356Z
{'Vendor': 'Dell', 'Product': 'Dell Command Monitor (DCM)', 'Versions': '0'}
CVE-2023-24123
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24820
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. An attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset. Thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patch manually.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-vpx8-h94p-9vrj
2023-01-30T14:43:33.705Z
2023-04-24T14:59:43.562Z
2023-04-24T14:59:43.562Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'}
CVE-2023-24965
IBM Aspera Faspex 5.0.5 does not restrict or incorrectly restricts access to a resource from an unauthorized actor. IBM X-Force ID: 246713.
https://www.ibm.com/support/pages/node/7029681
2023-02-01T02:39:37.389Z
2023-09-08T20:14:46.513Z
2023-09-08T20:14:46.513Z
{'Vendor': 'IBM', 'Product': 'Aspera Faspex', 'Versions': '5.0.5'}
CVE-2023-24436
A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%281%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:26.270Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Builder Plugin', 'Versions': 'unspecified, next of 1.42.2'}
CVE-2023-24709
An issue found in Paradox Security Systems IPR512 allows attackers to cause a denial of service via the login.html and login.xml parameters.
https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512
2023-01-30T00:00:00
2023-03-21T00:00:00
2023-04-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24836
SUNNET CTMS has vulnerability of path traversal within its file uploading function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload and execute scripts onto arbitrary directories to perform arbitrary system operation or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7033-878ab-1.html
2023-01-31T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'SUNNET', 'Product': 'CTMS', 'Versions': '7.0 1227'}
CVE-2023-24135
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a command injection vulnerability in the function formWriteFacMac. This vulnerability allows attackers to execute arbitrary commands via manipulation of the mac parameter.
http://eagle.com
2023-01-23T00:00:00
2024-01-22T00:00:00
2024-01-22T21:00:58.503038
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24565
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted STL file. This vulnerability could allow an attacker to disclose sensitive information. (ZDI-CAN-19428)
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T16:20:20.792Z
2023-02-14T10:36:44.102Z
2023-03-14T09:31:32.753Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24070
app/View/AuthKeys/authkey_display.ctp in MISP through 2.4.167 has an XSS in authkey add via a Referer field.
https://github.com/MISP/MISP/commit/f7238fe5e71ac065daa43c8607d02f8ac682f18f
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-10-30T21:17:53.726637
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24420
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Zestard Technologies Admin side data storage for Contact Form 7 plugin <= 1.1.1 versions.
https://patchstack.com/database/vulnerability/admin-side-data-storage-for-contact-form-7/wordpress-admin-side-data-storage-for-contact-form-7-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:53.497Z
2023-06-15T13:32:09.022Z
2023-06-15T13:32:09.022Z
{'Vendor': 'Zestard Technologies', 'Product': 'Admin side data storage for Contact Form 7', 'Versions': 'n/a'}
CVE-2023-24532
The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh.
https://go.dev/issue/58647
2023-01-25T21:19:20.641Z
2023-03-08T19:40:45.425Z
2023-06-12T19:07:52.290Z
{'Vendor': 'Go standard library', 'Product': 'crypto/internal/nistec', 'Versions': '0, 1.20.0-0'}
CVE-2023-24498
An uspecified endpoint in the web server of the switch does not properly authenticate the user identity, and may allow downloading a config page with the password to the switch in clear text.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T00:00:00
2023-02-15T00:00:00
2023-02-15T00:00:00
{'Vendor': 'Netgear', 'Product': 'ProSAFE 24 Port 10/100 FS726TP', 'Versions': '.'}
CVE-2023-24162
Deserialization vulnerability in Dromara Hutool v5.8.11 allows attacker to execute arbitrary code via the XmlUtil.readObjectFromXml parameter.
https://github.com/dromara/hutool/issues/2855
2023-01-23T00:00:00
2023-01-31T00:00:00
2023-01-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24861
Windows Graphics Component Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24861
2023-01-31T20:32:35.463Z
2023-03-14T16:55:49.244Z
2023-12-14T18:31:44.655Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24924
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24924
2023-01-31T20:37:47.253Z
2023-04-11T19:13:27.201Z
2023-12-14T18:59:26.157Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24477
In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. Thus an authenticated local attacker may gain acces to the original user's session.
https://security.nozominetworks.com/NN-2023:8-01
2023-01-24T10:39:24.290Z
2023-08-09T07:50:56.736Z
2023-08-09T07:50:56.736Z
{'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'}
CVE-2023-24027
In MISP 2.4.167, app/webroot/js/action_table.js allows XSS via a network history name.
https://github.com/MISP/MISP/commit/72c5424034c378583d128fc1e769aae33fb1c8b9
2023-01-20T00:00:00
2023-01-20T00:00:00
2023-01-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24230
A stored cross-site scripting (XSS) vulnerability in the component /formwork/panel/dashboard of Formwork v1.12.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page title parameter.
https://medium.com/%400x2bit/formwork-1-12-1-stored-xss-vulnerability-at-page-title-b6efba27891a
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24549
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to stack-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.398Z
2023-02-14T10:36:25.778Z
2023-03-14T09:31:15.989Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24119
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the ssid parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24322
A reflected cross-site scripting (XSS) vulnerability in the FileDialog.aspx component of mojoPortal v2.7.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ed and tbi parameters.
https://www.mojoportal.com/
2023-01-23T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24908
Remote Procedure Call Runtime Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24908
2023-01-31T20:37:47.251Z
2023-03-14T16:55:54.345Z
2023-12-14T18:31:49.791Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24621
An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
https://github.com/EsotericSoftware
2023-01-30T00:00:00
2023-08-25T00:00:00
2023-08-25T19:49:52.308018
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24508
Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce. 
https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG
2023-01-24T19:44:01.622Z
2023-01-24T22:32:58.249Z
2023-01-25T18:32:36.297Z
{'Vendor': 'Baicells', 'Product': 'Nova 227', 'Versions': '0'}
CVE-2023-24676
An issue found in Processwire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module.
https://medium.com/%40cupc4k3/reverse-shell-via-remote-file-inlusion-in-proccesswire-cms-a8fa5ace3255
2023-01-30T00:00:00
2024-01-24T00:00:00
2024-01-24T20:12:01.742748
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24733
PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950_new.php.
https://github.com/AetherBlack/CVE/tree/main/PMB
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24949
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24949
2023-01-31T20:37:47.261Z
2023-05-09T17:02:59.701Z
2023-12-14T19:06:09.820Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24528
SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests) - version 600, allows an authenticated attacker to exploit a certain misconfigured application endpoint to view sensitive data. This endpoint is normally exposed over the network and successful exploitation can lead to exposure of data like travel documents.
https://launchpad.support.sap.com/#/notes/3290901
2023-01-25T15:46:55.581Z
2023-02-14T03:18:53.948Z
2023-04-11T21:25:07.475Z
{'Vendor': 'SAP', 'Product': 'Fiori apps 1.0 for travel management in SAP ERP (My Travel Requests)', 'Versions': '600'}
CVE-2023-24482
A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition.
https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf
2023-01-24T13:52:15.873Z
2023-02-14T10:36:24.707Z
2023-02-15T09:24:59.994Z
{'Vendor': 'Siemens', 'Product': 'COMOS V10.2', 'Versions': 'All versions'}
CVE-2023-24197
Online Food Ordering System v2 was discovered to contain a SQL injection vulnerability via the id parameter at view_order.php.
https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24744
Cross Site Scripting (XSS) vulnerability in Rediker Software AdminPlus 6.1.91.00 allows remote attackers to run arbitrary code via the onload function within the application DOM.
https://github.com/HeidiSecurities/CVEs/blob/main/CVE-2023-24744/Rediker%20-%20XSS%20%28Reflected%20&%20DOM-based%29.md
2023-01-30T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24251
WangEditor v5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /dist/index.js.
https://github.com/Cutegod/CMS_0_day/issues/2
2023-01-23T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24601
OX App Suite before frontend 7.10.6-rev24 allows XSS via a non-app deeplink such as the jslob API's registry sub-tree.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24986
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19808)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.543Z
2023-02-14T10:36:56.309Z
2023-03-14T09:31:44.133Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24590
A format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service. This issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
https://security.gallagher.com/Security-Advisories/CVE-2023-24590
2023-02-03T20:38:05.209Z
2023-12-18T22:00:17.083Z
2023-12-18T22:00:17.083Z
{'Vendor': 'Gallagher', 'Product': 'Controller 6000', 'Versions': '0, 8.60'}
CVE-2023-24343
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSchedule.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24656
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the subject parameter under the Create Ticket function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24206
Davinci v0.3.0-rc was discovered to contain a SQL injection vulnerability via the copyDisplay function.
https://github.com/edp963/davinci/issues/2320
2023-01-23T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24093
An access control issue in H3C A210-G A210-GV100R005 allows attackers to authenticate without a password.
https://blog.luckytain.com/?p=66
2023-01-23T00:00:00
2023-02-22T00:00:00
2023-02-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24569
Dell Alienware Command Center versions 5.5.37.0 and prior contain an Improper Input validation vulnerability. A local authenticated malicious user could potentially send malicious input to a named pipe in order to elevate privileges on the system.
https://www.dell.com/support/kbdoc/en-us/000208327/dsa-2023-044
2023-01-26T16:27:33.568Z
2023-02-10T12:57:07.328Z
null
{'Vendor': 'Dell', 'Product': 'Alienware Command Center (AWCC)', 'Versions': '0'}
CVE-2023-24139
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagHost parameter in the setNetworkDiag function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagHost/setNetworkDiag_NetDiagHost.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24990
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19812)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.544Z
2023-02-14T10:37:00.759Z
2023-03-14T09:31:48.151Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24586
Cleartext storage of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote authenticated attacker to obtain an APN credential for the product.
https://www.seiko-sol.co.jp/archives/73969/
2023-03-15T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A100/110', 'Versions': 'firmware Ver. 4.2.0 and earlier'}
CVE-2023-24494
A stored cross-site scripting (XSS) vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated, remote attacker can exploit this by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.
https://www.tenable.com/security/tns-2023-03
2023-01-24T00:00:00
2023-01-25T00:00:00
2023-01-25T00:00:00
{'Vendor': 'n/a', 'Product': 'Tenable.sc', 'Versions': 'Tenable.sc versions 5.23.1 and earlier'}
CVE-2023-24181
LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /openvpn/pageswitch.htm.
https://github.com/openwrt/luci/commit/25983b9fa572a640a7ecd077378df2790266cd61
2023-01-23T00:00:00
2023-04-10T00:00:00
2023-04-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24928
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24928
2023-01-31T20:37:47.256Z
2023-04-11T19:13:31.533Z
2023-12-14T18:59:30.306Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24882
Microsoft OneDrive for Android Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24882
2023-01-31T20:32:35.465Z
2023-03-14T16:55:33.803Z
2023-12-14T18:31:29.092Z
{'Vendor': 'Microsoft', 'Product': 'OneDrive for Android', 'Versions': '1.0'}
CVE-2023-24752
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
https://github.com/strukturag/libde265/issues/378
2023-01-30T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24050
Cross Site Scripting (XSS) vulnerability in Connectize AC21000 G6 641.139.1.1256 allows attackers to run arbitrary code via crafted string when setting the Wi-Fi password in the admin panel.
https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
2023-01-21T00:00:00
2023-12-04T00:00:00
2023-12-04T22:56:20.608818
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24400
Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Hu-manity.Co Cookie Notice & Compliance for GDPR / CCPA plugin <= 2.4.6 versions.
https://patchstack.com/database/vulnerability/cookie-notice/wordpress-cookie-notice-compliance-for-gdpr-ccpa-plugin-2-4-6-cross-site-scripting-xss-vulnerability
2023-01-23T18:16:50.470Z
2023-05-06T23:03:02.318Z
2023-05-06T23:03:02.318Z
{'Vendor': 'Hu-manity.co', 'Product': 'Cookie Notice & Compliance for GDPR / CCPA', 'Versions': 'n/a'}
CVE-2023-24953
Microsoft Excel Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24953
2023-01-31T20:37:47.262Z
2023-05-09T17:03:00.788Z
2023-12-14T19:06:10.820Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'}
CVE-2023-24816
IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Versions prior to 8.1.0 are subject to a command injection vulnerability with very specific prerequisites. This vulnerability requires that the function `IPython.utils.terminal.set_term_title` be called on Windows in a Python environment where ctypes is not available. The dependency on `ctypes` in `IPython.utils._process_win32` prevents the vulnerable code from ever being reached in the ipython binary. However, as a library that could be used by another tool `set_term_title` could be called and hence introduce a vulnerability. Should an attacker get untrusted input to an instance of this function they would be able to inject shell commands as current process and limited to the scope of the current process. Users of ipython as a library are advised to upgrade. Users unable to upgrade should ensure that any calls to the `IPython.utils.terminal.set_term_title` function are done with trusted or filtered input.
https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7
2023-01-30T14:43:33.704Z
2023-02-10T19:52:56.195Z
null
{'Vendor': 'ipython', 'Product': 'ipython', 'Versions': '< 8.10'}
CVE-2023-24545
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085
2023-01-26T00:00:00
2023-04-12T00:00:00
2023-04-12T00:00:00
{'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.29.0, 4.28.0, 4.27.0, 4.26.8M'}
CVE-2023-24396
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <= 1.5.11 versions.
https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-plugin-1-5-11-cross-site-scripting-xss?_s_id=cve
2023-01-23T18:16:50.470Z
2023-04-06T13:14:37.112Z
2023-04-06T13:14:37.112Z
{'Vendor': 'E4J s.r.l.', 'Product': 'VikBooking Hotel Booking Engine & PMS', 'Versions': 'n/a'}
CVE-2023-24729
Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the address parameter in the user profile update function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24904
Windows Installer Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904
2023-01-31T20:32:35.473Z
2023-05-09T17:03:08.848Z
2023-12-14T19:06:18.518Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2008 Service Pack 2', 'Versions': '6.0.0'}
CVE-2023-24457
A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2986
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:50.547Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Keycloak Authentication Plugin', 'Versions': 'unspecified, next of 2.3.0'}
CVE-2023-24007
Cross-Site Request Forgery (CSRF) vulnerability in TheOnlineHero - Tom Skroza Admin Block Country plugin <= 7.1.4 versions.
https://patchstack.com/database/vulnerability/admin-block-country/wordpress-admin-block-country-plugin-7-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-20T09:29:08.377Z
2023-05-26T11:57:26.419Z
2023-05-26T11:57:26.419Z
{'Vendor': 'TheOnlineHero - Tom Skroza', 'Product': 'Admin Block Country', 'Versions': 'n/a'}
CVE-2023-24512
On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision
https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086
2023-01-24T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'Arista Networks', 'Product': 'Terminattr', 'Versions': '1.23.0, unspecified, 1.24.0, 1.22.0'}
CVE-2023-24142
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingSize parameter in the setNetworkDiag function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagPingSize/setNetworkDiag_NetDiagPingSize.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24841
HGiga MailSherlock query function for connection log has a vulnerability of insufficient filtering for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service.
https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-sysinfo-4.5'}
CVE-2023-24441
Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2292
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:31.937Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins MSTest Plugin', 'Versions': 'unspecified, next of 1.0.0'}
CVE-2023-24912
Windows Graphics Component Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24912
2023-01-31T20:37:47.252Z
2023-04-11T19:13:26.672Z
2023-12-14T18:59:25.627Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24857
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24857
2023-01-31T20:32:35.462Z
2023-03-14T16:55:47.752Z
2023-12-14T18:31:43.179Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24154
TOTOLINK T8 V4.1.5cu was discovered to contain a command injection vulnerability via the slaveIpList parameter in the function setUpgradeFW.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/setUpgradeFW/setUpgradeFW.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24504
Electra Central AC unit – Adjacent attacker may cause the unit to connect to unauthorized update server.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Electra', 'Product': 'Central AC unit', 'Versions': 'Update to the latest version'}
CVE-2023-24787
null
null
2023-01-30T00:00:00
null
2023-04-07T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-24945
Windows iSCSI Target Service Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24945
2023-01-31T20:37:47.258Z
2023-05-09T17:02:57.594Z
2023-12-14T19:06:07.833Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24046
An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to run arbitrary commands via use of a crafted string in the ping utility.
https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
2023-01-21T00:00:00
2023-12-04T00:00:00
2023-12-04T22:30:12.324777
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24553
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.399Z
2023-02-14T10:36:30.258Z
2023-03-14T09:31:20.298Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24800
D-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_495220 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://www.dlink.com/en/security-bulletin/
2023-01-30T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24380
Cross-Site Request Forgery (CSRF) vulnerability in Webbjocke Simple Wp Sitemap.This issue affects Simple Wp Sitemap: from n/a through 1.2.1.
https://patchstack.com/database/vulnerability/simple-wp-sitemap/wordpress-simple-wp-sitemap-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-23T18:16:47.036Z
2023-12-17T09:46:40.091Z
2023-12-17T09:46:40.091Z
{'Vendor': 'Webbjocke', 'Product': 'Simple Wp Sitemap', 'Versions': 'n/a'}
CVE-2023-24381
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NsThemes Advanced Social Pixel plugin <= 2.1.1 versions.
https://patchstack.com/database/vulnerability/ns-facebook-pixel-for-wp/wordpress-advanced-social-pixel-plugin-2-1-1-cross-site-scripting-xss?_s_id=cve
2023-01-23T18:16:47.036Z
2023-03-20T10:47:05.280Z
2023-03-20T10:47:05.280Z
{'Vendor': 'NsThemes', 'Product': 'Advanced Social Pixel', 'Versions': 'n/a'}
CVE-2023-24944
Windows Bluetooth Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24944
2023-01-31T20:37:47.258Z
2023-05-09T17:02:57.060Z
2023-12-14T19:06:07.320Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24417
Cross-Site Request Forgery (CSRF) vulnerability in tiggersWelt.Net Worthy plugin <= 1.6.5-6497609 versions.
https://patchstack.com/database/vulnerability/wp-worthy/wordpress-worthy-vg-wort-integration-fuer-wordpress-plugin-1-6-5-6497609-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-23T18:16:53.496Z
2023-07-11T12:38:29.231Z
2023-07-11T12:38:29.231Z
{'Vendor': 'tiggersWelt.net', 'Product': 'Worthy', 'Versions': 'n/a'}
CVE-2023-24047
An Insecure Credential Management issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges via use of weak hashing algorithm.
https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
2023-01-21T00:00:00
2023-12-04T00:00:00
2023-12-04T22:36:14.461221
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24552
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.399Z
2023-02-14T10:36:29.146Z
2023-03-14T09:31:19.249Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24769
Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the "Add a new change detection watch" function.
https://github.com/dgtlmoon/changedetection.io/issues/1358
2023-01-30T00:00:00
2023-02-17T00:00:00
2023-03-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24440
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2774
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:30.798Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'}
CVE-2023-24913
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24913
2023-01-31T20:37:47.252Z
2023-03-14T16:55:58.427Z
2023-12-14T18:31:53.761Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24856
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24856
2023-01-31T20:32:35.462Z
2023-03-14T16:55:30.201Z
2023-12-14T18:31:25.653Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24155
TOTOLINK T8 V4.1.5cu was discovered to contain a hard code password for the telnet service which is stored in the component /web_cste/cgi-bin/product.ini.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/telnet_login/telnet_login.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24505
Milesight NCR/camera version 71.8.0.6-r5 discloses sensitive information through an unspecified request.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T19:41:19.106Z
2023-05-08T00:00:00
2023-05-17T21:25:09.039Z
{'Vendor': 'Milesight ', 'Product': 'NCR/Camera', 'Versions': 'All versions'}
CVE-2023-24905
Remote Desktop Client Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24905
2023-01-31T20:32:35.473Z
2023-05-09T17:02:56.519Z
2023-12-14T19:06:06.803Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 20H2', 'Versions': '10.0.0'}
CVE-2023-24456
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2987
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:49.403Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Keycloak Authentication Plugin', 'Versions': 'unspecified, next of 2.3.0'}
CVE-2023-24006
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Link Software LLC WP Terms Popup plugin <= 2.6.0 versions.
https://patchstack.com/database/vulnerability/wp-terms-popup/wordpress-wp-terms-popup-terms-and-conditions-and-privacy-policy-wordpress-popups-plugin-2-6-0-cross-site-scripting-xss?_s_id=cve
2023-01-20T09:29:08.377Z
2023-04-06T07:55:06.247Z
2023-04-06T07:55:06.247Z
{'Vendor': 'Link Software LLC', 'Product': 'WP Terms Popup', 'Versions': 'n/a'}
CVE-2023-24513
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085
2023-01-24T00:00:00
2023-04-12T00:00:00
2023-04-12T00:00:00
{'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.29.0, 4.28.0, 4.27.0, 4.26.0'}
CVE-2023-24143
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagTracertHop parameter in the setNetworkDiag function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagTracertHop/setNetworkDiag_NetDiagTracertHop.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24840
HGiga MailSherlock mail query function has vulnerability of insufficient validation for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject SQL commands to read, modify, and delete the database.
https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-query-4.5'}
CVE-2023-24397
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Reservation.Studio Reservation.Studio widget plugin <= 1.0.11 versions.
https://patchstack.com/database/vulnerability/reservation-studio-widget/wordpress-reservation-studio-widget-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:50.470Z
2023-08-30T15:41:24.552Z
2023-08-30T15:41:24.552Z
{'Vendor': 'Reservation.Studio', 'Product': 'Reservation.Studio widget', 'Versions': 'n/a'}
CVE-2023-24728
Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the contact parameter in the user profile update function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24378
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Codeat Glossary plugin <= 2.1.27 versions.
https://patchstack.com/database/vulnerability/glossary-by-codeat/wordpress-glossary-plugin-2-1-27-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:47.036Z
2023-04-06T13:48:16.650Z
2023-04-06T13:48:16.650Z
{'Vendor': 'Codeat', 'Product': 'Glossary', 'Versions': 'n/a'}
CVE-2023-24051
A client side rate limit issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges via brute force style attacks.
https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/
2023-01-21T00:00:00
2023-12-04T00:00:00
2023-12-04T23:03:48.835828
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24401
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Davidsword Mobile Call Now & Map Buttons plugin <= 1.5.0 versions.
https://patchstack.com/database/vulnerability/mobile-call-now-map-buttons/wordpress-mobile-call-now-map-buttons-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:50.471Z
2023-08-30T15:48:55.192Z
2023-08-30T15:48:55.192Z
{'Vendor': 'Davidsword', 'Product': 'Mobile Call Now & Map Buttons', 'Versions': 'n/a'}
CVE-2023-24817
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device resulting in an integer underflow and out of bounds access in the packet buffer. Triggering the access at the right time will corrupt other packets or the allocator metadata. Corrupting a pointer will lead to denial of service. This issue is fixed in version 2023.04. As a workaround, disable SRH in the network stack.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xjgw-7638-29g5
2023-01-30T14:43:33.704Z
2023-05-30T15:50:54.247Z
2023-05-30T15:50:54.247Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2023.04'}