CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-24031 | An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 8.8.15. XSS can occur, via one of attributes of the webmail /h/ endpoint, to execute arbitrary JavaScript code, leading to information disclosure. | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | 2023-01-20T00:00:00 | 2023-06-15T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24461 |
An improper certificate validation vulnerability exists in the BIG-IP Edge Client for Windows and macOS and may allow an attacker to impersonate a BIG-IP APM system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | https://my.f5.com/manage/s/article/K000132539 | 2023-04-14T23:08:02.602Z | 2023-05-03T14:31:08.249Z | 2023-05-03T14:31:08.249Z | {'Vendor': 'F5', 'Product': 'BIG-IP Edge Client', 'Versions': '7.2.2'} |
CVE-2023-24932 | Secure Boot Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932 | 2023-01-31T20:37:47.256Z | 2023-05-09T17:03:07.282Z | 2023-12-14T19:06:16.980Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24898 | Windows SMB Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24898 | 2023-01-31T20:32:35.472Z | 2023-05-09T17:02:50.556Z | 2023-12-14T19:06:00.795Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'} |
CVE-2023-24573 |
Dell Command | Monitor versions prior to 10.9 contain an arbitrary folder delete vulnerability during uninstallation. A locally authenticated malicious user may potentially exploit this vulnerability leading to arbitrary folder deletion.
| https://www.dell.com/support/kbdoc/en-us/000207973/dsa-2023-033 | 2023-01-26T16:27:33.569Z | 2023-02-10T12:30:41.698Z | 2023-02-10T12:31:39.356Z | {'Vendor': 'Dell', 'Product': 'Dell Command Monitor (DCM)', 'Versions': '0'} |
CVE-2023-24123 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24820 | RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. An attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset. Thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, apply the patch manually. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-vpx8-h94p-9vrj | 2023-01-30T14:43:33.705Z | 2023-04-24T14:59:43.562Z | 2023-04-24T14:59:43.562Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'} |
CVE-2023-24965 | IBM Aspera Faspex 5.0.5 does not restrict or incorrectly restricts access to a resource from an unauthorized actor. IBM X-Force ID: 246713. | https://www.ibm.com/support/pages/node/7029681 | 2023-02-01T02:39:37.389Z | 2023-09-08T20:14:46.513Z | 2023-09-08T20:14:46.513Z | {'Vendor': 'IBM', 'Product': 'Aspera Faspex', 'Versions': '5.0.5'} |
CVE-2023-24436 | A missing permission check in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%281%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:26.270Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins GitHub Pull Request Builder Plugin', 'Versions': 'unspecified, next of 1.42.2'} |
CVE-2023-24709 | An issue found in Paradox Security Systems IPR512 allows attackers to cause a denial of service via the login.html and login.xml parameters. | https://github.com/sunktitanic/Injection-vulnerability-in-Paradox-Security-Systems-IPR512 | 2023-01-30T00:00:00 | 2023-03-21T00:00:00 | 2023-04-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24836 | SUNNET CTMS has vulnerability of path traversal within its file uploading function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload and execute scripts onto arbitrary directories to perform arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7033-878ab-1.html | 2023-01-31T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'SUNNET', 'Product': 'CTMS', 'Versions': '7.0 1227'} |
CVE-2023-24135 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a command injection vulnerability in the function formWriteFacMac. This vulnerability allows attackers to execute arbitrary commands via manipulation of the mac parameter. | http://eagle.com | 2023-01-23T00:00:00 | 2024-01-22T00:00:00 | 2024-01-22T21:00:58.503038 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24565 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted STL file. This vulnerability could allow an attacker to disclose sensitive information. (ZDI-CAN-19428) | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T16:20:20.792Z | 2023-02-14T10:36:44.102Z | 2023-03-14T09:31:32.753Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24070 | app/View/AuthKeys/authkey_display.ctp in MISP through 2.4.167 has an XSS in authkey add via a Referer field. | https://github.com/MISP/MISP/commit/f7238fe5e71ac065daa43c8607d02f8ac682f18f | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-10-30T21:17:53.726637 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24420 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Zestard Technologies Admin side data storage for Contact Form 7 plugin <= 1.1.1 versions. | https://patchstack.com/database/vulnerability/admin-side-data-storage-for-contact-form-7/wordpress-admin-side-data-storage-for-contact-form-7-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:53.497Z | 2023-06-15T13:32:09.022Z | 2023-06-15T13:32:09.022Z | {'Vendor': 'Zestard Technologies', 'Product': 'Admin side data storage for Contact Form 7', 'Versions': 'n/a'} |
CVE-2023-24532 | The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh. | https://go.dev/issue/58647 | 2023-01-25T21:19:20.641Z | 2023-03-08T19:40:45.425Z | 2023-06-12T19:07:52.290Z | {'Vendor': 'Go standard library', 'Product': 'crypto/internal/nistec', 'Versions': '0, 1.20.0-0'} |
CVE-2023-24498 | An uspecified endpoint in the web server of the switch does not properly authenticate the user identity, and may allow downloading a config page with the password to the switch in clear text. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T00:00:00 | 2023-02-15T00:00:00 | 2023-02-15T00:00:00 | {'Vendor': 'Netgear', 'Product': 'ProSAFE 24 Port 10/100 FS726TP', 'Versions': '.'} |
CVE-2023-24162 | Deserialization vulnerability in Dromara Hutool v5.8.11 allows attacker to execute arbitrary code via the XmlUtil.readObjectFromXml parameter. | https://github.com/dromara/hutool/issues/2855 | 2023-01-23T00:00:00 | 2023-01-31T00:00:00 | 2023-01-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24861 | Windows Graphics Component Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24861 | 2023-01-31T20:32:35.463Z | 2023-03-14T16:55:49.244Z | 2023-12-14T18:31:44.655Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24924 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24924 | 2023-01-31T20:37:47.253Z | 2023-04-11T19:13:27.201Z | 2023-12-14T18:59:26.157Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24477 | In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. Thus an authenticated local attacker may gain acces to the original user's session.
| https://security.nozominetworks.com/NN-2023:8-01 | 2023-01-24T10:39:24.290Z | 2023-08-09T07:50:56.736Z | 2023-08-09T07:50:56.736Z | {'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'} |
CVE-2023-24027 | In MISP 2.4.167, app/webroot/js/action_table.js allows XSS via a network history name. | https://github.com/MISP/MISP/commit/72c5424034c378583d128fc1e769aae33fb1c8b9 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24230 | A stored cross-site scripting (XSS) vulnerability in the component /formwork/panel/dashboard of Formwork v1.12.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page title parameter. | https://medium.com/%400x2bit/formwork-1-12-1-stored-xss-vulnerability-at-page-title-b6efba27891a | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24549 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to stack-based buffer while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.398Z | 2023-02-14T10:36:25.778Z | 2023-03-14T09:31:15.989Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24119 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the ssid parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24322 | A reflected cross-site scripting (XSS) vulnerability in the FileDialog.aspx component of mojoPortal v2.7.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ed and tbi parameters. | https://www.mojoportal.com/ | 2023-01-23T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24908 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24908 | 2023-01-31T20:37:47.251Z | 2023-03-14T16:55:54.345Z | 2023-12-14T18:31:49.791Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24621 | An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed. | https://github.com/EsotericSoftware | 2023-01-30T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T19:49:52.308018 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24508 | Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.
| https://img.baicells.com//Upload/20230118/FILE/BaiBS_RTS_3.7.11.6.IMG.IMG | 2023-01-24T19:44:01.622Z | 2023-01-24T22:32:58.249Z | 2023-01-25T18:32:36.297Z | {'Vendor': 'Baicells', 'Product': 'Nova 227', 'Versions': '0'} |
CVE-2023-24676 | An issue found in Processwire 3.0.210 allows attackers to execute arbitrary code and install a reverse shell via the download_zip_url parameter when installing a new module. | https://medium.com/%40cupc4k3/reverse-shell-via-remote-file-inlusion-in-proccesswire-cms-a8fa5ace3255 | 2023-01-30T00:00:00 | 2024-01-24T00:00:00 | 2024-01-24T20:12:01.742748 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24733 | PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950_new.php. | https://github.com/AetherBlack/CVE/tree/main/PMB | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24949 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24949 | 2023-01-31T20:37:47.261Z | 2023-05-09T17:02:59.701Z | 2023-12-14T19:06:09.820Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24528 | SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests) - version 600, allows an authenticated attacker to exploit a certain misconfigured application endpoint to view sensitive data. This endpoint is normally exposed over the network and successful exploitation can lead to exposure of data like travel documents.
| https://launchpad.support.sap.com/#/notes/3290901 | 2023-01-25T15:46:55.581Z | 2023-02-14T03:18:53.948Z | 2023-04-11T21:25:07.475Z | {'Vendor': 'SAP', 'Product': 'Fiori apps 1.0 for travel management in SAP ERP (My Travel Requests)', 'Versions': '600'} |
CVE-2023-24482 | A vulnerability has been identified in COMOS V10.2 (All versions), COMOS V10.3.3.1 (All versions < V10.3.3.1.45), COMOS V10.3.3.2 (All versions < V10.3.3.2.33), COMOS V10.3.3.3 (All versions < V10.3.3.3.9), COMOS V10.3.3.4 (All versions < V10.3.3.4.6), COMOS V10.4.0.0 (All versions < V10.4.0.0.31), COMOS V10.4.1.0 (All versions < V10.4.1.0.32), COMOS V10.4.2.0 (All versions < V10.4.2.0.25). Cache validation service in COMOS is vulnerable to Structured Exception Handler (SEH) based buffer overflow. This could allow an attacker to execute arbitrary code on the target system or cause denial of service condition. | https://cert-portal.siemens.com/productcert/pdf/ssa-693110.pdf | 2023-01-24T13:52:15.873Z | 2023-02-14T10:36:24.707Z | 2023-02-15T09:24:59.994Z | {'Vendor': 'Siemens', 'Product': 'COMOS V10.2', 'Versions': 'All versions'} |
CVE-2023-24197 | Online Food Ordering System v2 was discovered to contain a SQL injection vulnerability via the id parameter at view_order.php. | https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24744 | Cross Site Scripting (XSS) vulnerability in Rediker Software AdminPlus 6.1.91.00 allows remote attackers to run arbitrary code via the onload function within the application DOM. | https://github.com/HeidiSecurities/CVEs/blob/main/CVE-2023-24744/Rediker%20-%20XSS%20%28Reflected%20&%20DOM-based%29.md | 2023-01-30T00:00:00 | 2023-05-03T00:00:00 | 2023-05-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24251 | WangEditor v5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /dist/index.js. | https://github.com/Cutegod/CMS_0_day/issues/2 | 2023-01-23T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24601 | OX App Suite before frontend 7.10.6-rev24 allows XSS via a non-app deeplink such as the jslob API's registry sub-tree. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24986 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19808) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.543Z | 2023-02-14T10:36:56.309Z | 2023-03-14T09:31:44.133Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24590 |
A format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.
This issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
| https://security.gallagher.com/Security-Advisories/CVE-2023-24590 | 2023-02-03T20:38:05.209Z | 2023-12-18T22:00:17.083Z | 2023-12-18T22:00:17.083Z | {'Vendor': 'Gallagher', 'Product': 'Controller 6000', 'Versions': '0, 8.60'} |
CVE-2023-24343 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSchedule. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24656 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the subject parameter under the Create Ticket function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24206 | Davinci v0.3.0-rc was discovered to contain a SQL injection vulnerability via the copyDisplay function. | https://github.com/edp963/davinci/issues/2320 | 2023-01-23T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24093 | An access control issue in H3C A210-G A210-GV100R005 allows attackers to authenticate without a password. | https://blog.luckytain.com/?p=66 | 2023-01-23T00:00:00 | 2023-02-22T00:00:00 | 2023-02-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24569 |
Dell Alienware Command Center versions 5.5.37.0 and prior contain an Improper Input validation vulnerability. A local authenticated malicious user could potentially send malicious input to a named pipe in order to elevate privileges on the system.
| https://www.dell.com/support/kbdoc/en-us/000208327/dsa-2023-044 | 2023-01-26T16:27:33.568Z | 2023-02-10T12:57:07.328Z | null | {'Vendor': 'Dell', 'Product': 'Alienware Command Center (AWCC)', 'Versions': '0'} |
CVE-2023-24139 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagHost parameter in the setNetworkDiag function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagHost/setNetworkDiag_NetDiagHost.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24990 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19812) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.544Z | 2023-02-14T10:37:00.759Z | 2023-03-14T09:31:48.151Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24586 | Cleartext storage of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote authenticated attacker to obtain an APN credential for the product. | https://www.seiko-sol.co.jp/archives/73969/ | 2023-03-15T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A100/110', 'Versions': 'firmware Ver. 4.2.0 and earlier'} |
CVE-2023-24494 | A stored cross-site scripting (XSS) vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated, remote attacker can exploit this by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session. | https://www.tenable.com/security/tns-2023-03 | 2023-01-24T00:00:00 | 2023-01-25T00:00:00 | 2023-01-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'Tenable.sc', 'Versions': 'Tenable.sc versions 5.23.1 and earlier'} |
CVE-2023-24181 | LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /openvpn/pageswitch.htm. | https://github.com/openwrt/luci/commit/25983b9fa572a640a7ecd077378df2790266cd61 | 2023-01-23T00:00:00 | 2023-04-10T00:00:00 | 2023-04-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24928 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24928 | 2023-01-31T20:37:47.256Z | 2023-04-11T19:13:31.533Z | 2023-12-14T18:59:30.306Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24882 | Microsoft OneDrive for Android Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24882 | 2023-01-31T20:32:35.465Z | 2023-03-14T16:55:33.803Z | 2023-12-14T18:31:29.092Z | {'Vendor': 'Microsoft', 'Product': 'OneDrive for Android', 'Versions': '1.0'} |
CVE-2023-24752 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_hevc_epel_pixels_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | https://github.com/strukturag/libde265/issues/378 | 2023-01-30T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24050 | Cross Site Scripting (XSS) vulnerability in Connectize AC21000 G6 641.139.1.1256 allows attackers to run arbitrary code via crafted string when setting the Wi-Fi password in the admin panel. | https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ | 2023-01-21T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T22:56:20.608818 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24400 | Auth. (contributor+) Cross-Site Scripting (XSS) vulnerability in Hu-manity.Co Cookie Notice & Compliance for GDPR / CCPA plugin <= 2.4.6 versions. | https://patchstack.com/database/vulnerability/cookie-notice/wordpress-cookie-notice-compliance-for-gdpr-ccpa-plugin-2-4-6-cross-site-scripting-xss-vulnerability | 2023-01-23T18:16:50.470Z | 2023-05-06T23:03:02.318Z | 2023-05-06T23:03:02.318Z | {'Vendor': 'Hu-manity.co', 'Product': 'Cookie Notice & Compliance for GDPR / CCPA', 'Versions': 'n/a'} |
CVE-2023-24953 | Microsoft Excel Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24953 | 2023-01-31T20:37:47.262Z | 2023-05-09T17:03:00.788Z | 2023-12-14T19:06:10.820Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'} |
CVE-2023-24816 | IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Versions prior to 8.1.0 are subject to a command injection vulnerability with very specific prerequisites. This vulnerability requires that the function `IPython.utils.terminal.set_term_title` be called on Windows in a Python environment where ctypes is not available. The dependency on `ctypes` in `IPython.utils._process_win32` prevents the vulnerable code from ever being reached in the ipython binary. However, as a library that could be used by another tool `set_term_title` could be called and hence introduce a vulnerability. Should an attacker get untrusted input to an instance of this function they would be able to inject shell commands as current process and limited to the scope of the current process. Users of ipython as a library are advised to upgrade. Users unable to upgrade should ensure that any calls to the `IPython.utils.terminal.set_term_title` function are done with trusted or filtered input. | https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7 | 2023-01-30T14:43:33.704Z | 2023-02-10T19:52:56.195Z | null | {'Vendor': 'ipython', 'Product': 'ipython', 'Versions': '< 8.10'} |
CVE-2023-24545 | On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic. | https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085 | 2023-01-26T00:00:00 | 2023-04-12T00:00:00 | 2023-04-12T00:00:00 | {'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.29.0, 4.28.0, 4.27.0, 4.26.8M'} |
CVE-2023-24396 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <= 1.5.11 versions. | https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-plugin-1-5-11-cross-site-scripting-xss?_s_id=cve | 2023-01-23T18:16:50.470Z | 2023-04-06T13:14:37.112Z | 2023-04-06T13:14:37.112Z | {'Vendor': 'E4J s.r.l.', 'Product': 'VikBooking Hotel Booking Engine & PMS', 'Versions': 'n/a'} |
CVE-2023-24729 | Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the address parameter in the user profile update function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24904 | Windows Installer Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904 | 2023-01-31T20:32:35.473Z | 2023-05-09T17:03:08.848Z | 2023-12-14T19:06:18.518Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2008 Service Pack 2', 'Versions': '6.0.0'} |
CVE-2023-24457 | A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2986 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:50.547Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Keycloak Authentication Plugin', 'Versions': 'unspecified, next of 2.3.0'} |
CVE-2023-24007 | Cross-Site Request Forgery (CSRF) vulnerability in TheOnlineHero - Tom Skroza Admin Block Country plugin <= 7.1.4 versions. | https://patchstack.com/database/vulnerability/admin-block-country/wordpress-admin-block-country-plugin-7-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-05-26T11:57:26.419Z | 2023-05-26T11:57:26.419Z | {'Vendor': 'TheOnlineHero - Tom Skroza', 'Product': 'Admin Block Country', 'Versions': 'n/a'} |
CVE-2023-24512 | On affected platforms running Arista EOS, an authorized attacker with permissions to perform gNMI requests could craft a request allowing it to update arbitrary configurations in the switch. This situation occurs only when the Streaming Telemetry Agent (referred to as the TerminAttr agent) is enabled and gNMI access is configured on the agent. Note: This gNMI over the Streaming Telemetry Agent scenario is mostly commonly used when streaming to a 3rd party system and is not used by default when streaming to CloudVision | https://www.arista.com/en/support/advisories-notices/security-advisory/17250-security-advisory-0086 | 2023-01-24T00:00:00 | 2023-04-25T00:00:00 | 2023-04-25T00:00:00 | {'Vendor': 'Arista Networks', 'Product': 'Terminattr', 'Versions': '1.23.0, unspecified, 1.24.0, 1.22.0'} |
CVE-2023-24142 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingSize parameter in the setNetworkDiag function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagPingSize/setNetworkDiag_NetDiagPingSize.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24841 | HGiga MailSherlock query function for connection log has a vulnerability of insufficient filtering for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-6960-fc2fe-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-sysinfo-4.5'} |
CVE-2023-24441 | Jenkins MSTest Plugin 1.0.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2292 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:31.937Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins MSTest Plugin', 'Versions': 'unspecified, next of 1.0.0'} |
CVE-2023-24912 | Windows Graphics Component Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24912 | 2023-01-31T20:37:47.252Z | 2023-04-11T19:13:26.672Z | 2023-12-14T18:59:25.627Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24857 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24857 | 2023-01-31T20:32:35.462Z | 2023-03-14T16:55:47.752Z | 2023-12-14T18:31:43.179Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24154 | TOTOLINK T8 V4.1.5cu was discovered to contain a command injection vulnerability via the slaveIpList parameter in the function setUpgradeFW. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/setUpgradeFW/setUpgradeFW.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24504 | Electra Central AC unit – Adjacent attacker may cause the unit to connect to unauthorized update server. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Electra', 'Product': 'Central AC unit', 'Versions': 'Update to the latest version'} |
CVE-2023-24787 | null | null | 2023-01-30T00:00:00 | null | 2023-04-07T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-24945 | Windows iSCSI Target Service Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24945 | 2023-01-31T20:37:47.258Z | 2023-05-09T17:02:57.594Z | 2023-12-14T19:06:07.833Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24046 | An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to run arbitrary commands via use of a crafted string in the ping utility. | https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ | 2023-01-21T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T22:30:12.324777 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24553 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.399Z | 2023-02-14T10:36:30.258Z | 2023-03-14T09:31:20.298Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24800 | D-Link DIR878 DIR_878_FW120B05 was discovered to contain a stack overflow in the sub_495220 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://www.dlink.com/en/security-bulletin/ | 2023-01-30T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24380 | Cross-Site Request Forgery (CSRF) vulnerability in Webbjocke Simple Wp Sitemap.This issue affects Simple Wp Sitemap: from n/a through 1.2.1.
| https://patchstack.com/database/vulnerability/simple-wp-sitemap/wordpress-simple-wp-sitemap-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-23T18:16:47.036Z | 2023-12-17T09:46:40.091Z | 2023-12-17T09:46:40.091Z | {'Vendor': 'Webbjocke', 'Product': 'Simple Wp Sitemap', 'Versions': 'n/a'} |
CVE-2023-24381 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NsThemes Advanced Social Pixel plugin <= 2.1.1 versions. | https://patchstack.com/database/vulnerability/ns-facebook-pixel-for-wp/wordpress-advanced-social-pixel-plugin-2-1-1-cross-site-scripting-xss?_s_id=cve | 2023-01-23T18:16:47.036Z | 2023-03-20T10:47:05.280Z | 2023-03-20T10:47:05.280Z | {'Vendor': 'NsThemes', 'Product': 'Advanced Social Pixel', 'Versions': 'n/a'} |
CVE-2023-24944 | Windows Bluetooth Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24944 | 2023-01-31T20:37:47.258Z | 2023-05-09T17:02:57.060Z | 2023-12-14T19:06:07.320Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24417 | Cross-Site Request Forgery (CSRF) vulnerability in tiggersWelt.Net Worthy plugin <= 1.6.5-6497609 versions. | https://patchstack.com/database/vulnerability/wp-worthy/wordpress-worthy-vg-wort-integration-fuer-wordpress-plugin-1-6-5-6497609-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-23T18:16:53.496Z | 2023-07-11T12:38:29.231Z | 2023-07-11T12:38:29.231Z | {'Vendor': 'tiggersWelt.net', 'Product': 'Worthy', 'Versions': 'n/a'} |
CVE-2023-24047 | An Insecure Credential Management issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges via use of weak hashing algorithm. | https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ | 2023-01-21T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T22:36:14.461221 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24552 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted PAR file. This could allow an attacker to to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.399Z | 2023-02-14T10:36:29.146Z | 2023-03-14T09:31:19.249Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24769 | Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the main page. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter under the "Add a new change detection watch" function. | https://github.com/dgtlmoon/changedetection.io/issues/1358 | 2023-01-30T00:00:00 | 2023-02-17T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24440 | Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2774 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:30.798Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'} |
CVE-2023-24913 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24913 | 2023-01-31T20:37:47.252Z | 2023-03-14T16:55:58.427Z | 2023-12-14T18:31:53.761Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24856 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24856 | 2023-01-31T20:32:35.462Z | 2023-03-14T16:55:30.201Z | 2023-12-14T18:31:25.653Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24155 | TOTOLINK T8 V4.1.5cu was discovered to contain a hard code password for the telnet service which is stored in the component /web_cste/cgi-bin/product.ini. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/telnet_login/telnet_login.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24505 |
Milesight NCR/camera version 71.8.0.6-r5 discloses sensitive information through an unspecified request.
| https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T19:41:19.106Z | 2023-05-08T00:00:00 | 2023-05-17T21:25:09.039Z | {'Vendor': 'Milesight ', 'Product': 'NCR/Camera', 'Versions': 'All versions'} |
CVE-2023-24905 | Remote Desktop Client Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24905 | 2023-01-31T20:32:35.473Z | 2023-05-09T17:02:56.519Z | 2023-12-14T19:06:06.803Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 20H2', 'Versions': '10.0.0'} |
CVE-2023-24456 | Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2987 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:49.403Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Keycloak Authentication Plugin', 'Versions': 'unspecified, next of 2.3.0'} |
CVE-2023-24006 | Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Link Software LLC WP Terms Popup plugin <= 2.6.0 versions. | https://patchstack.com/database/vulnerability/wp-terms-popup/wordpress-wp-terms-popup-terms-and-conditions-and-privacy-policy-wordpress-popups-plugin-2-6-0-cross-site-scripting-xss?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-04-06T07:55:06.247Z | 2023-04-06T07:55:06.247Z | {'Vendor': 'Link Software LLC', 'Product': 'WP Terms Popup', 'Versions': 'n/a'} |
CVE-2023-24513 | On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic. | https://www.arista.com/en/support/advisories-notices/security-advisory/17240-security-advisory-0085 | 2023-01-24T00:00:00 | 2023-04-12T00:00:00 | 2023-04-12T00:00:00 | {'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.29.0, 4.28.0, 4.27.0, 4.26.0'} |
CVE-2023-24143 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagTracertHop parameter in the setNetworkDiag function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagTracertHop/setNetworkDiag_NetDiagTracertHop.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24840 | HGiga MailSherlock mail query function has vulnerability of insufficient validation for user input. An authenticated remote attacker with administrator privilege can exploit this vulnerability to inject SQL commands to read, modify, and delete the database. | https://www.twcert.org.tw/tw/cp-132-6959-cdecb-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'HGiga', 'Product': 'MailSherlock', 'Versions': 'iSherlock-query-4.5'} |
CVE-2023-24397 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Reservation.Studio Reservation.Studio widget plugin <= 1.0.11 versions. | https://patchstack.com/database/vulnerability/reservation-studio-widget/wordpress-reservation-studio-widget-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:50.470Z | 2023-08-30T15:41:24.552Z | 2023-08-30T15:41:24.552Z | {'Vendor': 'Reservation.Studio', 'Product': 'Reservation.Studio widget', 'Versions': 'n/a'} |
CVE-2023-24728 | Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the contact parameter in the user profile update function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24378 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Codeat Glossary plugin <= 2.1.27 versions. | https://patchstack.com/database/vulnerability/glossary-by-codeat/wordpress-glossary-plugin-2-1-27-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:47.036Z | 2023-04-06T13:48:16.650Z | 2023-04-06T13:48:16.650Z | {'Vendor': 'Codeat', 'Product': 'Glossary', 'Versions': 'n/a'} |
CVE-2023-24051 | A client side rate limit issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges via brute force style attacks. | https://research.nccgroup.com/2023/10/19/technical-advisory-multiple-vulnerabilities-in-connectize-g6-ac2100-dual-band-gigabit-wifi-router-cve-2023-24046-cve-2023-24047-cve-2023-24048-cve-2023-24049-cve-2023-24050-cve-2023-24051-cve/ | 2023-01-21T00:00:00 | 2023-12-04T00:00:00 | 2023-12-04T23:03:48.835828 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24401 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Davidsword Mobile Call Now & Map Buttons plugin <= 1.5.0 versions. | https://patchstack.com/database/vulnerability/mobile-call-now-map-buttons/wordpress-mobile-call-now-map-buttons-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:50.471Z | 2023-08-30T15:48:55.192Z | 2023-08-30T15:48:55.192Z | {'Vendor': 'Davidsword', 'Product': 'Mobile Call Now & Map Buttons', 'Versions': 'n/a'} |
CVE-2023-24817 | RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send a crafted frame to the device resulting in an integer underflow and out of bounds access in the packet buffer. Triggering the access at the right time will corrupt other packets or the allocator metadata. Corrupting a pointer will lead to denial of service. This issue is fixed in version 2023.04. As a workaround, disable SRH in the network stack. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xjgw-7638-29g5 | 2023-01-30T14:43:33.704Z | 2023-05-30T15:50:54.247Z | 2023-05-30T15:50:54.247Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2023.04'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.