CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-24114 | typecho 1.1/17.10.30 was discovered to contain a remote code execution (RCE) vulnerability via install.php. | https://github.com/typecho/typecho/issues/1523 | 2023-01-23T00:00:00 | 2023-02-22T00:00:00 | 2023-02-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24544 | Improper access control vulnerability in Buffalo network devices allows a network-adjacent attacker to obtain specific files of the product. As a result, the product settings may be altered. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier | https://www.buffalo.jp/news/detail/20230310-01.html | 2023-02-26T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'BUFFALO INC.', 'Product': 'BS-GSL and BS-GS series', 'Versions': 'BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier'} |
CVE-2023-24495 | A Server Side Request Forgery (SSRF) vulnerability exists in Tenable.sc due to improper validation of session & user-accessible input data. A privileged, authenticated remote attacker could interact with external and internal services covertly. | https://www.tenable.com/security/tns-2023-03 | 2023-01-24T00:00:00 | 2023-01-25T00:00:00 | 2023-01-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'Tenable.sc', 'Versions': 'Tenable.sc versions 5.23.1 and earlier'} |
CVE-2023-24180 | Libelfin v0.3 was discovered to contain an integer overflow in the load function at elf/mmap_loader.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted elf file. | https://github.com/aclements/libelfin/issues/75 | 2023-01-23T00:00:00 | 2023-03-14T00:00:00 | 2023-03-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24929 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24929 | 2023-01-31T20:37:47.256Z | 2023-04-11T19:13:32.586Z | 2023-12-14T18:59:31.308Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24883 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24883 | 2023-01-31T20:32:35.466Z | 2023-04-11T19:13:27.733Z | 2023-12-14T18:59:26.694Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24641 | Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the sid parameter at /php-jms/updateview.php. | https://github.com/594238758/mycve/blob/main/judging-management-system/SQLi-1.md | 2023-01-30T00:00:00 | 2023-03-03T00:00:00 | 2023-03-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24568 |
Dell NetWorker, contains an Improper Validation of Certificate with Host Mismatch vulnerability in Rabbitmq port which could disallow replacing CA signed certificates.
| https://www.dell.com/support/kbdoc/en-us/000210963/dsa-2023-059-dell-networker-security-update-for-a-rabbitmq-vulnerability-related-to-improper-validation-of-hostname-in-rabbitmq-startup-script-which-fails-to-replace-ca-signed-certificates | 2023-01-26T16:27:33.567Z | 2023-05-30T15:12:19.571Z | 2023-07-20T10:53:31.447Z | {'Vendor': 'Dell', 'Product': 'NetWorker', 'Versions': '19.8.0.0, 19.7.0.3 and prior releases, 19.7.1'} |
CVE-2023-24138 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the host_time parameter in the NTPSyncWithHost function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/NTPSyncWithHost/NTPSyncWithHost.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24991 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19813) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.544Z | 2023-02-14T10:37:02.099Z | 2023-03-14T09:31:49.138Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24587 | Insufficient control flow management in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable denial of service via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html | 2023-03-08T04:00:03.672Z | 2023-11-14T19:04:55.135Z | 2023-11-14T19:04:55.135Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Optane(TM) SSD products', 'Versions': 'See references'} |
CVE-2023-24657 | phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php. | https://github.com/phpipam/phpipam/issues/3738 | 2023-01-30T00:00:00 | 2023-03-08T00:00:00 | 2023-03-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24987 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19809) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.543Z | 2023-02-14T10:36:57.396Z | 2023-03-14T09:31:45.154Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24084 | ChiKoi v1.0 was discovered to contain a SQL injection vulnerability via the load_file function. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/tanhongit/2023/ChiKoi | 2023-01-23T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24600 | OX App Suite before backend 7.10.6-rev37 allows authenticated users to bypass access controls (for reading contacts) via a move to their own address book. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24529 | Due to lack of proper input validation, BSP application (CRM_BSP_FRAME) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H, allow malicious inputs from untrusted sources, which can be leveraged by an attacker to execute a Reflected Cross-Site Scripting (XSS) attack. As a result, an attacker may be able to hijack a user session, read and modify some sensitive information.
| https://launchpad.support.sap.com/#/notes/3282663 | 2023-01-25T15:46:55.581Z | 2023-02-14T03:19:22.690Z | 2023-04-11T21:24:44.858Z | {'Vendor': 'SAP', 'Product': 'NetWeaver AS ABAP (Business Server Pages application)', 'Versions': '700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H'} |
CVE-2023-24483 | A vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA. | https://support.citrix.com/article/CTX477616/citrix-virtual-apps-and-desktops-security-bulletin-for-cve202324483 | 2023-01-24T00:00:00 | 2023-02-16T00:00:00 | 2023-02-16T00:00:00 | {'Vendor': 'Citrix', 'Product': 'Citrix Virtual Apps and Desktops', 'Versions': 'Citrix Virtual Apps and Desktops'} |
CVE-2023-24895 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895 | 2023-01-31T20:32:35.471Z | 2023-06-14T14:52:18.749Z | 2024-01-09T17:39:14.232Z | {'Vendor': 'Microsoft', 'Product': '.NET 7.0', 'Versions': '7.0.0'} |
CVE-2023-24948 | Windows Bluetooth Driver Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24948 | 2023-01-31T20:37:47.260Z | 2023-05-09T17:02:59.197Z | 2023-12-14T19:06:09.332Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24732 | Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the gender parameter in the user profile update function. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24698 | Insufficient parameter validation in the Foswiki::Sandbox component of Foswiki v2.1.7 and below allows attackers to perform a directory traversal via supplying a crafted web request. | https://foswiki.org/Support/SecurityAlert-CVE-2023-24698 | 2023-01-30T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24509 | On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability. | https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082 | 2023-01-24T00:00:00 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | {'Vendor': 'Arista Networks', 'Product': 'Arista EOS', 'Versions': '4.23.0 4.23.13M, 4.28.0, 4.27.0, 4.286.0, 4.25.0, 4.24.0'} |
CVE-2023-24159 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admpass parameter in the setPasswordCfg function. | https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admpass/setPasswordCfg_admpass.md | 2023-01-23T00:00:00 | 2023-02-14T00:00:00 | 2023-02-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24620 | An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception. | https://github.com/EsotericSoftware | 2023-01-30T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T19:50:04.068855 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24909 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24909 | 2023-01-31T20:37:47.251Z | 2023-03-14T16:55:55.351Z | 2023-12-14T18:31:50.795Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24773 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list. | https://github.com/funadmin/funadmin/issues/4 | 2023-01-30T00:00:00 | 2023-03-08T00:00:00 | 2023-03-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24323 | Mojoportal v2.7 was discovered to contain an authenticated XML external entity (XXE) injection vulnerability. | https://www.mojoportal.com/ | 2023-01-23T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24548 | On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
| https://www.arista.com/en/support/advisories-notices/security-advisory/18043-security-advisory-0089 | 2023-01-26T11:37:43.827Z | 2023-08-29T16:13:10.451Z | 2023-08-29T16:13:10.451Z | {'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.25.0F, 4.24.0, 4.23.0, 4.22.1F'} |
CVE-2023-24118 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the security parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24231 | A stored cross-site scripting (XSS) vulnerability in the component /php-inventory-management-system/categories.php of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Categories Name parameter. | https://github.com/stemword/php-inventory-management-system | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24374 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Photon WP Material Design Icons for Page Builders plugin <= 1.4.2 versions. | https://patchstack.com/database/vulnerability/material-design-icons-for-elementor/wordpress-material-design-icons-for-page-builders-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:47.035Z | 2023-04-06T13:33:07.522Z | 2023-04-06T13:33:07.522Z | {'Vendor': 'Photon WP', 'Product': 'Material Design Icons for Page Builders', 'Versions': 'n/a'} |
CVE-2023-24724 | A stored cross site scripting (XSS) vulnerability was discovered in the user management module of the SAS 9.4 Admin Console, due to insufficient validation and sanitization of data input into the user creation and editing form fields. The product name is SAS Web Administration interface (SASAdmin). For the product release, the reported version is 9.4_M2 and the fixed version is 9.4_M3. For the SAS release, the reported version is 9.4 TS1M2 and the fixed version is 9.4 TS1M3. | https://owasp.org/www-community/attacks/xss/ | 2023-01-30T00:00:00 | 2023-04-03T00:00:00 | 2023-04-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24533 | Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this. | https://go.dev/issue/58647 | 2023-01-25T21:19:20.641Z | 2023-03-08T19:40:38.341Z | 2023-06-12T19:07:50.482Z | {'Vendor': 'filippo.io/nistec', 'Product': 'filippo.io/nistec', 'Versions': '0'} |
CVE-2023-24499 | Butterfly Button plugin may leave traces of its use on user's device. Since it is used for reporting domestic problems, this may lead to spouse knowing about its use. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T00:00:00 | 2023-02-15T00:00:00 | 2023-02-15T00:00:00 | {'Vendor': 'Butterfly Button', 'Product': 'Butterfly Button plugin', 'Versions': '.'} |
CVE-2023-24163 | SQL Inection vulnerability in Dromara hutool v5.8.11 allows attacker to execute arbitrary code via the aviator template engine. | https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868 | 2023-01-23T00:00:00 | 2023-01-31T00:00:00 | 2023-01-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24860 | Microsoft Defender Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860 | 2023-01-31T20:32:35.462Z | 2023-04-11T19:13:26.147Z | 2023-12-14T18:59:25.112Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Malware Protection Engine', 'Versions': '1.1.0.0'} |
CVE-2023-24925 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24925 | 2023-01-31T20:37:47.253Z | 2023-04-11T19:13:28.286Z | 2023-12-14T18:59:27.207Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24476 |
An attacker with local access to the machine could record the traffic,
which could allow them to resend requests without the server
authenticating that the user or session are valid.
| https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13 | 2023-04-24T23:30:29.247Z | 2023-06-07T21:44:56.326Z | 2023-06-07T21:44:56.326Z | {'Vendor': 'PTC ', 'Product': 'Vuforia Studio', 'Versions': '0'} |
CVE-2023-24026 | In MISP 2.4.167, app/webroot/js/event-graph.js has an XSS vulnerability via an event-graph preview payload. | https://github.com/MISP/MISP/commit/a46f794a136001101cbec84fccf3cc824e983493 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24837 | HGiga PowerStation remote management function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html | 2023-01-31T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'HGiga', 'Product': 'PowerStation', 'Versions': 'unspecified'} |
CVE-2023-24134 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey3 parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24564 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains a memory corruption vulnerability while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19069) | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T16:20:20.791Z | 2023-02-14T10:36:43.008Z | 2023-03-14T09:31:31.708Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24421 | Cross-Site Request Forgery (CSRF) vulnerability in WP Engine PHP Compatibility Checker plugin <= 1.5.2 versions. | https://patchstack.com/database/vulnerability/php-compatibility-checker/wordpress-php-compatibility-checker-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-01-23T18:16:53.497Z | 2023-07-11T07:22:25.812Z | 2023-07-11T07:22:25.812Z | {'Vendor': 'WP Engine', 'Product': 'PHP Compatibility Checker', 'Versions': 'n/a'} |
CVE-2023-24572 |
Dell Command | Integration Suite for System Center, versions before 6.4.0 contain an arbitrary folder delete vulnerability during uninstallation. A locally authenticated malicious user may potentially exploit this vulnerability leading to arbitrary folder deletion.
| https://www.dell.com/support/kbdoc/en-us/000207931/dsa-2023-032 | 2023-01-26T16:27:33.569Z | 2023-02-13T07:15:32.560Z | null | {'Vendor': 'Dell', 'Product': 'Dell Command Integration Suite for System Center (DCIS)', 'Versions': '0'} |
CVE-2023-24122 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the ssid_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24821 | RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset, thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-2fpr-82xr-p887 | 2023-01-30T14:43:33.705Z | 2023-04-24T15:11:47.374Z | 2023-04-24T15:11:47.374Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'} |
CVE-2023-24964 | IBM InfoSphere Information Server 11.7 could allow a local user to obtain sensitive information from a log files. IBM X-Force ID: 246463. | https://www.ibm.com/support/pages/node/6953519 | 2023-02-01T02:39:37.388Z | 2023-02-17T16:35:13.206Z | 2023-02-17T16:35:13.206Z | {'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'} |
CVE-2023-24437 | A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:27.411Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'} |
CVE-2023-24876 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24876 | 2023-01-31T20:32:35.465Z | 2023-03-14T16:55:58.928Z | 2023-12-14T18:31:54.268Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24525 | SAP CRM WebClient UI - versions WEBCUIF 748, 800, 801, S4FND 102, 103, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploitation an authenticated attacker can cause limited impact on confidentiality of the application.
| https://launchpad.support.sap.com/#/notes/2788178 | 2023-01-25T15:46:55.581Z | 2023-02-14T03:18:24.206Z | 2023-04-11T21:25:50.210Z | {'Vendor': 'SAP', 'Product': 'CRM (WebClient UI)', 'Versions': 'WEBCUIF 748, 800, 801, S4FND 102, 103'} |
CVE-2023-24030 | An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0 and 8.8.15. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL if url sanitisation is bypassed in incoming requests. NOTE: this is similar, but not identical, to CVE-2021-34807. | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | 2023-01-20T00:00:00 | 2023-06-15T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24899 | Windows Graphics Component Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24899 | 2023-01-31T20:32:35.472Z | 2023-05-09T17:02:51.070Z | 2023-12-14T19:06:01.314Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'} |
CVE-2023-24484 | A malicious user can cause log files to be written to a directory that they do not have permission to write to. | https://support.citrix.com/article/CTX477617/citrix-workspace-app-for-windows-security-bulletin-for-cve202324484-cve202324485 | 2023-01-24T00:00:00 | 2023-02-16T00:00:00 | 2023-02-16T00:00:00 | {'Vendor': 'Citrix', 'Product': 'Citrix Workspace App for Windows', 'Versions': 'Citrix Workspace App versions'} |
CVE-2023-24191 | Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the redirect parameter in signup.php. | https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24892 | Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24892 | 2023-01-31T20:32:35.470Z | 2023-03-14T16:56:00.409Z | 2023-12-14T18:31:55.759Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'} |
CVE-2023-24938 | Windows CryptoAPI Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24938 | 2023-01-31T20:37:47.257Z | 2023-06-13T23:25:50.850Z | 2024-01-09T17:39:04.337Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24607 | Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3. | https://www.qt.io/blog/tag/security | 2023-01-29T00:00:00 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24129 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey4 parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24579 | McAfee Total Protection prior to 16.0.51 allows attackers to trick a victim into uninstalling the application via the command prompt. | https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html | 2023-01-27T00:00:00 | 2023-03-13T00:00:00 | 2023-03-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24980 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19790) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.542Z | 2023-02-14T10:36:49.677Z | 2023-03-14T09:31:37.881Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24345 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetWanDhcpplus. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24200 | Raffle Draw System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at save_ticket.php. | https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24996 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19818) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.544Z | 2023-02-14T10:37:07.528Z | 2023-03-14T09:31:54.082Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24095 | TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSystemCheck. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24580 | An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack. | https://groups.google.com/forum/#%21forum/django-announce | 2023-01-27T00:00:00 | 2023-02-15T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24979 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19789) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.542Z | 2023-02-14T10:36:48.580Z | 2023-03-14T09:31:36.850Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24646 | An arbitrary file upload vulnerability in the component /fos/admin/ajax.php of Food Ordering System v2.0 allows attackers to execute arbitrary code via a crafted PHP file. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Food-Ordering-System-v2.0 | 2023-01-30T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24492 |
A vulnerability has been discovered in the Citrix Secure Access client for Ubuntu which, if exploited, could allow an attacker to remotely execute code if a victim user opens an attacker-crafted link and accepts further prompts.
| https://support.citrix.com/article/CTX564169/citrix-secure-access-client-for-ubuntu-security-bulletin-for-cve202324492 | 2023-01-24T15:49:52.579Z | 2023-07-11T21:36:52.664Z | 2023-07-11T21:36:52.664Z | {'Vendor': 'Citrix', 'Product': 'Citrix Secure Access client for Ubuntu', 'Versions': '0'} |
CVE-2023-24538 | Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution. | https://go.dev/issue/59234 | 2023-01-25T21:19:20.642Z | 2023-04-06T15:50:48.185Z | 2023-06-12T19:08:03.854Z | {'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'} |
CVE-2023-24884 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24884 | 2023-01-31T20:32:35.466Z | 2023-04-11T19:13:28.839Z | 2023-12-14T18:59:27.727Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24187 | An XML External Entity (XXE) vulnerability in ureport v2.2.9 allows attackers to execute arbitrary code via uploading a crafted XML file to /ureport/designer/saveReportFile. | http://ureport.com | 2023-01-23T00:00:00 | 2023-02-14T00:00:00 | 2023-02-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24754 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | https://github.com/strukturag/libde265/issues/382 | 2023-01-30T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24304 | Improper input validation in the PDF.dll plugin of IrfanView v4.60 allows attackers to execute arbitrary code via opening a crafted PDF file. | https://www.sit.fraunhofer.de/CVE-2023-24304/ | 2023-01-23T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24241 | Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/loginpost.php. | https://github.com/Mortalwangxin/lives/issues/1 | 2023-01-23T00:00:00 | 2023-01-31T00:00:00 | 2023-01-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24955 | Microsoft SharePoint Server Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955 | 2023-01-31T20:37:47.263Z | 2023-05-09T17:03:01.864Z | 2023-12-14T19:06:11.835Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Enterprise Server 2016', 'Versions': '16.0.0'} |
CVE-2023-24056 | In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes. | https://nullprogram.com/blog/2023/01/18/ | 2023-01-22T00:00:00 | 2023-01-22T00:00:00 | 2023-01-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24406 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Muneeb ur Rehman Simple PopUp plugin <= 1.8.6 versions. | https://patchstack.com/database/vulnerability/simple-popup/wordpress-simple-popup-plugin-1-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:51.989Z | 2023-05-10T08:01:53.554Z | 2023-05-10T08:01:53.554Z | {'Vendor': 'Muneeb ur Rehman', 'Product': 'Simple PopUp', 'Versions': 'n/a'} |
CVE-2023-24810 | Misskey is an open source, decentralized social media platform. Due to insufficient validation of the redirect URL during `miauth` authentication in Misskey, arbitrary JavaScript can be executed when a user allows the link. All versions below 13.3.1 (including 12.x) are affected. This has been fixed in version 13.3.1. Users are advised to upgrade. Users unable to upgrade should not allow authentication of untrusted apps. | https://github.com/misskey-dev/misskey/security/advisories/GHSA-cc6r-chgr-8r5m | 2023-01-30T14:43:33.703Z | 2023-02-22T19:15:34.157Z | 2023-02-22T19:15:34.157Z | {'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.3.1'} |
CVE-2023-24390 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WeSecur Security plugin <= 1.2.1 versions. | https://patchstack.com/database/vulnerability/wesecur-security/wordpress-wesecur-security-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:48.763Z | 2023-07-18T14:07:27.193Z | 2023-07-18T14:07:27.193Z | {'Vendor': 'WeSecur', 'Product': 'WeSecur Security', 'Versions': 'n/a'} |
CVE-2023-24685 | ChurchCRM v4.5.3 and below was discovered to contain a SQL injection vulnerability via the Event parameter under the Event Attendance reports module. | http://churchcrm.io/ | 2023-01-30T00:00:00 | 2023-02-09T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24451 | A missing permission check in Jenkins Cisco Spark Notifier Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2803 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:43.616Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Cisco Spark Notifier Plugin', 'Versions': 'unspecified, next of 1.1.1'} |
CVE-2023-24001 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Yannick Lefebvre Modal Dialog plugin <= 3.5.9 versions. | https://patchstack.com/database/vulnerability/modal-dialog/wordpress-modal-dialog-plugin-3-5-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-04-06T07:50:15.807Z | 2023-04-06T07:50:15.807Z | {'Vendor': 'Yannick Lefebvre', 'Product': 'Modal Dialog', 'Versions': 'n/a'} |
CVE-2023-24902 | Win32k Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24902 | 2023-01-31T20:32:35.472Z | 2023-05-09T17:02:54.340Z | 2023-12-14T19:06:04.801Z | {'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'} |
CVE-2023-24847 | Transient DOS in Modem while allocating DSM items. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T16:25:23.368Z | 2023-10-03T05:00:27.519Z | 2023-10-03T05:00:27.519Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AQT1000, AR8031, AR8035, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, FSM10055, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM9250, PMP8074, QCA4024, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA6698AQ, QCA8072, QCA8075, QCA8081, QCA8337, QCA9377, QCA9888, QCA9889, QCA9984, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6224, QCN6274, QCN7605, QCN7606, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 455, SD 675, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD835, SD855, SD865 5G, SD888, SDX55, SDX57M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24514 | Cross-site Scripting (XSS) vulnerability in Visual Console Module of Pandora FMS could be used to hijack admin users session cookie values, carry out phishing attacks, etc. This issue affects Pandora FMS v767 version and prior versions on all platforms. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-01-25T13:49:34.265Z | 2023-08-22T13:02:10.102Z | 2023-08-22T13:02:10.102Z | {'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'} |
CVE-2023-24144 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the hour parameter in the setRebootScheCfg function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setRebootScheCfg_hour/setRebootScheCfg_hour.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24797 | D-Link DIR882 DIR882A1_FW110B02 was discovered to contain a stack overflow in the sub_48AC20 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://www.dlink.com/en/security-bulletin/ | 2023-01-30T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24282 | An arbitrary file upload vulnerability in Poly Trio 8800 7.2.2.1094 allows attackers to execute arbitrary code via a crafted ringtone file. | http://polycom.com | 2023-01-23T00:00:00 | 2023-03-08T00:00:00 | 2023-03-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24914 | Win32k Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24914 | 2023-01-31T20:37:47.252Z | 2023-04-11T19:13:12.901Z | 2023-12-14T18:59:11.987Z | {'Vendor': 'Microsoft', 'Product': 'Windows 11 version 22H2', 'Versions': '10.0.0'} |
CVE-2023-24447 | A cross-site request forgery (CSRF) vulnerability in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2778 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:38.939Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins RabbitMQ Consumer Plugin', 'Versions': 'unspecified, next of 2.8'} |
CVE-2023-24152 | A command injection vulnerability in the serverIp parameter in the function meshSlaveUpdate of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveUpdate/meshSlaveUpdate.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24502 | Electra Central AC unit – The unit opens an AP with an easily calculated password. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Electra', 'Product': 'Electra Central AC unit', 'Versions': 'Update to the latest version'} |
CVE-2023-24851 | Memory Corruption in WLAN HOST while parsing QMI response message from firmware. | https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin | 2023-01-31T16:25:23.369Z | 2023-07-04T04:46:42.390Z | 2023-07-04T04:46:42.390Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, CSR8811, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4024, QCA6174A, QCA6310, QCA6320, QCA6391, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9377, QCA9888, QCA9889, QCM2290, QCM4290, QCM4325, QCM4490, QCM6490, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6122, QCN6132, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6490, QRB5165M, QRB5165N, QSM8350, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8255P, SA8295P, SD 8 Gen1 5G, SD660, SD835, SD865 5G, SD888, SDX65M, SG4150P, SM7250P, SM7315, SM7325P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 660 Mobile Platform, Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X12 LTE Modem, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2230P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-24781 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php. | https://github.com/funadmin/funadmin/issues/8 | 2023-01-30T00:00:00 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24294 | Zumtobel Netlink CCD Onboard v3.74 - Firmware v3.80 was discovered to contain a buffer overflow via the component NetlinkWeb::Information::SetDeviceIdentification. | http://zumtobel.com | 2023-01-23T00:00:00 | 2023-11-29T00:00:00 | 2023-11-29T00:43:33.847572 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24410 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Contact Form - WPManageNinja LLC Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms fluentform allows SQL Injection.This issue affects Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms: from n/a through 4.3.25.
| https://patchstack.com/database/vulnerability/fluentform/wordpress-fluentform-plugin-4-3-25-sql-injection-vulnerability?_s_id=cve | 2023-01-23T18:16:51.989Z | 2023-10-31T14:25:56.252Z | 2023-10-31T14:25:56.252Z | {'Vendor': 'Contact Form - WPManageNinja LLC', 'Product': 'Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms', 'Versions': 'n/a'} |
CVE-2023-24040 | dtprintinfo in Common Desktop Environment 1.6 has a bug in the parser of lpstat (an invoked external command) during listing of the names of available printers. This allows low-privileged local users to inject arbitrary printer names via the $HOME/.printers file. This injection allows those users to manipulate the control flow and disclose memory contents on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt | 2023-01-21T00:00:00 | 2023-01-21T00:00:00 | 2023-01-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24943 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943 | 2023-01-31T20:37:47.258Z | 2023-05-09T17:02:55.976Z | 2023-12-14T19:06:06.307Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24806 | null | null | 2023-01-30T00:00:00 | null | 2023-02-03T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-24555 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.400Z | 2023-02-14T10:36:32.550Z | 2023-03-14T09:31:22.404Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.