CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-24114
typecho 1.1/17.10.30 was discovered to contain a remote code execution (RCE) vulnerability via install.php.
https://github.com/typecho/typecho/issues/1523
2023-01-23T00:00:00
2023-02-22T00:00:00
2023-02-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24544
Improper access control vulnerability in Buffalo network devices allows a network-adjacent attacker to obtain specific files of the product. As a result, the product settings may be altered. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier
https://www.buffalo.jp/news/detail/20230310-01.html
2023-02-26T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'BUFFALO INC.', 'Product': 'BS-GSL and BS-GS series', 'Versions': 'BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier'}
CVE-2023-24495
A Server Side Request Forgery (SSRF) vulnerability exists in Tenable.sc due to improper validation of session & user-accessible input data. A privileged, authenticated remote attacker could interact with external and internal services covertly.
https://www.tenable.com/security/tns-2023-03
2023-01-24T00:00:00
2023-01-25T00:00:00
2023-01-25T00:00:00
{'Vendor': 'n/a', 'Product': 'Tenable.sc', 'Versions': 'Tenable.sc versions 5.23.1 and earlier'}
CVE-2023-24180
Libelfin v0.3 was discovered to contain an integer overflow in the load function at elf/mmap_loader.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted elf file.
https://github.com/aclements/libelfin/issues/75
2023-01-23T00:00:00
2023-03-14T00:00:00
2023-03-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24929
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24929
2023-01-31T20:37:47.256Z
2023-04-11T19:13:32.586Z
2023-12-14T18:59:31.308Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24883
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24883
2023-01-31T20:32:35.466Z
2023-04-11T19:13:27.733Z
2023-12-14T18:59:26.694Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24641
Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the sid parameter at /php-jms/updateview.php.
https://github.com/594238758/mycve/blob/main/judging-management-system/SQLi-1.md
2023-01-30T00:00:00
2023-03-03T00:00:00
2023-03-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24568
Dell NetWorker, contains an Improper Validation of Certificate with Host Mismatch vulnerability in Rabbitmq port which could disallow replacing CA signed certificates.
https://www.dell.com/support/kbdoc/en-us/000210963/dsa-2023-059-dell-networker-security-update-for-a-rabbitmq-vulnerability-related-to-improper-validation-of-hostname-in-rabbitmq-startup-script-which-fails-to-replace-ca-signed-certificates
2023-01-26T16:27:33.567Z
2023-05-30T15:12:19.571Z
2023-07-20T10:53:31.447Z
{'Vendor': 'Dell', 'Product': 'NetWorker', 'Versions': '19.8.0.0, 19.7.0.3 and prior releases, 19.7.1'}
CVE-2023-24138
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the host_time parameter in the NTPSyncWithHost function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/NTPSyncWithHost/NTPSyncWithHost.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24991
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19813)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.544Z
2023-02-14T10:37:02.099Z
2023-03-14T09:31:49.138Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24587
Insufficient control flow management in firmware for some Intel(R) Optane(TM) SSD products may allow a privileged user to potentially enable denial of service via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00758.html
2023-03-08T04:00:03.672Z
2023-11-14T19:04:55.135Z
2023-11-14T19:04:55.135Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Optane(TM) SSD products', 'Versions': 'See references'}
CVE-2023-24657
phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php.
https://github.com/phpipam/phpipam/issues/3738
2023-01-30T00:00:00
2023-03-08T00:00:00
2023-03-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24987
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19809)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.543Z
2023-02-14T10:36:57.396Z
2023-03-14T09:31:45.154Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24084
ChiKoi v1.0 was discovered to contain a SQL injection vulnerability via the load_file function.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/tanhongit/2023/ChiKoi
2023-01-23T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24600
OX App Suite before backend 7.10.6-rev37 allows authenticated users to bypass access controls (for reading contacts) via a move to their own address book.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24529
Due to lack of proper input validation, BSP application (CRM_BSP_FRAME) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H, allow malicious inputs from untrusted sources, which can be leveraged by an attacker to execute a Reflected Cross-Site Scripting (XSS) attack. As a result, an attacker may be able to hijack a user session, read and modify some sensitive information.
https://launchpad.support.sap.com/#/notes/3282663
2023-01-25T15:46:55.581Z
2023-02-14T03:19:22.690Z
2023-04-11T21:24:44.858Z
{'Vendor': 'SAP', 'Product': 'NetWeaver AS ABAP (Business Server Pages application)', 'Versions': '700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H'}
CVE-2023-24483
A vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.
https://support.citrix.com/article/CTX477616/citrix-virtual-apps-and-desktops-security-bulletin-for-cve202324483
2023-01-24T00:00:00
2023-02-16T00:00:00
2023-02-16T00:00:00
{'Vendor': 'Citrix', 'Product': 'Citrix Virtual Apps and Desktops', 'Versions': 'Citrix Virtual Apps and Desktops'}
CVE-2023-24895
.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24895
2023-01-31T20:32:35.471Z
2023-06-14T14:52:18.749Z
2024-01-09T17:39:14.232Z
{'Vendor': 'Microsoft', 'Product': '.NET 7.0', 'Versions': '7.0.0'}
CVE-2023-24948
Windows Bluetooth Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24948
2023-01-31T20:37:47.260Z
2023-05-09T17:02:59.197Z
2023-12-14T19:06:09.332Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24732
Simple Customer Relationship Management System v1.0 as discovered to contain a SQL injection vulnerability via the gender parameter in the user profile update function.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24698
Insufficient parameter validation in the Foswiki::Sandbox component of Foswiki v2.1.7 and below allows attackers to perform a directory traversal via supplying a crafted web request.
https://foswiki.org/Support/SecurityAlert-CVE-2023-24698
2023-01-30T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24509
On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability.
https://www.arista.com/en/support/advisories-notices/security-advisory/16985-security-advisory-0082
2023-01-24T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'Arista Networks', 'Product': 'Arista EOS', 'Versions': '4.23.0 4.23.13M, 4.28.0, 4.27.0, 4.286.0, 4.25.0, 4.24.0'}
CVE-2023-24159
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the admpass parameter in the setPasswordCfg function.
https://github.com/iceyjchen/VulnerabilityProjectRecords/blob/main/setPasswordCfg_admpass/setPasswordCfg_admpass.md
2023-01-23T00:00:00
2023-02-14T00:00:00
2023-02-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24620
An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.
https://github.com/EsotericSoftware
2023-01-30T00:00:00
2023-08-25T00:00:00
2023-08-25T19:50:04.068855
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24909
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24909
2023-01-31T20:37:47.251Z
2023-03-14T16:55:55.351Z
2023-12-14T18:31:50.795Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24773
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list.
https://github.com/funadmin/funadmin/issues/4
2023-01-30T00:00:00
2023-03-08T00:00:00
2023-03-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24323
Mojoportal v2.7 was discovered to contain an authenticated XML external entity (XXE) injection vulnerability.
https://www.mojoportal.com/
2023-01-23T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24548
On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
https://www.arista.com/en/support/advisories-notices/security-advisory/18043-security-advisory-0089
2023-01-26T11:37:43.827Z
2023-08-29T16:13:10.451Z
2023-08-29T16:13:10.451Z
{'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.25.0F, 4.24.0, 4.23.0, 4.22.1F'}
CVE-2023-24118
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the security parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24231
A stored cross-site scripting (XSS) vulnerability in the component /php-inventory-management-system/categories.php of Inventory Management System v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Categories Name parameter.
https://github.com/stemword/php-inventory-management-system
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24374
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Photon WP Material Design Icons for Page Builders plugin <= 1.4.2 versions.
https://patchstack.com/database/vulnerability/material-design-icons-for-elementor/wordpress-material-design-icons-for-page-builders-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:47.035Z
2023-04-06T13:33:07.522Z
2023-04-06T13:33:07.522Z
{'Vendor': 'Photon WP', 'Product': 'Material Design Icons for Page Builders', 'Versions': 'n/a'}
CVE-2023-24724
A stored cross site scripting (XSS) vulnerability was discovered in the user management module of the SAS 9.4 Admin Console, due to insufficient validation and sanitization of data input into the user creation and editing form fields. The product name is SAS Web Administration interface (SASAdmin). For the product release, the reported version is 9.4_M2 and the fixed version is 9.4_M3. For the SAS release, the reported version is 9.4 TS1M2 and the fixed version is 9.4 TS1M3.
https://owasp.org/www-community/attacks/xss/
2023-01-30T00:00:00
2023-04-03T00:00:00
2023-04-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24533
Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this.
https://go.dev/issue/58647
2023-01-25T21:19:20.641Z
2023-03-08T19:40:38.341Z
2023-06-12T19:07:50.482Z
{'Vendor': 'filippo.io/nistec', 'Product': 'filippo.io/nistec', 'Versions': '0'}
CVE-2023-24499
Butterfly Button plugin may leave traces of its use on user's device. Since it is used for reporting domestic problems, this may lead to spouse knowing about its use.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T00:00:00
2023-02-15T00:00:00
2023-02-15T00:00:00
{'Vendor': 'Butterfly Button', 'Product': 'Butterfly Button plugin', 'Versions': '.'}
CVE-2023-24163
SQL Inection vulnerability in Dromara hutool v5.8.11 allows attacker to execute arbitrary code via the aviator template engine.
https://gitee.com/dromara/hutool/issues/I6AJWJ#note_15801868
2023-01-23T00:00:00
2023-01-31T00:00:00
2023-01-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24860
Microsoft Defender Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860
2023-01-31T20:32:35.462Z
2023-04-11T19:13:26.147Z
2023-12-14T18:59:25.112Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Malware Protection Engine', 'Versions': '1.1.0.0'}
CVE-2023-24925
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24925
2023-01-31T20:37:47.253Z
2023-04-11T19:13:28.286Z
2023-12-14T18:59:27.207Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24476
An attacker with local access to the machine could record the traffic, which could allow them to resend requests without the server authenticating that the user or session are valid.
https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13
2023-04-24T23:30:29.247Z
2023-06-07T21:44:56.326Z
2023-06-07T21:44:56.326Z
{'Vendor': 'PTC ', 'Product': 'Vuforia Studio', 'Versions': '0'}
CVE-2023-24026
In MISP 2.4.167, app/webroot/js/event-graph.js has an XSS vulnerability via an event-graph preview payload.
https://github.com/MISP/MISP/commit/a46f794a136001101cbec84fccf3cc824e983493
2023-01-20T00:00:00
2023-01-20T00:00:00
2023-01-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24837
HGiga PowerStation remote management function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operation or disrupt service.
https://www.twcert.org.tw/tw/cp-132-6956-fbd85-1.html
2023-01-31T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'HGiga', 'Product': 'PowerStation', 'Versions': 'unspecified'}
CVE-2023-24134
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey3 parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24564
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains a memory corruption vulnerability while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19069)
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T16:20:20.791Z
2023-02-14T10:36:43.008Z
2023-03-14T09:31:31.708Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24421
Cross-Site Request Forgery (CSRF) vulnerability in WP Engine PHP Compatibility Checker plugin <= 1.5.2 versions.
https://patchstack.com/database/vulnerability/php-compatibility-checker/wordpress-php-compatibility-checker-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-01-23T18:16:53.497Z
2023-07-11T07:22:25.812Z
2023-07-11T07:22:25.812Z
{'Vendor': 'WP Engine', 'Product': 'PHP Compatibility Checker', 'Versions': 'n/a'}
CVE-2023-24572
Dell Command | Integration Suite for System Center, versions before 6.4.0 contain an arbitrary folder delete vulnerability during uninstallation. A locally authenticated malicious user may potentially exploit this vulnerability leading to arbitrary folder deletion.
https://www.dell.com/support/kbdoc/en-us/000207931/dsa-2023-032
2023-01-26T16:27:33.569Z
2023-02-13T07:15:32.560Z
null
{'Vendor': 'Dell', 'Product': 'Dell Command Integration Suite for System Center (DCIS)', 'Versions': '0'}
CVE-2023-24122
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the ssid_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24821
RIOT-OS, an operating system that supports Internet of Things devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2022.10, an attacker can send a crafted frame to the device resulting in a large out of bounds write beyond the packet buffer. The write will create a hard fault exception after reaching the last page of RAM. The hard fault is not handled and the system will be stuck until reset, thus the impact is denial of service. Version 2022.10 fixes this issue. As a workaround, disable support for fragmented IP datagrams or apply the patches manually.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-2fpr-82xr-p887
2023-01-30T14:43:33.705Z
2023-04-24T15:11:47.374Z
2023-04-24T15:11:47.374Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2022.10'}
CVE-2023-24964
IBM InfoSphere Information Server 11.7 could allow a local user to obtain sensitive information from a log files. IBM X-Force ID: 246463.
https://www.ibm.com/support/pages/node/6953519
2023-02-01T02:39:37.388Z
2023-02-17T16:35:13.206Z
2023-02-17T16:35:13.206Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-24437
A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:27.411Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins JIRA Pipeline Steps Plugin', 'Versions': 'unspecified, next of 2.0.165.v8846cf59f3db'}
CVE-2023-24876
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24876
2023-01-31T20:32:35.465Z
2023-03-14T16:55:58.928Z
2023-12-14T18:31:54.268Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24525
SAP CRM WebClient UI - versions WEBCUIF 748, 800, 801, S4FND 102, 103, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploitation an authenticated attacker can cause limited impact on confidentiality of the application.
https://launchpad.support.sap.com/#/notes/2788178
2023-01-25T15:46:55.581Z
2023-02-14T03:18:24.206Z
2023-04-11T21:25:50.210Z
{'Vendor': 'SAP', 'Product': 'CRM (WebClient UI)', 'Versions': 'WEBCUIF 748, 800, 801, S4FND 102, 103'}
CVE-2023-24030
An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0 and 8.8.15. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL if url sanitisation is bypassed in incoming requests. NOTE: this is similar, but not identical, to CVE-2021-34807.
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
2023-01-20T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24899
Windows Graphics Component Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24899
2023-01-31T20:32:35.472Z
2023-05-09T17:02:51.070Z
2023-12-14T19:06:01.314Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'}
CVE-2023-24484
A malicious user can cause log files to be written to a directory that they do not have permission to write to.
https://support.citrix.com/article/CTX477617/citrix-workspace-app-for-windows-security-bulletin-for-cve202324484-cve202324485
2023-01-24T00:00:00
2023-02-16T00:00:00
2023-02-16T00:00:00
{'Vendor': 'Citrix', 'Product': 'Citrix Workspace App for Windows', 'Versions': 'Citrix Workspace App versions'}
CVE-2023-24191
Online Food Ordering System v2 was discovered to contain a cross-site scripting (XSS) vulnerability via the redirect parameter in signup.php.
https://www.sourcecodester.com/php/16022/online-food-ordering-system-v2-using-php8-and-mysql-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24892
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24892
2023-01-31T20:32:35.470Z
2023-03-14T16:56:00.409Z
2023-12-14T18:31:55.759Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-24938
Windows CryptoAPI Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24938
2023-01-31T20:37:47.257Z
2023-06-13T23:25:50.850Z
2024-01-09T17:39:04.337Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24607
Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.
https://www.qt.io/blog/tag/security
2023-01-29T00:00:00
2023-04-15T00:00:00
2023-04-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24129
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey4 parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24579
McAfee Total Protection prior to 16.0.51 allows attackers to trick a victim into uninstalling the application via the command prompt.
https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html
2023-01-27T00:00:00
2023-03-13T00:00:00
2023-03-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24980
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19790)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.542Z
2023-02-14T10:36:49.677Z
2023-03-14T09:31:37.881Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24345
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetWanDhcpplus.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24200
Raffle Draw System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at save_ticket.php.
https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24996
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19818)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.544Z
2023-02-14T10:37:07.528Z
2023-03-14T09:31:54.082Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24095
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSystemCheck. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/05/README.md
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24580
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
https://groups.google.com/forum/#%21forum/django-announce
2023-01-27T00:00:00
2023-02-15T00:00:00
2023-04-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24979
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19789)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.542Z
2023-02-14T10:36:48.580Z
2023-03-14T09:31:36.850Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24646
An arbitrary file upload vulnerability in the component /fos/admin/ajax.php of Food Ordering System v2.0 allows attackers to execute arbitrary code via a crafted PHP file.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Food-Ordering-System-v2.0
2023-01-30T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24492
A vulnerability has been discovered in the Citrix Secure Access client for Ubuntu which, if exploited, could allow an attacker to remotely execute code if a victim user opens an attacker-crafted link and accepts further prompts.
https://support.citrix.com/article/CTX564169/citrix-secure-access-client-for-ubuntu-security-bulletin-for-cve202324492
2023-01-24T15:49:52.579Z
2023-07-11T21:36:52.664Z
2023-07-11T21:36:52.664Z
{'Vendor': 'Citrix', 'Product': 'Citrix Secure Access client for Ubuntu', 'Versions': '0'}
CVE-2023-24538
Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.
https://go.dev/issue/59234
2023-01-25T21:19:20.642Z
2023-04-06T15:50:48.185Z
2023-06-12T19:08:03.854Z
{'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'}
CVE-2023-24884
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24884
2023-01-31T20:32:35.466Z
2023-04-11T19:13:28.839Z
2023-12-14T18:59:27.727Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24187
An XML External Entity (XXE) vulnerability in ureport v2.2.9 allows attackers to execute arbitrary code via uploading a crafted XML file to /ureport/designer/saveReportFile.
http://ureport.com
2023-01-23T00:00:00
2023-02-14T00:00:00
2023-02-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24754
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
https://github.com/strukturag/libde265/issues/382
2023-01-30T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24304
Improper input validation in the PDF.dll plugin of IrfanView v4.60 allows attackers to execute arbitrary code via opening a crafted PDF file.
https://www.sit.fraunhofer.de/CVE-2023-24304/
2023-01-23T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24241
Forget Heart Message Box v1.1 was discovered to contain a SQL injection vulnerability via the name parameter at /admin/loginpost.php.
https://github.com/Mortalwangxin/lives/issues/1
2023-01-23T00:00:00
2023-01-31T00:00:00
2023-01-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24955
Microsoft SharePoint Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955
2023-01-31T20:37:47.263Z
2023-05-09T17:03:01.864Z
2023-12-14T19:06:11.835Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Enterprise Server 2016', 'Versions': '16.0.0'}
CVE-2023-24056
In pkgconf through 1.9.3, variable duplication can cause unbounded string expansion due to incorrect checks in libpkgconf/tuple.c:pkgconf_tuple_parse. For example, a .pc file containing a few hundred bytes can expand to one billion bytes.
https://nullprogram.com/blog/2023/01/18/
2023-01-22T00:00:00
2023-01-22T00:00:00
2023-01-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24406
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Muneeb ur Rehman Simple PopUp plugin <= 1.8.6 versions.
https://patchstack.com/database/vulnerability/simple-popup/wordpress-simple-popup-plugin-1-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:51.989Z
2023-05-10T08:01:53.554Z
2023-05-10T08:01:53.554Z
{'Vendor': 'Muneeb ur Rehman', 'Product': 'Simple PopUp', 'Versions': 'n/a'}
CVE-2023-24810
Misskey is an open source, decentralized social media platform. Due to insufficient validation of the redirect URL during `miauth` authentication in Misskey, arbitrary JavaScript can be executed when a user allows the link. All versions below 13.3.1 (including 12.x) are affected. This has been fixed in version 13.3.1. Users are advised to upgrade. Users unable to upgrade should not allow authentication of untrusted apps.
https://github.com/misskey-dev/misskey/security/advisories/GHSA-cc6r-chgr-8r5m
2023-01-30T14:43:33.703Z
2023-02-22T19:15:34.157Z
2023-02-22T19:15:34.157Z
{'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.3.1'}
CVE-2023-24390
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WeSecur Security plugin <= 1.2.1 versions.
https://patchstack.com/database/vulnerability/wesecur-security/wordpress-wesecur-security-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:48.763Z
2023-07-18T14:07:27.193Z
2023-07-18T14:07:27.193Z
{'Vendor': 'WeSecur', 'Product': 'WeSecur Security', 'Versions': 'n/a'}
CVE-2023-24685
ChurchCRM v4.5.3 and below was discovered to contain a SQL injection vulnerability via the Event parameter under the Event Attendance reports module.
http://churchcrm.io/
2023-01-30T00:00:00
2023-02-09T00:00:00
2023-04-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24451
A missing permission check in Jenkins Cisco Spark Notifier Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2803
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:43.616Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Cisco Spark Notifier Plugin', 'Versions': 'unspecified, next of 1.1.1'}
CVE-2023-24001
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Yannick Lefebvre Modal Dialog plugin <= 3.5.9 versions.
https://patchstack.com/database/vulnerability/modal-dialog/wordpress-modal-dialog-plugin-3-5-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-20T09:29:08.377Z
2023-04-06T07:50:15.807Z
2023-04-06T07:50:15.807Z
{'Vendor': 'Yannick Lefebvre', 'Product': 'Modal Dialog', 'Versions': 'n/a'}
CVE-2023-24902
Win32k Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24902
2023-01-31T20:32:35.472Z
2023-05-09T17:02:54.340Z
2023-12-14T19:06:04.801Z
{'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'}
CVE-2023-24847
Transient DOS in Modem while allocating DSM items.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T16:25:23.368Z
2023-10-03T05:00:27.519Z
2023-10-03T05:00:27.519Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AQT1000, AR8031, AR8035, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, FSM10055, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM9250, PMP8074, QCA4024, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595AU, QCA6696, QCA6698AQ, QCA8072, QCA8075, QCA8081, QCA8337, QCA9377, QCA9888, QCA9889, QCA9984, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6224, QCN6274, QCN7605, QCN7606, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 455, SD 675, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD835, SD855, SD865 5G, SD888, SDX55, SDX57M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24514
Cross-site Scripting (XSS) vulnerability in Visual Console Module of Pandora FMS could be used to hijack admin users session cookie values, carry out phishing attacks, etc. This issue affects Pandora FMS v767 version and prior versions on all platforms.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-01-25T13:49:34.265Z
2023-08-22T13:02:10.102Z
2023-08-22T13:02:10.102Z
{'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'}
CVE-2023-24144
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the hour parameter in the setRebootScheCfg function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setRebootScheCfg_hour/setRebootScheCfg_hour.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24797
D-Link DIR882 DIR882A1_FW110B02 was discovered to contain a stack overflow in the sub_48AC20 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://www.dlink.com/en/security-bulletin/
2023-01-30T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24282
An arbitrary file upload vulnerability in Poly Trio 8800 7.2.2.1094 allows attackers to execute arbitrary code via a crafted ringtone file.
http://polycom.com
2023-01-23T00:00:00
2023-03-08T00:00:00
2023-03-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24914
Win32k Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24914
2023-01-31T20:37:47.252Z
2023-04-11T19:13:12.901Z
2023-12-14T18:59:11.987Z
{'Vendor': 'Microsoft', 'Product': 'Windows 11 version 22H2', 'Versions': '10.0.0'}
CVE-2023-24447
A cross-site request forgery (CSRF) vulnerability in Jenkins RabbitMQ Consumer Plugin 2.8 and earlier allows attackers to connect to an attacker-specified AMQP(S) URL using attacker-specified username and password.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2778
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:38.939Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins RabbitMQ Consumer Plugin', 'Versions': 'unspecified, next of 2.8'}
CVE-2023-24152
A command injection vulnerability in the serverIp parameter in the function meshSlaveUpdate of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/meshSlaveUpdate/meshSlaveUpdate.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24502
Electra Central AC unit – The unit opens an AP with an easily calculated password.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Electra', 'Product': 'Electra Central AC unit', 'Versions': 'Update to the latest version'}
CVE-2023-24851
Memory Corruption in WLAN HOST while parsing QMI response message from firmware.
https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin
2023-01-31T16:25:23.369Z
2023-07-04T04:46:42.390Z
2023-07-04T04:46:42.390Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, CSR8811, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4024, QCA6174A, QCA6310, QCA6320, QCA6391, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9377, QCA9888, QCA9889, QCM2290, QCM4290, QCM4325, QCM4490, QCM6490, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6122, QCN6132, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6490, QRB5165M, QRB5165N, QSM8350, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8255P, SA8295P, SD 8 Gen1 5G, SD660, SD835, SD865 5G, SD888, SDX65M, SG4150P, SM7250P, SM7315, SM7325P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 660 Mobile Platform, Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X12 LTE Modem, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2230P, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3615, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'}
CVE-2023-24781
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\MemberLevel.php.
https://github.com/funadmin/funadmin/issues/8
2023-01-30T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24294
Zumtobel Netlink CCD Onboard v3.74 - Firmware v3.80 was discovered to contain a buffer overflow via the component NetlinkWeb::Information::SetDeviceIdentification.
http://zumtobel.com
2023-01-23T00:00:00
2023-11-29T00:00:00
2023-11-29T00:43:33.847572
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24410
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Contact Form - WPManageNinja LLC Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms fluentform allows SQL Injection.This issue affects Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms: from n/a through 4.3.25.
https://patchstack.com/database/vulnerability/fluentform/wordpress-fluentform-plugin-4-3-25-sql-injection-vulnerability?_s_id=cve
2023-01-23T18:16:51.989Z
2023-10-31T14:25:56.252Z
2023-10-31T14:25:56.252Z
{'Vendor': 'Contact Form - WPManageNinja LLC', 'Product': 'Contact Form Plugin – Fastest Contact Form Builder Plugin for WordPress by Fluent Forms', 'Versions': 'n/a'}
CVE-2023-24040
dtprintinfo in Common Desktop Environment 1.6 has a bug in the parser of lpstat (an invoked external command) during listing of the names of available printers. This allows low-privileged local users to inject arbitrary printer names via the $HOME/.printers file. This injection allows those users to manipulate the control flow and disclose memory contents on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt
2023-01-21T00:00:00
2023-01-21T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24943
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943
2023-01-31T20:37:47.258Z
2023-05-09T17:02:55.976Z
2023-12-14T19:06:06.307Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24806
null
null
2023-01-30T00:00:00
null
2023-02-03T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-24555
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.400Z
2023-02-14T10:36:32.550Z
2023-03-14T09:31:22.404Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}