CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-24386
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Karishma Arora AI Contact Us Form plugin <= 1.0 versions.
https://patchstack.com/database/vulnerability/ai-contact-us/wordpress-ai-contact-us-form-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:48.762Z
2023-04-23T09:38:17.238Z
2023-04-23T09:38:17.238Z
{'Vendor': 'Karishma Arora', 'Product': 'AI Contact Us Form', 'Versions': 'n/a'}
CVE-2023-24369
A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter under the Add New Articles function.
https://github.com/ujcms/ujcms/issues/3
2023-01-23T00:00:00
2023-02-17T00:00:00
2023-02-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24488
Cross site scripting vulnerability in Citrix ADC and Citrix Gateway  in allows and attacker to perform cross site scripting
https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488
2023-01-24T15:49:52.579Z
2023-07-10T20:41:31.248Z
2023-07-10T20:41:53.469Z
{'Vendor': 'Citrix', 'Product': 'Citrix ADC and Citrix Gateway\u202f', 'Versions': '13.1, 13.0, 12.1, 12.1-FIPS , 13.1-FIPS , 12.1-NDcPP'}
CVE-2023-24522
Due to insufficient input sanitization, SAP NetWeaver AS ABAP (Business Server Pages) - versions 700, 701, 702, 731, 740, allows an unauthenticated user to alter the current session of the user by injecting the malicious code over the network and gain access to the unintended data. This may lead to a limited impact on the confidentiality and the integrity of the application.
https://launchpad.support.sap.com/#/notes/3269118
2023-01-25T15:46:55.581Z
2023-02-14T03:17:02.758Z
2023-04-11T21:26:34.087Z
{'Vendor': 'SAP', 'Product': 'NetWeaver AS ABAP (BSP Framework)', 'Versions': '700, 701, 702, 731, 740'}
CVE-2023-24871
Windows Bluetooth Service Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24871
2023-01-31T20:32:35.464Z
2023-03-14T16:55:57.416Z
2023-12-14T18:31:52.784Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'}
CVE-2023-24934
Microsoft Defender Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24934
2023-01-31T20:37:47.257Z
2023-04-14T21:27:55.042Z
2023-12-14T18:59:23.083Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Malware Protection Platform', 'Versions': '4.0.0.0'}
CVE-2023-24349
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetRoute.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24826
RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send crafted frames to the device to trigger the usage of an uninitialized object leading to denial of service. This issue is fixed in version 2023.04. As a workaround, disable fragment forwarding or SFR.
https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xfj4-9g7w-f4gh
2023-01-30T14:43:33.706Z
2023-05-30T16:07:45.208Z
2023-05-30T16:07:45.208Z
{'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2023.04'}
CVE-2023-24575
Dell Multifunction Printer E525w Driver and Software Suite, versions prior to 1.047.2022, A05, contain a local privilege escalation vulnerability that could be exploited by malicious users to compromise the affected system
https://www.dell.com/support/kbdoc/en-us/000208396/dsa-2023-043
2023-01-26T16:27:33.569Z
2023-02-21T04:03:48.673Z
2023-02-21T04:03:48.673Z
{'Vendor': 'Dell', 'Product': 'Dell Multifunction Printer E525w Driver and Software Suite', 'Versions': '0'}
CVE-2023-24125
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey2_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24430
Jenkins Semantic Versioning Plugin 1.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%282%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:19.457Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Semantic Versioning Plugin', 'Versions': 'unspecified'}
CVE-2023-24060
Haven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functionality. Authenticated users with the ability to create new RSS Feeds or add RSS Feeds can supply an arbitrary hostname (or even the hostname of the Haven server itself). NOTE: this product has significant usage but does not have numbered releases; ordinary end users may typically use the master branch.
https://havenweb.org/
2023-01-23T00:00:00
2023-01-27T00:00:00
2023-01-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24133
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24099
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the username parameter at /formWizardPassword. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24563
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.401Z
2023-02-14T10:36:41.883Z
2023-03-14T09:31:30.687Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24830
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects iotdb-web-workbench component: from 0.13.0 before 0.13.3.
https://lists.apache.org/thread/l4fon37687jz5ohgsnz2ko9fv400915t
2023-01-30T15:43:01.950Z
2023-01-30T16:25:33.163Z
2023-03-08T16:15:25.489Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache IoTDB Workbench', 'Versions': '0.13.0'}
CVE-2023-24975
IBM Spectrum Symphony 7.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 247030.
https://www.ibm.com/support/pages/node/6959369
2023-02-01T02:59:27.688Z
2023-03-02T20:33:41.451Z
2023-03-10T20:05:13.704141Z
{'Vendor': 'IBM', 'Product': 'Spectrum Symphony', 'Versions': '7.3'}
CVE-2023-24426
Jenkins Azure AD Plugin 303.va_91ef20ee49f and earlier does not invalidate the previous session on login.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2980
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:14.956Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Azure AD Plugin', 'Versions': 'unspecified'}
CVE-2023-24308
A potential memory vulnerability due to insufficient input validation in PDFXEditCore.x64.dll in PDF-XChange Editor version 9.3 by Tracker Software may allow attackers to execute code when a user opens a crafted PDF file. The issue occurs when handling a large number of objects in a PDF file.
https://www.sit.fraunhofer.de/cve-2023-24308/
2023-01-23T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24758
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
https://github.com/strukturag/libde265/issues/383
2023-01-30T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24867
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24867
2023-01-31T20:32:35.463Z
2023-03-14T16:55:52.847Z
2023-12-14T18:31:48.267Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24534
HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.
https://go.dev/issue/58975
2023-01-25T21:19:20.642Z
2023-04-06T15:50:45.710Z
2023-06-12T19:08:10.543Z
{'Vendor': 'Go standard library', 'Product': 'net/textproto', 'Versions': '0, 1.20.0-0'}
CVE-2023-24164
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_000c2318.
https://github.com/DrizzlingSun/Tenda/blob/main/AC18/4/4.md
2023-01-23T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24471
An access control vulnerability was found, due to the restrictions that are applied on actual assertions not being enforced in their debug functionality. An authenticated user with reduced visibility can obtain unauthorized information via the debug functionality, obtaining data that would normally be not accessible in the Query and Assertions functions.
https://security.nozominetworks.com/NN-2023:5-01
2023-01-24T10:39:24.296Z
2023-08-09T08:54:27.616Z
2023-08-09T08:54:27.616Z
{'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'}
CVE-2023-24021
Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.
https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7
2023-01-20T00:00:00
2023-01-20T00:00:00
2023-04-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24922
Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24922
2023-01-31T20:37:47.253Z
2023-03-14T16:55:32.750Z
2023-12-14T18:31:28.100Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'}
CVE-2023-24236
TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the province parameter at setting/delStaticDhcpRules.
https://github.com/Am1ngl/ttt/tree/main/19
2023-01-23T00:00:00
2023-02-16T00:00:00
2023-02-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24689
An issue in Mojoportal v2.7.0.0 and below allows an authenticated attacker to list all css files inside the root path of the webserver via manipulation of the "s" parameter in /DesignTools/ManageSkin.aspx
https://www.mojoportal.com/
2023-01-30T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24959
IBM InfoSphere Information Systems 11.7 could expose information about the host system and environment configuration. IBM X-Force ID: 246332.
https://www.ibm.com/support/pages/node/6988615
2023-02-01T02:39:37.387Z
2023-08-28T00:56:30.619Z
2023-08-28T00:56:30.619Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-24261
A vulnerability in GL.iNET GL-E750 Mudi before firmware v3.216 allows authenticated attackers to execute arbitrary code via a crafted POST request.
https://justinapplegate.me/2023/glinet-CVE-2023-24261/
2023-01-23T00:00:00
2023-06-21T00:00:00
2023-06-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24774
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \controller\auth\Auth.php.
https://github.com/funadmin/funadmin/issues/12
2023-01-30T00:00:00
2023-03-10T00:00:00
2023-03-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24148
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the FileName parameter in the setUploadUserData function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setUploadUserData/setUploadUserData.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24518
A Cross-site Request Forgery (CSRF) vulnerability in Pandora FMS allows an attacker to force authenticated users to send a request to a web application they are currently authenticated against. This issue affects Pandora FMS version 767 and earlier versions on all platforms.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-01-25T13:49:34.265Z
2023-10-03T10:41:42.777Z
2023-10-03T10:41:42.777Z
{'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'}
CVE-2023-24762
OS Command injection vulnerability in D-Link DIR-867 DIR_867_FW1.30B07 allows attackers to execute arbitrary commands via a crafted LocalIPAddress parameter for the SetVirtualServerSettings to HNAP1.
https://www.dlink.com/en/security-bulletin/
2023-01-30T00:00:00
2023-03-13T00:00:00
2023-03-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24220
LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/RoleMapper.xml.
https://github.com/seagull1985/LuckyFrameWeb/issues/22
2023-01-23T00:00:00
2023-02-17T00:00:00
2023-02-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24735
PMB v7.4.6 was discovered to contain an open redirect vulnerability via the component /opac_css/pmb.php. This vulnerability allows attackers to redirect victim users to an external domain via a crafted URL.
https://github.com/AetherBlack/CVE/tree/main/PMB
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24559
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.401Z
2023-02-14T10:36:37.176Z
2023-03-14T09:31:26.597Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24108
MvcTools 6d48cd6830fc1df1d8c9d61caa1805fd6a1b7737 was discovered to contain a code execution backdoor via the request package (requirements.txt). This vulnerability allows attackers to access sensitive user information and execute arbitrary code.
https://mirrors.neusoft.edu.cn/pypi/web/simple/request/
2023-01-23T00:00:00
2023-02-22T00:00:00
2023-02-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24558
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.400Z
2023-02-14T10:36:36.036Z
2023-03-14T09:31:25.558Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24671
VX Search v13.8 and v14.7 was discovered to contain an unquoted service path vulnerability which allows attackers to execute arbitrary commands at elevated privileges via a crafted executable file.
https://medium.com/%40SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae
2023-01-30T00:00:00
2023-03-16T00:00:00
2023-03-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24221
LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/DeptMapper.xml.
https://github.com/seagull1985/LuckyFrameWeb/issues/23
2023-01-23T00:00:00
2023-02-17T00:00:00
2023-02-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24734
An arbitrary file upload vulnerability in the camera_upload.php component of PMB v7.4.6 allows attackers to execute arbitrary code via a crafted image file.
https://github.com/AetherBlack/CVE/tree/main/PMB
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24364
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter under the Admin Panel.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-23T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24919
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24919
2023-01-31T20:37:47.253Z
2023-03-14T16:55:30.715Z
2023-12-14T18:31:26.149Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'}
CVE-2023-24276
TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the country parameter at setting/delStaticDhcpRules.
https://github.com/Am1ngl/ttt/tree/main/18
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24626
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
https://savannah.gnu.org/bugs/?63195
2023-01-30T00:00:00
2023-04-08T00:00:00
2023-04-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24763
In the module "Xen Forum" (xenforum) for PrestaShop, an authenticated user can perform SQL injection in versions up to 2.13.0.
https://addons.prestashop.com/en/blog-forum-new/19299-xen-forum.html
2023-01-30T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24149
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for root which is stored in the component /etc/shadow.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/root_hard_code/root_hard_code.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24519
Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the ping tool utility.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706
2023-01-25T15:05:01.029Z
2023-07-06T14:53:30.365Z
2023-07-06T17:00:09.566Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-24775
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\Member.php.
https://github.com/funadmin/funadmin/issues/9
2023-01-30T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24958
A vulnerability in the IBM TS7700 Management Interface 8.51.2.12, 8.52.200.111, 8.52.102.13, and 8.53.0.63 could allow an authenticated user to submit a specially crafted URL leading to privilege escalation and remote code execution. IBM X-Force ID: 246320.
https://www.ibm.com/support/pages/node/6980845
2023-02-01T02:39:37.387Z
2023-05-04T13:38:49.305Z
2023-05-04T13:38:49.305Z
{'Vendor': 'IBM', 'Product': 'Virtualization Engine TS7700', 'Versions': '8.51.2.12, 8.52.200.111, 8.52.102.13, 8.53.0.63'}
CVE-2023-24688
An issue in Mojoportal v2.7.0.0 allows an unauthenticated attacker to register a new user even if the Allow User Registrations feature is disabled.
https://www.mojoportal.com/
2023-01-30T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24372
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in USB Memory Direct Simple Custom Author Profiles plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/simple-custom-author-profiles/wordpress-simple-custom-author-profiles-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:47.035Z
2023-05-09T10:44:05.337Z
2023-05-09T10:44:05.337Z
{'Vendor': 'USB Memory Direct', 'Product': 'Simple Custom Author Profiles', 'Versions': 'n/a'}
CVE-2023-24866
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24866
2023-01-31T20:32:35.463Z
2023-03-14T16:55:51.843Z
2023-12-14T18:31:47.263Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24535
Parsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.
https://go.dev/cl/475995
2023-01-25T21:19:20.642Z
2023-06-08T20:26:40.313Z
2023-06-12T19:07:56.917Z
{'Vendor': 'google.golang.org/protobuf', 'Product': 'google.golang.org/protobuf/encoding/prototext', 'Versions': '1.29.0'}
CVE-2023-24165
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/initIpAddrInfo.
https://github.com/DrizzlingSun/Tenda/blob/main/AC18/7/7.md
2023-01-23T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24470
Potential XML External Entity Injection in ArcSight Logger versions prior to 7.3.0.
https://portal.microfocus.com/s/article/KM000018224?language=en_US
2023-01-23T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'n/a', 'Product': 'ArcSight Logger', 'Versions': 'versions prior to 7.3.0'}
CVE-2023-24020
Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior could bypass the brute force protection, allowing multiple attempts to force a login.
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-03
2023-01-23T23:57:52.042Z
2023-01-30T21:54:49.887Z
null
{'Vendor': 'Snap One', 'Product': 'Wattbox WB-300-IP-3', 'Versions': '0'}
CVE-2023-24923
Microsoft OneDrive for Android Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24923
2023-01-31T20:37:47.253Z
2023-03-14T16:55:33.305Z
2023-12-14T18:31:28.594Z
{'Vendor': 'Microsoft', 'Product': 'OneDrive for Android', 'Versions': '1.0'}
CVE-2023-24132
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey3_5g parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24098
TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSysLog. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/04/README.md
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24562
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.401Z
2023-02-14T10:36:40.716Z
2023-03-14T09:31:29.675Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24831
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects Apache IoTDB Grafana Connector: from 0.13.0 through 0.13.3. Attackers could login without authorization. This is fixed in 0.13.4.
https://lists.apache.org/thread/3dgvzgstycf8b5hyf4z3n7cqdhcyln3l
2023-01-30T15:53:19.799Z
2023-04-17T06:42:06.404Z
2023-04-17T06:42:06.404Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache IoTDB', 'Versions': '0.13.0'}
CVE-2023-24427
Jenkins Bitbucket OAuth Plugin 0.12 and earlier does not invalidate the previous session on login.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2982
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:16.078Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Bitbucket OAuth Plugin', 'Versions': 'unspecified'}
CVE-2023-24827
syft is a a CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable. The `SYFT_ATTEST_PASSWORD` environment variable is for the `syft attest` command to generate attested SBOMs for the given container image. This environment variable is used to decrypt the private key (provided with `syft attest --key <path-to-key-file>`) during the signing process while generating an SBOM attestation. This vulnerability affects users running syft that have the `SYFT_ATTEST_PASSWORD` environment variable set with credentials (regardless of if the attest command is being used or not). Users that do not have the environment variable `SYFT_ATTEST_PASSWORD` set are not affected by this issue. The credentials are leaked in two ways: in the syft logs when `-vv` or `-vvv` are used in the syft command (which is any log level >= `DEBUG`) and in the attestation or SBOM only when the `syft-json` format is used. Note that as of v0.69.0 any generated attestations by the `syft attest` command are uploaded to the OCI registry (if you have write access to that registry) in the same way `cosign attach` is done. This means that any attestations generated for the affected versions of syft when the `SYFT_ATTEST_PASSWORD` environment variable was set would leak credentials in the attestation payload uploaded to the OCI registry. This issue has been patched in commit `9995950c70` and has been released as v0.70.0. There are no workarounds for this vulnerability. Users are advised to upgrade.
https://github.com/anchore/syft/security/advisories/GHSA-jp7v-3587-2956
2023-01-30T14:43:33.706Z
2023-02-07T00:07:38.460Z
null
{'Vendor': 'anchore', 'Product': 'syft', 'Versions': '>= 0.69.0, < 0.70.0'}
CVE-2023-24574
Dell Enterprise SONiC OS, 3.5.3, 4.0.0, 4.0.1, 4.0.2, contains an "Uncontrolled Resource Consumption vulnerability" in authentication component. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to uncontrolled resource consumption by creating permanent home directories for unauthenticated users.
https://www.dell.com/support/kbdoc/en-us/000208165/dsa-2023-039-dell-emc-enterprise-sonic-security-update-for-an-uncontrolled-resource-consumption-vulnerability
2023-01-26T16:27:33.569Z
2023-02-02T16:04:58.071Z
null
{'Vendor': 'Dell', 'Product': 'Enterprise SONiC OS', 'Versions': '0'}
CVE-2023-24124
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wrlEn parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24431
A missing permission check in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%281%29
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:20.585Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Orka by MacStadium Plugin', 'Versions': 'unspecified'}
CVE-2023-24348
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetACLFilter.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24489
A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller.
https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489
2023-01-24T15:49:52.579Z
2023-07-10T21:11:39.479Z
2023-07-10T21:11:39.479Z
{'Vendor': 'Citrix', 'Product': 'Citrix ShareFile Storage Zones Controller', 'Versions': '0'}
CVE-2023-24523
An attacker authenticated as a non-admin user with local access to a server port assigned to the SAP Host Agent (Start Service) - versions 7.21, 7.22, can submit a crafted ConfigureOutsideDiscovery request with an operating system command which will be executed with administrator privileges.  The OS command can read or modify any user or system data and can make the system unavailable.
https://launchpad.support.sap.com/#/notes/3285757
2023-01-25T15:46:55.581Z
2023-02-14T03:17:37.098Z
2023-04-11T21:26:20.554Z
{'Vendor': 'SAP', 'Product': 'Host Agent Service', 'Versions': '7.21, 7.22'}
CVE-2023-24870
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24870
2023-01-31T20:32:35.464Z
2023-03-14T16:55:56.399Z
2023-12-14T18:31:51.787Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24935
Microsoft Edge (Chromium-based) Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24935
2023-01-31T20:37:47.257Z
2023-04-11T19:12:59.904Z
2023-12-14T18:59:23.590Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-24387
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPdevart Organization chart plugin <= 1.4.4 versions.
https://patchstack.com/database/vulnerability/organization-chart/wordpress-wpdevart-organization-chart-plugin-1-4-4-cross-site-scripting-xss?_s_id=cve
2023-01-23T18:16:48.762Z
2023-04-06T10:57:18.669Z
2023-04-06T10:57:18.669Z
{'Vendor': 'WPdevart', 'Product': 'Organization chart', 'Versions': 'n/a'}
CVE-2023-24368
null
null
2023-01-23T00:00:00
null
2023-04-25T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-24411
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kerry Kline BNE Testimonials plugin <= 2.0.7 versions.
https://patchstack.com/database/vulnerability/bne-testimonials/wordpress-bne-testimonials-plugin-2-0-7-cross-site-scripting-xss?_s_id=cve
2023-01-23T18:16:51.989Z
2023-04-06T10:52:23.911Z
2023-04-06T10:52:23.911Z
{'Vendor': 'Kerry Kline', 'Product': 'BNE Testimonials', 'Versions': 'n/a'}
CVE-2023-24942
Remote Procedure Call Runtime Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942
2023-01-31T20:37:47.258Z
2023-05-09T17:02:54.880Z
2023-12-14T19:06:05.312Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24807
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w
2023-01-30T14:43:33.703Z
2023-02-16T17:30:19.923Z
2023-02-16T17:30:19.923Z
{'Vendor': 'nodejs', 'Product': 'undici', 'Versions': '< 5.19.1'}
CVE-2023-24554
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-26T14:06:35.399Z
2023-02-14T10:36:31.375Z
2023-03-14T09:31:21.336Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24104
Ubiquiti Networks UniFi Dream Machine Pro v7.2.95 allows attackers to bypass domain restrictions via crafted packets.
https://github.com/f1veT/BUG/issues/1
2023-01-23T00:00:00
2023-02-23T00:00:00
2023-02-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24780
Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/columns.
https://github.com/funadmin/funadmin/issues/6
2023-01-30T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24295
A stack overfow in SoftMaker Software GmbH FlexiPDF v3.0.3.0 allows attackers to execute arbitrary code after opening a crafted PDF file.
https://www.sit.fraunhofer.de/CVE-2023-24295/
2023-01-23T00:00:00
2023-03-23T00:00:00
2023-03-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24016
Uncontrolled search path element in some Intel(R) Quartus(R) Prime Pro and Standard edition software for linux may allow an authenticated user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00800.html
2023-02-01T04:00:02.739Z
2023-08-11T02:36:58.450Z
2023-08-11T02:36:58.450Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Quartus(R) Prime Pro and Standard edition software for linux', 'Versions': 'See references'}
CVE-2023-24446
A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2995
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:37.781Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenID Plugin', 'Versions': 'unspecified, next of 2.4'}
CVE-2023-24153
A command injection vulnerability in the version parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_version/recvSlaveCloudCheckStatus.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24503
Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-01-24T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Electra', 'Product': 'OSK201', 'Versions': 'Update to the latest version'}
CVE-2023-24850
Memory Corruption in HLOS while importing a cryptographic key into KeyMaster Trusted Application.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-01-31T16:25:23.369Z
2023-10-03T05:00:31.983Z
2023-10-03T05:00:31.983Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'APQ8017, APQ8037, AQT1000, AR8035, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Home Hub 100 Platform, PM8937, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QCA6174A, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCA9379, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN7606, QCN9024, QCS2290, QCS4290, QCS4490, QCS6125, QCS6490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, QSM8350, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8650P, SA9000P, SD 8 Gen1 5G, SD626, SD670, SD730, SD855, SD865 5G, SD888, SDM429W, SG4150P, SG8275P, SM4125, SM6250, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 427 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 435 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 450 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 625 Mobile Platform, Snapdragon 626 Mobile Platform, Snapdragon 632 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SRV1H, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-24796
Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints.
https://gist.github.com/yinfei6/3664387cb5b66b68c7eff4bfdb51b2d6
2023-01-30T00:00:00
2023-04-26T00:00:00
2023-04-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24329
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
https://pointernull.com/security/python-url-parse-problem.html
2023-01-23T00:00:00
2023-02-17T00:00:00
2023-09-20T21:06:19.477131
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24450
Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-10-24T12:48:42.431Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins view-cloner Plugin', 'Versions': 'unspecified, next of 1.1'}
CVE-2023-24000
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GamiPress gamipress allows SQL Injection.This issue affects GamiPress: from n/a through 2.5.7.
https://patchstack.com/database/vulnerability/gamipress/wordpress-gamipress-plugin-2-5-7-unauthenticated-sql-injection-vulnerability?_s_id=cve
2023-01-20T09:29:08.377Z
2023-10-31T13:54:07.430Z
2023-10-31T13:54:07.430Z
{'Vendor': 'GamiPress', 'Product': 'GamiPress', 'Versions': 'n/a'}
CVE-2023-24903
Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903
2023-01-31T20:32:35.472Z
2023-05-09T17:02:55.423Z
2023-12-14T19:06:05.817Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24515
Server-Side Request Forgery (SSRF) vulnerability in API checker of Pandora FMS. Application does not have a check on the URL scheme used while retrieving API URL. Rather than validating the http/https scheme, the application allows other scheme such as file, which could allow a malicious user to fetch internal file content. This issue affects Pandora FMS v767 version and prior versions on all platforms.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-01-25T13:49:34.265Z
2023-08-22T12:59:25.617Z
2023-10-18T11:06:06.895Z
{'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'}
CVE-2023-24145
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the plugin_version parameter in the setUnloadUserData function.
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setUnloadUserData/setUnloadUserData.md
2023-01-23T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24391
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Spider Teams ApplyOnline plugin <= 2.5 versions.
https://patchstack.com/database/vulnerability/apply-online/wordpress-applyonline-application-form-builder-and-manager-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-01-23T18:16:48.763Z
2023-08-10T12:28:18.681Z
2023-08-10T12:28:18.681Z
{'Vendor': 'Spider Teams', 'Product': 'ApplyOnline', 'Versions': 'n/a'}
CVE-2023-24684
ChurchCRM v4.5.3 and below was discovered to contain a SQL injection vulnerability via the EID parameter at GetText.php.
https://github.com/ChurchCRM/CRM
2023-01-30T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24954
Microsoft SharePoint Server Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24954
2023-01-31T20:37:47.263Z
2023-05-09T17:03:01.327Z
2023-12-14T19:06:11.347Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Enterprise Server 2016', 'Versions': '16.0.0'}
CVE-2023-24057
HL7 (Health Level 7) FHIR Core Libraries before 5.6.92 allow attackers to extract files into arbitrary directories via directory traversal from a crafted ZIP or TGZ archive (for a prepackaged terminology cache, NPM package, or comparison archive).
https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg
2023-01-22T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24811
Misskey is an open source, decentralized social media platform. In versions prior to 13.3.2 the URL preview function is subject to a cross site scripting vulnerability due to insufficient URL validation. Arbitrary JavaScript is executed when a malicious URL is loaded in the `View in Player` or `View in Window` preview. This has been fixed in version 13.3.2. Users are advised to upgrade. Users unable to upgrade should avoid usage of the `View in Player` or `View in Window` functions.
https://github.com/misskey-dev/misskey/security/advisories/GHSA-vc39-c453-67g3
2023-01-30T14:43:33.703Z
2023-02-22T19:13:29.602Z
2023-02-22T19:13:29.602Z
{'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.3.2'}
CVE-2023-24755
libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_weighted_pred_8_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
https://github.com/strukturag/libde265/issues/384
2023-01-30T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}