CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-24386 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Karishma Arora AI Contact Us Form plugin <= 1.0 versions. | https://patchstack.com/database/vulnerability/ai-contact-us/wordpress-ai-contact-us-form-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:48.762Z | 2023-04-23T09:38:17.238Z | 2023-04-23T09:38:17.238Z | {'Vendor': 'Karishma Arora', 'Product': 'AI Contact Us Form', 'Versions': 'n/a'} |
CVE-2023-24369 | A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter under the Add New Articles function. | https://github.com/ujcms/ujcms/issues/3 | 2023-01-23T00:00:00 | 2023-02-17T00:00:00 | 2023-02-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24488 | Cross site scripting vulnerability in Citrix ADC and Citrix Gateway in allows and attacker to perform cross site scripting | https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488 | 2023-01-24T15:49:52.579Z | 2023-07-10T20:41:31.248Z | 2023-07-10T20:41:53.469Z | {'Vendor': 'Citrix', 'Product': 'Citrix ADC and Citrix Gateway\u202f', 'Versions': '13.1, 13.0, 12.1, 12.1-FIPS , 13.1-FIPS , 12.1-NDcPP'} |
CVE-2023-24522 | Due to insufficient input sanitization, SAP NetWeaver AS ABAP (Business Server Pages) - versions 700, 701, 702, 731, 740, allows an unauthenticated user to alter the current session of the user by injecting the malicious code over the network and gain access to the unintended data. This may lead to a limited impact on the confidentiality and the integrity of the application.
| https://launchpad.support.sap.com/#/notes/3269118 | 2023-01-25T15:46:55.581Z | 2023-02-14T03:17:02.758Z | 2023-04-11T21:26:34.087Z | {'Vendor': 'SAP', 'Product': 'NetWeaver AS ABAP (BSP Framework)', 'Versions': '700, 701, 702, 731, 740'} |
CVE-2023-24871 | Windows Bluetooth Service Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24871 | 2023-01-31T20:32:35.464Z | 2023-03-14T16:55:57.416Z | 2023-12-14T18:31:52.784Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'} |
CVE-2023-24934 | Microsoft Defender Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24934 | 2023-01-31T20:37:47.257Z | 2023-04-14T21:27:55.042Z | 2023-12-14T18:59:23.083Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Malware Protection Platform', 'Versions': '4.0.0.0'} |
CVE-2023-24349 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetRoute. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24826 | RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send crafted frames to the device to trigger the usage of an uninitialized object leading to denial of service. This issue is fixed in version 2023.04. As a workaround, disable fragment forwarding or SFR. | https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xfj4-9g7w-f4gh | 2023-01-30T14:43:33.706Z | 2023-05-30T16:07:45.208Z | 2023-05-30T16:07:45.208Z | {'Vendor': 'RIOT-OS', 'Product': 'RIOT', 'Versions': '< 2023.04'} |
CVE-2023-24575 |
Dell Multifunction Printer E525w Driver and Software Suite, versions prior to 1.047.2022, A05, contain a local privilege escalation vulnerability that could be exploited by malicious users to compromise the affected system
| https://www.dell.com/support/kbdoc/en-us/000208396/dsa-2023-043 | 2023-01-26T16:27:33.569Z | 2023-02-21T04:03:48.673Z | 2023-02-21T04:03:48.673Z | {'Vendor': 'Dell', 'Product': 'Dell Multifunction Printer E525w Driver and Software Suite', 'Versions': '0'} |
CVE-2023-24125 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey2_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24430 | Jenkins Semantic Versioning Plugin 1.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%282%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:19.457Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Semantic Versioning Plugin', 'Versions': 'unspecified'} |
CVE-2023-24060 | Haven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functionality. Authenticated users with the ability to create new RSS Feeds or add RSS Feeds can supply an arbitrary hostname (or even the hostname of the Haven server itself). NOTE: this product has significant usage but does not have numbered releases; ordinary end users may typically use the master branch. | https://havenweb.org/ | 2023-01-23T00:00:00 | 2023-01-27T00:00:00 | 2023-01-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24133 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24099 | TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the username parameter at /formWizardPassword. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/07/README.md | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24563 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.401Z | 2023-02-14T10:36:41.883Z | 2023-03-14T09:31:30.687Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24830 | Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects iotdb-web-workbench component: from 0.13.0 before 0.13.3.
| https://lists.apache.org/thread/l4fon37687jz5ohgsnz2ko9fv400915t | 2023-01-30T15:43:01.950Z | 2023-01-30T16:25:33.163Z | 2023-03-08T16:15:25.489Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache IoTDB Workbench', 'Versions': '0.13.0'} |
CVE-2023-24975 |
IBM Spectrum Symphony 7.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 247030.
| https://www.ibm.com/support/pages/node/6959369 | 2023-02-01T02:59:27.688Z | 2023-03-02T20:33:41.451Z | 2023-03-10T20:05:13.704141Z | {'Vendor': 'IBM', 'Product': 'Spectrum Symphony', 'Versions': '7.3'} |
CVE-2023-24426 | Jenkins Azure AD Plugin 303.va_91ef20ee49f and earlier does not invalidate the previous session on login. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2980 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:14.956Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Azure AD Plugin', 'Versions': 'unspecified'} |
CVE-2023-24308 | A potential memory vulnerability due to insufficient input validation in PDFXEditCore.x64.dll in PDF-XChange Editor version 9.3 by Tracker Software may allow attackers to execute code when a user opens a crafted PDF file. The issue occurs when handling a large number of objects in a PDF file. | https://www.sit.fraunhofer.de/cve-2023-24308/ | 2023-01-23T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24758 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the ff_hevc_put_weighted_pred_avg_8_sse function at sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | https://github.com/strukturag/libde265/issues/383 | 2023-01-30T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24867 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24867 | 2023-01-31T20:32:35.463Z | 2023-03-14T16:55:52.847Z | 2023-12-14T18:31:48.267Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24534 | HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers. | https://go.dev/issue/58975 | 2023-01-25T21:19:20.642Z | 2023-04-06T15:50:45.710Z | 2023-06-12T19:08:10.543Z | {'Vendor': 'Go standard library', 'Product': 'net/textproto', 'Versions': '0, 1.20.0-0'} |
CVE-2023-24164 | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_000c2318. | https://github.com/DrizzlingSun/Tenda/blob/main/AC18/4/4.md | 2023-01-23T00:00:00 | 2023-01-26T00:00:00 | 2023-01-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24471 | An access control vulnerability was found, due to the restrictions that are applied on actual assertions not being enforced in their debug functionality.
An authenticated user with reduced visibility can obtain unauthorized information via the debug functionality, obtaining data that would normally be not accessible in the Query and Assertions functions.
| https://security.nozominetworks.com/NN-2023:5-01 | 2023-01-24T10:39:24.296Z | 2023-08-09T08:54:27.616Z | 2023-08-09T08:54:27.616Z | {'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'} |
CVE-2023-24021 | Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection. | https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.7 | 2023-01-20T00:00:00 | 2023-01-20T00:00:00 | 2023-04-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24922 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24922 | 2023-01-31T20:37:47.253Z | 2023-03-14T16:55:32.750Z | 2023-12-14T18:31:28.100Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'} |
CVE-2023-24236 | TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the province parameter at setting/delStaticDhcpRules. | https://github.com/Am1ngl/ttt/tree/main/19 | 2023-01-23T00:00:00 | 2023-02-16T00:00:00 | 2023-02-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24689 | An issue in Mojoportal v2.7.0.0 and below allows an authenticated attacker to list all css files inside the root path of the webserver via manipulation of the "s" parameter in /DesignTools/ManageSkin.aspx | https://www.mojoportal.com/ | 2023-01-30T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24959 | IBM InfoSphere Information Systems 11.7 could expose information about the host system and environment configuration. IBM X-Force ID: 246332. | https://www.ibm.com/support/pages/node/6988615 | 2023-02-01T02:39:37.387Z | 2023-08-28T00:56:30.619Z | 2023-08-28T00:56:30.619Z | {'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'} |
CVE-2023-24261 | A vulnerability in GL.iNET GL-E750 Mudi before firmware v3.216 allows authenticated attackers to execute arbitrary code via a crafted POST request. | https://justinapplegate.me/2023/glinet-CVE-2023-24261/ | 2023-01-23T00:00:00 | 2023-06-21T00:00:00 | 2023-06-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24774 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \controller\auth\Auth.php. | https://github.com/funadmin/funadmin/issues/12 | 2023-01-30T00:00:00 | 2023-03-10T00:00:00 | 2023-03-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24148 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the FileName parameter in the setUploadUserData function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setUploadUserData/setUploadUserData.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24518 | A Cross-site Request Forgery (CSRF) vulnerability in Pandora FMS allows an attacker to force authenticated users to send a request to a web application they are currently authenticated against. This issue affects Pandora FMS version 767 and earlier versions on all platforms. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-01-25T13:49:34.265Z | 2023-10-03T10:41:42.777Z | 2023-10-03T10:41:42.777Z | {'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'} |
CVE-2023-24762 | OS Command injection vulnerability in D-Link DIR-867 DIR_867_FW1.30B07 allows attackers to execute arbitrary commands via a crafted LocalIPAddress parameter for the SetVirtualServerSettings to HNAP1. | https://www.dlink.com/en/security-bulletin/ | 2023-01-30T00:00:00 | 2023-03-13T00:00:00 | 2023-03-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24220 | LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/RoleMapper.xml. | https://github.com/seagull1985/LuckyFrameWeb/issues/22 | 2023-01-23T00:00:00 | 2023-02-17T00:00:00 | 2023-02-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24735 | PMB v7.4.6 was discovered to contain an open redirect vulnerability via the component /opac_css/pmb.php. This vulnerability allows attackers to redirect victim users to an external domain via a crafted URL. | https://github.com/AetherBlack/CVE/tree/main/PMB | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24559 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.401Z | 2023-02-14T10:36:37.176Z | 2023-03-14T09:31:26.597Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24108 | MvcTools 6d48cd6830fc1df1d8c9d61caa1805fd6a1b7737 was discovered to contain a code execution backdoor via the request package (requirements.txt). This vulnerability allows attackers to access sensitive user information and execute arbitrary code. | https://mirrors.neusoft.edu.cn/pypi/web/simple/request/ | 2023-01-23T00:00:00 | 2023-02-22T00:00:00 | 2023-02-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24558 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.400Z | 2023-02-14T10:36:36.036Z | 2023-03-14T09:31:25.558Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24671 | VX Search v13.8 and v14.7 was discovered to contain an unquoted service path vulnerability which allows attackers to execute arbitrary commands at elevated privileges via a crafted executable file. | https://medium.com/%40SumitVerma101/windows-privilege-escalation-part-1-unquoted-service-path-c7a011a8d8ae | 2023-01-30T00:00:00 | 2023-03-16T00:00:00 | 2023-03-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24221 | LuckyframeWEB v3.5 was discovered to contain a SQL injection vulnerability via the dataScope parameter at /system/DeptMapper.xml. | https://github.com/seagull1985/LuckyFrameWeb/issues/23 | 2023-01-23T00:00:00 | 2023-02-17T00:00:00 | 2023-02-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24734 | An arbitrary file upload vulnerability in the camera_upload.php component of PMB v7.4.6 allows attackers to execute arbitrary code via a crafted image file. | https://github.com/AetherBlack/CVE/tree/main/PMB | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24364 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the username parameter under the Admin Panel. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-23T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24919 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24919 | 2023-01-31T20:37:47.253Z | 2023-03-14T16:55:30.715Z | 2023-12-14T18:31:26.149Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'} |
CVE-2023-24276 | TOTOlink A7100RU(V7.4cu.2313_B20191024) was discovered to contain a command injection vulnerability via the country parameter at setting/delStaticDhcpRules. | https://github.com/Am1ngl/ttt/tree/main/18 | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24626 | socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process. | https://savannah.gnu.org/bugs/?63195 | 2023-01-30T00:00:00 | 2023-04-08T00:00:00 | 2023-04-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24763 | In the module "Xen Forum" (xenforum) for PrestaShop, an authenticated user can perform SQL injection in versions up to 2.13.0. | https://addons.prestashop.com/en/blog-forum-new/19299-xen-forum.html | 2023-01-30T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24149 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a hard code password for root which is stored in the component /etc/shadow. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/root_hard_code/root_hard_code.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24519 | Two OS command injection vulnerability exist in the vtysh_ubus toolsh_excute.constprop.1 functionality of Milesight UR32L v32.3.0.5. A specially-crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the ping tool utility. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1706 | 2023-01-25T15:05:01.029Z | 2023-07-06T14:53:30.365Z | 2023-07-06T17:00:09.566Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-24775 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at \member\Member.php. | https://github.com/funadmin/funadmin/issues/9 | 2023-01-30T00:00:00 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24958 | A vulnerability in the IBM TS7700 Management Interface 8.51.2.12, 8.52.200.111, 8.52.102.13, and 8.53.0.63 could allow an authenticated user to submit a specially crafted URL leading to privilege escalation and remote code execution. IBM X-Force ID: 246320. | https://www.ibm.com/support/pages/node/6980845 | 2023-02-01T02:39:37.387Z | 2023-05-04T13:38:49.305Z | 2023-05-04T13:38:49.305Z | {'Vendor': 'IBM', 'Product': 'Virtualization Engine TS7700', 'Versions': '8.51.2.12, 8.52.200.111, 8.52.102.13, 8.53.0.63'} |
CVE-2023-24688 | An issue in Mojoportal v2.7.0.0 allows an unauthenticated attacker to register a new user even if the Allow User Registrations feature is disabled. | https://www.mojoportal.com/ | 2023-01-30T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24372 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in USB Memory Direct Simple Custom Author Profiles plugin <= 1.0.0 versions. | https://patchstack.com/database/vulnerability/simple-custom-author-profiles/wordpress-simple-custom-author-profiles-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:47.035Z | 2023-05-09T10:44:05.337Z | 2023-05-09T10:44:05.337Z | {'Vendor': 'USB Memory Direct', 'Product': 'Simple Custom Author Profiles', 'Versions': 'n/a'} |
CVE-2023-24866 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24866 | 2023-01-31T20:32:35.463Z | 2023-03-14T16:55:51.843Z | 2023-12-14T18:31:47.263Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24535 | Parsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic. | https://go.dev/cl/475995 | 2023-01-25T21:19:20.642Z | 2023-06-08T20:26:40.313Z | 2023-06-12T19:07:56.917Z | {'Vendor': 'google.golang.org/protobuf', 'Product': 'google.golang.org/protobuf/encoding/prototext', 'Versions': '1.29.0'} |
CVE-2023-24165 | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/initIpAddrInfo. | https://github.com/DrizzlingSun/Tenda/blob/main/AC18/7/7.md | 2023-01-23T00:00:00 | 2023-01-26T00:00:00 | 2023-01-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24470 | Potential XML External Entity Injection in ArcSight Logger versions prior to 7.3.0. | https://portal.microfocus.com/s/article/KM000018224?language=en_US | 2023-01-23T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'ArcSight Logger', 'Versions': 'versions prior to 7.3.0'} |
CVE-2023-24020 |
Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior could bypass the brute force protection, allowing multiple attempts to force a login.
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-03 | 2023-01-23T23:57:52.042Z | 2023-01-30T21:54:49.887Z | null | {'Vendor': 'Snap One', 'Product': 'Wattbox WB-300-IP-3', 'Versions': '0'} |
CVE-2023-24923 | Microsoft OneDrive for Android Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24923 | 2023-01-31T20:37:47.253Z | 2023-03-14T16:55:33.305Z | 2023-12-14T18:31:28.594Z | {'Vendor': 'Microsoft', 'Product': 'OneDrive for Android', 'Versions': '1.0'} |
CVE-2023-24132 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey3_5g parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24098 | TrendNet Wireless AC Easy-Upgrader TEW-820AP v1.0R, firmware version 1.01.B01 was discovered to contain a stack overflow via the submit-url parameter at /formSysLog. This vulnerability allows attackers to execute arbitrary code via a crafted payload. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/chunklhit/cve/blob/master/TRENDNet/TEW-820AP/04/README.md | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | 2023-01-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24562 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.401Z | 2023-02-14T10:36:40.716Z | 2023-03-14T09:31:29.675Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24831 | Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects Apache IoTDB Grafana Connector: from 0.13.0 through 0.13.3.
Attackers could login without authorization. This is fixed in 0.13.4. | https://lists.apache.org/thread/3dgvzgstycf8b5hyf4z3n7cqdhcyln3l | 2023-01-30T15:53:19.799Z | 2023-04-17T06:42:06.404Z | 2023-04-17T06:42:06.404Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache IoTDB', 'Versions': '0.13.0'} |
CVE-2023-24427 | Jenkins Bitbucket OAuth Plugin 0.12 and earlier does not invalidate the previous session on login. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2982 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:16.078Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Bitbucket OAuth Plugin', 'Versions': 'unspecified'} |
CVE-2023-24827 | syft is a a CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems. A password disclosure flaw was found in Syft versions v0.69.0 and v0.69.1. This flaw leaks the password stored in the SYFT_ATTEST_PASSWORD environment variable. The `SYFT_ATTEST_PASSWORD` environment variable is for the `syft attest` command to generate attested SBOMs for the given container image. This environment variable is used to decrypt the private key (provided with `syft attest --key <path-to-key-file>`) during the signing process while generating an SBOM attestation. This vulnerability affects users running syft that have the `SYFT_ATTEST_PASSWORD` environment variable set with credentials (regardless of if the attest command is being used or not). Users that do not have the environment variable `SYFT_ATTEST_PASSWORD` set are not affected by this issue. The credentials are leaked in two ways: in the syft logs when `-vv` or `-vvv` are used in the syft command (which is any log level >= `DEBUG`) and in the attestation or SBOM only when the `syft-json` format is used. Note that as of v0.69.0 any generated attestations by the `syft attest` command are uploaded to the OCI registry (if you have write access to that registry) in the same way `cosign attach` is done. This means that any attestations generated for the affected versions of syft when the `SYFT_ATTEST_PASSWORD` environment variable was set would leak credentials in the attestation payload uploaded to the OCI registry. This issue has been patched in commit `9995950c70` and has been released as v0.70.0. There are no workarounds for this vulnerability. Users are advised to upgrade. | https://github.com/anchore/syft/security/advisories/GHSA-jp7v-3587-2956 | 2023-01-30T14:43:33.706Z | 2023-02-07T00:07:38.460Z | null | {'Vendor': 'anchore', 'Product': 'syft', 'Versions': '>= 0.69.0, < 0.70.0'} |
CVE-2023-24574 |
Dell Enterprise SONiC OS, 3.5.3, 4.0.0, 4.0.1, 4.0.2, contains an "Uncontrolled Resource Consumption vulnerability" in authentication component. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to uncontrolled resource consumption by creating permanent home directories for unauthenticated users.
| https://www.dell.com/support/kbdoc/en-us/000208165/dsa-2023-039-dell-emc-enterprise-sonic-security-update-for-an-uncontrolled-resource-consumption-vulnerability | 2023-01-26T16:27:33.569Z | 2023-02-02T16:04:58.071Z | null | {'Vendor': 'Dell', 'Product': 'Enterprise SONiC OS', 'Versions': '0'} |
CVE-2023-24124 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wrlEn parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24431 | A missing permission check in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%281%29 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:20.585Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Orka by MacStadium Plugin', 'Versions': 'unspecified'} |
CVE-2023-24348 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the curTime parameter at /goform/formSetACLFilter. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24489 |
A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller. | https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489 | 2023-01-24T15:49:52.579Z | 2023-07-10T21:11:39.479Z | 2023-07-10T21:11:39.479Z | {'Vendor': 'Citrix', 'Product': 'Citrix ShareFile Storage Zones Controller', 'Versions': '0'} |
CVE-2023-24523 | An attacker authenticated as a non-admin user with local access to a server port assigned to the SAP Host Agent (Start Service) - versions 7.21, 7.22, can submit a crafted ConfigureOutsideDiscovery request with an operating system command which will be executed with administrator privileges. The OS command can read or modify any user or system data and can make the system unavailable.
| https://launchpad.support.sap.com/#/notes/3285757 | 2023-01-25T15:46:55.581Z | 2023-02-14T03:17:37.098Z | 2023-04-11T21:26:20.554Z | {'Vendor': 'SAP', 'Product': 'Host Agent Service', 'Versions': '7.21, 7.22'} |
CVE-2023-24870 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24870 | 2023-01-31T20:32:35.464Z | 2023-03-14T16:55:56.399Z | 2023-12-14T18:31:51.787Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24935 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24935 | 2023-01-31T20:37:47.257Z | 2023-04-11T19:12:59.904Z | 2023-12-14T18:59:23.590Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'} |
CVE-2023-24387 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPdevart Organization chart plugin <= 1.4.4 versions. | https://patchstack.com/database/vulnerability/organization-chart/wordpress-wpdevart-organization-chart-plugin-1-4-4-cross-site-scripting-xss?_s_id=cve | 2023-01-23T18:16:48.762Z | 2023-04-06T10:57:18.669Z | 2023-04-06T10:57:18.669Z | {'Vendor': 'WPdevart', 'Product': 'Organization chart', 'Versions': 'n/a'} |
CVE-2023-24368 | null | null | 2023-01-23T00:00:00 | null | 2023-04-25T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-24411 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kerry Kline BNE Testimonials plugin <= 2.0.7 versions. | https://patchstack.com/database/vulnerability/bne-testimonials/wordpress-bne-testimonials-plugin-2-0-7-cross-site-scripting-xss?_s_id=cve | 2023-01-23T18:16:51.989Z | 2023-04-06T10:52:23.911Z | 2023-04-06T10:52:23.911Z | {'Vendor': 'Kerry Kline', 'Product': 'BNE Testimonials', 'Versions': 'n/a'} |
CVE-2023-24942 | Remote Procedure Call Runtime Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942 | 2023-01-31T20:37:47.258Z | 2023-05-09T17:02:54.880Z | 2023-12-14T19:06:05.312Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24807 | Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available. | https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w | 2023-01-30T14:43:33.703Z | 2023-02-16T17:30:19.923Z | 2023-02-16T17:30:19.923Z | {'Vendor': 'nodejs', 'Product': 'undici', 'Versions': '< 5.19.1'} |
CVE-2023-24554 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2023 (All versions < V223.0Update2). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-26T14:06:35.399Z | 2023-02-14T10:36:31.375Z | 2023-03-14T09:31:21.336Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24104 | Ubiquiti Networks UniFi Dream Machine Pro v7.2.95 allows attackers to bypass domain restrictions via crafted packets. | https://github.com/f1veT/BUG/issues/1 | 2023-01-23T00:00:00 | 2023-02-23T00:00:00 | 2023-02-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24780 | Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/columns. | https://github.com/funadmin/funadmin/issues/6 | 2023-01-30T00:00:00 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24295 | A stack overfow in SoftMaker Software GmbH FlexiPDF v3.0.3.0 allows attackers to execute arbitrary code after opening a crafted PDF file. | https://www.sit.fraunhofer.de/CVE-2023-24295/ | 2023-01-23T00:00:00 | 2023-03-23T00:00:00 | 2023-03-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24016 | Uncontrolled search path element in some Intel(R) Quartus(R) Prime Pro and Standard edition software for linux may allow an authenticated user to potentially enable escalation of privilege via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00800.html | 2023-02-01T04:00:02.739Z | 2023-08-11T02:36:58.450Z | 2023-08-11T02:36:58.450Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Quartus(R) Prime Pro and Standard edition software for linux', 'Versions': 'See references'} |
CVE-2023-24446 | A cross-site request forgery (CSRF) vulnerability in Jenkins OpenID Plugin 2.4 and earlier allows attackers to trick users into logging in to the attacker's account. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2995 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:37.781Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenID Plugin', 'Versions': 'unspecified, next of 2.4'} |
CVE-2023-24153 | A command injection vulnerability in the version parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_version/recvSlaveCloudCheckStatus.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24503 | Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW. | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-01-24T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Electra', 'Product': 'OSK201', 'Versions': 'Update to the latest version'} |
CVE-2023-24850 | Memory Corruption in HLOS while importing a cryptographic key into KeyMaster Trusted Application. | https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin | 2023-01-31T16:25:23.369Z | 2023-10-03T05:00:31.983Z | 2023-10-03T05:00:31.983Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'APQ8017, APQ8037, AQT1000, AR8035, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Home Hub 100 Platform, PM8937, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QCA6174A, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCA9379, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN7606, QCN9024, QCS2290, QCS4290, QCS4490, QCS6125, QCS6490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, QSM8350, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8650P, SA9000P, SD 8 Gen1 5G, SD626, SD670, SD730, SD855, SD865 5G, SD888, SDM429W, SG4150P, SG8275P, SM4125, SM6250, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 427 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 435 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 450 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 625 Mobile Platform, Snapdragon 626 Mobile Platform, Snapdragon 632 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SRV1H, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-24796 | Password vulnerability found in Vinga WR-AC1200 81.102.1.4370 and before allows a remote attacker to execute arbitrary code via the password parameter at the /goform/sysTools and /adm/systools.asp endpoints. | https://gist.github.com/yinfei6/3664387cb5b66b68c7eff4bfdb51b2d6 | 2023-01-30T00:00:00 | 2023-04-26T00:00:00 | 2023-04-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24329 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. | https://pointernull.com/security/python-url-parse-problem.html | 2023-01-23T00:00:00 | 2023-02-17T00:00:00 | 2023-09-20T21:06:19.477131 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24450 | Jenkins view-cloner Plugin 1.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2787 | 2023-01-23T00:00:00 | 2023-01-24T00:00:00 | 2023-10-24T12:48:42.431Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins view-cloner Plugin', 'Versions': 'unspecified, next of 1.1'} |
CVE-2023-24000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GamiPress gamipress allows SQL Injection.This issue affects GamiPress: from n/a through 2.5.7.
| https://patchstack.com/database/vulnerability/gamipress/wordpress-gamipress-plugin-2-5-7-unauthenticated-sql-injection-vulnerability?_s_id=cve | 2023-01-20T09:29:08.377Z | 2023-10-31T13:54:07.430Z | 2023-10-31T13:54:07.430Z | {'Vendor': 'GamiPress', 'Product': 'GamiPress', 'Versions': 'n/a'} |
CVE-2023-24903 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903 | 2023-01-31T20:32:35.472Z | 2023-05-09T17:02:55.423Z | 2023-12-14T19:06:05.817Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24515 | Server-Side Request Forgery (SSRF) vulnerability in API checker of Pandora FMS. Application does not have a check on the URL scheme used while retrieving API URL. Rather than validating the http/https scheme, the application allows other scheme such as file, which could allow a malicious user to fetch internal file content. This issue affects Pandora FMS v767 version and prior versions on all platforms. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-01-25T13:49:34.265Z | 2023-08-22T12:59:25.617Z | 2023-10-18T11:06:06.895Z | {'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'} |
CVE-2023-24145 | TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the plugin_version parameter in the setUnloadUserData function. | https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setUnloadUserData/setUnloadUserData.md | 2023-01-23T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24391 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Spider Teams ApplyOnline plugin <= 2.5 versions. | https://patchstack.com/database/vulnerability/apply-online/wordpress-applyonline-application-form-builder-and-manager-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-01-23T18:16:48.763Z | 2023-08-10T12:28:18.681Z | 2023-08-10T12:28:18.681Z | {'Vendor': 'Spider Teams', 'Product': 'ApplyOnline', 'Versions': 'n/a'} |
CVE-2023-24684 | ChurchCRM v4.5.3 and below was discovered to contain a SQL injection vulnerability via the EID parameter at GetText.php. | https://github.com/ChurchCRM/CRM | 2023-01-30T00:00:00 | 2023-02-09T00:00:00 | 2023-02-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24954 | Microsoft SharePoint Server Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24954 | 2023-01-31T20:37:47.263Z | 2023-05-09T17:03:01.327Z | 2023-12-14T19:06:11.347Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Enterprise Server 2016', 'Versions': '16.0.0'} |
CVE-2023-24057 | HL7 (Health Level 7) FHIR Core Libraries before 5.6.92 allow attackers to extract files into arbitrary directories via directory traversal from a crafted ZIP or TGZ archive (for a prepackaged terminology cache, NPM package, or comparison archive). | https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg | 2023-01-22T00:00:00 | 2023-01-24T00:00:00 | 2023-01-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24811 | Misskey is an open source, decentralized social media platform. In versions prior to 13.3.2 the URL preview function is subject to a cross site scripting vulnerability due to insufficient URL validation. Arbitrary JavaScript is executed when a malicious URL is loaded in the `View in Player` or `View in Window` preview. This has been fixed in version 13.3.2. Users are advised to upgrade. Users unable to upgrade should avoid usage of the `View in Player` or `View in Window` functions.
| https://github.com/misskey-dev/misskey/security/advisories/GHSA-vc39-c453-67g3 | 2023-01-30T14:43:33.703Z | 2023-02-22T19:13:29.602Z | 2023-02-22T19:13:29.602Z | {'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.3.2'} |
CVE-2023-24755 | libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_weighted_pred_8_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file. | https://github.com/strukturag/libde265/issues/384 | 2023-01-30T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.