CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-24610
NOSH 4a5cfdb allows remote authenticated users to execute PHP arbitrary code via the "practice logo" upload feature. The client-side checks can be bypassed. This may allow attackers to steal Protected Health Information because the product is for health charting.
https://github.com/shihjay2/docker-nosh
2023-01-30T00:00:00
2023-02-01T00:00:00
2023-02-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24493
A formula injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could leverage the reporting system to export reports containing formulas, which would then require a victim to approve and execute on a host.
https://www.tenable.com/security/tns-2023-03
2023-01-24T00:00:00
2023-01-25T00:00:00
2023-01-25T00:00:00
{'Vendor': 'n/a', 'Product': 'Tenable.sc', 'Versions': 'Tenable.sc versions 5.23.1 and earlier'}
CVE-2023-24169
Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_0007343c.
https://github.com/DrizzlingSun/Tenda/blob/main/AC18/6/6.md
2023-01-23T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24539
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
https://go.dev/issue/59720
2023-01-25T21:19:20.642Z
2023-05-11T15:29:38.143Z
2023-06-12T19:08:23.986Z
{'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'}
CVE-2023-24885
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24885
2023-01-31T20:32:35.468Z
2023-04-11T19:13:29.925Z
2023-12-14T18:59:28.781Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-24352
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWPS.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24217
AgileBio Electronic Lab Notebook v4.234 was discovered to contain a local file inclusion vulnerability.
https://labcollector.com/labcollector-lims/add-ons/eln-electronic-lab-notebook/
2023-01-23T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24647
Food Ordering System v2.0 was discovered to contain a SQL injection vulnerability via the email parameter.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Food-Ordering-System-v2.0/SQLi
2023-01-30T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24997
Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 https://github.com/apache/inlong/pull/7223  to solve it.
https://lists.apache.org/thread/nxvtxq7oxhwyzo9ty2hqz8rvh5r7ngd8
2023-02-01T10:29:47.039Z
2023-02-01T14:49:44.930Z
null
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.1.0'}
CVE-2023-24094
An issue in the bridge2 component of MikroTik RouterOS v6.40.5 allows attackers to cause a Denial of Service (DoS) via crafted packets.
http://mikrotik.com
2023-01-23T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24581
A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted STP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19425)
https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf
2023-01-27T16:12:53.048Z
2023-02-14T10:36:46.345Z
2023-03-14T09:31:34.788Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'}
CVE-2023-24978
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted SPP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19788)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.542Z
2023-02-14T10:36:47.474Z
2023-03-14T09:31:35.828Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24344
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWlanGuestSetup.
https://www.dlink.com/en/security-bulletin/
2023-01-23T00:00:00
2023-02-10T00:00:00
2023-02-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24651
Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter on the registration page.
https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html
2023-01-30T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24201
Raffle Draw System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at get_ticket.php.
https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html
2023-01-23T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24128
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey2 parameter at /goform/WifiBasicSet.
http://eagle.com
2023-01-23T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24578
McAfee Total Protection prior to 16.0.49 allows attackers to elevate user privileges due to DLL sideloading. This could enable a user with lower privileges to execute unauthorized tasks.
https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html
2023-01-27T00:00:00
2023-03-13T00:00:00
2023-03-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24981
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19791)
https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf
2023-02-01T09:35:11.542Z
2023-02-14T10:36:50.780Z
2023-03-14T09:31:38.915Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'}
CVE-2023-24597
OX App Suite before frontend 7.10.6-rev24 allows the loading (without user consent) of an e-mail message's remote resources during printing.
https://open-xchange.com
2023-01-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24256
An issue in the com.nextev.datastatistic component of NIO EC6 Aspen before v3.3.0 allows attackers to escalate privileges via path traversal.
https://github.com/hhj4ck/JailBreakEC6/blob/main/BugReport.md
2023-01-23T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-24485
Vulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app.
https://support.citrix.com/article/CTX477617/citrix-workspace-app-for-windows-security-bulletin-for-cve202324484-cve202324485
2023-01-24T00:00:00
2023-02-16T00:00:00
2023-02-16T00:00:00
{'Vendor': 'Citrix', 'Product': 'Citrix Workspace App for Windows', 'Versions': 'Citrix Workspace App versions'}
CVE-2023-24893
Visual Studio Code Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24893
2023-01-31T20:32:35.470Z
2023-04-11T19:13:24.013Z
2023-12-14T18:59:22.555Z
{'Vendor': 'Microsoft', 'Product': 'Visual Studio Code', 'Versions': '1.0.0'}
CVE-2023-24939
Server for NFS Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24939
2023-01-31T20:37:47.257Z
2023-05-09T17:02:51.663Z
2023-12-14T19:06:02.094Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-41791
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed users with low privileges to introduce Javascript executables via a translation string that could affect the integrity of some configuration files. This issue affects Pandora FMS: from 700 through 773.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T11:54:47.539Z
2023-11-23T14:41:46.802Z
2023-11-23T14:41:46.802Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41284
A SQL injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following version: QuMagie 2.1.4 and later
https://www.qnap.com/en/security-advisory/qsa-23-50
2023-08-28T09:45:52.366Z
2023-11-10T16:01:54.206Z
2023-11-10T16:01:54.206Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QuMagie', 'Versions': '2.1.x'}
CVE-2023-41904
Zoho ManageEngine ADManager Plus before 7203 allows 2FA bypass (for AuthToken generation) in REST APIs.
https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-41904.html
2023-09-05T00:00:00
2023-09-26T00:00:00
2023-09-26T13:35:05.066821
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41841
An improper authorization vulnerability in Fortinet FortiOS 7.0.0 - 7.0.11 and 7.2.0 - 7.2.4 allows an attacker belonging to the prof-admin profile to perform elevated actions.
https://fortiguard.com/psirt/FG-IR-23-318
2023-09-04T08:12:52.814Z
2023-10-10T16:49:35.723Z
2023-10-10T16:49:35.723Z
{'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.2.0, 7.0.0'}
CVE-2023-41729
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.22.3.31 versions.
https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-cross-site-scripting-xss?_s_id=cve
2023-08-31T06:58:39.903Z
2023-10-02T07:39:34.189Z
2023-10-02T07:39:34.189Z
{'Vendor': 'SendPress', 'Product': 'SendPress Newsletters', 'Versions': 'n/a'}
CVE-2023-41050
AccessControl provides a general security framework for use in Zope. Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure. `AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe. Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-8xv7-89vj-q48c
2023-08-22T16:57:23.933Z
2023-09-06T17:58:10.510Z
2023-09-06T17:58:10.510Z
{'Vendor': 'zopefoundation', 'Product': 'AccessControl', 'Versions': 'AccessControl: < 4.4, AccessControl: >= 5.0, < 5.8, AccessControl: >= 6.0, < 6.2, Zope: < 4.8.9, Zope: >= 5.0.0, < 5.8.4'}
CVE-2023-41115
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. When using UTL_ENCODE, an authenticated user can read any large object, regardless of that user's permissions.
https://www.enterprisedb.com/docs/security/advisories/cve202341115/
2023-08-23T00:00:00
2023-12-12T00:00:00
2023-12-12T07:05:07.765255
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41945
Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3065
2023-09-05T16:39:57.394Z
2023-09-06T12:09:02.231Z
2023-10-24T12:51:56.463Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Assembla Auth Plugin', 'Versions': '0'}
CVE-2023-41046
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible in XWiki to execute Velocity code without having script right by creating an XClass with a property of type "TextArea" and content type "VelocityCode" or "VelocityWiki". For the former, the syntax of the document needs to be set the `xwiki/1.0` (this syntax doesn't need to be installed). In both cases, when adding the property to an object, the Velocity code is executed regardless of the rights of the author of the property (edit right is still required, though). In both cases, the code is executed with the correct context author so no privileged APIs can be accessed. However, Velocity still grants access to otherwise inaccessible data and APIs that could allow further privilege escalation. At least for "VelocityCode", this behavior is most likely very old but only since XWiki 7.2, script right is a separate right, before that version all users were allowed to execute Velocity and thus this was expected and not a security issue. This has been patched in XWiki 14.10.10 and 15.4 RC1. Users are advised to upgrade. There are no known workarounds.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m5m2-h6h9-p2c8
2023-08-22T16:57:23.933Z
2023-09-01T19:59:23.278Z
2023-09-01T19:59:23.278Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.2, < 14.10.10, >= 15.0-rc-1, < 15.4-rc-1'}
CVE-2023-41553
Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetStaticRouteCfg.
https://github.com/peris-navince/founded-0-days/blob/main/fromSetRouteStatic/1.md
2023-08-30T00:00:00
2023-08-30T00:00:00
2023-08-30T12:31:36.490197
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41103
Interact 7.9.79.5 allows stored Cross-site Scripting (XSS) attacks in several locations, allowing an attacker to store a JavaScript payload.
https://www.interactsoftware.com/
2023-08-23T00:00:00
2023-09-11T00:00:00
2023-09-11T18:47:25.307450
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41800
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in UniConsent UniConsent CMP for GDPR CPRA GPP TCF plugin <= 1.4.2 versions.
https://patchstack.com/database/vulnerability/uniconsent-cmp/wordpress-uniconsent-cookie-consent-cmp-for-gdpr-ccpa-plugin-1-4-2-cross-site-scripting-xss?_s_id=cve
2023-09-01T11:55:20.628Z
2023-10-02T08:24:20.434Z
2023-10-02T08:24:20.434Z
{'Vendor': 'UniConsent', 'Product': 'UniConsent CMP for GDPR CPRA GPP TCF', 'Versions': 'n/a'}
CVE-2023-41787
Uncontrolled Search Path Element vulnerability in Pandora FMS on all allows Leveraging/Manipulating Configuration File Search Paths. This vulnerability allows access to files with sensitive information. This issue affects Pandora FMS: from 700 through 772.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-09-01T11:54:47.538Z
2023-11-23T14:31:41.618Z
2023-11-23T14:31:41.618Z
{'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'}
CVE-2023-41768
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41768
2023-08-31T23:30:45.393Z
2023-10-10T17:07:27.029Z
2023-12-14T01:15:00.726Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-41338
Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version.
https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f
2023-08-28T16:56:43.368Z
2023-09-08T18:17:18.044Z
2023-09-08T18:17:18.044Z
{'Vendor': 'gofiber', 'Product': 'fiber', 'Versions': '< 2.49.2'}
CVE-2023-41011
Command Execution vulnerability in China Mobile Communications China Mobile Intelligent Home Gateway v.HG6543C4 allows a remote attacker to execute arbitrary code via the shortcut_telnet.cg component.
https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4
2023-08-22T00:00:00
2023-09-14T00:00:00
2023-09-14T18:42:18.625706
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41154
A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-09-13T00:00:00
2023-09-13T21:08:07.076190
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41713
SonicOS Use of Hard-coded Password vulnerability in the 'dynHandleBuyToolbar' demo function.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012
2023-08-30T17:07:28.452Z
2023-10-17T22:28:50.229Z
2023-10-17T22:28:50.229Z
{'Vendor': 'SonicWall', 'Product': 'SonicOS', 'Versions': '7.0.1-5119 and earlier versions, 7.0.1-5129 and earlier versions, 6.5.4.4-44v-21-2079 and earlier versions, 6.5.4.12-101n and earlier versions'}
CVE-2023-41343
Rogic No-Code Database Builder's file uploading function has insufficient filtering for special characters. A remote attacker with regular user privilege can inject JavaScript to perform XSS (Stored Cross-Site Scripting) attack.
https://www.twcert.org.tw/tw/cp-132-7509-5b734-1.html
2023-08-29T00:11:47.811Z
2023-11-03T04:11:29.131Z
2023-11-03T04:11:29.131Z
{'Vendor': 'Ragic', 'Product': 'No-Code Database Builder ', 'Versions': 'All version before patching'}
CVE-2023-41986
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to modify protected parts of the file system.
https://support.apple.com/en-us/HT213938
2023-09-06T17:40:06.141Z
2023-09-26T20:12:01.498Z
2023-09-26T20:12:01.498Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41085
When IPSec is configured on a Virtual Server, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
https://my.f5.com/manage/s/article/K000132420
2023-10-05T19:17:25.734Z
2023-10-10T12:33:11.777Z
2023-10-10T12:33:11.777Z
{'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'}
CVE-2023-41314
The api /api/snapshot and /api/get_log_file would allow unauthenticated access. It could allow a DoS attack or get arbitrary files from FE node. Please upgrade to 2.0.3 to fix these issues.
https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4
2023-08-28T15:52:14.092Z
2023-12-18T08:27:51.999Z
2023-12-18T08:27:51.999Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Doris', 'Versions': '1.2.0'}
CVE-2023-41744
Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-4728
2023-08-31T14:10:27.638Z
2023-08-31T15:14:13.720Z
2023-08-31T15:14:13.720Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-41601
Multiple cross-site scripting (XSS) vulnerabilities in install/index.php of CSZ CMS v1.3.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Database Username or Database Host parameters.
https://www.cszcms.com/
2023-08-30T00:00:00
2023-09-06T00:00:00
2023-09-06T19:46:42.913671
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41178
Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker. Please note, this vulnerability is similar to, but not identical to, CVE-2023-41176.
https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US
2023-08-24T14:36:57.668Z
2024-01-23T20:36:01.653Z
2024-01-23T20:36:01.653Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Mobile Security for Enterprise', 'Versions': '9.8 SP5'}
CVE-2023-41894
Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45
2023-09-04T16:31:48.225Z
2023-10-19T23:23:17.909Z
2023-10-19T23:23:17.909Z
{'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.9.0'}
CVE-2023-41752
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.
https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q
2023-08-31T20:55:13.999Z
2023-10-17T06:57:47.508Z
2023-10-17T06:57:47.508Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Traffic Server', 'Versions': '8.0.0, 9.0.0'}
CVE-2023-41302
Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally.
https://consumer.huawei.com/en/support/bulletin/2023/9/
2023-08-28T12:17:07.354Z
2023-09-25T12:16:12.190Z
2023-09-25T12:16:12.190Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-41882
vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds.
https://github.com/vantage6/vantage6/security/advisories/GHSA-gc57-xhh5-m94r
2023-09-04T16:31:48.224Z
2023-10-11T19:48:44.606Z
2023-10-11T19:48:44.606Z
{'Vendor': 'vantage6', 'Product': 'vantage6', 'Versions': '< 4.0.0'}
CVE-2023-41355
Chunghwa Telecom NOKIA G-040W-Q Firewall function has a vulnerability of input validation for ICMP redirect messages. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted package to modify the network routing table, resulting in a denial of service or sensitive information leaking.
https://www.twcert.org.tw/tw/cp-132-7505-a0c94-1.html
2023-08-29T00:14:47.636Z
2023-11-03T05:55:07.221Z
2023-11-03T05:55:07.221Z
{'Vendor': 'Chunghwa Telecom', 'Product': 'NOKIA G-040W-Q', 'Versions': 'G040WQR201207'}
CVE-2023-41640
An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query.
https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md
2023-08-30T00:00:00
2023-08-31T00:00:00
2023-09-11T21:24:15.943242
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41139
A maliciously crafted STP file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018
2023-08-23T17:55:48.799Z
2023-11-23T03:53:09.761Z
2023-11-23T03:53:09.761Z
{'Vendor': 'Autodesk', 'Product': 'AutoCAD, Advance Steel and Civil 3D', 'Versions': '2024, 2023'}
CVE-2023-41990
The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
https://support.apple.com/en-us/HT213606
2023-09-06T17:40:06.142Z
2023-09-11T23:29:26.660Z
2023-09-21T18:23:48.181Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41908
Cerebrate before 1.15 lacks the Secure attribute for the session cookie.
https://github.com/cerebrate-project/cerebrate/commit/9be81055651649658243b5aa274b175064bfc6db
2023-09-05T00:00:00
2023-09-05T00:00:00
2023-09-05T06:13:45.729108
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41637
An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file.
https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md
2023-08-30T00:00:00
2023-08-31T00:00:00
2023-09-06T22:20:42.511240
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41267
In the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1
https://github.com/apache/airflow/pull/33813
2023-08-27T21:27:41.472Z
2023-09-14T07:46:42.191Z
2023-09-14T07:46:42.191Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow HDFS Provider', 'Versions': '0'}
CVE-2023-41772
Win32k Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41772
2023-08-31T23:37:56.339Z
2023-10-10T17:07:29.149Z
2023-12-14T01:15:02.921Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-41288
An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.2 ( 2023/11/23 ) and later
https://www.qnap.com/en/security-advisory/qsa-23-55
2023-08-28T09:45:52.367Z
2024-01-05T16:19:10.920Z
2024-01-05T16:19:10.920Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'}
CVE-2023-41322
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability.
https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr
2023-08-28T16:56:43.365Z
2023-09-26T22:34:06.088Z
2023-09-26T22:34:06.088Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.1.0, < 10.0.10'}
CVE-2023-41119
An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contains the function _dbms_aq_move_to_exception_queue that may be used to elevate a user's privileges to superuser. This function accepts the OID of a table, and then accesses that table as the superuser by using SELECT and DML commands.
https://www.enterprisedb.com/docs/security/advisories/cve202341119/
2023-08-23T00:00:00
2023-12-12T00:00:00
2023-12-12T07:05:15.848428
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41660
Cross-Site Request Forgery (CSRF) vulnerability in WPSynchro WP Synchro plugin <= 1.9.1 versions.
https://patchstack.com/database/vulnerability/wpsynchro/wordpress-wordpress-migration-plugin-db-files-wp-synchro-plugin-1-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-08-30T13:02:41.615Z
2023-10-09T13:51:35.408Z
2023-10-09T13:51:35.408Z
{'Vendor': 'WPSynchro', 'Product': 'WP Synchro', 'Versions': 'n/a'}
CVE-2023-41375
Use after free vulnerability exists in Kostac PLC Programming Software Version 1.6.11.0. Arbitrary code may be executed by having a user open a specially crafted project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier because the issue exists in parsing of KPP project files. The vendor states that Kostac PLC Programming Software Version 1.6.10.0 or later implements the function which prevents a project file alteration. Therefore, to mitigate the impact of these vulnerabilities, a project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier needs to be saved again using Kostac PLC Programming Software Version 1.6.10.0 or later.
https://www.electronics.jtekt.co.jp/en/topics/202309125391/
2023-08-29T07:40:00.504Z
2023-09-20T08:49:10.486Z
2023-09-20T08:49:10.486Z
{'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'Kostac PLC Programming Software', 'Versions': 'Version 1.6.11.0 and earlier'}
CVE-2023-41725
Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Local Privilege Escalation Vulnerability
https://download.wavelink.com/Files/avalanche_v6.4.1.236_release_notes.txt
2023-08-31T01:00:11.771Z
2023-11-03T18:13:19.979Z
2023-11-03T18:13:19.979Z
{'Vendor': 'Ivanti', 'Product': 'Avalanche', 'Versions': '6.4.1.236'}
CVE-2023-41949
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Avirtum iFolders plugin <= 1.5.0 versions.
https://patchstack.com/database/vulnerability/ifolders/wordpress-ifolders-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-06T08:46:20.963Z
2023-09-25T00:31:22.877Z
2023-09-25T00:37:43.173Z
{'Vendor': 'Avirtum', 'Product': 'iFolders', 'Versions': 'n/a'}
CVE-2023-41676
An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.
https://fortiguard.com/psirt/FG-IR-23-290
2023-08-30T13:42:39.547Z
2023-11-14T18:05:39.178Z
2023-11-14T18:05:39.178Z
{'Vendor': 'Fortinet', 'Product': 'FortiSIEM', 'Versions': '7.0.0, 6.7.0'}
CVE-2023-41733
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in YYDevelopment Back To The Top Button plugin <= 2.1.5 versions.
https://patchstack.com/database/vulnerability/back-to-the-top-button/wordpress-back-to-the-top-button-plugin-2-1-5-cross-site-scripting-xss?_s_id=cve
2023-08-31T06:58:39.904Z
2023-10-02T07:49:09.471Z
2023-10-02T07:49:09.471Z
{'Vendor': 'YYDevelopment', 'Product': 'Back To The Top Button', 'Versions': 'n/a'}
CVE-2023-41363
In Cerebrate 1.14, a vulnerability in UserSettingsController allows authenticated users to change user settings of other users.
https://github.com/cerebrate-project/cerebrate/commit/8e616180ba0d6a1fcb8326dbe39307960ee1946c
2023-08-29T00:00:00
2023-08-29T00:00:00
2023-08-29T04:31:53.478876
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41699
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payara Platform Payara Server, Micro and Embedded (Servlet Implementation modules) allows Redirect Access to Libraries.This issue affects Payara Server, Micro and Embedded: from 5.0.0 before 5.57.0, from 4.1.2.191 before 4.1.2.191.46, from 6.0.0 before 6.8.0, from 6.2023.1 before 6.2023.11.
https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.8.0.html
2023-08-30T16:08:29.041Z
2023-11-15T19:54:23.590Z
2023-11-15T19:57:20.119Z
{'Vendor': 'Payara Platform', 'Product': 'Payara Server, Micro and Embedded', 'Versions': '5.0.0, 4.1.2.191, 6.0.0, 6.2023.1'}
CVE-2023-41508
A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel.
https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/
2023-08-30T00:00:00
2023-09-05T00:00:00
2023-09-05T20:49:43.379452
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41158
A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-09-13T00:00:00
2023-09-13T21:19:06.949646
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41621
A Cross Site Scripting (XSS) vulnerability was discovered in Emlog Pro v2.1.14 via the component /admin/store.php.
https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41621
2023-08-30T00:00:00
2023-12-13T00:00:00
2023-12-13T22:36:12.541864
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41764
Microsoft Office Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41764
2023-08-31T23:13:52.910Z
2023-09-12T16:58:33.923Z
2023-12-14T20:11:50.098Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'}
CVE-2023-41089
The affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate user as long as the device keeps the session active, since the attack takes advantage of the cookie header to generate "legitimate" requests.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02
2023-09-12T23:06:14.688Z
2023-10-19T18:13:25.005Z
2023-10-19T18:13:25.005Z
{'Vendor': 'DEXMA', 'Product': 'DexGate', 'Versions': 'version 20130114'}
CVE-2023-41123
null
null
2023-08-23T09:39:18.583Z
null
2023-08-23T14:56:58.411477Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-41965
Sending some requests in the web application of the vulnerable device allows information to be obtained due to the lack of security in the authentication process.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03
2023-09-06T15:41:16.517Z
2023-09-18T19:29:58.603Z
2023-09-18T19:56:52.097Z
{'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'}
CVE-2023-41436
Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component.
https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md
2023-08-30T00:00:00
2023-09-15T00:00:00
2023-09-15T23:54:57.958282
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41066
An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. An app may be able to unexpectedly leak a user's credentials from secure text fields.
https://support.apple.com/en-us/HT213940
2023-08-22T18:10:00.330Z
2023-09-26T20:12:03.116Z
2023-09-26T20:12:03.116Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-41174
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213938
2023-09-14T19:03:36.122Z
2023-09-26T20:12:03.609Z
2023-09-26T20:12:03.609Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41031
Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint.
https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-homemng-command-injection-vulnerability/
2023-08-22T14:09:29.146Z
2023-09-22T16:07:59.041Z
2023-09-22T16:07:59.041Z
{'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.2'}
CVE-2023-41932
Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict 'timestamp' query parameters in multiple endpoints, allowing attackers with to delete attacker-specified directories on the Jenkins controller file system as long as they contain a file called 'history.xml'.
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3235
2023-09-05T16:39:57.391Z
2023-09-06T12:08:53.687Z
2023-10-24T12:51:41.324Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Job Configuration History Plugin', 'Versions': '0'}
CVE-2023-41898
Home assistant is an open source home automation. The Home Assistant Companion for Android app up to version 2023.8.2 is vulnerable to arbitrary URL loading in a WebView. This enables all sorts of attacks, including arbitrary JavaScript execution, limited native code execution, and credential theft. This issue has been patched in version 2023.9.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-142`.
https://github.com/home-assistant/core/security/advisories/GHSA-jvpm-q3hq-86rg
2023-09-04T16:31:48.226Z
2023-10-19T22:08:40.783Z
2023-10-19T22:08:40.783Z
{'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.9.2'}
CVE-2023-41748
Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203.
https://security-advisory.acronis.com/advisories/SEC-5816
2023-08-31T14:10:27.638Z
2023-08-31T17:54:25.532Z
2023-08-31T17:54:25.532Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cloud Manager', 'Versions': 'unspecified'}
CVE-2023-41318
matrix-media-repo is a highly customizable multi-domain media repository for the Matrix chat ecosystem. In affected versions an attacker could upload a malicious piece of media to the media repo, which would then be served with `Content-Disposition: inline` upon download. This vulnerability could be leveraged to execute scripts embedded in SVG content. Commits `77ec235` and `bf8abdd` fix the issue and are included in the 1.3.0 release. Operators should upgrade to v1.3.0 as soon as possible. Operators unable to upgrade should override the `Content-Disposition` header returned by matrix-media-repo as a workaround.
https://github.com/turt2live/matrix-media-repo/security/advisories/GHSA-5crw-6j7v-xc72
2023-08-28T16:56:43.365Z
2023-09-08T19:51:20.011Z
2023-09-08T19:51:20.011Z
{'Vendor': 'turt2live', 'Product': 'matrix-media-repo', 'Versions': '< 1.3.0'}
CVE-2023-41162
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-09-13T00:00:00
2023-09-13T21:51:18.238302
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41861
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Restrict plugin <= 2.2.4 versions.
https://patchstack.com/database/vulnerability/restricted-content/wordpress-restrict-membership-site-content-and-user-access-restrictions-for-wordpress-plugin-2-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T10:33:46.291Z
2023-09-26T07:41:45.190Z
2023-09-26T07:41:45.190Z
{'Vendor': 'Restrict', 'Product': 'Restrict', 'Versions': 'n/a'}
CVE-2023-41027
Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint.
https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-credential-disclosure-vulnerability/
2023-08-22T14:09:29.145Z
2023-09-22T16:06:05.266Z
2023-09-22T16:06:05.266Z
{'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.5, V1.0.4'}
CVE-2023-41836
An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.0 and 4.2.0 through 4.2.4, and 4.0.0 through 4.0.4 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.4 through 3.0.7 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
https://fortiguard.com/psirt/FG-IR-23-215
2023-09-04T08:12:52.814Z
2023-10-13T14:51:22.277Z
2023-10-13T14:51:22.277Z
{'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.4'}
CVE-2023-41070
A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access sensitive data logged when a user shares a link.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.331Z
2023-09-26T20:12:04.256Z
2023-09-26T20:12:04.256Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41359
An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.
https://github.com/FRRouting/frr/pull/14232
2023-08-29T00:00:00
2023-08-29T00:00:00
2023-11-15T05:07:07.139574
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41358
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.
https://github.com/FRRouting/frr/pull/14260
2023-08-29T00:00:00
2023-08-29T00:00:00
2023-11-15T05:07:00.388715
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41564
An arbitrary file upload vulnerability in the Upload Asset function of Cockpit CMS v2.6.3 allows attackers to execute arbitrary code via uploading a crafted .shtml file.
https://github.com/LongHair00/Mitre_opensource_report/blob/main/CockpitCMS-StoredXSS.md
2023-08-30T00:00:00
2023-09-08T00:00:00
2023-09-08T22:11:02.185871
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41071
A use-after-free issue was addressed with improved memory management. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Ventura 13.6. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213938
2023-08-22T18:10:00.331Z
2023-09-26T20:12:04.756Z
2023-09-26T20:12:04.756Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-41163
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the replace in results field while replacing the results under the tools drop down.
https://webmin.com/tags/webmin-changelog/
2023-08-24T00:00:00
2023-08-30T00:00:00
2023-08-31T22:05:27.878365
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-41860
Unauth. Cross-Site Scripting (XSS) vulnerability in TravelMap plugin <= 1.0.1 versions.
https://patchstack.com/database/vulnerability/travelmap-blog/wordpress-travel-map-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-09-04T10:33:46.291Z
2023-09-26T07:46:53.689Z
2023-09-26T07:46:53.689Z
{'Vendor': 'TravelMap', 'Product': 'Travel Map', 'Versions': 'n/a'}
CVE-2023-41749
Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979.
https://security-advisory.acronis.com/advisories/SEC-5287
2023-08-31T14:10:27.638Z
2023-08-31T20:17:55.126Z
2023-08-31T20:17:55.126Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-41319
Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code. The vulnerability allows the execution of arbitrary code on the target system within the context of the webserver python process owner on the webserver container, which by default is `root`, and leverage that access to attack underlying infrastructure and integrated systems. This vulnerability affects Fides versions `2.11.0` through `2.19.0`. Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. In the Fides Admin UI this scope is restricted to highly privileged users, specifically root users and users with the owner role. Exploitation is only possible if the security configuration parameter `allow_custom_connector_functions` is enabled by the user deploying the Fides webserver container, either in `fides.toml` or by setting the env var `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS=True`. By default this configuration parameter is disabled. The vulnerability has been patched in Fides version `2.19.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. Users unable to upgrade should ensure that `allow_custom_connector_functions` in `fides.toml` and the `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS` are both either unset or explicit set to `False`.
https://github.com/ethyca/fides/security/advisories/GHSA-p6p2-qq95-vq5h
2023-08-28T16:56:43.365Z
2023-09-06T17:54:30.889Z
2023-09-06T17:54:30.889Z
{'Vendor': 'ethyca', 'Product': 'fides', 'Versions': '>= 2.11.0, < 2.19.0'}
CVE-2023-41876
Cross-Site Request Forgery (CSRF) vulnerability in Hardik Kalathiya WP Gallery Metabox plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/wp-gallery-metabox/wordpress-wp-gallery-metabox-plugin-1-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-09-04T11:35:57.269Z
2023-10-10T08:53:25.955Z
2023-10-10T08:53:25.955Z
{'Vendor': 'Hardik Kalathiya', 'Product': 'WP Gallery Metabox', 'Versions': 'n/a'}