CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-24610 | NOSH 4a5cfdb allows remote authenticated users to execute PHP arbitrary code via the "practice logo" upload feature. The client-side checks can be bypassed. This may allow attackers to steal Protected Health Information because the product is for health charting. | https://github.com/shihjay2/docker-nosh | 2023-01-30T00:00:00 | 2023-02-01T00:00:00 | 2023-02-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24493 | A formula injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could leverage the reporting system to export reports containing formulas, which would then require a victim to approve and execute on a host. | https://www.tenable.com/security/tns-2023-03 | 2023-01-24T00:00:00 | 2023-01-25T00:00:00 | 2023-01-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'Tenable.sc', 'Versions': 'Tenable.sc versions 5.23.1 and earlier'} |
CVE-2023-24169 | Tenda AC18 V15.03.05.19 is vulnerable to Buffer Overflow via /goform/FUN_0007343c. | https://github.com/DrizzlingSun/Tenda/blob/main/AC18/6/6.md | 2023-01-23T00:00:00 | 2023-01-26T00:00:00 | 2023-01-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24539 | Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input. | https://go.dev/issue/59720 | 2023-01-25T21:19:20.642Z | 2023-05-11T15:29:38.143Z | 2023-06-12T19:08:23.986Z | {'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'} |
CVE-2023-24885 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24885 | 2023-01-31T20:32:35.468Z | 2023-04-11T19:13:29.925Z | 2023-12-14T18:59:28.781Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-24352 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWPS. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24217 | AgileBio Electronic Lab Notebook v4.234 was discovered to contain a local file inclusion vulnerability. | https://labcollector.com/labcollector-lims/add-ons/eln-electronic-lab-notebook/ | 2023-01-23T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24647 | Food Ordering System v2.0 was discovered to contain a SQL injection vulnerability via the email parameter. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Food-Ordering-System-v2.0/SQLi | 2023-01-30T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24997 | Deserialization of Untrusted Data vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.5.0. Users are advised to upgrade to Apache InLong's latest version or cherry-pick https://github.com/apache/inlong/pull/7223 https://github.com/apache/inlong/pull/7223 to solve it.
| https://lists.apache.org/thread/nxvtxq7oxhwyzo9ty2hqz8rvh5r7ngd8 | 2023-02-01T10:29:47.039Z | 2023-02-01T14:49:44.930Z | null | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.1.0'} |
CVE-2023-24094 | An issue in the bridge2 component of MikroTik RouterOS v6.40.5 allows attackers to cause a Denial of Service (DoS) via crafted packets. | http://mikrotik.com | 2023-01-23T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24581 | A vulnerability has been identified in Solid Edge SE2022 (All versions < V222.0MP12), Solid Edge SE2022 (All versions), Solid Edge SE2023 (All versions < V223.0Update2). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted STP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19425) | https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf | 2023-01-27T16:12:53.048Z | 2023-02-14T10:36:46.345Z | 2023-03-14T09:31:34.788Z | {'Vendor': 'Siemens', 'Product': 'Solid Edge SE2022', 'Versions': 'All versions < V222.0MP12'} |
CVE-2023-24978 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted SPP files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-19788) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.542Z | 2023-02-14T10:36:47.474Z | 2023-03-14T09:31:35.828Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24344 | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the webpage parameter at /goform/formWlanGuestSetup. | https://www.dlink.com/en/security-bulletin/ | 2023-01-23T00:00:00 | 2023-02-10T00:00:00 | 2023-02-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24651 | Simple Customer Relationship Management System v1.0 was discovered to contain a SQL injection vulnerability via the name parameter on the registration page. | https://www.sourcecodester.com/php/15895/simple-customer-relationship-management-crm-system-using-php-free-source-coude.html | 2023-01-30T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24201 | Raffle Draw System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at get_ticket.php. | https://www.sourcecodester.com/php/15951/raffle-draw-system-using-php-and-javascript-free-source-code.html | 2023-01-23T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24128 | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepkey2 parameter at /goform/WifiBasicSet. | http://eagle.com | 2023-01-23T00:00:00 | 2023-03-01T00:00:00 | 2023-03-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24578 | McAfee Total Protection prior to 16.0.49 allows attackers to elevate user privileges due to DLL sideloading. This could enable a user with lower privileges to execute unauthorized tasks. | https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html | 2023-01-27T00:00:00 | 2023-03-13T00:00:00 | 2023-03-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24981 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V2201.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted SPP file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-19791) | https://cert-portal.siemens.com/productcert/pdf/ssa-847261.pdf | 2023-02-01T09:35:11.542Z | 2023-02-14T10:36:50.780Z | 2023-03-14T09:31:38.915Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation', 'Versions': 'All versions < V2201.0006'} |
CVE-2023-24597 | OX App Suite before frontend 7.10.6-rev24 allows the loading (without user consent) of an e-mail message's remote resources during printing. | https://open-xchange.com | 2023-01-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24256 | An issue in the com.nextev.datastatistic component of NIO EC6 Aspen before v3.3.0 allows attackers to escalate privileges via path traversal. | https://github.com/hhj4ck/JailBreakEC6/blob/main/BugReport.md | 2023-01-23T00:00:00 | 2023-07-06T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-24485 | Vulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app. | https://support.citrix.com/article/CTX477617/citrix-workspace-app-for-windows-security-bulletin-for-cve202324484-cve202324485 | 2023-01-24T00:00:00 | 2023-02-16T00:00:00 | 2023-02-16T00:00:00 | {'Vendor': 'Citrix', 'Product': 'Citrix Workspace App for Windows', 'Versions': 'Citrix Workspace App versions'} |
CVE-2023-24893 | Visual Studio Code Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24893 | 2023-01-31T20:32:35.470Z | 2023-04-11T19:13:24.013Z | 2023-12-14T18:59:22.555Z | {'Vendor': 'Microsoft', 'Product': 'Visual Studio Code', 'Versions': '1.0.0'} |
CVE-2023-24939 | Server for NFS Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24939 | 2023-01-31T20:37:47.257Z | 2023-05-09T17:02:51.663Z | 2023-12-14T19:06:02.094Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-41791 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pandora FMS on all allows Cross-Site Scripting (XSS). This vulnerability allowed users with low privileges to introduce Javascript executables via a translation string that could affect the integrity of some configuration files. This issue affects Pandora FMS: from 700 through 773. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T11:54:47.539Z | 2023-11-23T14:41:46.802Z | 2023-11-23T14:41:46.802Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41284 | A SQL injection vulnerability has been reported to affect QuMagie. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.
We have already fixed the vulnerability in the following version:
QuMagie 2.1.4 and later
| https://www.qnap.com/en/security-advisory/qsa-23-50 | 2023-08-28T09:45:52.366Z | 2023-11-10T16:01:54.206Z | 2023-11-10T16:01:54.206Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QuMagie', 'Versions': '2.1.x'} |
CVE-2023-41904 | Zoho ManageEngine ADManager Plus before 7203 allows 2FA bypass (for AuthToken generation) in REST APIs. | https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-41904.html | 2023-09-05T00:00:00 | 2023-09-26T00:00:00 | 2023-09-26T13:35:05.066821 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41841 | An improper authorization vulnerability in Fortinet FortiOS 7.0.0 - 7.0.11 and 7.2.0 - 7.2.4 allows an attacker belonging to the prof-admin profile to perform elevated actions. | https://fortiguard.com/psirt/FG-IR-23-318 | 2023-09-04T08:12:52.814Z | 2023-10-10T16:49:35.723Z | 2023-10-10T16:49:35.723Z | {'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.2.0, 7.0.0'} |
CVE-2023-41729 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.22.3.31 versions. | https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-cross-site-scripting-xss?_s_id=cve | 2023-08-31T06:58:39.903Z | 2023-10-02T07:39:34.189Z | 2023-10-02T07:39:34.189Z | {'Vendor': 'SendPress', 'Product': 'SendPress Newsletters', 'Versions': 'n/a'} |
CVE-2023-41050 | AccessControl provides a general security framework for use in Zope. Python's "format" functionality allows someone controlling the format string to "read" objects accessible (recursively) via attribute access and subscription from accessible objects. Those attribute accesses and subscriptions use Python's full blown `getattr` and `getitem`, not the policy restricted `AccessControl` variants `_getattr_` and `_getitem_`. This can lead to critical information disclosure. `AccessControl` already provides a safe variant for `str.format` and denies access to `string.Formatter`. However, `str.format_map` is still unsafe. Affected are all users who allow untrusted users to create `AccessControl` controlled Python code and execute it. A fix has been introduced in versions 4.4, 5.8 and 6.2. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-8xv7-89vj-q48c | 2023-08-22T16:57:23.933Z | 2023-09-06T17:58:10.510Z | 2023-09-06T17:58:10.510Z | {'Vendor': 'zopefoundation', 'Product': 'AccessControl', 'Versions': 'AccessControl: < 4.4, AccessControl: >= 5.0, < 5.8, AccessControl: >= 6.0, < 6.2, Zope: < 4.8.9, Zope: >= 5.0.0, < 5.8.4'} |
CVE-2023-41115 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. When using UTL_ENCODE, an authenticated user can read any large object, regardless of that user's permissions. | https://www.enterprisedb.com/docs/security/advisories/cve202341115/ | 2023-08-23T00:00:00 | 2023-12-12T00:00:00 | 2023-12-12T07:05:07.765255 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41945 | Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3065 | 2023-09-05T16:39:57.394Z | 2023-09-06T12:09:02.231Z | 2023-10-24T12:51:56.463Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Assembla Auth Plugin', 'Versions': '0'} |
CVE-2023-41046 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible in XWiki to execute Velocity code without having script right by creating an XClass with a property of type "TextArea" and content type "VelocityCode" or "VelocityWiki". For the former, the syntax of the document needs to be set the `xwiki/1.0` (this syntax doesn't need to be installed). In both cases, when adding the property to an object, the Velocity code is executed regardless of the rights of the author of the property (edit right is still required, though). In both cases, the code is executed with the correct context author so no privileged APIs can be accessed. However, Velocity still grants access to otherwise inaccessible data and APIs that could allow further privilege escalation. At least for "VelocityCode", this behavior is most likely very old but only since XWiki 7.2, script right is a separate right, before that version all users were allowed to execute Velocity and thus this was expected and not a security issue. This has been patched in XWiki 14.10.10 and 15.4 RC1. Users are advised to upgrade. There are no known workarounds. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m5m2-h6h9-p2c8 | 2023-08-22T16:57:23.933Z | 2023-09-01T19:59:23.278Z | 2023-09-01T19:59:23.278Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.2, < 14.10.10, >= 15.0-rc-1, < 15.4-rc-1'} |
CVE-2023-41553 | Tenda AC9 V3.0 V15.03.06.42_multi and Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 were discovered to contain a stack overflow via parameter list at url /goform/SetStaticRouteCfg. | https://github.com/peris-navince/founded-0-days/blob/main/fromSetRouteStatic/1.md | 2023-08-30T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T12:31:36.490197 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41103 | Interact 7.9.79.5 allows stored Cross-site Scripting (XSS) attacks in several locations, allowing an attacker to store a JavaScript payload. | https://www.interactsoftware.com/ | 2023-08-23T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T18:47:25.307450 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41800 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in UniConsent UniConsent CMP for GDPR CPRA GPP TCF plugin <= 1.4.2 versions. | https://patchstack.com/database/vulnerability/uniconsent-cmp/wordpress-uniconsent-cookie-consent-cmp-for-gdpr-ccpa-plugin-1-4-2-cross-site-scripting-xss?_s_id=cve | 2023-09-01T11:55:20.628Z | 2023-10-02T08:24:20.434Z | 2023-10-02T08:24:20.434Z | {'Vendor': 'UniConsent', 'Product': 'UniConsent CMP for GDPR CPRA GPP TCF', 'Versions': 'n/a'} |
CVE-2023-41787 | Uncontrolled Search Path Element vulnerability in Pandora FMS on all allows Leveraging/Manipulating Configuration File Search Paths. This vulnerability allows access to files with sensitive information. This issue affects Pandora FMS: from 700 through 772. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-09-01T11:54:47.538Z | 2023-11-23T14:31:41.618Z | 2023-11-23T14:31:41.618Z | {'Vendor': 'Pandora FMS', 'Product': 'Pandora FMS', 'Versions': '700'} |
CVE-2023-41768 | Layer 2 Tunneling Protocol Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41768 | 2023-08-31T23:30:45.393Z | 2023-10-10T17:07:27.029Z | 2023-12-14T01:15:00.726Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-41338 | Fiber is an Express inspired web framework built in the go language. Versions of gofiber prior to 2.49.2 did not properly restrict access to localhost. This issue impacts users of our project who rely on the `ctx.IsFromLocal` method to restrict access to localhost requests. If exploited, it could allow unauthorized access to resources intended only for localhost. Setting `X-Forwarded-For: 127.0.0.1` in a request from a foreign host, will result in true for `ctx.IsFromLocal`. Access is limited to the scope of the affected process. This issue has been patched in version `2.49.2` with commit `b8c9ede6`. Users are advised to upgrade. There are no known workarounds to remediate this vulnerability without upgrading to the patched version. | https://github.com/gofiber/fiber/security/advisories/GHSA-3q5p-3558-364f | 2023-08-28T16:56:43.368Z | 2023-09-08T18:17:18.044Z | 2023-09-08T18:17:18.044Z | {'Vendor': 'gofiber', 'Product': 'fiber', 'Versions': '< 2.49.2'} |
CVE-2023-41011 | Command Execution vulnerability in China Mobile Communications China Mobile Intelligent Home Gateway v.HG6543C4 allows a remote attacker to execute arbitrary code via the shortcut_telnet.cg component. | https://github.com/te5tb99/For-submitting/wiki/Command-Execution-Vulnerability-in-China-Mobile-Intelligent-Home-Gateway-HG6543C4 | 2023-08-22T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T18:42:18.625706 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41154 | A Stored Cross-Site Scripting (XSS) vulnerability in the scheduled cron jobs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the value field parameter while creating a new environment variable. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-09-13T00:00:00 | 2023-09-13T21:08:07.076190 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41713 | SonicOS Use of Hard-coded Password vulnerability in the 'dynHandleBuyToolbar' demo function. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0012 | 2023-08-30T17:07:28.452Z | 2023-10-17T22:28:50.229Z | 2023-10-17T22:28:50.229Z | {'Vendor': 'SonicWall', 'Product': 'SonicOS', 'Versions': '7.0.1-5119 and earlier versions, 7.0.1-5129 and earlier versions, 6.5.4.4-44v-21-2079 and earlier versions, 6.5.4.12-101n and earlier versions'} |
CVE-2023-41343 | Rogic No-Code Database Builder's file uploading function has insufficient filtering for special characters. A remote attacker with regular user privilege can inject JavaScript to perform XSS (Stored Cross-Site Scripting) attack. | https://www.twcert.org.tw/tw/cp-132-7509-5b734-1.html | 2023-08-29T00:11:47.811Z | 2023-11-03T04:11:29.131Z | 2023-11-03T04:11:29.131Z | {'Vendor': 'Ragic', 'Product': 'No-Code Database Builder ', 'Versions': 'All version before patching'} |
CVE-2023-41986 | The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to modify protected parts of the file system. | https://support.apple.com/en-us/HT213938 | 2023-09-06T17:40:06.141Z | 2023-09-26T20:12:01.498Z | 2023-09-26T20:12:01.498Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41085 |
When IPSec is configured on a Virtual Server, undisclosed traffic can cause TMM to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| https://my.f5.com/manage/s/article/K000132420 | 2023-10-05T19:17:25.734Z | 2023-10-10T12:33:11.777Z | 2023-10-10T12:33:11.777Z | {'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '17.1.0, 16.1.0, 15.1.0, 14.1.0, 13.1.0'} |
CVE-2023-41314 | The api /api/snapshot and /api/get_log_file would allow unauthenticated access.
It could allow a DoS attack or get arbitrary files from FE node.
Please upgrade to 2.0.3 to fix these issues. | https://lists.apache.org/thread/tgvpvz3yw7zgodl1sb3sv3jbbz8t5zb4 | 2023-08-28T15:52:14.092Z | 2023-12-18T08:27:51.999Z | 2023-12-18T08:27:51.999Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Doris', 'Versions': '1.2.0'} |
CVE-2023-41744 | Local privilege escalation due to unrestricted loading of unsigned libraries. The following products are affected: Acronis Agent (macOS) before build 30600, Acronis Cyber Protect 15 (macOS) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-4728 | 2023-08-31T14:10:27.638Z | 2023-08-31T15:14:13.720Z | 2023-08-31T15:14:13.720Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-41601 | Multiple cross-site scripting (XSS) vulnerabilities in install/index.php of CSZ CMS v1.3.0 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Database Username or Database Host parameters. | https://www.cszcms.com/ | 2023-08-30T00:00:00 | 2023-09-06T00:00:00 | 2023-09-06T19:46:42.913671 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41178 | Reflected cross-site scripting (XSS) vulnerabilities in Trend Micro Mobile Security (Enterprise) could allow an exploit against an authenticated victim that visits a malicious link provided by an attacker.
Please note, this vulnerability is similar to, but not identical to, CVE-2023-41176. | https://success.trendmicro.com/dcx/s/solution/000294695?language=en_US | 2023-08-24T14:36:57.668Z | 2024-01-23T20:36:01.653Z | 2024-01-23T20:36:01.653Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Mobile Security for Enterprise', 'Versions': '9.8 SP5'} |
CVE-2023-41894 | Home assistant is an open source home automation. The assessment verified that webhooks available in the webhook component are triggerable via the `*.ui.nabu.casa` URL without authentication, even when the webhook is marked as Only accessible from the local network. This issue is facilitated by the SniTun proxy, which sets the source address to 127.0.0.1 on all requests sent to the public URL and forwarded to the local Home Assistant. This issue has been addressed in version 2023.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/home-assistant/core/security/advisories/GHSA-wx3j-3v2j-rf45 | 2023-09-04T16:31:48.225Z | 2023-10-19T23:23:17.909Z | 2023-10-19T23:23:17.909Z | {'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.9.0'} |
CVE-2023-41752 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2.
Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.
| https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q | 2023-08-31T20:55:13.999Z | 2023-10-17T06:57:47.508Z | 2023-10-17T06:57:47.508Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Traffic Server', 'Versions': '8.0.0, 9.0.0'} |
CVE-2023-41302 | Redirection permission verification vulnerability in the home screen module. Successful exploitation of this vulnerability may cause features to perform abnormally. | https://consumer.huawei.com/en/support/bulletin/2023/9/ | 2023-08-28T12:17:07.354Z | 2023-09-25T12:16:12.190Z | 2023-09-25T12:16:12.190Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-41882 | vantage6 is privacy preserving federated learning infrastructure. The endpoint /api/collaboration/{id}/task is used to collect all tasks from a certain collaboration. To get such tasks, a user should have permission to view the collaboration and to view the tasks in it. However, prior to version 4.0.0, it is only checked if the user has permission to view the collaboration. Version 4.0.0 contains a patch. There are no known workarounds. | https://github.com/vantage6/vantage6/security/advisories/GHSA-gc57-xhh5-m94r | 2023-09-04T16:31:48.224Z | 2023-10-11T19:48:44.606Z | 2023-10-11T19:48:44.606Z | {'Vendor': 'vantage6', 'Product': 'vantage6', 'Versions': '< 4.0.0'} |
CVE-2023-41355 | Chunghwa Telecom NOKIA G-040W-Q Firewall function has a vulnerability of input validation for ICMP redirect messages. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted package to modify the network routing table, resulting in a denial of service or sensitive information leaking. | https://www.twcert.org.tw/tw/cp-132-7505-a0c94-1.html | 2023-08-29T00:14:47.636Z | 2023-11-03T05:55:07.221Z | 2023-11-03T05:55:07.221Z | {'Vendor': 'Chunghwa Telecom', 'Product': 'NOKIA G-040W-Q', 'Versions': 'G040WQR201207'} |
CVE-2023-41640 | An improper error handling vulnerability in the component ErroreNonGestito.aspx of GruppoSCAI RealGimm 1.1.37p38 allows attackers to obtain sensitive technical information via a crafted SQL query. | https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Information%20disclosure.md | 2023-08-30T00:00:00 | 2023-08-31T00:00:00 | 2023-09-11T21:24:15.943242 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41139 | A maliciously crafted STP file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018 | 2023-08-23T17:55:48.799Z | 2023-11-23T03:53:09.761Z | 2023-11-23T03:53:09.761Z | {'Vendor': 'Autodesk', 'Product': 'AutoCAD, Advance Steel and Civil 3D', 'Versions': '2024, 2023'} |
CVE-2023-41990 | The issue was addressed with improved handling of caches. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. Processing a font file may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1. | https://support.apple.com/en-us/HT213606 | 2023-09-06T17:40:06.142Z | 2023-09-11T23:29:26.660Z | 2023-09-21T18:23:48.181Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41908 | Cerebrate before 1.15 lacks the Secure attribute for the session cookie. | https://github.com/cerebrate-project/cerebrate/commit/9be81055651649658243b5aa274b175064bfc6db | 2023-09-05T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T06:13:45.729108 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41637 | An arbitrary file upload vulnerability in the Carica immagine function of GruppoSCAI RealGimm 1.1.37p38 allows attackers to execute arbitrary code via uploading a crafted HTML file. | https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md | 2023-08-30T00:00:00 | 2023-08-31T00:00:00 | 2023-09-06T22:20:42.511240 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41267 | In the Apache Airflow HDFS Provider, versions prior to 4.1.1, a documentation info pointed users to an install incorrect pip package. As this package name was unclaimed, in theory, an attacker could claim this package and provide code that would be executed when this package was installed. The Airflow team has since taken ownership of the package (neutralizing the risk), and fixed the doc strings in version 4.1.1
| https://github.com/apache/airflow/pull/33813 | 2023-08-27T21:27:41.472Z | 2023-09-14T07:46:42.191Z | 2023-09-14T07:46:42.191Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow HDFS Provider', 'Versions': '0'} |
CVE-2023-41772 | Win32k Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41772 | 2023-08-31T23:37:56.339Z | 2023-10-10T17:07:29.149Z | 2023-12-14T01:15:02.921Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-41288 | An OS command injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow users to execute commands via a network.
We have already fixed the vulnerability in the following version:
Video Station 5.7.2 ( 2023/11/23 ) and later
| https://www.qnap.com/en/security-advisory/qsa-23-55 | 2023-08-28T09:45:52.367Z | 2024-01-05T16:19:10.920Z | 2024-01-05T16:19:10.920Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'} |
CVE-2023-41322 | GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A user with write access to another user can make requests to change the latter's password and then take control of their account. Users are advised to upgrade to version 10.0.10. There are no known work around for this vulnerability. | https://github.com/glpi-project/glpi/security/advisories/GHSA-9j8m-7563-8xvr | 2023-08-28T16:56:43.365Z | 2023-09-26T22:34:06.088Z | 2023-09-26T22:34:06.088Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.1.0, < 10.0.10'} |
CVE-2023-41119 | An issue was discovered in EnterpriseDB Postgres Advanced Server (EPAS) before 11.21.32, 12.x before 12.16.20, 13.x before 13.12.16, 14.x before 14.9.0, and 15.x before 15.4.0. It contains the function _dbms_aq_move_to_exception_queue that may be used to elevate a user's privileges to superuser. This function accepts the OID of a table, and then accesses that table as the superuser by using SELECT and DML commands. | https://www.enterprisedb.com/docs/security/advisories/cve202341119/ | 2023-08-23T00:00:00 | 2023-12-12T00:00:00 | 2023-12-12T07:05:15.848428 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41660 | Cross-Site Request Forgery (CSRF) vulnerability in WPSynchro WP Synchro plugin <= 1.9.1 versions. | https://patchstack.com/database/vulnerability/wpsynchro/wordpress-wordpress-migration-plugin-db-files-wp-synchro-plugin-1-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-08-30T13:02:41.615Z | 2023-10-09T13:51:35.408Z | 2023-10-09T13:51:35.408Z | {'Vendor': 'WPSynchro', 'Product': 'WP Synchro', 'Versions': 'n/a'} |
CVE-2023-41375 | Use after free vulnerability exists in Kostac PLC Programming Software Version 1.6.11.0. Arbitrary code may be executed by having a user open a specially crafted project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier because the issue exists in parsing of KPP project files. The vendor states that Kostac PLC Programming Software Version 1.6.10.0 or later implements the function which prevents a project file alteration. Therefore, to mitigate the impact of these vulnerabilities, a project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier needs to be saved again using Kostac PLC Programming Software Version 1.6.10.0 or later. | https://www.electronics.jtekt.co.jp/en/topics/202309125391/ | 2023-08-29T07:40:00.504Z | 2023-09-20T08:49:10.486Z | 2023-09-20T08:49:10.486Z | {'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'Kostac PLC Programming Software', 'Versions': 'Version 1.6.11.0 and earlier'} |
CVE-2023-41725 | Ivanti Avalanche EnterpriseServer Service Unrestricted File Upload Local Privilege Escalation Vulnerability | https://download.wavelink.com/Files/avalanche_v6.4.1.236_release_notes.txt | 2023-08-31T01:00:11.771Z | 2023-11-03T18:13:19.979Z | 2023-11-03T18:13:19.979Z | {'Vendor': 'Ivanti', 'Product': 'Avalanche', 'Versions': '6.4.1.236'} |
CVE-2023-41949 | Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Avirtum iFolders plugin <= 1.5.0 versions. | https://patchstack.com/database/vulnerability/ifolders/wordpress-ifolders-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-06T08:46:20.963Z | 2023-09-25T00:31:22.877Z | 2023-09-25T00:37:43.173Z | {'Vendor': 'Avirtum', 'Product': 'iFolders', 'Versions': 'n/a'} |
CVE-2023-41676 | An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs. | https://fortiguard.com/psirt/FG-IR-23-290 | 2023-08-30T13:42:39.547Z | 2023-11-14T18:05:39.178Z | 2023-11-14T18:05:39.178Z | {'Vendor': 'Fortinet', 'Product': 'FortiSIEM', 'Versions': '7.0.0, 6.7.0'} |
CVE-2023-41733 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in YYDevelopment Back To The Top Button plugin <= 2.1.5 versions. | https://patchstack.com/database/vulnerability/back-to-the-top-button/wordpress-back-to-the-top-button-plugin-2-1-5-cross-site-scripting-xss?_s_id=cve | 2023-08-31T06:58:39.904Z | 2023-10-02T07:49:09.471Z | 2023-10-02T07:49:09.471Z | {'Vendor': 'YYDevelopment', 'Product': 'Back To The Top Button', 'Versions': 'n/a'} |
CVE-2023-41363 | In Cerebrate 1.14, a vulnerability in UserSettingsController allows authenticated users to change user settings of other users. | https://github.com/cerebrate-project/cerebrate/commit/8e616180ba0d6a1fcb8326dbe39307960ee1946c | 2023-08-29T00:00:00 | 2023-08-29T00:00:00 | 2023-08-29T04:31:53.478876 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41699 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Payara Platform Payara Server, Micro and Embedded (Servlet Implementation modules) allows Redirect Access to Libraries.This issue affects Payara Server, Micro and Embedded: from 5.0.0 before 5.57.0, from 4.1.2.191 before 4.1.2.191.46, from 6.0.0 before 6.8.0, from 6.2023.1 before 6.2023.11.
| https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.8.0.html | 2023-08-30T16:08:29.041Z | 2023-11-15T19:54:23.590Z | 2023-11-15T19:57:20.119Z | {'Vendor': 'Payara Platform', 'Product': 'Payara Server, Micro and Embedded', 'Versions': '5.0.0, 4.1.2.191, 6.0.0, 6.2023.1'} |
CVE-2023-41508 | A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel. | https://superstorefinder.net/support/forums/topic/super-store-finder-patch-notes/ | 2023-08-30T00:00:00 | 2023-09-05T00:00:00 | 2023-09-05T20:49:43.379452 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41158 | A Stored Cross-Site Scripting (XSS) vulnerability in the MIME type programs tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the description field while creating a new MIME type program. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-09-13T00:00:00 | 2023-09-13T21:19:06.949646 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41621 | A Cross Site Scripting (XSS) vulnerability was discovered in Emlog Pro v2.1.14 via the component /admin/store.php. | https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41621 | 2023-08-30T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T22:36:12.541864 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41764 | Microsoft Office Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41764 | 2023-08-31T23:13:52.910Z | 2023-09-12T16:58:33.923Z | 2023-12-14T20:11:50.098Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'} |
CVE-2023-41089 |
The affected product is vulnerable to an improper authentication vulnerability, which may allow an attacker to impersonate a legitimate user as long as the device keeps the session active, since the attack takes advantage of the cookie header to generate "legitimate" requests.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-271-02 | 2023-09-12T23:06:14.688Z | 2023-10-19T18:13:25.005Z | 2023-10-19T18:13:25.005Z | {'Vendor': 'DEXMA', 'Product': 'DexGate', 'Versions': 'version 20130114'} |
CVE-2023-41123 | null | null | 2023-08-23T09:39:18.583Z | null | 2023-08-23T14:56:58.411477Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-41965 |
Sending some requests in the web application of the vulnerable device allows information to be obtained due to the lack of security in the authentication process.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | 2023-09-06T15:41:16.517Z | 2023-09-18T19:29:58.603Z | 2023-09-18T19:56:52.097Z | {'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'} |
CVE-2023-41436 | Cross Site Scripting vulnerability in CSZCMS v.1.3.0 allows a local attacker to execute arbitrary code via a crafted script to the Additional Meta Tag parameter in the Pages Content Menu component. | https://github.com/sromanhu/CSZ-CMS-Stored-XSS---Pages-Content/blob/main/README.md | 2023-08-30T00:00:00 | 2023-09-15T00:00:00 | 2023-09-15T23:54:57.958282 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41066 | An authentication issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14. An app may be able to unexpectedly leak a user's credentials from secure text fields. | https://support.apple.com/en-us/HT213940 | 2023-08-22T18:10:00.330Z | 2023-09-26T20:12:03.116Z | 2023-09-26T20:12:03.116Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-41174 | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-09-14T19:03:36.122Z | 2023-09-26T20:12:03.609Z | 2023-09-26T20:12:03.609Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41031 | Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint. | https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-homemng-command-injection-vulnerability/ | 2023-08-22T14:09:29.146Z | 2023-09-22T16:07:59.041Z | 2023-09-22T16:07:59.041Z | {'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.2'} |
CVE-2023-41932 | Jenkins Job Configuration History Plugin 1227.v7a_79fc4dc01f and earlier does not restrict 'timestamp' query parameters in multiple endpoints, allowing attackers with to delete attacker-specified directories on the Jenkins controller file system as long as they contain a file called 'history.xml'. | https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3235 | 2023-09-05T16:39:57.391Z | 2023-09-06T12:08:53.687Z | 2023-10-24T12:51:41.324Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Job Configuration History Plugin', 'Versions': '0'} |
CVE-2023-41898 | Home assistant is an open source home automation. The Home Assistant Companion for Android app up to version 2023.8.2 is vulnerable to arbitrary URL loading in a WebView. This enables all sorts of attacks, including arbitrary JavaScript execution, limited native code execution, and credential theft. This issue has been patched in version 2023.9.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2023-142`. | https://github.com/home-assistant/core/security/advisories/GHSA-jvpm-q3hq-86rg | 2023-09-04T16:31:48.226Z | 2023-10-19T22:08:40.783Z | 2023-10-19T22:08:40.783Z | {'Vendor': 'home-assistant', 'Product': 'core', 'Versions': '< 2023.9.2'} |
CVE-2023-41748 | Remote command execution due to improper input validation. The following products are affected: Acronis Cloud Manager (Windows) before build 6.2.23089.203. | https://security-advisory.acronis.com/advisories/SEC-5816 | 2023-08-31T14:10:27.638Z | 2023-08-31T17:54:25.532Z | 2023-08-31T17:54:25.532Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cloud Manager', 'Versions': 'unspecified'} |
CVE-2023-41318 | matrix-media-repo is a highly customizable multi-domain media repository for the Matrix chat ecosystem. In affected versions an attacker could upload a malicious piece of media to the media repo, which would then be served with `Content-Disposition: inline` upon download. This vulnerability could be leveraged to execute scripts embedded in SVG content. Commits `77ec235` and `bf8abdd` fix the issue and are included in the 1.3.0 release. Operators should upgrade to v1.3.0 as soon as possible. Operators unable to upgrade should override the `Content-Disposition` header returned by matrix-media-repo as a workaround. | https://github.com/turt2live/matrix-media-repo/security/advisories/GHSA-5crw-6j7v-xc72 | 2023-08-28T16:56:43.365Z | 2023-09-08T19:51:20.011Z | 2023-09-08T19:51:20.011Z | {'Vendor': 'turt2live', 'Product': 'matrix-media-repo', 'Versions': '< 1.3.0'} |
CVE-2023-41162 | A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the file mask field while searching under the tools drop down. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-09-13T00:00:00 | 2023-09-13T21:51:18.238302 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41861 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Restrict plugin <= 2.2.4 versions. | https://patchstack.com/database/vulnerability/restricted-content/wordpress-restrict-membership-site-content-and-user-access-restrictions-for-wordpress-plugin-2-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T10:33:46.291Z | 2023-09-26T07:41:45.190Z | 2023-09-26T07:41:45.190Z | {'Vendor': 'Restrict', 'Product': 'Restrict', 'Versions': 'n/a'} |
CVE-2023-41027 | Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint.
| https://blog.exodusintel.com/2023/09/18/juplink-rx4-1500-credential-disclosure-vulnerability/ | 2023-08-22T14:09:29.145Z | 2023-09-22T16:06:05.266Z | 2023-09-22T16:06:05.266Z | {'Vendor': 'Juplink', 'Product': 'RX4-1500', 'Versions': 'V1.0.5, V1.0.4'} |
CVE-2023-41836 | An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.0 and 4.2.0 through 4.2.4, and 4.0.0 through 4.0.4 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.4 through 3.0.7 allows attacker to execute unauthorized code or commands via crafted HTTP requests. | https://fortiguard.com/psirt/FG-IR-23-215 | 2023-09-04T08:12:52.814Z | 2023-10-13T14:51:22.277Z | 2023-10-13T14:51:22.277Z | {'Vendor': 'Fortinet', 'Product': 'FortiSandbox', 'Versions': '4.4.0, 4.2.0, 4.0.0, 3.2.0, 3.1.0, 3.0.4'} |
CVE-2023-41070 | A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.6, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access sensitive data logged when a user shares a link. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.331Z | 2023-09-26T20:12:04.256Z | 2023-09-26T20:12:04.256Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41359 | An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation. | https://github.com/FRRouting/frr/pull/14232 | 2023-08-29T00:00:00 | 2023-08-29T00:00:00 | 2023-11-15T05:07:07.139574 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41358 | An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero. | https://github.com/FRRouting/frr/pull/14260 | 2023-08-29T00:00:00 | 2023-08-29T00:00:00 | 2023-11-15T05:07:00.388715 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41564 | An arbitrary file upload vulnerability in the Upload Asset function of Cockpit CMS v2.6.3 allows attackers to execute arbitrary code via uploading a crafted .shtml file. | https://github.com/LongHair00/Mitre_opensource_report/blob/main/CockpitCMS-StoredXSS.md | 2023-08-30T00:00:00 | 2023-09-08T00:00:00 | 2023-09-08T22:11:02.185871 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41071 | A use-after-free issue was addressed with improved memory management. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Ventura 13.6. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213938 | 2023-08-22T18:10:00.331Z | 2023-09-26T20:12:04.756Z | 2023-09-26T20:12:04.756Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-41163 | A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the replace in results field while replacing the results under the tools drop down. | https://webmin.com/tags/webmin-changelog/ | 2023-08-24T00:00:00 | 2023-08-30T00:00:00 | 2023-08-31T22:05:27.878365 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-41860 | Unauth. Cross-Site Scripting (XSS) vulnerability in TravelMap plugin <= 1.0.1 versions. | https://patchstack.com/database/vulnerability/travelmap-blog/wordpress-travel-map-plugin-1-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-09-04T10:33:46.291Z | 2023-09-26T07:46:53.689Z | 2023-09-26T07:46:53.689Z | {'Vendor': 'TravelMap', 'Product': 'Travel Map', 'Versions': 'n/a'} |
CVE-2023-41749 | Sensitive information disclosure due to excessive collection of system information. The following products are affected: Acronis Agent (Windows) before build 32047, Acronis Cyber Protect 15 (Windows) before build 35979. | https://security-advisory.acronis.com/advisories/SEC-5287 | 2023-08-31T14:10:27.638Z | 2023-08-31T20:17:55.126Z | 2023-08-31T20:17:55.126Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-41319 | Fides is an open-source privacy engineering platform for managing the fulfillment of data privacy requests in a runtime environment, and the enforcement of privacy regulations in code. The Fides webserver API allows custom integrations to be uploaded as a ZIP file. This ZIP file must contain YAML files, but Fides can be configured to also accept the inclusion of custom Python code in it. The custom code is executed in a restricted, sandboxed environment, but the sandbox can be bypassed to execute any arbitrary code. The vulnerability allows the execution of arbitrary code on the target system within the context of the webserver python process owner on the webserver container, which by default is `root`, and leverage that access to attack underlying infrastructure and integrated systems. This vulnerability affects Fides versions `2.11.0` through `2.19.0`. Exploitation is limited to API clients with the `CONNECTOR_TEMPLATE_REGISTER` authorization scope. In the Fides Admin UI this scope is restricted to highly privileged users, specifically root users and users with the owner role. Exploitation is only possible if the security configuration parameter `allow_custom_connector_functions` is enabled by the user deploying the Fides webserver container, either in `fides.toml` or by setting the env var `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS=True`. By default this configuration parameter is disabled. The vulnerability has been patched in Fides version `2.19.0`. Users are advised to upgrade to this version or later to secure their systems against this threat. Users unable to upgrade should ensure that `allow_custom_connector_functions` in `fides.toml` and the `FIDES__SECURITY__ALLOW_CUSTOM_CONNECTOR_FUNCTIONS` are both either unset or explicit set to `False`. | https://github.com/ethyca/fides/security/advisories/GHSA-p6p2-qq95-vq5h | 2023-08-28T16:56:43.365Z | 2023-09-06T17:54:30.889Z | 2023-09-06T17:54:30.889Z | {'Vendor': 'ethyca', 'Product': 'fides', 'Versions': '>= 2.11.0, < 2.19.0'} |
CVE-2023-41876 | Cross-Site Request Forgery (CSRF) vulnerability in Hardik Kalathiya WP Gallery Metabox plugin <= 1.0.0 versions. | https://patchstack.com/database/vulnerability/wp-gallery-metabox/wordpress-wp-gallery-metabox-plugin-1-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-09-04T11:35:57.269Z | 2023-10-10T08:53:25.955Z | 2023-10-10T08:53:25.955Z | {'Vendor': 'Hardik Kalathiya', 'Product': 'WP Gallery Metabox', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.