CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-50859 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum WP Crowdfunding allows Stored XSS.This issue affects WP Crowdfunding: from n/a through 2.1.6.
| https://patchstack.com/database/vulnerability/wp-crowdfunding/wordpress-wp-crowdfunding-plugin-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-14T17:19:16.270Z | 2023-12-28T10:16:51.601Z | 2023-12-28T10:16:51.601Z | {'Vendor': 'Themeum', 'Product': 'WP Crowdfunding', 'Versions': 'n/a'} |
CVE-2023-50265 | Bazarr manages and downloads subtitles. Prior to 1.3.1, the /api/swaggerui/static endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1. | https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/ | 2023-12-05T20:42:59.379Z | 2023-12-15T20:42:25.409Z | 2023-12-15T20:42:25.409Z | {'Vendor': 'morpheus65535', 'Product': 'bazarr', 'Versions': '< 1.3.1'} |
CVE-2023-50770 | Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins. | https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3168 | 2023-12-13T13:06:36.477Z | 2023-12-13T17:30:17.513Z | 2023-12-13T17:30:17.513Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenId Connect Authentication Plugin', 'Versions': '0'} |
CVE-2023-50727 | Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. Reflected XSS issue occurs when /queues is appended with /"><svg%20onload=alert(domain)>. This issue has been patched in version 2.6.0. | https://github.com/resque/resque/security/advisories/GHSA-r9mq-m72x-257g | 2023-12-11T17:53:36.032Z | 2023-12-22T20:10:10.964Z | 2023-12-22T20:10:10.964Z | {'Vendor': 'resque', 'Product': 'resque', 'Versions': '< 2.6.0'} |
CVE-2023-50377 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AB-WP Simple Counter allows Stored XSS.This issue affects Simple Counter: from n/a through 1.0.2.
| https://patchstack.com/database/vulnerability/abwp-simple-counter/wordpress-simple-counter-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-07T12:18:13.606Z | 2023-12-21T14:30:19.186Z | 2023-12-21T14:30:19.186Z | {'Vendor': 'AB-WP', 'Product': 'Simple Counter', 'Versions': 'n/a'} |
CVE-2023-50880 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The BuddyPress Community BuddyPress allows Stored XSS.This issue affects BuddyPress: from n/a through 11.3.1.
| https://patchstack.com/database/vulnerability/buddypress/wordpress-buddypress-plugin-11-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-15T14:42:48.489Z | 2023-12-29T11:28:39.308Z | 2023-12-29T11:28:39.308Z | {'Vendor': 'The BuddyPress Community', 'Product': 'BuddyPress', 'Versions': 'n/a'} |
CVE-2023-50245 | OpenEXR-viewer is a viewer for OpenEXR files with detailed metadata probing. Versions prior to 0.6.1 have a memory overflow vulnerability. This issue is fixed in version 0.6.1. | https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj | 2023-12-05T20:42:59.376Z | 2023-12-11T22:39:19.059Z | 2023-12-11T22:39:19.059Z | {'Vendor': 'afichet', 'Product': 'openexr-viewer', 'Versions': '< 0.6.1'} |
CVE-2023-50838 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Basix NEX-Forms – Ultimate Form Builder – Contact forms and much more.This issue affects NEX-Forms – Ultimate Form Builder – Contact forms and much more: from n/a through 8.5.5.
| https://patchstack.com/database/vulnerability/nex-forms-express-wp-form-builder/wordpress-nex-forms-ultimate-form-builder-8-5-5-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:18:45.975Z | 2023-12-28T20:04:58.740Z | 2023-12-28T20:04:58.740Z | {'Vendor': 'Basix', 'Product': 'NEX-Forms – Ultimate Form Builder – Contact forms and much more', 'Versions': 'n/a'} |
CVE-2023-50992 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a stack overflow via the ip parameter in the setPing function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:44:28.675929 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50707 |
Through the exploitation of active user sessions, an attacker could send custom requests to cause a denial-of-service condition on the device.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-02 | 2023-12-11T16:37:13.794Z | 2023-12-19T23:18:26.771Z | 2023-12-19T23:18:26.771Z | {'Vendor': 'EFACEC', 'Product': 'BCU 500', 'Versions': 'version 4.07'} |
CVE-2023-50984 | Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the ip parameter in the spdtstConfigAndStart function. | http://tenda.com | 2023-12-18T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:41:39.721026 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50341 | HCL DRYiCE MyXalytics is impacted by Improper Access Control (Obsolete web pages) vulnerability. Discovery of outdated and accessible web pages, reflects a "Missing Access Control" vulnerability, which could lead to inadvertent exposure of sensitive information and/or exposing a vulnerable endpoint.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608 | 2023-12-07T03:55:55.604Z | 2024-01-03T02:42:20.178Z | 2024-01-03T02:42:20.178Z | {'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'} |
CVE-2023-50711 | vmm-sys-util is a collection of modules that provides helpers and utilities used by multiple rust-vmm components. Starting in version 0.5.0 and prior to version 0.12.0, an issue in the `FamStructWrapper::deserialize` implementation provided by the crate for `vmm_sys_util::fam::FamStructWrapper` can lead to out of bounds memory accesses. The deserialization does not check that the length stored in the header matches the flexible array length. Mismatch in the lengths might allow out of bounds memory access through Rust-safe methods. The issue was corrected in version 0.12.0 by inserting a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization otherwise. Moreover, the API was changed so that header length can only be modified through Rust-unsafe code. This ensures that users cannot trigger out-of-bounds memory access from Rust-safe code. | https://github.com/rust-vmm/vmm-sys-util/security/advisories/GHSA-875g-mfp6-g7f9 | 2023-12-11T17:53:36.028Z | 2024-01-02T20:02:28.225Z | 2024-01-02T20:02:28.225Z | {'Vendor': 'rust-vmm', 'Product': 'vmm-sys-util', 'Versions': '>= 0.5.0, < 0.12.0'} |
CVE-2023-50879 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WordPress.Com Editing Toolkit allows Stored XSS.This issue affects WordPress.Com Editing Toolkit: from n/a through 3.78784.
| https://patchstack.com/database/vulnerability/full-site-editing/wordpress-wordpress-com-editing-toolkit-plugin-3-78784-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-15T14:42:48.488Z | 2023-12-29T11:31:24.984Z | 2023-12-29T11:31:24.984Z | {'Vendor': 'Automattic', 'Product': 'WordPress.com Editing Toolkit', 'Versions': 'n/a'} |
CVE-2023-50896 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weForms weForms – Easy Drag & Drop Contact Form Builder For WordPress allows Stored XSS.This issue affects weForms – Easy Drag & Drop Contact Form Builder For WordPress: from n/a through 1.6.17.
| https://patchstack.com/database/vulnerability/weforms/wordpress-weforms-plugin-1-6-17-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-12-15T15:45:32.564Z | 2023-12-29T11:09:16.175Z | 2023-12-29T11:09:16.175Z | {'Vendor': 'weForms', 'Product': 'weForms – Easy Drag & Drop Contact Form Builder For WordPress', 'Versions': 'n/a'} |
CVE-2023-50253 | Laf is a cloud development platform. In the Laf version design, the log uses communication with k8s to quickly retrieve logs from the container without the need for additional storage. However, in version 1.0.0-beta.13 and prior, this interface does not verify the permissions of the pod, which allows authenticated users to obtain any pod logs under the same namespace through this method, thereby obtaining sensitive information printed in the logs. As of time of publication, no known patched versions exist. | https://github.com/labring/laf/security/advisories/GHSA-g9c8-wh35-g75f | 2023-12-05T20:42:59.378Z | 2024-01-03T16:45:11.778Z | 2024-01-03T16:45:11.778Z | {'Vendor': 'labring', 'Product': 'laf', 'Versions': '<= 1.0.0-beta.13'} |
CVE-2023-50044 | Cesanta MJS 2.20.0 has a getprop_builtin_foreign out-of-bounds read if a Built-in API name occurs in a substring of an input string. | https://github.com/cesanta/mjs/issues/254 | 2023-12-04T00:00:00 | 2023-12-20T00:00:00 | 2023-12-29T00:04:25.136302 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50101 | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via Label management editing. | https://github.com/Jarvis-616/cms/blob/master/Label%20management%20editing%20with%20stored%20XSS.md | 2023-12-04T00:00:00 | 2023-12-14T00:00:00 | 2023-12-14T15:58:52.699815 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50443 | Encrypted disks created by PRIMX CRYHOD for Windows before Q.2020.4 (ANSSI qualification submission) or CRYHOD for Windows before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger outbound network traffic from computers on which disks are opened. | https://www.primx.eu/fr/blog/ | 2023-12-10T00:00:00 | 2023-12-13T00:00:00 | 2023-12-13T20:21:20.288869 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50855 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sam Perrow Pre* Party Resource Hints.This issue affects Pre* Party Resource Hints: from n/a through 1.8.18.
| https://patchstack.com/database/vulnerability/pre-party-browser-hints/wordpress-pre-party-resource-hints-plugin-1-8-18-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:16.269Z | 2023-12-28T11:19:11.369Z | 2023-12-28T11:19:11.369Z | {'Vendor': 'Sam Perrow', 'Product': 'Pre* Party Resource Hints', 'Versions': 'n/a'} |
CVE-2023-50785 | Zoho ManageEngine ADAudit Plus before 7270 allows admin users to view names of arbitrary directories via path traversal. | https://www.manageengine.com/products/active-directory-audit/cve-2023-50785.html | 2023-12-14T00:00:00 | 2024-01-25T00:00:00 | 2024-01-25T05:44:13.037566 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50290 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.
The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess.
The Solr Metrics API is protected by the "metrics-read" permission.
Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission.
This issue affects Apache Solr: from 9.0.0 before 9.3.0.
Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
| https://solr.apache.org/security.html#cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables | 2023-12-06T17:35:24.747Z | 2024-01-15T09:32:44.532Z | 2024-01-15T09:32:44.532Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Solr', 'Versions': '9.0.0'} |
CVE-2023-50455 | An issue was discovered in Zammad before 6.2.0. Due to lack of rate limiting in the "email address verification" feature, an attacker could send many requests for a known address to cause Denial Of Service (generation of many emails, which would also spam the victim). | https://zammad.com/en/advisories/zaa-2023-06 | 2023-12-10T00:00:00 | 2023-12-10T00:00:00 | 2023-12-10T18:49:13.949953 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50843 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Clockwork Clockwork SMS Notfications.This issue affects Clockwork SMS Notfications: from n/a through 3.0.4.
| https://patchstack.com/database/vulnerability/mediaburst-email-to-sms/wordpress-clockwork-sms-notfications-plugin-3-0-4-sql-injection-vulnerability?_s_id=cve | 2023-12-14T17:19:02.629Z | 2023-12-28T18:30:01.243Z | 2023-12-28T18:30:01.243Z | {'Vendor': 'Clockwork', 'Product': 'Clockwork SMS Notfications', 'Versions': 'n/a'} |
CVE-2023-50639 | Cross Site Scripting (XSS) vulnerability in CuteHttpFileServer v.1.0 and v.2.0 allows attackers to obtain sensitive information via the file upload function in the home page. | https://github.com/940198871/Vulnerability-details/blob/main/CVE-2023-50639.md | 2023-12-11T00:00:00 | 2023-12-20T00:00:00 | 2023-12-20T21:05:56.649587 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-50269 | Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. | https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3 | 2023-12-05T20:42:59.381Z | 2023-12-14T17:09:25.168Z | 2023-12-14T17:09:25.168Z | {'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '>= 2.6, <= 2.7.STABLE9, >= 3.1, <= 5.9, >= 6.0.1, < 6.6'} |
CVE-2023-35983 | This issue was addressed with improved data protection. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to modify protected parts of the file system. | https://support.apple.com/en-us/HT213843 | 2023-07-20T15:04:25.800Z | 2023-07-26T23:52:30.789Z | 2023-07-27T03:45:16.817Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-35829 | An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 | 2023-06-18T00:00:00 | 2023-06-18T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35080 | A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure. | https://forums.ivanti.com/s/article/Security-fixes-included-in-the-latest-Ivanti-Secure-Access-Client-Release | 2023-06-13T01:00:11.784Z | 2023-11-14T23:18:08.387Z | 2023-11-14T23:18:08.387Z | {'Vendor': 'Ivanti', 'Product': 'Secure Access Client', 'Versions': '22.6.1.1'} |
CVE-2023-35346 | Windows DNS Server Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35346 | 2023-06-14T23:09:47.624Z | 2023-07-11T17:02:52.464Z | 2023-12-14T19:52:50.436Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35653 | In TBD of TBD, there is a possible way to access location information due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:07.507Z | 2023-10-11T19:21:13.242Z | 2023-10-11T19:21:13.242Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35038 | Cross-Site Request Forgery (CSRF) vulnerability in wpexperts.Io WP PDF Generator plugin <= 1.2.2 versions. | https://patchstack.com/database/vulnerability/wp-pdf-generator/wordpress-wp-pdf-generator-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-12T09:05:49.595Z | 2023-07-17T13:26:20.162Z | 2023-07-17T13:26:20.162Z | {'Vendor': 'wpexperts.io', 'Product': 'WP PDF Generator', 'Versions': 'n/a'} |
CVE-2023-35311 | Microsoft Outlook Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311 | 2023-06-14T23:09:47.613Z | 2023-07-11T17:03:27.227Z | 2023-12-14T19:53:22.976Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft 365 Apps for Enterprise', 'Versions': '16.0.1'} |
CVE-2023-35184 | The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse a SolarWinds service resulting in a remote code execution. | https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35184 | 2023-06-14T20:03:23.107Z | 2023-10-19T14:22:26.928Z | 2023-10-19T14:22:26.928Z | {'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'} |
CVE-2023-35887 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA.
In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks.
This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10
| https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2 | 2023-06-19T15:49:53.163Z | 2023-07-10T09:28:54.987Z | 2023-07-19T07:18:06.740Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache MINA SSHD', 'Versions': '1.0'} |
CVE-2023-35096 | Cross-Site Request Forgery (CSRF) vulnerability in myCred plugin <= 2.5 versions. | https://patchstack.com/database/vulnerability/mycred/wordpress-mycred-plugin-2-5-cross-site-request-forgery-csrf?_s_id=cve | 2023-06-13T15:10:42.889Z | 2023-07-17T13:35:21.634Z | 2023-07-17T13:35:21.634Z | {'Vendor': 'myCred', 'Product': 'myCred', 'Versions': 'n/a'} |
CVE-2023-35995 | Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 1. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791 | 2023-06-20T19:41:02.814Z | 2024-01-08T14:47:56.783Z | 2024-01-08T18:00:10.984Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35700 | null | null | 2023-06-15T11:32:19.767Z | null | 2023-07-02T21:37:26.274084Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-35350 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35350 | 2023-06-14T23:09:47.625Z | 2023-07-11T17:02:54.231Z | 2023-12-14T19:52:51.931Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35645 | In tbd of tbd, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:07.505Z | 2023-10-11T18:40:24.221Z | 2023-10-11T19:18:21.704Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35901 | IBM Robotic Process Automation 21.0.0 through 21.0.7.6 and 23.0.0 through 23.0.6 is vulnerable to client side validation bypass which could allow invalid changes or values in some fields. IBM X-Force ID: 259380. | https://www.ibm.com/support/pages/node/7012317 | 2023-06-20T02:24:31.593Z | 2023-07-16T23:31:39.325Z | 2023-07-16T23:31:39.325Z | {'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'} |
CVE-2023-35002 | A heap-based buffer overflow vulnerability exists in the pictwread functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760 | 2023-06-09T13:03:16.421Z | 2023-09-25T15:22:34.091Z | 2023-09-25T17:00:09.033Z | {'Vendor': 'Accusoft', 'Product': 'ImageGear', 'Versions': '20.1'} |
CVE-2023-35147 | Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3099 | 2023-06-14T08:58:33.245Z | 2023-06-14T12:53:09.530Z | 2023-10-24T12:50:40.843Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins AWS CodeCommit Trigger Plugin', 'Versions': '0'} |
CVE-2023-35844 | packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used. | https://advisory.dw1.io/59 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35794 | An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console. | https://www.cassianetworks.com/products/iot-access-controller/ | 2023-06-16T00:00:00 | 2023-10-27T00:00:00 | 2023-10-27T20:32:32.774910 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35055 | A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761 | 2023-06-12T15:52:42.060Z | 2023-10-11T15:14:31.751Z | 2023-10-11T17:00:06.915Z | {'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'} |
CVE-2023-35956 | Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `fastlz_decompress`. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785 | 2023-06-20T18:27:13.647Z | 2024-01-08T14:47:59.620Z | 2024-01-08T18:00:09.521Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35813 | Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3. | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1002979 | 2023-06-17T00:00:00 | 2023-06-17T00:00:00 | 2023-06-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35110 | An issue was discovered jjson thru 0.1.7 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://github.com/grobmeier/jjson/issues/2 | 2023-06-13T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35669 | In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to control other running activities due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6 | 2023-06-15T02:50:29.819Z | 2023-09-11T20:09:52.808Z | 2023-09-11T20:16:40.959Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35393 | Azure Apache Hive Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35393 | 2023-06-14T23:09:47.640Z | 2023-08-08T17:08:39.361Z | 2023-12-14T20:03:12.215Z | {'Vendor': 'Microsoft', 'Product': 'Azure HDInsight', 'Versions': '1.0'} |
CVE-2023-35940 | GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue. | https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw | 2023-06-20T14:02:45.595Z | 2023-07-05T20:46:04.061Z | 2023-07-05T20:46:04.061Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.5.0, < 10.0.8'} |
CVE-2023-35043 | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Neha Goel Recent Posts Slider plugin <= 1.1 versions. | https://patchstack.com/database/vulnerability/recent-posts-slider/wordpress-recent-posts-slider-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-12T15:16:17.293Z | 2023-07-25T12:57:09.248Z | 2023-07-25T12:57:09.248Z | {'Vendor': 'Neha Goel', 'Product': 'Recent Posts Slider', 'Versions': 'n/a'} |
CVE-2023-35385 | Microsoft Message Queuing Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385 | 2023-06-14T23:09:47.638Z | 2023-08-08T17:08:37.142Z | 2023-12-14T20:03:10.221Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35690 | In RGXDestroyHWRTData of rgxta3d.c, there is a possible arbitrary code execution due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. | https://source.android.com/security/bulletin/2023-12-01 | 2023-06-15T02:50:33.963Z | 2023-12-04T22:40:49.946Z | 2023-12-22T00:16:43.676Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'} |
CVE-2023-35917 | Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce PayPal Payments plugin <= 2.0.4 versions. | https://patchstack.com/database/vulnerability/woocommerce-paypal-payments/wordpress-woocommerce-paypal-payments-plugin-2-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-20T09:05:43.963Z | 2023-06-22T11:47:52.610Z | 2023-06-22T11:47:52.610Z | {'Vendor': 'WooCommerce', 'Product': 'WooCommerce PayPal Payments', 'Versions': 'n/a'} |
CVE-2023-35852 | In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation. | https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35151 | XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8g9c-c9cm-9c56 | 2023-06-14T14:17:52.177Z | 2023-06-23T16:33:01.388Z | 2023-06-23T16:33:01.388Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.3-milestone-1, < 14.4.8, >= 14.5, < 14.10.6, >= 15.0-rc-1, < 15.1'} |
CVE-2023-35782 | The ipandlanguageredirect extension before 5.1.2 for TYPO3 allows SQL Injection. | https://typo3.org/security/advisory/typo3-ext-sa-2023-005 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35628 | Windows MSHTML Platform Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628 | 2023-06-15T01:03:28.507Z | 2023-12-12T18:10:51.539Z | 2023-12-15T21:02:54.250Z | {'Vendor': 'Microsoft', 'Product': 'Windows 11 Version 23H2', 'Versions': '10.0.0'} |
CVE-2023-35297 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35297 | 2023-06-14T23:09:47.611Z | 2023-07-11T17:03:20.451Z | 2023-12-14T19:53:16.825Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35126 | An out-of-bounds write vulnerability exists within the parsers for both the "DocumentViewStyles" and "DocumentEditStyles" streams of Ichitaro 2023 1.0.1.59372 when processing types 0x0000-0x0009 of a style record with the type 0x2008. A specially crafted document can cause memory corruption, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825 | 2023-07-31T21:52:03.187Z | 2023-10-19T16:02:29.998Z | 2023-10-19T16:02:29.998Z | {'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'} |
CVE-2023-35825 | null | null | 2023-06-18T00:00:00 | null | 2023-06-19T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-35960 | Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns legacy decompression in `vcd_main`. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786 | 2023-06-20T18:31:47.415Z | 2024-01-08T14:47:58.638Z | 2024-01-08T18:00:07.159Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35872 | The Message Display Tool (MDT) of SAP NetWeaver Process Integration - version SAP_XIAF 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application.
| https://me.sap.com/notes/3343564 | 2023-06-19T10:27:44.580Z | 2023-07-11T02:41:33.243Z | 2023-07-11T02:41:33.243Z | {'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Process Integration (Message Display Tool)', 'Versions': 'SAP_XIAF 7.50'} |
CVE-2023-35171 | NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4 | 2023-06-14T14:17:52.180Z | 2023-06-23T20:44:34.272Z | 2023-06-23T20:44:34.272Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 26.0.0, < 26.0.2'} |
CVE-2023-35034 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow remote code execution by unauthenticated users, aka OSFOURK-24033. | https://networks.unify.com/security/advisories/OBSO-2305-01.pdf | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35937 | Metersphere is an open source continuous testing platform. In versions prior to 2.10.2 LTS, some key APIs in Metersphere lack permission checks. This allows ordinary users to execute APIs that can only be executed by space administrators or project administrators. For example, ordinary users can be updated as space administrators. Version 2.10.2 LTS has a patch for this issue. | https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r | 2023-06-20T14:02:45.594Z | 2023-07-06T13:50:10.673Z | 2023-07-06T13:50:10.673Z | {'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.2-LTS'} |
CVE-2023-35167 | Remult is a CRUD framework for full-stack TypeScript. If you used the apiPrefilter option of the `@Entity` decorator, by setting it to a function that returns a filter that prevents unauthorized access to data, an attacker who knows the `id` of an entity instance is not authorized to access, can gain read, update and delete access to it. The issue is fixed in version 0.20.6. As a workaround, set the `apiPrefilter` option to a filter object instead of a function. | https://github.com/remult/remult/security/advisories/GHSA-7hh3-3x64-v2g9 | 2023-06-14T14:17:52.179Z | 2023-06-23T19:03:54.753Z | 2023-06-23T19:03:54.753Z | {'Vendor': 'remult', 'Product': 'remult', 'Versions': '< 0.20.6'} |
CVE-2023-35921 | A vulnerability has been identified in SIMATIC MV540 H (All versions < V3.3.4), SIMATIC MV540 S (All versions < V3.3.4), SIMATIC MV550 H (All versions < V3.3.4), SIMATIC MV550 S (All versions < V3.3.4), SIMATIC MV560 U (All versions < V3.3.4), SIMATIC MV560 X (All versions < V3.3.4). Affected devices cannot properly process specially crafted Ethernet frames sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually. | https://cert-portal.siemens.com/productcert/pdf/ssa-561322.pdf | 2023-06-20T10:46:34.162Z | 2023-07-11T09:07:09.314Z | 2023-07-11T09:07:09.314Z | {'Vendor': 'Siemens', 'Product': 'SIMATIC MV540 H', 'Versions': 'All versions < V3.3.4'} |
CVE-2023-35649 | In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:07.506Z | 2023-10-11T19:20:41.460Z | 2023-10-11T19:20:41.460Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35999 | null | null | 2023-06-20T20:19:49.398Z | null | 2023-07-02T21:50:52.192612Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-35833 | An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration. | https://ysoft.com | 2023-06-18T00:00:00 | 2023-07-13T00:00:00 | 2023-09-11T14:33:16.386801 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35075 | Mattermost fails to use innerText / textContent when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim's page by create a channel name that is valid HTML. No XSS is possible though.
| https://mattermost.com/security-updates | 2023-11-20T12:06:31.656Z | 2023-11-27T09:09:19.659Z | 2023-11-27T09:09:19.659Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.13, 8.1.4'} |
CVE-2023-35976 | Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt | 2023-06-20T18:41:22.737Z | 2023-07-05T14:47:43.236Z | 2023-07-05T14:47:43.236Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central', 'Versions': '- ArubaOS 10.4.x.x: 10.4.0.1 and below, - ArubaOS 8.11.x.x: 8.11.1.0 and below, - ArubaOS 8.10.x.x: 8.10.0.6 and below, - ArubaOS 8.6.x.x: 8.6.0.20 and below'} |
CVE-2023-35798 | Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it.
This issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1.
It is recommended to upgrade to a version that is not affected
| https://github.com/apache/airflow/pull/31984 | 2023-06-17T20:00:14.715Z | 2023-06-27T11:39:51.759Z | 2023-06-27T11:39:51.759Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow ODBC Provider', 'Versions': '0'} |
CVE-2023-35632 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35632 | 2023-06-15T01:03:28.507Z | 2023-12-12T18:10:53.603Z | 2023-12-15T21:02:56.301Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35848 | VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 lacks certain size calculations before attempting to set a value of an mss structure member. | https://github.com/virtualsquare/picotcp/pull/15/files | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35665 | In multiple files, there is a possible way to import a contact from another user due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/services/Telephony/+/674039e70e1c5bf29b808899ac80c709acc82290 | 2023-06-15T02:50:29.818Z | 2023-09-11T20:09:52.237Z | 2023-09-11T20:16:39.827Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35673 | In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8770c07c102c7fdc74626dc717acc8f6dd1c92cc | 2023-06-15T02:50:29.820Z | 2023-09-11T20:09:53.391Z | 2023-09-11T20:16:42.035Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35389 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35389 | 2023-06-14T23:09:47.639Z | 2023-08-08T17:08:38.800Z | 2023-12-14T20:03:11.709Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'} |
CVE-2023-35366 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35366 | 2023-06-14T23:09:47.634Z | 2023-07-11T17:03:01.684Z | 2023-12-14T19:52:58.422Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35809 | An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected. | https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-007/ | 2023-06-17T00:00:00 | 2023-06-17T00:00:00 | 2023-08-23T15:06:15.726579 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35624 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624 | 2023-06-15T01:03:28.506Z | 2023-12-12T18:10:57.777Z | 2023-12-15T21:03:00.401Z | {'Vendor': 'Microsoft', 'Product': 'Azure Connected Machine Agent', 'Versions': '1.0.0'} |
CVE-2023-35331 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35331 | 2023-06-14T23:09:47.619Z | 2023-07-11T17:02:44.688Z | 2023-12-14T19:52:43.913Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35018 | IBM Security Verify Governance 10.0 could allow a privileged use to upload arbitrary files due to improper file validation. IBM X-Force ID: 259382. | https://www.ibm.com/support/pages/node/7050358 | 2023-06-11T20:38:21.241Z | 2023-10-15T23:46:49.009Z | 2023-10-15T23:48:50.779Z | {'Vendor': 'IBM', 'Product': 'Security Verify Governance', 'Versions': '10.0'} |
CVE-2023-35019 | IBM Security Verify Governance, Identity Manager 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 257873. | https://www.ibm.com/support/pages/node/7014397 | 2023-06-11T20:38:21.241Z | 2023-07-31T00:27:01.113Z | 2023-07-31T00:27:01.113Z | {'Vendor': 'IBM', 'Product': 'Security Verify Governance, Identity Manager', 'Versions': '10.0'} |
CVE-2023-35625 | Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35625 | 2023-06-15T01:03:28.506Z | 2023-12-12T18:10:43.227Z | 2023-12-15T21:02:45.576Z | {'Vendor': 'Microsoft', 'Product': 'Azure Machine Learning', 'Versions': '1.0.0'} |
CVE-2023-35330 | Windows Extended Negotiation Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35330 | 2023-06-14T23:09:47.619Z | 2023-07-11T17:02:44.128Z | 2023-12-14T19:52:43.410Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35808 | An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. An Unrestricted File Upload vulnerability has been identified in the Notes module. By using crafted requests, custom PHP code can be injected and executed through the Notes module because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected. | https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-006/ | 2023-06-17T00:00:00 | 2023-06-17T00:00:00 | 2023-08-23T15:06:14.285008 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35388 | Microsoft Exchange Server Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35388 | 2023-06-14T23:09:47.638Z | 2023-08-08T17:08:53.722Z | 2023-12-14T20:03:25.712Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 13', 'Versions': '15.02.0'} |
CVE-2023-35367 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35367 | 2023-06-14T23:09:47.634Z | 2023-07-11T17:03:02.367Z | 2023-12-14T19:52:58.943Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35664 | In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/47299fd978258e67a8eebc361cb7a4dd2936205e | 2023-06-15T02:50:10.273Z | 2023-09-11T20:09:52.027Z | 2023-09-11T20:16:39.483Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12'} |
CVE-2023-35371 | Microsoft Office Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35371 | 2023-06-14T23:09:47.636Z | 2023-08-08T17:08:46.816Z | 2023-12-14T20:03:19.797Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'} |
CVE-2023-35849 | VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet. | https://github.com/virtualsquare/picotcp/commit/4b9a16764f2b12b611de9c34a50b4713d10ca401 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35799 | Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges. | https://advisories.stormshield.eu | 2023-06-17T00:00:00 | 2023-06-27T00:00:00 | 2023-06-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35633 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35633 | 2023-06-15T01:03:28.507Z | 2023-12-12T18:10:54.130Z | 2023-12-15T00:51:06.390Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1507', 'Versions': '10.0.0'} |
CVE-2023-35326 | Windows CDP User Components Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35326 | 2023-06-14T23:09:47.617Z | 2023-07-11T17:02:42.162Z | 2023-12-14T19:52:41.913Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35776 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Beplus Sermon'e – Sermons Online plugin <= 1.0.0 versions. | https://patchstack.com/database/vulnerability/sermone-online-sermons-management/wordpress-sermon-e-sermons-online-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-16T08:57:49.307Z | 2023-06-19T13:27:26.697Z | 2023-06-19T13:27:26.697Z | {'Vendor': 'Beplus', 'Product': "Sermon'e – Sermons Online", 'Versions': 'n/a'} |
CVE-2023-35998 | A missing authorization check in multiple SOAP endpoints of the Insider Threat Management Server enables an attacker on an adjacent network to read and write unauthorized objects. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected. | https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005 | 2023-06-20T20:19:49.398Z | 2023-06-27T14:30:53.460Z | 2023-06-27T14:30:53.460Z | {'Vendor': 'Proofpoint', 'Product': 'Insider Threat Management', 'Versions': '0'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.