CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-50859
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum WP Crowdfunding allows Stored XSS.This issue affects WP Crowdfunding: from n/a through 2.1.6.
https://patchstack.com/database/vulnerability/wp-crowdfunding/wordpress-wp-crowdfunding-plugin-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-14T17:19:16.270Z
2023-12-28T10:16:51.601Z
2023-12-28T10:16:51.601Z
{'Vendor': 'Themeum', 'Product': 'WP Crowdfunding', 'Versions': 'n/a'}
CVE-2023-50265
Bazarr manages and downloads subtitles. Prior to 1.3.1, the /api/swaggerui/static endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1.
https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/
2023-12-05T20:42:59.379Z
2023-12-15T20:42:25.409Z
2023-12-15T20:42:25.409Z
{'Vendor': 'morpheus65535', 'Product': 'bazarr', 'Versions': '< 1.3.1'}
CVE-2023-50770
Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.
https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3168
2023-12-13T13:06:36.477Z
2023-12-13T17:30:17.513Z
2023-12-13T17:30:17.513Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OpenId Connect Authentication Plugin', 'Versions': '0'}
CVE-2023-50727
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. Reflected XSS issue occurs when /queues is appended with /"><svg%20onload=alert(domain)>. This issue has been patched in version 2.6.0.
https://github.com/resque/resque/security/advisories/GHSA-r9mq-m72x-257g
2023-12-11T17:53:36.032Z
2023-12-22T20:10:10.964Z
2023-12-22T20:10:10.964Z
{'Vendor': 'resque', 'Product': 'resque', 'Versions': '< 2.6.0'}
CVE-2023-50377
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AB-WP Simple Counter allows Stored XSS.This issue affects Simple Counter: from n/a through 1.0.2.
https://patchstack.com/database/vulnerability/abwp-simple-counter/wordpress-simple-counter-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-07T12:18:13.606Z
2023-12-21T14:30:19.186Z
2023-12-21T14:30:19.186Z
{'Vendor': 'AB-WP', 'Product': 'Simple Counter', 'Versions': 'n/a'}
CVE-2023-50880
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The BuddyPress Community BuddyPress allows Stored XSS.This issue affects BuddyPress: from n/a through 11.3.1.
https://patchstack.com/database/vulnerability/buddypress/wordpress-buddypress-plugin-11-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T14:42:48.489Z
2023-12-29T11:28:39.308Z
2023-12-29T11:28:39.308Z
{'Vendor': 'The BuddyPress Community', 'Product': 'BuddyPress', 'Versions': 'n/a'}
CVE-2023-50245
OpenEXR-viewer is a viewer for OpenEXR files with detailed metadata probing. Versions prior to 0.6.1 have a memory overflow vulnerability. This issue is fixed in version 0.6.1.
https://github.com/afichet/openexr-viewer/security/advisories/GHSA-99jg-r3f4-rpxj
2023-12-05T20:42:59.376Z
2023-12-11T22:39:19.059Z
2023-12-11T22:39:19.059Z
{'Vendor': 'afichet', 'Product': 'openexr-viewer', 'Versions': '< 0.6.1'}
CVE-2023-50838
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Basix NEX-Forms – Ultimate Form Builder – Contact forms and much more.This issue affects NEX-Forms – Ultimate Form Builder – Contact forms and much more: from n/a through 8.5.5.
https://patchstack.com/database/vulnerability/nex-forms-express-wp-form-builder/wordpress-nex-forms-ultimate-form-builder-8-5-5-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:18:45.975Z
2023-12-28T20:04:58.740Z
2023-12-28T20:04:58.740Z
{'Vendor': 'Basix', 'Product': 'NEX-Forms – Ultimate Form Builder – Contact forms and much more', 'Versions': 'n/a'}
CVE-2023-50992
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a stack overflow via the ip parameter in the setPing function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:44:28.675929
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50707
Through the exploitation of active user sessions, an attacker could send custom requests to cause a denial-of-service condition on the device.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-02
2023-12-11T16:37:13.794Z
2023-12-19T23:18:26.771Z
2023-12-19T23:18:26.771Z
{'Vendor': 'EFACEC', 'Product': 'BCU 500', 'Versions': 'version 4.07'}
CVE-2023-50984
Tenda i29 v1.0 V1.0.0.5 was discovered to contain a buffer overflow via the ip parameter in the spdtstConfigAndStart function.
http://tenda.com
2023-12-18T00:00:00
2023-12-20T00:00:00
2023-12-20T21:41:39.721026
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50341
HCL DRYiCE MyXalytics is impacted by Improper Access Control (Obsolete web pages) vulnerability. Discovery of outdated and accessible web pages, reflects a "Missing Access Control" vulnerability, which could lead to inadvertent exposure of sensitive information and/or exposing a vulnerable endpoint.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109608
2023-12-07T03:55:55.604Z
2024-01-03T02:42:20.178Z
2024-01-03T02:42:20.178Z
{'Vendor': 'HCL Software', 'Product': 'DRYiCE MyXalytics', 'Versions': '5.9, 6.0, 6.1'}
CVE-2023-50711
vmm-sys-util is a collection of modules that provides helpers and utilities used by multiple rust-vmm components. Starting in version 0.5.0 and prior to version 0.12.0, an issue in the `FamStructWrapper::deserialize` implementation provided by the crate for `vmm_sys_util::fam::FamStructWrapper` can lead to out of bounds memory accesses. The deserialization does not check that the length stored in the header matches the flexible array length. Mismatch in the lengths might allow out of bounds memory access through Rust-safe methods. The issue was corrected in version 0.12.0 by inserting a check that verifies the lengths of compared flexible arrays are equal for any deserialized header and aborting deserialization otherwise. Moreover, the API was changed so that header length can only be modified through Rust-unsafe code. This ensures that users cannot trigger out-of-bounds memory access from Rust-safe code.
https://github.com/rust-vmm/vmm-sys-util/security/advisories/GHSA-875g-mfp6-g7f9
2023-12-11T17:53:36.028Z
2024-01-02T20:02:28.225Z
2024-01-02T20:02:28.225Z
{'Vendor': 'rust-vmm', 'Product': 'vmm-sys-util', 'Versions': '>= 0.5.0, < 0.12.0'}
CVE-2023-50879
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Automattic WordPress.Com Editing Toolkit allows Stored XSS.This issue affects WordPress.Com Editing Toolkit: from n/a through 3.78784.
https://patchstack.com/database/vulnerability/full-site-editing/wordpress-wordpress-com-editing-toolkit-plugin-3-78784-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T14:42:48.488Z
2023-12-29T11:31:24.984Z
2023-12-29T11:31:24.984Z
{'Vendor': 'Automattic', 'Product': 'WordPress.com Editing Toolkit', 'Versions': 'n/a'}
CVE-2023-50896
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in weForms weForms – Easy Drag & Drop Contact Form Builder For WordPress allows Stored XSS.This issue affects weForms – Easy Drag & Drop Contact Form Builder For WordPress: from n/a through 1.6.17.
https://patchstack.com/database/vulnerability/weforms/wordpress-weforms-plugin-1-6-17-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-12-15T15:45:32.564Z
2023-12-29T11:09:16.175Z
2023-12-29T11:09:16.175Z
{'Vendor': 'weForms', 'Product': 'weForms – Easy Drag & Drop Contact Form Builder For WordPress', 'Versions': 'n/a'}
CVE-2023-50253
Laf is a cloud development platform. In the Laf version design, the log uses communication with k8s to quickly retrieve logs from the container without the need for additional storage. However, in version 1.0.0-beta.13 and prior, this interface does not verify the permissions of the pod, which allows authenticated users to obtain any pod logs under the same namespace through this method, thereby obtaining sensitive information printed in the logs. As of time of publication, no known patched versions exist.
https://github.com/labring/laf/security/advisories/GHSA-g9c8-wh35-g75f
2023-12-05T20:42:59.378Z
2024-01-03T16:45:11.778Z
2024-01-03T16:45:11.778Z
{'Vendor': 'labring', 'Product': 'laf', 'Versions': '<= 1.0.0-beta.13'}
CVE-2023-50044
Cesanta MJS 2.20.0 has a getprop_builtin_foreign out-of-bounds read if a Built-in API name occurs in a substring of an input string.
https://github.com/cesanta/mjs/issues/254
2023-12-04T00:00:00
2023-12-20T00:00:00
2023-12-29T00:04:25.136302
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50101
JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) via Label management editing.
https://github.com/Jarvis-616/cms/blob/master/Label%20management%20editing%20with%20stored%20XSS.md
2023-12-04T00:00:00
2023-12-14T00:00:00
2023-12-14T15:58:52.699815
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50443
Encrypted disks created by PRIMX CRYHOD for Windows before Q.2020.4 (ANSSI qualification submission) or CRYHOD for Windows before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger outbound network traffic from computers on which disks are opened.
https://www.primx.eu/fr/blog/
2023-12-10T00:00:00
2023-12-13T00:00:00
2023-12-13T20:21:20.288869
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50855
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sam Perrow Pre* Party Resource Hints.This issue affects Pre* Party Resource Hints: from n/a through 1.8.18.
https://patchstack.com/database/vulnerability/pre-party-browser-hints/wordpress-pre-party-resource-hints-plugin-1-8-18-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:16.269Z
2023-12-28T11:19:11.369Z
2023-12-28T11:19:11.369Z
{'Vendor': 'Sam Perrow', 'Product': 'Pre* Party Resource Hints', 'Versions': 'n/a'}
CVE-2023-50785
Zoho ManageEngine ADAudit Plus before 7270 allows admin users to view names of arbitrary directories via path traversal.
https://www.manageengine.com/products/active-directory-audit/cve-2023-50785.html
2023-12-14T00:00:00
2024-01-25T00:00:00
2024-01-25T05:44:13.037566
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50290
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the "metrics-read" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.
https://solr.apache.org/security.html#cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables
2023-12-06T17:35:24.747Z
2024-01-15T09:32:44.532Z
2024-01-15T09:32:44.532Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Solr', 'Versions': '9.0.0'}
CVE-2023-50455
An issue was discovered in Zammad before 6.2.0. Due to lack of rate limiting in the "email address verification" feature, an attacker could send many requests for a known address to cause Denial Of Service (generation of many emails, which would also spam the victim).
https://zammad.com/en/advisories/zaa-2023-06
2023-12-10T00:00:00
2023-12-10T00:00:00
2023-12-10T18:49:13.949953
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50843
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Clockwork Clockwork SMS Notfications.This issue affects Clockwork SMS Notfications: from n/a through 3.0.4.
https://patchstack.com/database/vulnerability/mediaburst-email-to-sms/wordpress-clockwork-sms-notfications-plugin-3-0-4-sql-injection-vulnerability?_s_id=cve
2023-12-14T17:19:02.629Z
2023-12-28T18:30:01.243Z
2023-12-28T18:30:01.243Z
{'Vendor': 'Clockwork', 'Product': 'Clockwork SMS Notfications', 'Versions': 'n/a'}
CVE-2023-50639
Cross Site Scripting (XSS) vulnerability in CuteHttpFileServer v.1.0 and v.2.0 allows attackers to obtain sensitive information via the file upload function in the home page.
https://github.com/940198871/Vulnerability-details/blob/main/CVE-2023-50639.md
2023-12-11T00:00:00
2023-12-20T00:00:00
2023-12-20T21:05:56.649587
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-50269
Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.
https://github.com/squid-cache/squid/security/advisories/GHSA-wgq4-4cfg-c4x3
2023-12-05T20:42:59.381Z
2023-12-14T17:09:25.168Z
2023-12-14T17:09:25.168Z
{'Vendor': 'squid-cache', 'Product': 'squid', 'Versions': '>= 2.6, <= 2.7.STABLE9, >= 3.1, <= 5.9, >= 6.0.1, < 6.6'}
CVE-2023-35983
This issue was addressed with improved data protection. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to modify protected parts of the file system.
https://support.apple.com/en-us/HT213843
2023-07-20T15:04:25.800Z
2023-07-26T23:52:30.789Z
2023-07-27T03:45:16.817Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-35829
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
2023-06-18T00:00:00
2023-06-18T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35080
A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.
https://forums.ivanti.com/s/article/Security-fixes-included-in-the-latest-Ivanti-Secure-Access-Client-Release
2023-06-13T01:00:11.784Z
2023-11-14T23:18:08.387Z
2023-11-14T23:18:08.387Z
{'Vendor': 'Ivanti', 'Product': 'Secure Access Client', 'Versions': '22.6.1.1'}
CVE-2023-35346
Windows DNS Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35346
2023-06-14T23:09:47.624Z
2023-07-11T17:02:52.464Z
2023-12-14T19:52:50.436Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35653
In TBD of TBD, there is a possible way to access location information due to a permissions bypass. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:07.507Z
2023-10-11T19:21:13.242Z
2023-10-11T19:21:13.242Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35038
Cross-Site Request Forgery (CSRF) vulnerability in wpexperts.Io WP PDF Generator plugin <= 1.2.2 versions.
https://patchstack.com/database/vulnerability/wp-pdf-generator/wordpress-wp-pdf-generator-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-12T09:05:49.595Z
2023-07-17T13:26:20.162Z
2023-07-17T13:26:20.162Z
{'Vendor': 'wpexperts.io', 'Product': 'WP PDF Generator', 'Versions': 'n/a'}
CVE-2023-35311
Microsoft Outlook Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311
2023-06-14T23:09:47.613Z
2023-07-11T17:03:27.227Z
2023-12-14T19:53:22.976Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft 365 Apps for Enterprise', 'Versions': '16.0.1'}
CVE-2023-35184
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse a SolarWinds service resulting in a remote code execution.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35184
2023-06-14T20:03:23.107Z
2023-10-19T14:22:26.928Z
2023-10-19T14:22:26.928Z
{'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'}
CVE-2023-35887
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache MINA. In SFTP servers implemented using Apache MINA SSHD that use a RootedFileSystem, logged users may be able to discover "exists/does not exist" information about items outside the rooted tree via paths including parent navigation ("..") beyond the root, or involving symlinks. This issue affects Apache MINA: from 1.0 before 2.10. Users are recommended to upgrade to 2.10
https://lists.apache.org/thread/b9qgtqvhnvgfpn0w1gz918p21p53tqk2
2023-06-19T15:49:53.163Z
2023-07-10T09:28:54.987Z
2023-07-19T07:18:06.740Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache MINA SSHD', 'Versions': '1.0'}
CVE-2023-35096
Cross-Site Request Forgery (CSRF) vulnerability in myCred plugin <= 2.5 versions.
https://patchstack.com/database/vulnerability/mycred/wordpress-mycred-plugin-2-5-cross-site-request-forgery-csrf?_s_id=cve
2023-06-13T15:10:42.889Z
2023-07-17T13:35:21.634Z
2023-07-17T13:35:21.634Z
{'Vendor': 'myCred', 'Product': 'myCred', 'Versions': 'n/a'}
CVE-2023-35995
Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta indexing when signal_lens is 1.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
2023-06-20T19:41:02.814Z
2024-01-08T14:47:56.783Z
2024-01-08T18:00:10.984Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35700
null
null
2023-06-15T11:32:19.767Z
null
2023-07-02T21:37:26.274084Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-35350
Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35350
2023-06-14T23:09:47.625Z
2023-07-11T17:02:54.231Z
2023-12-14T19:52:51.931Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35645
In tbd of tbd, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:07.505Z
2023-10-11T18:40:24.221Z
2023-10-11T19:18:21.704Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35901
IBM Robotic Process Automation 21.0.0 through 21.0.7.6 and 23.0.0 through 23.0.6 is vulnerable to client side validation bypass which could allow invalid changes or values in some fields. IBM X-Force ID: 259380.
https://www.ibm.com/support/pages/node/7012317
2023-06-20T02:24:31.593Z
2023-07-16T23:31:39.325Z
2023-07-16T23:31:39.325Z
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'}
CVE-2023-35002
A heap-based buffer overflow vulnerability exists in the pictwread functionality of Accusoft ImageGear 20.1. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1760
2023-06-09T13:03:16.421Z
2023-09-25T15:22:34.091Z
2023-09-25T17:00:09.033Z
{'Vendor': 'Accusoft', 'Product': 'ImageGear', 'Versions': '20.1'}
CVE-2023-35147
Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not restrict the AWS SQS queue name path parameter in an HTTP endpoint, allowing attackers with Item/Read permission to obtain the contents of arbitrary files on the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3099
2023-06-14T08:58:33.245Z
2023-06-14T12:53:09.530Z
2023-10-24T12:50:40.843Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins AWS CodeCommit Trigger Plugin', 'Versions': '0'}
CVE-2023-35844
packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used.
https://advisory.dw1.io/59
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35794
An issue was discovered in Cassia Access Controller 2.1.1.2303271039. The Web SSH terminal endpoint (spawned console) can be accessed without authentication. Specifically, there is no session cookie validation on the Access Controller; instead, there is only Basic Authentication to the SSH console.
https://www.cassianetworks.com/products/iot-access-controller/
2023-06-16T00:00:00
2023-10-27T00:00:00
2023-10-27T20:32:32.774910
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35055
A buffer overflow vulnerability exists in the httpd next_page functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger this vulnerability.This buffer overflow is in the next_page parameter in the gozila_cgi function.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
2023-06-12T15:52:42.060Z
2023-10-11T15:14:31.751Z
2023-10-11T17:00:06.915Z
{'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'}
CVE-2023-35956
Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `fastlz_decompress`.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
2023-06-20T18:27:13.647Z
2024-01-08T14:47:59.620Z
2024-01-08T18:00:09.521Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35813
Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.
https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1002979
2023-06-17T00:00:00
2023-06-17T00:00:00
2023-06-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35110
An issue was discovered jjson thru 0.1.7 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://github.com/grobmeier/jjson/issues/2
2023-06-13T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35669
In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to control other running activities due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/f810d81839af38ee121c446105ca67cb12992fc6
2023-06-15T02:50:29.819Z
2023-09-11T20:09:52.808Z
2023-09-11T20:16:40.959Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35393
Azure Apache Hive Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35393
2023-06-14T23:09:47.640Z
2023-08-08T17:08:39.361Z
2023-12-14T20:03:12.215Z
{'Vendor': 'Microsoft', 'Product': 'Azure HDInsight', 'Versions': '1.0'}
CVE-2023-35940
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.8, an incorrect rights check on a file allows an unauthenticated user to be able to access dashboards data. Version 10.0.8 contains a patch for this issue.
https://github.com/glpi-project/glpi/security/advisories/GHSA-qrh8-rg45-45fw
2023-06-20T14:02:45.595Z
2023-07-05T20:46:04.061Z
2023-07-05T20:46:04.061Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.5.0, < 10.0.8'}
CVE-2023-35043
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Neha Goel Recent Posts Slider plugin <= 1.1 versions.
https://patchstack.com/database/vulnerability/recent-posts-slider/wordpress-recent-posts-slider-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-12T15:16:17.293Z
2023-07-25T12:57:09.248Z
2023-07-25T12:57:09.248Z
{'Vendor': 'Neha Goel', 'Product': 'Recent Posts Slider', 'Versions': 'n/a'}
CVE-2023-35385
Microsoft Message Queuing Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35385
2023-06-14T23:09:47.638Z
2023-08-08T17:08:37.142Z
2023-12-14T20:03:10.221Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35690
In RGXDestroyHWRTData of rgxta3d.c, there is a possible arbitrary code execution due to an uncaught exception. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/2023-12-01
2023-06-15T02:50:33.963Z
2023-12-04T22:40:49.946Z
2023-12-22T00:16:43.676Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'}
CVE-2023-35917
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce PayPal Payments plugin <= 2.0.4 versions.
https://patchstack.com/database/vulnerability/woocommerce-paypal-payments/wordpress-woocommerce-paypal-payments-plugin-2-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-20T09:05:43.963Z
2023-06-22T11:47:52.610Z
2023-06-22T11:47:52.610Z
{'Vendor': 'WooCommerce', 'Product': 'WooCommerce PayPal Payments', 'Versions': 'n/a'}
CVE-2023-35852
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35151
XWiki Platform is a generic wiki platform. Starting in version 7.3-milestone-1 and prior to versions 14.4.8, 14.10.6, and 15.1, ny user can call a REST endpoint and obtain the obfuscated passwords, even when the mail obfuscation is activated. The issue has been patched in XWiki 14.4.8, 14.10.6, and 15.1. There is no known workaround.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8g9c-c9cm-9c56
2023-06-14T14:17:52.177Z
2023-06-23T16:33:01.388Z
2023-06-23T16:33:01.388Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.3-milestone-1, < 14.4.8, >= 14.5, < 14.10.6, >= 15.0-rc-1, < 15.1'}
CVE-2023-35782
The ipandlanguageredirect extension before 5.1.2 for TYPO3 allows SQL Injection.
https://typo3.org/security/advisory/typo3-ext-sa-2023-005
2023-06-16T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35628
Windows MSHTML Platform Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628
2023-06-15T01:03:28.507Z
2023-12-12T18:10:51.539Z
2023-12-15T21:02:54.250Z
{'Vendor': 'Microsoft', 'Product': 'Windows 11 Version 23H2', 'Versions': '10.0.0'}
CVE-2023-35297
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35297
2023-06-14T23:09:47.611Z
2023-07-11T17:03:20.451Z
2023-12-14T19:53:16.825Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35126
An out-of-bounds write vulnerability exists within the parsers for both the "DocumentViewStyles" and "DocumentEditStyles" streams of Ichitaro 2023 1.0.1.59372 when processing types 0x0000-0x0009 of a style record with the type 0x2008. A specially crafted document can cause memory corruption, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825
2023-07-31T21:52:03.187Z
2023-10-19T16:02:29.998Z
2023-10-19T16:02:29.998Z
{'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'}
CVE-2023-35825
null
null
2023-06-18T00:00:00
null
2023-06-19T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-35960
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns legacy decompression in `vcd_main`.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
2023-06-20T18:31:47.415Z
2024-01-08T14:47:58.638Z
2024-01-08T18:00:07.159Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35872
The Message Display Tool (MDT) of SAP NetWeaver Process Integration - version SAP_XIAF 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application.
https://me.sap.com/notes/3343564
2023-06-19T10:27:44.580Z
2023-07-11T02:41:33.243Z
2023-07-11T02:41:33.243Z
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Process Integration (Message Display Tool)', 'Versions': 'SAP_XIAF 7.50'}
CVE-2023-35171
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. Starting in version 26.0.0 and prior to version 26.0.2, an attacker could supply a URL that redirects an unsuspecting victim from a legitimate domain to an attacker's site. Nextcloud Server and Nextcloud Enterprise Server 26.0.2 contain a patch for this issue. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h353-vvwv-j2r4
2023-06-14T14:17:52.180Z
2023-06-23T20:44:34.272Z
2023-06-23T20:44:34.272Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 26.0.0, < 26.0.2'}
CVE-2023-35034
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow remote code execution by unauthenticated users, aka OSFOURK-24033.
https://networks.unify.com/security/advisories/OBSO-2305-01.pdf
2023-06-12T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35937
Metersphere is an open source continuous testing platform. In versions prior to 2.10.2 LTS, some key APIs in Metersphere lack permission checks. This allows ordinary users to execute APIs that can only be executed by space administrators or project administrators. For example, ordinary users can be updated as space administrators. Version 2.10.2 LTS has a patch for this issue.
https://github.com/metersphere/metersphere/security/advisories/GHSA-7xj3-qrx5-524r
2023-06-20T14:02:45.594Z
2023-07-06T13:50:10.673Z
2023-07-06T13:50:10.673Z
{'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.2-LTS'}
CVE-2023-35167
Remult is a CRUD framework for full-stack TypeScript. If you used the apiPrefilter option of the `@Entity` decorator, by setting it to a function that returns a filter that prevents unauthorized access to data, an attacker who knows the `id` of an entity instance is not authorized to access, can gain read, update and delete access to it. The issue is fixed in version 0.20.6. As a workaround, set the `apiPrefilter` option to a filter object instead of a function.
https://github.com/remult/remult/security/advisories/GHSA-7hh3-3x64-v2g9
2023-06-14T14:17:52.179Z
2023-06-23T19:03:54.753Z
2023-06-23T19:03:54.753Z
{'Vendor': 'remult', 'Product': 'remult', 'Versions': '< 0.20.6'}
CVE-2023-35921
A vulnerability has been identified in SIMATIC MV540 H (All versions < V3.3.4), SIMATIC MV540 S (All versions < V3.3.4), SIMATIC MV550 H (All versions < V3.3.4), SIMATIC MV550 S (All versions < V3.3.4), SIMATIC MV560 U (All versions < V3.3.4), SIMATIC MV560 X (All versions < V3.3.4). Affected devices cannot properly process specially crafted Ethernet frames sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually.
https://cert-portal.siemens.com/productcert/pdf/ssa-561322.pdf
2023-06-20T10:46:34.162Z
2023-07-11T09:07:09.314Z
2023-07-11T09:07:09.314Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC MV540 H', 'Versions': 'All versions < V3.3.4'}
CVE-2023-35649
In several functions of Exynos modem files, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:07.506Z
2023-10-11T19:20:41.460Z
2023-10-11T19:20:41.460Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35999
null
null
2023-06-20T20:19:49.398Z
null
2023-07-02T21:50:52.192612Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-35833
An issue was discovered in YSoft SAFEQ 6 Server before 6.0.82. When modifying the URL of the LDAP server configuration from LDAPS to LDAP, the system does not require the password to be (re)entered. This results in exposing cleartext credentials when connecting to a rogue LDAP server. NOTE: the vendor originally reported this as a security issue but then reconsidered because of the requirement for Admin access in order to change the configuration.
https://ysoft.com
2023-06-18T00:00:00
2023-07-13T00:00:00
2023-09-11T14:33:16.386801
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35075
Mattermost fails to use  innerText / textContent when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim's page by create a channel name that is valid HTML. No XSS is possible though. 
https://mattermost.com/security-updates
2023-11-20T12:06:31.656Z
2023-11-27T09:09:19.659Z
2023-11-27T09:09:19.659Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.13, 8.1.4'}
CVE-2023-35976
Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt
2023-06-20T18:41:22.737Z
2023-07-05T14:47:43.236Z
2023-07-05T14:47:43.236Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central', 'Versions': '- ArubaOS 10.4.x.x: 10.4.0.1 and below, - ArubaOS 8.11.x.x: 8.11.1.0 and below, - ArubaOS 8.10.x.x: 8.10.0.6 and below, - ArubaOS 8.6.x.x: 8.6.0.20 and below'}
CVE-2023-35798
Input Validation vulnerability in Apache Software Foundation Apache Airflow ODBC Provider, Apache Software Foundation Apache Airflow MSSQL Provider.This vulnerability is considered low since it requires DAG code to use `get_sqlalchemy_connection` and someone with access to connection resources specifically updating the connection to exploit it. This issue affects Apache Airflow ODBC Provider: before 4.0.0; Apache Airflow MSSQL Provider: before 3.4.1. It is recommended to upgrade to a version that is not affected
https://github.com/apache/airflow/pull/31984
2023-06-17T20:00:14.715Z
2023-06-27T11:39:51.759Z
2023-06-27T11:39:51.759Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow ODBC Provider', 'Versions': '0'}
CVE-2023-35632
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35632
2023-06-15T01:03:28.507Z
2023-12-12T18:10:53.603Z
2023-12-15T21:02:56.301Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35848
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 lacks certain size calculations before attempting to set a value of an mss structure member.
https://github.com/virtualsquare/picotcp/pull/15/files
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35665
In multiple files, there is a possible way to import a contact from another user due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/services/Telephony/+/674039e70e1c5bf29b808899ac80c709acc82290
2023-06-15T02:50:29.818Z
2023-09-11T20:09:52.237Z
2023-09-11T20:16:39.827Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35673
In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/8770c07c102c7fdc74626dc717acc8f6dd1c92cc
2023-06-15T02:50:29.820Z
2023-09-11T20:09:53.391Z
2023-09-11T20:16:42.035Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35389
Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35389
2023-06-14T23:09:47.639Z
2023-08-08T17:08:38.800Z
2023-12-14T20:03:11.709Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'}
CVE-2023-35366
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35366
2023-06-14T23:09:47.634Z
2023-07-11T17:03:01.684Z
2023-12-14T19:52:58.422Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35809
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. A Bean Manipulation vulnerability has been identified in the REST API. By using a crafted request, custom PHP code can be injected through the REST API because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected.
https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-007/
2023-06-17T00:00:00
2023-06-17T00:00:00
2023-08-23T15:06:15.726579
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35624
Azure Connected Machine Agent Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35624
2023-06-15T01:03:28.506Z
2023-12-12T18:10:57.777Z
2023-12-15T21:03:00.401Z
{'Vendor': 'Microsoft', 'Product': 'Azure Connected Machine Agent', 'Versions': '1.0.0'}
CVE-2023-35331
Windows Local Security Authority (LSA) Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35331
2023-06-14T23:09:47.619Z
2023-07-11T17:02:44.688Z
2023-12-14T19:52:43.913Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35018
IBM Security Verify Governance 10.0 could allow a privileged use to upload arbitrary files due to improper file validation. IBM X-Force ID: 259382.
https://www.ibm.com/support/pages/node/7050358
2023-06-11T20:38:21.241Z
2023-10-15T23:46:49.009Z
2023-10-15T23:48:50.779Z
{'Vendor': 'IBM', 'Product': 'Security Verify Governance', 'Versions': '10.0'}
CVE-2023-35019
IBM Security Verify Governance, Identity Manager 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 257873.
https://www.ibm.com/support/pages/node/7014397
2023-06-11T20:38:21.241Z
2023-07-31T00:27:01.113Z
2023-07-31T00:27:01.113Z
{'Vendor': 'IBM', 'Product': 'Security Verify Governance, Identity Manager', 'Versions': '10.0'}
CVE-2023-35625
Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35625
2023-06-15T01:03:28.506Z
2023-12-12T18:10:43.227Z
2023-12-15T21:02:45.576Z
{'Vendor': 'Microsoft', 'Product': 'Azure Machine Learning', 'Versions': '1.0.0'}
CVE-2023-35330
Windows Extended Negotiation Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35330
2023-06-14T23:09:47.619Z
2023-07-11T17:02:44.128Z
2023-12-14T19:52:43.410Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35808
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. An Unrestricted File Upload vulnerability has been identified in the Notes module. By using crafted requests, custom PHP code can be injected and executed through the Notes module because of missing input validation. Regular user privileges can be used to exploit this vulnerability. Editions other than Enterprise are also affected.
https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-006/
2023-06-17T00:00:00
2023-06-17T00:00:00
2023-08-23T15:06:14.285008
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35388
Microsoft Exchange Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35388
2023-06-14T23:09:47.638Z
2023-08-08T17:08:53.722Z
2023-12-14T20:03:25.712Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 13', 'Versions': '15.02.0'}
CVE-2023-35367
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35367
2023-06-14T23:09:47.634Z
2023-07-11T17:03:02.367Z
2023-12-14T19:52:58.943Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35664
In convertSubgraphFromHAL of ShimConverter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/NeuralNetworks/+/47299fd978258e67a8eebc361cb7a4dd2936205e
2023-06-15T02:50:10.273Z
2023-09-11T20:09:52.027Z
2023-09-11T20:16:39.483Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12'}
CVE-2023-35371
Microsoft Office Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35371
2023-06-14T23:09:47.636Z
2023-08-08T17:08:46.816Z
2023-12-14T20:03:19.797Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'}
CVE-2023-35849
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not properly check whether header sizes would result in accessing data outside of a packet.
https://github.com/virtualsquare/picotcp/commit/4b9a16764f2b12b611de9c34a50b4713d10ca401
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35799
Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges.
https://advisories.stormshield.eu
2023-06-17T00:00:00
2023-06-27T00:00:00
2023-06-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35633
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35633
2023-06-15T01:03:28.507Z
2023-12-12T18:10:54.130Z
2023-12-15T00:51:06.390Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1507', 'Versions': '10.0.0'}
CVE-2023-35326
Windows CDP User Components Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35326
2023-06-14T23:09:47.617Z
2023-07-11T17:02:42.162Z
2023-12-14T19:52:41.913Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35776
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Beplus Sermon'e – Sermons Online plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/sermone-online-sermons-management/wordpress-sermon-e-sermons-online-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-16T08:57:49.307Z
2023-06-19T13:27:26.697Z
2023-06-19T13:27:26.697Z
{'Vendor': 'Beplus', 'Product': "Sermon'e – Sermons Online", 'Versions': 'n/a'}
CVE-2023-35998
A missing authorization check in multiple SOAP endpoints of the Insider Threat Management Server enables an attacker on an adjacent network to read and write unauthorized objects. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005
2023-06-20T20:19:49.398Z
2023-06-27T14:30:53.460Z
2023-06-27T14:30:53.460Z
{'Vendor': 'Proofpoint', 'Product': 'Insider Threat Management', 'Versions': '0'}