CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-35131
Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.
https://moodle.org/mod/forum/discuss.php?d=447829
2023-06-13T00:00:00
2023-06-22T00:00:00
2023-06-30T00:00:00
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14'}
CVE-2023-35074
The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213938
2023-07-20T15:03:50.114Z
2023-09-26T20:12:05.743Z
2023-09-26T20:12:05.743Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-35977
Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt
2023-06-20T18:41:22.737Z
2023-07-05T14:47:46.596Z
2023-07-05T14:47:46.596Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central', 'Versions': '- ArubaOS 10.4.x.x: 10.4.0.1 and below, - ArubaOS 8.11.x.x: 8.11.1.0 and below, - ArubaOS 8.10.x.x: 8.10.0.6 and below, - ArubaOS 8.6.x.x: 8.6.0.20 and below'}
CVE-2023-35648
In ProtocolMiscLceIndAdapter::GetConfLevel() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:07.506Z
2023-10-11T19:20:09.906Z
2023-10-11T19:20:09.906Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35166
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute any wiki content with the right of the TipsPanel author by creating a tip UI extension. This has been patched in XWiki 15.1-rc-1 and 14.10.5.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h7cw-44vp-jq7h
2023-06-14T14:17:52.179Z
2023-06-20T19:29:51.912Z
2023-06-20T19:29:51.912Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 8.1-milestone-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'}
CVE-2023-35920
A vulnerability has been identified in SIMATIC MV540 H (All versions < V3.3.4), SIMATIC MV540 S (All versions < V3.3.4), SIMATIC MV550 H (All versions < V3.3.4), SIMATIC MV550 S (All versions < V3.3.4), SIMATIC MV560 U (All versions < V3.3.4), SIMATIC MV560 X (All versions < V3.3.4). Affected devices cannot properly process specially crafted IP packets sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually.
https://cert-portal.siemens.com/productcert/pdf/ssa-561322.pdf
2023-06-20T10:46:34.162Z
2023-07-11T09:07:08.275Z
2023-07-11T09:07:08.275Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC MV540 H', 'Versions': 'All versions < V3.3.4'}
CVE-2023-35189
Iagona ScrutisWeb versions 2.1.37 and prior are vulnerable to a remote code execution vulnerability that could allow an unauthenticated user to upload a malicious payload and execute it.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-03
2023-07-13T17:28:15.859Z
2023-07-18T17:12:24.681Z
2023-07-18T17:14:57.706Z
{'Vendor': 'iagona', 'Product': 'ScrutisWeb', 'Versions': '0'}
CVE-2023-35873
The Runtime Workbench (RWB) of SAP NetWeaver Process Integration - version SAP_XITOOL 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application.
https://me.sap.com/notes/3343547
2023-06-19T10:27:44.580Z
2023-07-11T02:42:19.464Z
2023-07-11T02:42:19.464Z
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Process Integration (Runtime Workbench)', 'Versions': 'SAP_XITOOL 7.50'}
CVE-2023-35170
null
null
2023-06-14T14:17:52.179Z
2023-06-26T19:40:23.707Z
2023-06-29T20:40:31.244Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-35035
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, and Manager V10 R0 allow command injection by authenticated users, aka OSFOURK-23557.
https://networks.unify.com/security/advisories/OBSO-2305-01.pdf
2023-06-12T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35936
Pandoc is a Haskell library for converting from one markup format to another, and a command-line tool that uses this library. Starting in version 1.13 and prior to version 3.1.4, Pandoc is susceptible to an arbitrary file write vulnerability, which can be triggered by providing a specially crafted image element in the input when generating files using the `--extract-media` option or outputting to PDF format. This vulnerability allows an attacker to create or overwrite arbitrary files on the system ,depending on the privileges of the process running pandoc. It only affects systems that pass untrusted user input to pandoc and allow pandoc to be used to produce a PDF or with the `--extract-media` option. The fix is to unescape the percent-encoding prior to checking that the resource is not above the working directory, and prior to extracting the extension. Some code for checking that the path is below the working directory was flawed in a similar way and has also been fixed. Note that the `--sandbox` option, which only affects IO done by readers and writers themselves, does not block this vulnerability. The vulnerability is patched in pandoc 3.1.4. As a workaround, audit the pandoc command and disallow PDF output and the `--extract-media` option.
https://github.com/jgm/pandoc/security/advisories/GHSA-xj5q-fv23-575g
2023-06-20T14:02:45.594Z
2023-07-05T20:37:56.394Z
2023-07-05T20:37:56.394Z
{'Vendor': 'jgm', 'Product': 'pandoc', 'Versions': '>= 1.13, < 3.1.4'}
CVE-2023-35127
Stack-based buffer overflow may occur when Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02
2023-08-18T17:42:07.395Z
2023-11-22T00:44:26.650Z
2023-11-22T00:44:26.650Z
{'Vendor': 'Fuji Electric', 'Product': 'Tellus Lite V-Simulator', 'Versions': '0'}
CVE-2023-35824
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
2023-06-18T00:00:00
2023-06-18T00:00:00
2023-10-19T23:06:27.639148
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35961
Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in `vcd_recorder_main`.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
2023-06-20T18:31:47.415Z
2024-01-08T14:47:58.748Z
2024-01-08T18:00:07.316Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35783
The ke_search (aka Faceted Search) extension before 4.0.3, 4.1.x through 4.6.x before 4.6.6, and 5.x before 5.0.2 for TYPO3 allows XSS via indexed data.
https://typo3.org/security/advisory/typo3-ext-sa-2023-004
2023-06-16T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35629
Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35629
2023-06-15T01:03:28.507Z
2023-12-12T18:10:52.059Z
2023-12-15T21:02:54.774Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1507', 'Versions': '10.0.0'}
CVE-2023-35296
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35296
2023-06-14T23:09:47.611Z
2023-07-11T17:03:19.728Z
2023-12-14T19:53:16.261Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35916
Authorization Bypass Through User-Controlled Key vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 5.9.0.
https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woocommerce-payments-plugin-5-9-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve
2023-06-20T09:05:43.963Z
2023-12-20T15:12:38.385Z
2023-12-20T15:12:38.385Z
{'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'}
CVE-2023-35853
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35150
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 2.40m-2 and prior to versions 14.4.8, 14.10.4, and 15.0, any user with view rights on any document can execute code with programming rights, leading to remote code execution by crafting an url with a dangerous payload. The problem has been patched in XWiki 15.0, 14.10.4 and 14.4.8.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6mf5-36v9-3h2w
2023-06-14T14:17:52.177Z
2023-06-23T16:26:55.213Z
2023-06-23T16:26:55.213Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 2.4-m-2, < 14.4.8, >= 14.5, < 14.10.4'}
CVE-2023-35384
Windows HTML Platforms Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384
2023-06-14T23:09:47.638Z
2023-08-08T17:08:36.575Z
2023-12-14T20:03:09.716Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35691
there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-07-01
2023-06-15T02:50:33.964Z
2023-07-12T23:53:56.481Z
2023-07-12T23:53:56.481Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35941
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration.
https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55
2023-06-20T14:02:45.596Z
2023-07-25T17:40:56.203Z
2023-07-25T17:40:56.203Z
{'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.4, >= 1.25.0, < 1.25.9, >= 1.24.0, < 1.24.10, < 1.23.12'}
CVE-2023-35042
GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version.
https://isc.sans.edu/diary/29936
2023-06-12T00:00:00
2023-06-12T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35668
In visitUris of Notification.java, there is a possible way to display images from another user due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd
2023-06-15T02:50:29.819Z
2023-12-04T22:40:49.750Z
2023-12-22T00:16:43.315Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35392
Microsoft Edge (Chromium-based) Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35392
2023-06-14T23:09:47.640Z
2023-07-21T17:51:57.890Z
2023-12-14T19:53:26.940Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-35687
In MtpPropertyValue of MtpProperty.h, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/av/+/ea6131efa76a0b2a12724ffd157909e2c6fb4036
2023-06-15T02:50:33.961Z
2023-09-11T20:09:55.452Z
2023-09-11T20:16:46.031Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35054
In JetBrains YouTrack before 2023.1.10518 stored XSS in a Markdown-rendering engine was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-06-12T15:42:07.261Z
2023-06-12T15:46:04.704Z
2023-06-12T15:46:04.704Z
{'Vendor': 'JetBrains', 'Product': 'YouTrack', 'Versions': '0'}
CVE-2023-35957
Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `uncompress`.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
2023-06-20T18:27:13.647Z
2024-01-08T14:47:59.713Z
2024-01-08T18:00:09.666Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35900
IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 and 23.0.0 through 23.0.5 is vulnerable to disclosing server version information which may be used to determine software vulnerabilities at the operating system level. IBM X-Force ID: 259368.
https://www.ibm.com/support/pages/node/7010895
2023-06-20T02:24:31.593Z
2023-07-19T00:58:53.912Z
2023-07-19T00:58:53.912Z
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'}
CVE-2023-35146
Jenkins Template Workflows Plugin 41.v32d86a_313b_4a and earlier does not escape names of jobs used as buildings blocks for Template Workflow Job, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create jobs.
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3166
2023-06-14T08:58:33.245Z
2023-06-14T12:53:08.824Z
2023-10-24T12:50:39.728Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Template Workflows Plugin', 'Versions': '0'}
CVE-2023-35845
Anaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected.
https://uponfurtherinvestigation.blogspot.com/2023/06/cve-2023-35845-anaconda3-creates.html
2023-06-19T00:00:00
2023-09-11T00:00:00
2023-09-11T07:56:50.212650
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35351
Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35351
2023-06-14T23:09:47.626Z
2023-07-11T17:02:54.783Z
2023-12-14T19:52:52.441Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35644
Windows Sysmain Service Elevation of Privilege
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35644
2023-06-15T01:03:28.508Z
2023-12-12T18:10:51.007Z
2023-12-15T21:02:53.762Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35097
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Internet Marketing Dojo WP Affiliate Links plugin <= 0.1.1 versions.
https://patchstack.com/database/vulnerability/wp-affiliate-links/wordpress-wp-affiliate-links-plugin-0-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-13T15:10:42.889Z
2023-06-20T09:05:03.297Z
2023-06-20T09:05:03.297Z
{'Vendor': 'Internet Marketing Dojo', 'Product': 'WP Affiliate Links', 'Versions': 'n/a'}
CVE-2023-35994
Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta initialization part.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
2023-06-20T19:41:02.814Z
2024-01-08T14:47:56.687Z
2024-01-08T18:00:10.755Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35078
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability
2023-06-13T01:00:11.783Z
2023-07-25T06:08:38.441Z
2023-11-28T19:30:31.171Z
{'Vendor': 'Ivanti', 'Product': 'Endpoint Manager Mobile', 'Versions': '11.10, 11.9, 11.8'}
CVE-2023-35306
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35306
2023-06-14T23:09:47.612Z
2023-07-11T17:03:24.995Z
2023-12-14T19:53:20.839Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35185
The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability using SYSTEM privileges.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35185
2023-06-14T20:03:23.107Z
2023-10-19T14:24:15.553Z
2023-12-28T17:05:58.115Z
{'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'}
CVE-2023-35310
Windows DNS Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35310
2023-06-14T23:09:47.613Z
2023-07-11T17:03:26.663Z
2023-12-14T19:53:22.412Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35890
IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637.
https://www.ibm.com/support/pages/node/7007857
2023-06-20T02:24:14.838Z
2023-07-07T02:13:23.147Z
2023-07-07T02:13:23.147Z
{'Vendor': 'IBM', 'Product': 'WebSphere Application Server', 'Versions': '8.5, 9.0'}
CVE-2023-35039
Improper Restriction of Excessive Authentication Attempts vulnerability in Be Devious Web Development Password Reset with Code for WordPress REST API allows Authentication Abuse.This issue affects Password Reset with Code for WordPress REST API: from n/a through 0.0.15.
https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cve
2023-06-12T09:05:49.595Z
2023-12-07T11:27:16.116Z
2023-12-07T11:27:16.116Z
{'Vendor': 'Be Devious Web Development', 'Product': 'Password Reset with Code for WordPress REST API', 'Versions': 'n/a'}
CVE-2023-35193
An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset 0x4bddb8.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
2023-06-14T20:41:25.820Z
2023-10-11T15:16:55.642Z
2023-10-11T17:00:09.009Z
{'Vendor': 'Peplink', 'Product': 'Surf SOHO HW1', 'Versions': 'v6.3.5 (in QEMU)'}
CVE-2023-35347
Microsoft Install Service Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35347
2023-06-14T23:09:47.624Z
2023-07-11T17:02:53.052Z
2023-12-14T19:52:50.947Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'}
CVE-2023-35652
In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:07.506Z
2023-10-11T19:21:00.472Z
2023-10-11T19:21:00.472Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35982
There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-009.txt
2023-06-20T18:43:02.967Z
2023-07-25T18:28:20.312Z
2023-07-25T18:28:20.312Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points running InstantOS and ArubaOS 10', 'Versions': 'ArubaOS 10.4.x.x: 10.4.0.1 and below, InstantOS 8.11.x.x: 8.11.1.0 and below, InstantOS 8.10.x.x: 8.10.0.6 and below, InstantOS 8.6.x.x: 8.6.0.20 and below, InstantOS 6.5.x.x: 6.5.4.24 and below, InstantOS 6.4.x.x: 6.4.4.8-4.2.4.21 and below'}
CVE-2023-35828
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
2023-06-18T00:00:00
2023-06-18T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35081
A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance.
https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US
2023-06-13T01:00:11.784Z
2023-08-03T17:00:10.822Z
2023-08-03T17:00:10.822Z
{'Vendor': 'Ivanti', 'Product': 'EPMM', 'Versions': '11.10.0.3'}
CVE-2023-35823
An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
2023-06-18T00:00:00
2023-06-18T00:00:00
2023-10-19T23:06:37.069715
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35989
An integer overflow vulnerability exists in the LXT2 zlib block allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1822
2023-07-31T19:23:15.979Z
2024-01-08T14:47:42.164Z
2024-01-08T18:00:24.672Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35120
PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01
2023-06-27T16:55:52.775Z
2023-07-06T23:09:42.511Z
2023-07-06T23:09:42.511Z
{'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'}
CVE-2023-35065
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Osoft Paint Production Management allows SQL Injection.This issue affects Paint Production Management: before 2.1.
https://www.usom.gov.tr/bildirim/tr-23-0490
2023-06-12T19:32:44.799Z
2023-09-05T17:07:00.225Z
2023-09-05T17:07:00.225Z
{'Vendor': 'Osoft', 'Product': 'Paint Production Management', 'Versions': '0'}
CVE-2023-35966
Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787
2023-06-20T18:36:46.429Z
2023-10-11T15:14:28.595Z
2023-10-11T17:00:07.702Z
{'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'}
CVE-2023-35177
Certain HP LaserJet Pro print products are potentially vulnerable to a stack-based buffer overflow related to the compact font format parser.
https://support.hp.com/us-en/document/ish_8651888-8651916-16/hpsbpi03853
2023-06-14T15:14:52.289Z
2023-06-30T15:51:43.530Z
2023-06-30T15:51:43.530Z
{'Vendor': 'HP Inc.', 'Product': 'HP LaserJet Pro', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-35874
SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability.
https://me.sap.com/notes/3318850
2023-06-19T10:27:44.580Z
2023-07-11T02:47:11.869Z
2023-07-11T02:47:11.869Z
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver AS ABAP and ABAP Platform', 'Versions': 'KRNL64NUC 722, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93'}
CVE-2023-35931
Shescape is a simple shell escape library for JavaScript. An attacker may be able to get read-only access to environment variables. This bug has been patched in version 1.7.1.
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r
2023-06-20T14:02:45.593Z
2023-06-23T19:32:53.897Z
2023-06-23T19:32:53.897Z
{'Vendor': 'ericcornelissen', 'Product': 'shescape', 'Versions': '< 1.7.1'}
CVE-2023-35032
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow command injection by authenticated users, aka OSFOURK-23554.
https://networks.unify.com/security/advisories/OBSO-2305-01.pdf
2023-06-12T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35618
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35618
2023-06-15T01:03:28.506Z
2023-12-07T20:45:51.513Z
2023-12-15T21:02:45.081Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-35862
libcoap 4.3.1 contains a buffer over-read via the function coap_parse_oscore_conf_mem at coap_oscore.c.
https://github.com/obgm/libcoap/issues/1117
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35161
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4xm7-5q79-3fch
2023-06-14T14:17:52.178Z
2023-06-23T18:51:45.575Z
2023-06-23T18:51:45.575Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 6.2-milestone-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'}
CVE-2023-35024
IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 258349.
https://www.ibm.com/support/pages/node/7047198
2023-06-11T20:38:21.242Z
2023-10-14T15:07:18.696Z
2023-10-14T15:07:18.696Z
{'Vendor': 'IBM', 'Product': 'Cloud Pak for Business Automation', 'Versions': '18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2'}
CVE-2023-35927
NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again. Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87
2023-06-20T14:02:45.593Z
2023-06-23T20:53:33.688Z
2023-06-23T20:53:33.688Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': 'Nextcloud Server >= 25.0.0, < 25.0.7, Nextcloud Server >= 26.0.0, < 26.0.2, Nextcloud Enterprise Server >= 25.0.0, < 25.0.7, Nextcloud Enterprise Server >= 26.0.0, < 26.0.2, Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.12, Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.12, Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.7, Nextcloud Enterprise Server >= 24.0.0, < 24.0.12.2'}
CVE-2023-35136
An improper input validation vulnerability in the “Quagga” package of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to access configuration files on an affected device.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps
2023-06-14T06:26:48.563Z
2023-11-28T01:16:16.723Z
2023-11-28T02:08:26.895Z
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': 'versions 4.32 through 5.37'}
CVE-2023-35835
An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. The device provides a WiFi access point for initial configuration. The WiFi network provided has no network authentication (such as an encryption key) and persists permanently, including after enrollment and setup is complete. The WiFi network serves a web-based configuration utility, as well as an unauthenticated ModBus protocol interface.
https://yougottahackthat.com/blog/
2023-06-18T00:00:00
2024-01-23T00:00:00
2024-01-23T22:39:07.573677
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35970
Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of the `FST_BL_VCDATA_DYN_ALIAS2` section type.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789
2023-06-20T18:38:18.618Z
2024-01-08T14:47:58.040Z
2024-01-08T18:00:10.309Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35073
null
null
2023-06-12T19:32:44.800Z
null
2023-07-02T21:50:53.775679Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-35634
Windows Bluetooth Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35634
2023-06-15T01:03:28.507Z
2023-12-12T18:10:54.628Z
2023-12-15T21:02:57.339Z
{'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'}
CVE-2023-35321
Windows Deployment Services Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35321
2023-06-14T23:09:47.616Z
2023-07-11T17:02:39.270Z
2023-12-14T19:52:39.413Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35663
In Init of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:10.272Z
2023-10-18T19:10:32.213Z
2023-10-18T19:10:32.213Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35376
Microsoft Message Queuing Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376
2023-06-14T23:09:47.637Z
2023-08-08T17:08:31.367Z
2023-12-14T20:03:05.211Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35675
In loadMediaResumptionControls of MediaResumeListener.kt, there is a possible way to play and listen to media files played by another user on the same device due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/c1cf4b9746c9641190730172522324ccd5b8c914
2023-06-15T02:50:31.872Z
2023-09-11T20:09:53.771Z
2023-09-11T20:16:42.742Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35360
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35360
2023-06-14T23:09:47.628Z
2023-07-11T17:02:58.171Z
2023-12-14T19:52:55.437Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35622
Windows DNS Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35622
2023-06-15T01:03:28.506Z
2023-12-12T18:10:57.208Z
2023-12-15T21:02:59.861Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35788
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
https://www.openwall.com/lists/oss-security/2023/06/07/1
2023-06-16T00:00:00
2023-06-16T00:00:00
2023-10-19T23:07:19.640039
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35767
In Helix Core versions prior to 2023.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. Reported by Jason Geffner.  
https://perforce.com
2023-10-24T21:47:07.842Z
2023-11-08T15:31:29.693Z
2024-01-04T17:22:38.684Z
{'Vendor': 'Helix', 'Product': 'Helix Core', 'Versions': '0.0.0, 0.0.0, 0.0.0, 0.0.0, 0.0.0'}
CVE-2023-35337
Win32k Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35337
2023-06-14T23:09:47.621Z
2023-07-11T17:02:47.386Z
2023-12-14T19:52:45.881Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'}
CVE-2023-35086
It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. An unauthenticated remote attacker without privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service. This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.
https://www.twcert.org.tw/tw/cp-132-7240-a5f96-1.html
2023-06-13T10:19:24.130Z
2023-07-21T06:32:20.831Z
2023-07-21T06:32:20.831Z
{'Vendor': 'ASUS', 'Product': 'RT-AX56U V2', 'Versions': '3.0.0.4.386_50460'}
CVE-2023-35985
An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834
2023-08-15T20:00:03.273Z
2023-11-27T15:25:11.052Z
2023-11-27T18:00:06.987Z
{'Vendor': 'Foxit', 'Product': 'Foxit Reader', 'Versions': '12.1.3.15356'}
CVE-2023-35069
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Bullwark allows Path Traversal.This issue affects Bullwark: before BLW-2016E-960H.
https://www.usom.gov.tr/bildirim/tr-23-0401
2023-06-12T19:32:44.799Z
2023-07-13T07:56:42.429Z
2023-07-26T09:08:19.698Z
{'Vendor': 'Bullwark', 'Product': 'Bullwark', 'Versions': '0'}
CVE-2023-35340
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35340
2023-06-14T23:09:47.622Z
2023-07-11T17:02:49.050Z
2023-12-14T19:52:47.417Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35655
In CanConvertPadV2Op of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:10.271Z
2023-10-11T19:23:16.364Z
2023-10-11T19:23:16.364Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35878
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Vadym K. Extra User Details plugin <= 0.5 versions.
https://patchstack.com/database/vulnerability/extra-user-details/wordpress-extra-user-details-plugin-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-19T13:54:57.634Z
2023-06-20T07:57:08.943Z
2023-06-20T07:57:08.943Z
{'Vendor': 'Vadym K.', 'Product': 'Extra User Details', 'Versions': 'n/a'}
CVE-2023-35194
An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782
2023-06-14T20:41:25.821Z
2023-10-11T15:16:55.771Z
2023-10-11T17:00:09.136Z
{'Vendor': 'Peplink', 'Product': 'Surf SOHO HW1', 'Versions': 'v6.3.5 (in QEMU)'}
CVE-2023-35897
IBM Spectrum Protect Client and IBM Storage Protect for Virtual Environments 8.1.0.0 through 8.1.19.0 could allow a local user to execute arbitrary code on the system using a specially crafted file, caused by a DLL hijacking flaw. IBM X-Force ID: 259246.
https://www.ibm.com/support/pages/node/7037299
2023-06-20T02:24:14.840Z
2023-10-06T13:06:34.570Z
2023-10-06T13:06:34.570Z
{'Vendor': 'IBM', 'Product': 'Storage Protect Client', 'Versions': '8.1.0.0'}
CVE-2023-35317
Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35317
2023-06-14T23:09:47.614Z
2023-07-11T17:02:36.983Z
2023-12-14T19:52:37.420Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35182
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability can be abused by unauthenticated users on SolarWinds ARM Server.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35182
2023-06-14T20:03:23.107Z
2023-10-19T14:23:31.797Z
2023-10-19T14:23:31.797Z
{'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'}
CVE-2023-35839
Solon before 2.3.3 allows Deserialization of Untrusted Data.
https://github.com/noear/solon/issues/145
2023-06-18T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35993
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213846
2023-07-20T15:03:50.136Z
2023-07-27T00:22:30.186Z
2023-07-27T03:45:48.399Z
{'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'}
CVE-2023-35090
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in StylemixThemes MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin <= 3.0.7 versions.
https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-13T15:10:42.888Z
2023-06-22T10:33:16.893Z
2023-06-22T10:33:16.893Z
{'Vendor': 'StylemixThemes', 'Product': 'MasterStudy LMS WordPress Plugin – for Online Courses and Education', 'Versions': 'n/a'}
CVE-2023-35356
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35356
2023-06-14T23:09:47.627Z
2023-07-11T17:02:56.575Z
2023-07-19T00:18:36.931Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35643
DHCP Server Service Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35643
2023-06-15T01:03:28.508Z
2023-12-12T18:10:50.508Z
2023-12-15T21:02:53.265Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35004
An integer overflow vulnerability exists in the VZT longest_len value allocation functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1816
2023-07-21T20:59:43.842Z
2024-01-08T14:47:45.725Z
2024-01-08T18:00:21.796Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35141
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3135
2023-06-14T08:58:33.244Z
2023-06-14T12:53:05.244Z
2023-10-24T12:50:34.086Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins', 'Versions': '2.400'}
CVE-2023-35638
DHCP Server Service Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35638
2023-06-15T01:03:28.508Z
2023-12-12T18:10:48.400Z
2023-12-15T21:02:51.191Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35792
Vound Intella Connect 2.6.0.3 is vulnerable to stored Cross-site Scripting (XSS).
https://excellium-services.com/cert-xlm-advisory/CVE-2023-35792
2023-06-16T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35053
In JetBrains YouTrack before 2023.1.10518 a DoS attack was possible via Helpdesk forms
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-06-12T15:42:06.856Z
2023-06-12T15:46:04.269Z
2023-06-12T15:46:04.269Z
{'Vendor': 'JetBrains', 'Product': 'YouTrack', 'Versions': '0'}
CVE-2023-35116
jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.
https://github.com/FasterXML/jackson-databind/issues/3972
2023-06-13T00:00:00
2023-06-14T00:00:00
2023-07-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35680
In multiple locations, there is a possible way to import contacts belonging to other users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/services/Telephony/+/674039e70e1c5bf29b808899ac80c709acc82290
2023-06-15T02:50:31.873Z
2023-09-11T20:09:54.517Z
2023-09-11T20:16:44.159Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35946
Gradle is a build tool with a focus on build automation and support for multi-language development. When Gradle writes a dependency into its dependency cache, it uses the dependency's coordinates to compute a file location. With specially crafted dependency coordinates, Gradle can be made to write files into an unintended location. The file may be written outside the dependency cache or over another file in the dependency cache. This vulnerability could be used to poison the dependency cache or overwrite important files elsewhere on the filesystem where the Gradle process has write permissions. Exploiting this vulnerability requires an attacker to have control over a dependency repository used by the Gradle build or have the ability to modify the build's configuration. It is unlikely that this would go unnoticed. A fix has been released in Gradle 7.6.2 and 8.2 to protect against this vulnerability. Gradle will refuse to cache dependencies that have path traversal elements in their dependency coordinates. It is recommended that users upgrade to a patched version. If you are unable to upgrade to Gradle 7.6.2 or 8.2, `dependency verification` will make this vulnerability more difficult to exploit.
https://github.com/gradle/gradle/security/advisories/GHSA-2h6c-rv6q-494v
2023-06-20T14:02:45.598Z
2023-06-30T20:21:17.219Z
2023-06-30T20:21:17.219Z
{'Vendor': 'gradle', 'Product': 'gradle', 'Versions': '< 7.6.2, >= 8.0, < 8.2'}
CVE-2023-35803
IQ Engine before 10.6r2 on Extreme Network AP devices has a Buffer Overflow.
https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472
2023-06-17T00:00:00
2023-10-04T00:00:00
2023-10-04T21:49:00.477794
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}