CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-35131 | Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14. | https://moodle.org/mod/forum/discuss.php?d=447829 | 2023-06-13T00:00:00 | 2023-06-22T00:00:00 | 2023-06-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14'} |
CVE-2023-35074 | The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213938 | 2023-07-20T15:03:50.114Z | 2023-09-26T20:12:05.743Z | 2023-09-26T20:12:05.743Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-35977 | Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt | 2023-06-20T18:41:22.737Z | 2023-07-05T14:47:46.596Z | 2023-07-05T14:47:46.596Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central', 'Versions': '- ArubaOS 10.4.x.x: 10.4.0.1 and below, - ArubaOS 8.11.x.x: 8.11.1.0 and below, - ArubaOS 8.10.x.x: 8.10.0.6 and below, - ArubaOS 8.6.x.x: 8.6.0.20 and below'} |
CVE-2023-35648 | In ProtocolMiscLceIndAdapter::GetConfLevel() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:07.506Z | 2023-10-11T19:20:09.906Z | 2023-10-11T19:20:09.906Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35166 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute any wiki content with the right of the TipsPanel author by creating a tip UI extension. This has been patched in XWiki 15.1-rc-1 and 14.10.5.
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h7cw-44vp-jq7h | 2023-06-14T14:17:52.179Z | 2023-06-20T19:29:51.912Z | 2023-06-20T19:29:51.912Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 8.1-milestone-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'} |
CVE-2023-35920 | A vulnerability has been identified in SIMATIC MV540 H (All versions < V3.3.4), SIMATIC MV540 S (All versions < V3.3.4), SIMATIC MV550 H (All versions < V3.3.4), SIMATIC MV550 S (All versions < V3.3.4), SIMATIC MV560 U (All versions < V3.3.4), SIMATIC MV560 X (All versions < V3.3.4). Affected devices cannot properly process specially crafted IP packets sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually. | https://cert-portal.siemens.com/productcert/pdf/ssa-561322.pdf | 2023-06-20T10:46:34.162Z | 2023-07-11T09:07:08.275Z | 2023-07-11T09:07:08.275Z | {'Vendor': 'Siemens', 'Product': 'SIMATIC MV540 H', 'Versions': 'All versions < V3.3.4'} |
CVE-2023-35189 | Iagona ScrutisWeb versions 2.1.37 and prior are vulnerable to a remote
code execution vulnerability that could allow an unauthenticated user to
upload a malicious payload and execute it.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-03 | 2023-07-13T17:28:15.859Z | 2023-07-18T17:12:24.681Z | 2023-07-18T17:14:57.706Z | {'Vendor': 'iagona', 'Product': 'ScrutisWeb', 'Versions': '0'} |
CVE-2023-35873 | The Runtime Workbench (RWB) of SAP NetWeaver Process Integration - version SAP_XITOOL 7.50, does not perform authentication checks for certain functionalities that require user identity. An unauthenticated user might access technical data about the product status and its configuration. The vulnerability does not allow access to sensitive information or administrative functionalities. On successful exploitation an attacker can cause limited impact on confidentiality and availability of the application.
| https://me.sap.com/notes/3343547 | 2023-06-19T10:27:44.580Z | 2023-07-11T02:42:19.464Z | 2023-07-11T02:42:19.464Z | {'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver Process Integration (Runtime Workbench)', 'Versions': 'SAP_XITOOL 7.50'} |
CVE-2023-35170 | null | null | 2023-06-14T14:17:52.179Z | 2023-06-26T19:40:23.707Z | 2023-06-29T20:40:31.244Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-35035 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, and Manager V10 R0 allow command injection by authenticated users, aka OSFOURK-23557. | https://networks.unify.com/security/advisories/OBSO-2305-01.pdf | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35936 | Pandoc is a Haskell library for converting from one markup format to another, and a command-line tool that uses this library. Starting in version 1.13 and prior to version 3.1.4, Pandoc is susceptible to an arbitrary file write vulnerability, which can be triggered by providing a specially crafted image element in the input when generating files using the `--extract-media` option or outputting to PDF format. This vulnerability allows an attacker to create or overwrite arbitrary files on the system ,depending on the privileges of the process running pandoc. It only affects systems that pass untrusted user input to pandoc and allow pandoc to be used to produce a PDF or with the `--extract-media` option.
The fix is to unescape the percent-encoding prior to checking that the resource is not above the working directory, and prior to extracting the extension. Some code for checking that the path is below the working directory was flawed in a similar way and has also been fixed. Note that the `--sandbox` option, which only affects IO done by readers and writers themselves, does not block this vulnerability. The vulnerability is patched in pandoc 3.1.4. As a workaround, audit the pandoc command and disallow PDF output and the `--extract-media` option.
| https://github.com/jgm/pandoc/security/advisories/GHSA-xj5q-fv23-575g | 2023-06-20T14:02:45.594Z | 2023-07-05T20:37:56.394Z | 2023-07-05T20:37:56.394Z | {'Vendor': 'jgm', 'Product': 'pandoc', 'Versions': '>= 1.13, < 3.1.4'} |
CVE-2023-35127 | Stack-based buffer overflow may occur when Fuji Electric Tellus Lite V-Simulator parses a specially-crafted input file. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02 | 2023-08-18T17:42:07.395Z | 2023-11-22T00:44:26.650Z | 2023-11-22T00:44:26.650Z | {'Vendor': 'Fuji Electric', 'Product': 'Tellus Lite V-Simulator', 'Versions': '0'} |
CVE-2023-35824 | An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 | 2023-06-18T00:00:00 | 2023-06-18T00:00:00 | 2023-10-19T23:06:27.639148 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35961 | Multiple OS command injection vulnerabilities exist in the decompression functionality of GTKWave 3.3.115. A specially crafted wave file can lead to arbitrary command execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns decompression in `vcd_recorder_main`. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786 | 2023-06-20T18:31:47.415Z | 2024-01-08T14:47:58.748Z | 2024-01-08T18:00:07.316Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35783 | The ke_search (aka Faceted Search) extension before 4.0.3, 4.1.x through 4.6.x before 4.6.6, and 5.x before 5.0.2 for TYPO3 allows XSS via indexed data. | https://typo3.org/security/advisory/typo3-ext-sa-2023-004 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35629 | Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35629 | 2023-06-15T01:03:28.507Z | 2023-12-12T18:10:52.059Z | 2023-12-15T21:02:54.774Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1507', 'Versions': '10.0.0'} |
CVE-2023-35296 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35296 | 2023-06-14T23:09:47.611Z | 2023-07-11T17:03:19.728Z | 2023-12-14T19:53:16.261Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35916 | Authorization Bypass Through User-Controlled Key vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 5.9.0.
| https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woocommerce-payments-plugin-5-9-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve | 2023-06-20T09:05:43.963Z | 2023-12-20T15:12:38.385Z | 2023-12-20T15:12:38.385Z | {'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'} |
CVE-2023-35853 | In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section. | https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35150 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 2.40m-2 and prior to versions 14.4.8, 14.10.4, and 15.0, any user with view rights on any document can execute code with programming rights, leading to remote code execution by crafting an url with a dangerous payload. The problem has been patched in XWiki 15.0, 14.10.4 and 14.4.8. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6mf5-36v9-3h2w | 2023-06-14T14:17:52.177Z | 2023-06-23T16:26:55.213Z | 2023-06-23T16:26:55.213Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 2.4-m-2, < 14.4.8, >= 14.5, < 14.10.4'} |
CVE-2023-35384 | Windows HTML Platforms Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35384 | 2023-06-14T23:09:47.638Z | 2023-08-08T17:08:36.575Z | 2023-12-14T20:03:09.716Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35691 | there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-07-01 | 2023-06-15T02:50:33.964Z | 2023-07-12T23:53:56.481Z | 2023-07-12T23:53:56.481Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35941 | Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration. | https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55 | 2023-06-20T14:02:45.596Z | 2023-07-25T17:40:56.203Z | 2023-07-25T17:40:56.203Z | {'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.4, >= 1.25.0, < 1.25.9, >= 1.24.0, < 1.24.10, < 1.23.12'} |
CVE-2023-35042 | GeoServer 2, in some configurations, allows remote attackers to execute arbitrary code via java.lang.Runtime.getRuntime().exec in wps:LiteralData within a wps:Execute request, as exploited in the wild in June 2023. NOTE: the vendor states that they are unable to reproduce this in any version. | https://isc.sans.edu/diary/29936 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35668 | In visitUris of Notification.java, there is a possible way to display images from another user due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/b7bd7df91740da680a5c3a84d8dd91b4ca6956dd | 2023-06-15T02:50:29.819Z | 2023-12-04T22:40:49.750Z | 2023-12-22T00:16:43.315Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35392 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35392 | 2023-06-14T23:09:47.640Z | 2023-07-21T17:51:57.890Z | 2023-12-14T19:53:26.940Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'} |
CVE-2023-35687 | In MtpPropertyValue of MtpProperty.h, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/av/+/ea6131efa76a0b2a12724ffd157909e2c6fb4036 | 2023-06-15T02:50:33.961Z | 2023-09-11T20:09:55.452Z | 2023-09-11T20:16:46.031Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35054 | In JetBrains YouTrack before 2023.1.10518 stored XSS in a Markdown-rendering engine was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-06-12T15:42:07.261Z | 2023-06-12T15:46:04.704Z | 2023-06-12T15:46:04.704Z | {'Vendor': 'JetBrains', 'Product': 'YouTrack', 'Versions': '0'} |
CVE-2023-35957 | Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 VCDATA parsing functionality of GTKWave 3.3.115. A specially-crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the decompression function `uncompress`. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785 | 2023-06-20T18:27:13.647Z | 2024-01-08T14:47:59.713Z | 2024-01-08T18:00:09.666Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35900 | IBM Robotic Process Automation for Cloud Pak 21.0.0 through 21.0.7.4 and 23.0.0 through 23.0.5 is vulnerable to disclosing server version information which may be used to determine software vulnerabilities at the operating system level. IBM X-Force ID: 259368. | https://www.ibm.com/support/pages/node/7010895 | 2023-06-20T02:24:31.593Z | 2023-07-19T00:58:53.912Z | 2023-07-19T00:58:53.912Z | {'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'} |
CVE-2023-35146 | Jenkins Template Workflows Plugin 41.v32d86a_313b_4a and earlier does not escape names of jobs used as buildings blocks for Template Workflow Job, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create jobs. | https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3166 | 2023-06-14T08:58:33.245Z | 2023-06-14T12:53:08.824Z | 2023-10-24T12:50:39.728Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Template Workflows Plugin', 'Versions': '0'} |
CVE-2023-35845 | Anaconda 3 2023.03-1-Linux allows local users to disrupt TLS certificate validation by modifying the cacert.pem file used by the installed pip program. This occurs because many files are installed as world-writable on Linux, ignoring umask, even when these files are installed as root. Miniconda is also affected. | https://uponfurtherinvestigation.blogspot.com/2023/06/cve-2023-35845-anaconda3-creates.html | 2023-06-19T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T07:56:50.212650 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35351 | Windows Active Directory Certificate Services (AD CS) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35351 | 2023-06-14T23:09:47.626Z | 2023-07-11T17:02:54.783Z | 2023-12-14T19:52:52.441Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35644 | Windows Sysmain Service Elevation of Privilege | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35644 | 2023-06-15T01:03:28.508Z | 2023-12-12T18:10:51.007Z | 2023-12-15T21:02:53.762Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35097 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Internet Marketing Dojo WP Affiliate Links plugin <= 0.1.1 versions. | https://patchstack.com/database/vulnerability/wp-affiliate-links/wordpress-wp-affiliate-links-plugin-0-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-13T15:10:42.889Z | 2023-06-20T09:05:03.297Z | 2023-06-20T09:05:03.297Z | {'Vendor': 'Internet Marketing Dojo', 'Product': 'WP Affiliate Links', 'Versions': 'n/a'} |
CVE-2023-35994 | Multiple improper array index validation vulnerabilities exist in the fstReaderIterBlocks2 tdelta functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the tdelta initialization part. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791 | 2023-06-20T19:41:02.814Z | 2024-01-08T14:47:56.687Z | 2024-01-08T18:00:10.755Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35078 | An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication. | https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability | 2023-06-13T01:00:11.783Z | 2023-07-25T06:08:38.441Z | 2023-11-28T19:30:31.171Z | {'Vendor': 'Ivanti', 'Product': 'Endpoint Manager Mobile', 'Versions': '11.10, 11.9, 11.8'} |
CVE-2023-35306 | Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35306 | 2023-06-14T23:09:47.612Z | 2023-07-11T17:03:24.995Z | 2023-12-14T19:53:20.839Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35185 | The SolarWinds Access Rights Manager was susceptible to a Directory Traversal Remote Code Vulnerability using SYSTEM privileges. | https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35185 | 2023-06-14T20:03:23.107Z | 2023-10-19T14:24:15.553Z | 2023-12-28T17:05:58.115Z | {'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'} |
CVE-2023-35310 | Windows DNS Server Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35310 | 2023-06-14T23:09:47.613Z | 2023-07-11T17:03:26.663Z | 2023-12-14T19:53:22.412Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35890 | IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security, caused by the improper encoding in a local configuration file. IBM X-Force ID: 258637. | https://www.ibm.com/support/pages/node/7007857 | 2023-06-20T02:24:14.838Z | 2023-07-07T02:13:23.147Z | 2023-07-07T02:13:23.147Z | {'Vendor': 'IBM', 'Product': 'WebSphere Application Server', 'Versions': '8.5, 9.0'} |
CVE-2023-35039 | Improper Restriction of Excessive Authentication Attempts vulnerability in Be Devious Web Development Password Reset with Code for WordPress REST API allows Authentication Abuse.This issue affects Password Reset with Code for WordPress REST API: from n/a through 0.0.15.
| https://patchstack.com/database/vulnerability/bdvs-password-reset/wordpress-password-reset-with-code-for-wordpress-rest-api-plugin-0-0-15-privilege-escalation-due-to-weak-pin-generation-vulnerability?_s_id=cve | 2023-06-12T09:05:49.595Z | 2023-12-07T11:27:16.116Z | 2023-12-07T11:27:16.116Z | {'Vendor': 'Be Devious Web Development', 'Product': 'Password Reset with Code for WordPress REST API', 'Versions': 'n/a'} |
CVE-2023-35193 | An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset 0x4bddb8. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782 | 2023-06-14T20:41:25.820Z | 2023-10-11T15:16:55.642Z | 2023-10-11T17:00:09.009Z | {'Vendor': 'Peplink', 'Product': 'Surf SOHO HW1', 'Versions': 'v6.3.5 (in QEMU)'} |
CVE-2023-35347 | Microsoft Install Service Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35347 | 2023-06-14T23:09:47.624Z | 2023-07-11T17:02:53.052Z | 2023-12-14T19:52:50.947Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'} |
CVE-2023-35652 | In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:07.506Z | 2023-10-11T19:21:00.472Z | 2023-10-11T19:21:00.472Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35982 | There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-009.txt | 2023-06-20T18:43:02.967Z | 2023-07-25T18:28:20.312Z | 2023-07-25T18:28:20.312Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points running InstantOS and ArubaOS 10', 'Versions': 'ArubaOS 10.4.x.x: 10.4.0.1 and below, InstantOS 8.11.x.x: 8.11.1.0 and below, InstantOS 8.10.x.x: 8.10.0.6 and below, InstantOS 8.6.x.x: 8.6.0.20 and below, InstantOS 6.5.x.x: 6.5.4.24 and below, InstantOS 6.4.x.x: 6.4.4.8-4.2.4.21 and below'} |
CVE-2023-35828 | An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 | 2023-06-18T00:00:00 | 2023-06-18T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35081 | A path traversal vulnerability in Ivanti EPMM versions (11.10.x < 11.10.0.3, 11.9.x < 11.9.1.2 and 11.8.x < 11.8.1.2) allows an authenticated administrator to write arbitrary files onto the appliance. | https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US | 2023-06-13T01:00:11.784Z | 2023-08-03T17:00:10.822Z | 2023-08-03T17:00:10.822Z | {'Vendor': 'Ivanti', 'Product': 'EPMM', 'Versions': '11.10.0.3'} |
CVE-2023-35823 | An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2 | 2023-06-18T00:00:00 | 2023-06-18T00:00:00 | 2023-10-19T23:06:37.069715 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35989 | An integer overflow vulnerability exists in the LXT2 zlib block allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1822 | 2023-07-31T19:23:15.979Z | 2024-01-08T14:47:42.164Z | 2024-01-08T18:00:24.672Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35120 |
PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01 | 2023-06-27T16:55:52.775Z | 2023-07-06T23:09:42.511Z | 2023-07-06T23:09:42.511Z | {'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'} |
CVE-2023-35065 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Osoft Paint Production Management allows SQL Injection.This issue affects Paint Production Management: before 2.1.
| https://www.usom.gov.tr/bildirim/tr-23-0490 | 2023-06-12T19:32:44.799Z | 2023-09-05T17:07:00.225Z | 2023-09-05T17:07:00.225Z | {'Vendor': 'Osoft', 'Product': 'Paint Production Management', 'Versions': '0'} |
CVE-2023-35966 | Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 | 2023-06-20T18:36:46.429Z | 2023-10-11T15:14:28.595Z | 2023-10-11T17:00:07.702Z | {'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'} |
CVE-2023-35177 | Certain HP LaserJet Pro print products are potentially vulnerable to a stack-based buffer overflow related to the compact font format parser. | https://support.hp.com/us-en/document/ish_8651888-8651916-16/hpsbpi03853 | 2023-06-14T15:14:52.289Z | 2023-06-30T15:51:43.530Z | 2023-06-30T15:51:43.530Z | {'Vendor': 'HP Inc.', 'Product': 'HP LaserJet Pro', 'Versions': 'See HP Security Bulletin reference for affected versions.'} |
CVE-2023-35874 | SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability.
| https://me.sap.com/notes/3318850 | 2023-06-19T10:27:44.580Z | 2023-07-11T02:47:11.869Z | 2023-07-11T02:47:11.869Z | {'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver AS ABAP and ABAP Platform', 'Versions': 'KRNL64NUC 722, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93'} |
CVE-2023-35931 | Shescape is a simple shell escape library for JavaScript. An attacker may be able to get read-only access to environment variables. This bug has been patched in version 1.7.1.
| https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r | 2023-06-20T14:02:45.593Z | 2023-06-23T19:32:53.897Z | 2023-06-23T19:32:53.897Z | {'Vendor': 'ericcornelissen', 'Product': 'shescape', 'Versions': '< 1.7.1'} |
CVE-2023-35032 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8 and Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8 allow command injection by authenticated users, aka OSFOURK-23554. | https://networks.unify.com/security/advisories/OBSO-2305-01.pdf | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35618 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35618 | 2023-06-15T01:03:28.506Z | 2023-12-07T20:45:51.513Z | 2023-12-15T21:02:45.081Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'} |
CVE-2023-35862 | libcoap 4.3.1 contains a buffer over-read via the function coap_parse_oscore_conf_mem at coap_oscore.c. | https://github.com/obgm/libcoap/issues/1117 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35161 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4xm7-5q79-3fch | 2023-06-14T14:17:52.178Z | 2023-06-23T18:51:45.575Z | 2023-06-23T18:51:45.575Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 6.2-milestone-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'} |
CVE-2023-35024 | IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 258349. | https://www.ibm.com/support/pages/node/7047198 | 2023-06-11T20:38:21.242Z | 2023-10-14T15:07:18.696Z | 2023-10-14T15:07:18.696Z | {'Vendor': 'IBM', 'Product': 'Cloud Pak for Business Automation', 'Versions': '18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2'} |
CVE-2023-35927 | NextCloud Server and NextCloud Enterprise Server provide file storage for Nextcloud, a self-hosted productivity platform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, when two server are registered as trusted servers for each other and successfully exchanged the share secrets, the malicious server could modify or delete VCards in the system addressbook on the origin server. This would impact the available and shown information in certain places, such as the user search and avatar menu. If a manipulated user modifies their own data in the personal settings the entry is fixed again.
Nextcloud Server n 25.0.7 and 26.0.2 and Nextcloud Enterprise Server 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2 contain a patch for this issue. A workaround is available. Remove all trusted servers in the "Administration" > "Sharing" settings `…/index.php/settings/admin/sharing`. Afterwards, trigger a recreation of the local system addressbook with the following `occ dav:sync-system-addressbook`. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h7f7-535f-7q87 | 2023-06-20T14:02:45.593Z | 2023-06-23T20:53:33.688Z | 2023-06-23T20:53:33.688Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': 'Nextcloud Server >= 25.0.0, < 25.0.7, Nextcloud Server >= 26.0.0, < 26.0.2, Nextcloud Enterprise Server >= 25.0.0, < 25.0.7, Nextcloud Enterprise Server >= 26.0.0, < 26.0.2, Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.12, Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.12, Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.7, Nextcloud Enterprise Server >= 24.0.0, < 24.0.12.2'} |
CVE-2023-35136 | An improper input validation vulnerability in the “Quagga” package of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, and VPN series firmware versions 4.30 through 5.37, could allow an authenticated local attacker to access configuration files on an affected device. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps | 2023-06-14T06:26:48.563Z | 2023-11-28T01:16:16.723Z | 2023-11-28T02:08:26.895Z | {'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': 'versions 4.32 through 5.37'} |
CVE-2023-35835 | An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. The device provides a WiFi access point for initial configuration. The WiFi network provided has no network authentication (such as an encryption key) and persists permanently, including after enrollment and setup is complete. The WiFi network serves a web-based configuration utility, as well as an unauthenticated ModBus protocol interface. | https://yougottahackthat.com/blog/ | 2023-06-18T00:00:00 | 2024-01-23T00:00:00 | 2024-01-23T22:39:07.573677 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35970 | Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of the `FST_BL_VCDATA_DYN_ALIAS2` section type. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789 | 2023-06-20T18:38:18.618Z | 2024-01-08T14:47:58.040Z | 2024-01-08T18:00:10.309Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35073 | null | null | 2023-06-12T19:32:44.800Z | null | 2023-07-02T21:50:53.775679Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-35634 | Windows Bluetooth Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35634 | 2023-06-15T01:03:28.507Z | 2023-12-12T18:10:54.628Z | 2023-12-15T21:02:57.339Z | {'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'} |
CVE-2023-35321 | Windows Deployment Services Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35321 | 2023-06-14T23:09:47.616Z | 2023-07-11T17:02:39.270Z | 2023-12-14T19:52:39.413Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35663 | In Init of protocolnetadapter.cpp, there is a possible out of bounds read
due to a missing bounds check. This could lead to remote information
disclosure with no additional execution privileges needed. User interaction
is not needed for exploitation. | https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:10.272Z | 2023-10-18T19:10:32.213Z | 2023-10-18T19:10:32.213Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35376 | Microsoft Message Queuing Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35376 | 2023-06-14T23:09:47.637Z | 2023-08-08T17:08:31.367Z | 2023-12-14T20:03:05.211Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35675 | In loadMediaResumptionControls of MediaResumeListener.kt, there is a possible way to play and listen to media files played by another user on the same device due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/c1cf4b9746c9641190730172522324ccd5b8c914 | 2023-06-15T02:50:31.872Z | 2023-09-11T20:09:53.771Z | 2023-09-11T20:16:42.742Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35360 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35360 | 2023-06-14T23:09:47.628Z | 2023-07-11T17:02:58.171Z | 2023-12-14T19:52:55.437Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35622 | Windows DNS Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35622 | 2023-06-15T01:03:28.506Z | 2023-12-12T18:10:57.208Z | 2023-12-15T21:02:59.861Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35788 | An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation. | https://www.openwall.com/lists/oss-security/2023/06/07/1 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | 2023-10-19T23:07:19.640039 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35767 | In Helix Core versions prior to 2023.2, an unauthenticated remote Denial of Service (DoS) via the shutdown function was identified. Reported by Jason Geffner.
| https://perforce.com | 2023-10-24T21:47:07.842Z | 2023-11-08T15:31:29.693Z | 2024-01-04T17:22:38.684Z | {'Vendor': 'Helix', 'Product': 'Helix Core', 'Versions': '0.0.0, 0.0.0, 0.0.0, 0.0.0, 0.0.0'} |
CVE-2023-35337 | Win32k Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35337 | 2023-06-14T23:09:47.621Z | 2023-07-11T17:02:47.386Z | 2023-12-14T19:52:45.881Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'} |
CVE-2023-35086 |
It is identified a format string vulnerability in ASUS RT-AX56U V2 & RT-AC86U. This vulnerability is caused by directly using input as a format string when calling syslog in logmessage_normal function, in the do_detwan_cgi module of httpd. An unauthenticated remote attacker without privilege can exploit this vulnerability to perform remote arbitrary code execution, arbitrary system operation or disrupt service.
This issue affects RT-AX56U V2: 3.0.0.4.386_50460; RT-AC86U: 3.0.0.4_386_51529.
| https://www.twcert.org.tw/tw/cp-132-7240-a5f96-1.html | 2023-06-13T10:19:24.130Z | 2023-07-21T06:32:20.831Z | 2023-07-21T06:32:20.831Z | {'Vendor': 'ASUS', 'Product': 'RT-AX56U V2', 'Versions': '3.0.0.4.386_50460'} |
CVE-2023-35985 | An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834 | 2023-08-15T20:00:03.273Z | 2023-11-27T15:25:11.052Z | 2023-11-27T18:00:06.987Z | {'Vendor': 'Foxit', 'Product': 'Foxit Reader', 'Versions': '12.1.3.15356'} |
CVE-2023-35069 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Bullwark allows Path Traversal.This issue affects Bullwark: before BLW-2016E-960H.
| https://www.usom.gov.tr/bildirim/tr-23-0401 | 2023-06-12T19:32:44.799Z | 2023-07-13T07:56:42.429Z | 2023-07-26T09:08:19.698Z | {'Vendor': 'Bullwark', 'Product': 'Bullwark', 'Versions': '0'} |
CVE-2023-35340 | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35340 | 2023-06-14T23:09:47.622Z | 2023-07-11T17:02:49.050Z | 2023-12-14T19:52:47.417Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35655 | In CanConvertPadV2Op of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:10.271Z | 2023-10-11T19:23:16.364Z | 2023-10-11T19:23:16.364Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35878 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Vadym K. Extra User Details plugin <= 0.5 versions. | https://patchstack.com/database/vulnerability/extra-user-details/wordpress-extra-user-details-plugin-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-19T13:54:57.634Z | 2023-06-20T07:57:08.943Z | 2023-06-20T07:57:08.943Z | {'Vendor': 'Vadym K.', 'Product': 'Extra User Details', 'Versions': 'n/a'} |
CVE-2023-35194 | An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1782 | 2023-06-14T20:41:25.821Z | 2023-10-11T15:16:55.771Z | 2023-10-11T17:00:09.136Z | {'Vendor': 'Peplink', 'Product': 'Surf SOHO HW1', 'Versions': 'v6.3.5 (in QEMU)'} |
CVE-2023-35897 | IBM Spectrum Protect Client and IBM Storage Protect for Virtual Environments 8.1.0.0 through 8.1.19.0 could allow a local user to execute arbitrary code on the system using a specially crafted file, caused by a DLL hijacking flaw. IBM X-Force ID: 259246. | https://www.ibm.com/support/pages/node/7037299 | 2023-06-20T02:24:14.840Z | 2023-10-06T13:06:34.570Z | 2023-10-06T13:06:34.570Z | {'Vendor': 'IBM', 'Product': 'Storage Protect Client', 'Versions': '8.1.0.0'} |
CVE-2023-35317 | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35317 | 2023-06-14T23:09:47.614Z | 2023-07-11T17:02:36.983Z | 2023-12-14T19:52:37.420Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35182 | The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability can be abused by unauthenticated users on SolarWinds ARM Server. | https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35182 | 2023-06-14T20:03:23.107Z | 2023-10-19T14:23:31.797Z | 2023-10-19T14:23:31.797Z | {'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'} |
CVE-2023-35839 | Solon before 2.3.3 allows Deserialization of Untrusted Data. | https://github.com/noear/solon/issues/145 | 2023-06-18T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35993 | A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213846 | 2023-07-20T15:03:50.136Z | 2023-07-27T00:22:30.186Z | 2023-07-27T03:45:48.399Z | {'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'} |
CVE-2023-35090 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in StylemixThemes MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin <= 3.0.7 versions. | https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-13T15:10:42.888Z | 2023-06-22T10:33:16.893Z | 2023-06-22T10:33:16.893Z | {'Vendor': 'StylemixThemes', 'Product': 'MasterStudy LMS WordPress Plugin – for Online Courses and Education', 'Versions': 'n/a'} |
CVE-2023-35356 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35356 | 2023-06-14T23:09:47.627Z | 2023-07-11T17:02:56.575Z | 2023-07-19T00:18:36.931Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35643 | DHCP Server Service Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35643 | 2023-06-15T01:03:28.508Z | 2023-12-12T18:10:50.508Z | 2023-12-15T21:02:53.265Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35004 | An integer overflow vulnerability exists in the VZT longest_len value allocation functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1816 | 2023-07-21T20:59:43.842Z | 2024-01-08T14:47:45.725Z | 2024-01-08T18:00:21.796Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35141 | In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu. | https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3135 | 2023-06-14T08:58:33.244Z | 2023-06-14T12:53:05.244Z | 2023-10-24T12:50:34.086Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins', 'Versions': '2.400'} |
CVE-2023-35638 | DHCP Server Service Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35638 | 2023-06-15T01:03:28.508Z | 2023-12-12T18:10:48.400Z | 2023-12-15T21:02:51.191Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35792 | Vound Intella Connect 2.6.0.3 is vulnerable to stored Cross-site Scripting (XSS). | https://excellium-services.com/cert-xlm-advisory/CVE-2023-35792 | 2023-06-16T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35053 | In JetBrains YouTrack before 2023.1.10518 a DoS attack was possible via Helpdesk forms | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-06-12T15:42:06.856Z | 2023-06-12T15:46:04.269Z | 2023-06-12T15:46:04.269Z | {'Vendor': 'JetBrains', 'Product': 'YouTrack', 'Versions': '0'} |
CVE-2023-35116 | jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker. | https://github.com/FasterXML/jackson-databind/issues/3972 | 2023-06-13T00:00:00 | 2023-06-14T00:00:00 | 2023-07-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35680 | In multiple locations, there is a possible way to import contacts belonging to other users due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/services/Telephony/+/674039e70e1c5bf29b808899ac80c709acc82290 | 2023-06-15T02:50:31.873Z | 2023-09-11T20:09:54.517Z | 2023-09-11T20:16:44.159Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35946 | Gradle is a build tool with a focus on build automation and support for multi-language development. When Gradle writes a dependency into its dependency cache, it uses the dependency's coordinates to compute a file location. With specially crafted dependency coordinates, Gradle can be made to write files into an unintended location. The file may be written outside the dependency cache or over another file in the dependency cache. This vulnerability could be used to poison the dependency cache or overwrite important files elsewhere on the filesystem where the Gradle process has write permissions. Exploiting this vulnerability requires an attacker to have control over a dependency repository used by the Gradle build or have the ability to modify the build's configuration. It is unlikely that this would go unnoticed. A fix has been released in Gradle 7.6.2 and 8.2 to protect against this vulnerability. Gradle will refuse to cache dependencies that have path traversal elements in their dependency coordinates. It is recommended that users upgrade to a patched version. If you are unable to upgrade to Gradle 7.6.2 or 8.2, `dependency verification` will make this vulnerability more difficult to exploit. | https://github.com/gradle/gradle/security/advisories/GHSA-2h6c-rv6q-494v | 2023-06-20T14:02:45.598Z | 2023-06-30T20:21:17.219Z | 2023-06-30T20:21:17.219Z | {'Vendor': 'gradle', 'Product': 'gradle', 'Versions': '< 7.6.2, >= 8.0, < 8.2'} |
CVE-2023-35803 | IQ Engine before 10.6r2 on Extreme Network AP devices has a Buffer Overflow. | https://community.extremenetworks.com/t5/security-advisories-formerly/sa-2023-067-iq-engine-acsd-service-buffer-overflow-cve-2023/ba-p/96472 | 2023-06-17T00:00:00 | 2023-10-04T00:00:00 | 2023-10-04T21:49:00.477794 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.