CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-35913
Cross-Site Request Forgery (CSRF) vulnerability in OOPSpam OOPSpam Anti-Spam plugin <= 1.1.44 versions.
https://patchstack.com/database/vulnerability/oopspam-anti-spam/wordpress-oopspam-anti-spam-plugin-1-1-44-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-20T09:05:43.962Z
2023-07-11T08:21:34.594Z
2023-07-11T08:21:34.594Z
{'Vendor': 'OOPSpam', 'Product': 'OOPSpam Anti-Spam', 'Versions': 'n/a'}
CVE-2023-35694
In DMPixelLogger_ProcessDmCommand of DMPixelLogger.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-07-01
2023-06-15T02:50:33.964Z
2023-07-12T23:56:38.081Z
2023-07-12T23:56:38.081Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35381
Windows Fax Service Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381
2023-06-14T23:09:47.637Z
2023-08-08T17:08:34.784Z
2023-12-14T20:03:08.221Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35801
A directory traversal vulnerability in Safe Software FME Server before 2022.2.5 allows an attacker to bypass validation when editing a network-based resource connection, resulting in the unauthorized reading and writing of arbitrary files. Successful exploitation requires an attacker to have access to a user account with write privileges. FME Flow 2023.0 is also a fixed version.
https://community.safe.com/s/
2023-06-17T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35944
Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as `htTp` or `htTps`, or the bypassing of some requests such as `https` in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue.
https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g
2023-06-20T14:02:45.597Z
2023-07-25T18:35:59.135Z
2023-07-25T18:35:59.135Z
{'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.4, >= 1.25.0, < 1.25.9, >= 1.24.0, < 1.24.10, < 1.23.12'}
CVE-2023-35047
Cross-Site Request Forgery (CSRF) vulnerability in AREOI All Bootstrap Blocks plugin <= 1.3.6 versions.
https://patchstack.com/database/vulnerability/all-bootstrap-blocks/wordpress-all-bootstrap-blocks-plugin-1-3-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-12T15:16:17.293Z
2023-07-11T11:14:45.579Z
2023-07-11T11:14:45.579Z
{'Vendor': 'AREOI', 'Product': 'All Bootstrap Blocks', 'Versions': 'n/a'}
CVE-2023-35378
Windows Projected File System Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35378
2023-06-14T23:09:47.637Z
2023-08-08T17:08:33.069Z
2023-12-14T20:03:06.717Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35682
In hasPermissionForActivity of PackageManagerHelper.java, there is a possible way to start arbitrary components due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
https://android.googlesource.com/platform/packages/apps/Launcher3/+/09f8b0e52e45a0b39bab457534ba2e5ae91ffad0
2023-06-15T02:50:31.873Z
2023-09-11T20:09:54.893Z
2023-09-11T20:16:44.869Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35790
An issue was discovered in dec_patch_dictionary.cc in libjxl before 0.8.2. An integer underflow in patch decoding can lead to a denial of service, such as an infinite loop.
https://github.com/libjxl/libjxl/releases/tag/v0.8.2
2023-06-16T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35143
Jenkins Maven Repository Server Plugin 1.10 and earlier does not escape the versions of build artifacts on the Build Artifacts As Maven Repository page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control maven project versions in `pom.xml`.
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3156
2023-06-14T08:58:33.245Z
2023-06-14T12:53:06.654Z
2023-10-24T12:50:36.351Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Maven Repository Server Plugin', 'Versions': '0'}
CVE-2023-35840
_joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector.
https://github.com/Studio-42/elFinder/security/advisories/GHSA-wm5g-p99q-66g4
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35905
IBM FileNet Content Manager 5.5.8, 5.5.10, and 5.5.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 259384.
https://www.ibm.com/support/pages/node/7014389
2023-06-20T02:24:31.594Z
2023-10-04T00:38:39.565Z
2023-10-04T00:38:39.565Z
{'Vendor': 'IBM', 'Product': 'FileNet Content Manager', 'Versions': '5.5.8, 5.5.10, 5.5.11'}
CVE-2023-35641
Internet Connection Sharing (ICS) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641
2023-06-15T01:03:28.508Z
2023-12-12T18:10:49.435Z
2023-12-15T21:02:52.240Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35704
Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint32WithSkip function.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783
2023-06-15T13:56:19.639Z
2024-01-08T14:48:01.458Z
2024-01-08T18:00:08.436Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35138
A command injection vulnerability in the “show_zysync_server_contents” function of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products
2023-06-14T06:26:48.564Z
2023-11-30T01:30:44.661Z
2023-11-30T01:41:35.390Z
{'Vendor': 'Zyxel', 'Product': 'NAS326 firmware', 'Versions': 'V5.21(AAZF.14)C0'}
CVE-2023-35092
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Abhay Yadav Breadcrumb simple plugin <= 1.3 versions.
https://patchstack.com/database/vulnerability/breadcrumb-simple/wordpress-breadcrumb-simple-plugin-1-3-cross-site-scripting-xss?_s_id=cve
2023-06-13T15:10:42.889Z
2023-08-30T15:19:56.920Z
2023-08-30T15:19:56.920Z
{'Vendor': 'Abhay Yadav', 'Product': 'Breadcrumb simple', 'Versions': 'n/a'}
CVE-2023-35991
Hidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions.
https://www.elecom.co.jp/news/security/20230810-01/
2023-08-09T11:54:58.462Z
2023-08-18T09:37:37.744Z
2023-08-18T09:37:37.744Z
{'Vendor': 'LOGITEC CORPORATION', 'Product': 'LAN-W300N/DR', 'Versions': 'all versions'}
CVE-2023-35303
USB Audio Class System Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35303
2023-06-14T23:09:47.612Z
2023-07-11T17:03:23.268Z
2023-12-14T19:53:19.302Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35180
The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows authenticated users to abuse SolarWinds ARM API.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35180
2023-06-14T20:03:23.107Z
2023-10-19T14:23:48.383Z
2023-10-19T14:23:48.383Z
{'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'}
CVE-2023-35883
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Magazine3 Core Web Vitals & PageSpeed Booster.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.12.
https://patchstack.com/database/vulnerability/core-web-vitals-pagespeed-booster/wordpress-core-web-vitals-pagespeed-booster-plugin-1-0-12-open-redirection-vulnerability?_s_id=cve
2023-06-19T13:54:57.634Z
2023-12-19T20:11:11.659Z
2023-12-19T20:11:11.659Z
{'Vendor': 'Magazine3', 'Product': 'Core Web Vitals & PageSpeed Booster', 'Versions': 'n/a'}
CVE-2023-35929
Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix.
https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268
2023-06-20T14:02:45.593Z
2023-07-25T17:30:22.017Z
2023-07-25T17:30:22.017Z
{'Vendor': 'Enalean', 'Product': 'tuleap', 'Versions': 'Tuleap Community Edition < 14.10.99.4, Tuleap Enterprise Edition < 14.9-5, Tuleap Enterprise Edition >= 14.10, < 14.10-2'}
CVE-2023-35315
Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35315
2023-06-14T23:09:47.614Z
2023-07-11T17:02:35.868Z
2023-12-14T19:52:36.429Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35895
IBM Informix JDBC Driver 4.10 and 4.50 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 259116.
https://www.ibm.com/support/pages/node/7099762
2023-06-20T02:24:14.840Z
2023-12-20T14:18:56.529Z
2023-12-20T14:18:56.529Z
{'Vendor': 'IBM', 'Product': 'Informix JDBC', 'Versions': '4.10, 4.50'}
CVE-2023-35179
A vulnerability has been identified within Serv-U 15.4 that, if exploited, allows an actor to bypass multi-factor/two-factor authentication. The actor must have administrator-level access to Serv-U to perform this action. 
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35179
2023-06-14T20:03:23.106Z
2023-08-10T23:14:48.081Z
2023-09-14T19:05:04.546Z
{'Vendor': 'SolarWinds ', 'Product': 'Serv-U ', 'Versions': '15.4 '}
CVE-2023-35342
Windows Image Acquisition Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35342
2023-06-14T23:09:47.623Z
2023-07-11T17:02:50.242Z
2023-12-14T19:52:48.434Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35968
Two heap-based buffer overflow vulnerabilities exist in the gwcfg_cgi_set_manage_post_data functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788
2023-06-20T18:37:39.611Z
2023-10-11T15:14:27.992Z
2023-10-11T17:00:06.292Z
{'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'}
CVE-2023-35987
PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01
2023-06-27T16:55:52.738Z
2023-07-06T22:58:06.843Z
2023-07-07T16:30:12.852Z
{'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'}
CVE-2023-35084
Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely.
https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US
2023-06-13T01:00:11.784Z
2023-10-18T03:52:06.581Z
2023-10-18T03:52:06.581Z
{'Vendor': 'Ivanti', 'Product': 'Endpoint Manager', 'Versions': '2022 su3'}
CVE-2023-35969
Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of `FST_BL_VCDATA` and `FST_BL_VCDATA_DYN_ALIAS` section types.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789
2023-06-20T18:38:18.618Z
2024-01-08T14:47:57.931Z
2024-01-08T18:00:10.173Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35986
Sante DICOM Viewer Pro lacks proper validation of user-supplied data when parsing DICOM files. This could lead to a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-285-01
2023-09-12T20:04:59.924Z
2023-10-19T17:35:00.379Z
2023-10-19T17:35:00.379Z
{'Vendor': 'Santesoft', 'Product': 'Sante DICOM Viewer Pro', 'Versions': '0'}
CVE-2023-35085
An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE). Affected Products: All UniFi Access Points (Version 6.5.50 and earlier) All UniFi Switches (Version 6.5.32 and earlier) -USW Flex Mini excluded. Mitigation: Update UniFi Access Points to Version 6.5.62 or later. Update the UniFi Switches to Version 6.5.59 or later.
https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56
2023-06-13T01:00:11.784Z
2023-08-10T18:58:17.222Z
2023-08-10T18:58:17.222Z
{'Vendor': 'Ubiquiti Inc', 'Product': 'UniFi Access Points', 'Versions': '6.5.50'}
CVE-2023-35656
In multiple functions of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:10.271Z
2023-10-18T19:10:32.026Z
2023-10-18T19:10:32.026Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35343
Windows Geolocation Service Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35343
2023-06-14T23:09:47.623Z
2023-07-11T17:02:50.827Z
2023-12-14T19:52:48.936Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35178
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow when performing a GET request to scan jobs.
https://support.hp.com/us-en/document/ish_8651729-8651769-16/hpsbpi03854
2023-06-14T15:14:52.289Z
2023-06-30T15:54:06.696Z
2023-06-30T15:54:06.696Z
{'Vendor': 'HP Inc.', 'Product': 'HP LaserJet Pro', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-35314
Remote Procedure Call Runtime Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35314
2023-06-14T23:09:47.614Z
2023-07-11T17:02:35.354Z
2023-12-14T19:52:35.929Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35181
The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows users to abuse incorrect folder permission resulting in Privilege Escalation.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35181
2023-06-14T20:03:23.107Z
2023-10-19T14:24:54.662Z
2023-10-19T14:24:54.662Z
{'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'}
CVE-2023-35882
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Team Heateor Super Socializer plugin <= 7.13.52 versions.
https://patchstack.com/database/vulnerability/super-socializer/wordpress-super-socializer-plugin-7-13-52-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-19T13:54:57.634Z
2023-06-20T07:53:58.274Z
2023-06-20T07:53:58.274Z
{'Vendor': 'Team Heateor', 'Product': 'Super Socializer', 'Versions': 'n/a'}
CVE-2023-35928
Nextcloud Server is a space for data storage on Nextcloud, a self-hosted productivity playform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 19.0.0 until 19.0.13.9, 20.0.0 until 20.0.14.14, 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, a user could use this functionality to get access to the login credentials of another user and take over their account. This issue has been patched in Nextcloud Server versions 25.0.7 and 26.0.2 and NextCloud Enterprise Server versions 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2. Three workarounds are available. Disable app files_external. Change config setting "Allow users to mount external storage" to disabled in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages`. Change config setting to disallow users to create external storages in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages` with the types FTP, Nextcloud, SFTP, and/or WebDAV.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h
2023-06-20T14:02:45.593Z
2023-06-23T20:58:33.225Z
2023-06-23T20:58:33.225Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': 'Nextcloud Enterprise Server >= 19.0.0, < 19.0.13.9, Nextcloud Enterprise Server >= 20.0.0.0, < 20.0.14.14, Nextcloud Enterprise Server >= 21.0.0.0, < 21.0.9.12, Nextcloud Enterprise Server >= 22.0.0.0, < 22.2.10.12, Nextcloud Enterprise Server >= 23.0.0.0, < 23.0.12.7, Nextcloud Enterprise Server >= 24.0.0.0, < 24.0.12.2, Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 , Nextcloud Enterprise Server >= 26.0.0, < 26.0.2, Nextcloud Server >= 25.0.0, < 25.0.7, Nextcloud Server >= 26.0.0, < 26.0.2'}
CVE-2023-35302
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35302
2023-06-14T23:09:47.612Z
2023-07-11T17:03:22.689Z
2023-12-14T19:53:18.801Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35139
A cross-site scripting (XSS) vulnerability in the CGI program of the Zyxel ATP series firmware versions 5.10 through 5.37, USG FLEX series firmware versions 5.00 through 5.37, USG FLEX 50(W) series firmware versions 5.10 through 5.37, USG20(W)-VPN series firmware versions 5.10 through 5.37, and VPN series firmware versions 5.00 through 5.37, could allow an unauthenticated LAN-based attacker to store malicious scripts in a vulnerable device. A successful XSS attack could then result in the stored malicious scripts being executed to steal cookies when the user visits the specific CGI used for dumping ZTP logs.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps
2023-06-14T06:26:48.564Z
2023-11-28T01:22:07.985Z
2023-11-28T01:22:07.985Z
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': 'versions 5.10 through 5.37'}
CVE-2023-35093
Broken Access Control vulnerability in StylemixThemes MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin <= 3.0.8 versions allows any logged-in users, such as subscribers to view the "Orders" of the plugin and get the data related to the order like email, username, and more.
https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-0-7-broken-access-control-vulnerability?_s_id=cve
2023-06-13T15:10:42.889Z
2023-06-22T11:07:21.020Z
2023-06-22T11:07:21.020Z
{'Vendor': 'StylemixThemes', 'Product': 'MasterStudy LMS WordPress Plugin – for Online Courses and Education', 'Versions': 'n/a'}
CVE-2023-35990
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed.
https://support.apple.com/en-us/HT213938
2023-07-20T15:03:50.160Z
2023-09-26T20:14:46.575Z
2023-09-26T20:14:46.575Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-35355
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35355
2023-06-14T23:09:47.627Z
2023-09-12T16:58:16.704Z
2023-12-14T20:11:32.976Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35142
Jenkins Checkmarx Plugin 2022.4.3 and earlier disables SSL/TLS validation for connections to the Checkmarx server by default.
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2870
2023-06-14T08:58:33.244Z
2023-06-14T12:53:05.967Z
2023-10-24T12:50:35.200Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Checkmarx Plugin', 'Versions': '0'}
CVE-2023-35791
Vound Intella Connect 2.6.0.3 has an Open Redirect vulnerability.
https://excellium-services.com/cert-xlm-advisory/CVE-2023-35791
2023-06-16T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35379
Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35379
2023-06-14T23:09:47.637Z
2023-08-08T17:08:33.613Z
2023-12-14T20:03:07.219Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2008 R2 Service Pack 1', 'Versions': '6.1.0'}
CVE-2023-35683
In bindSelection of DatabaseUtils.java, there is a possible way to access files from other applications due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/providers/MediaProvider/+/23d156ed1bed6d2c2b325f0be540d0afca510c49
2023-06-15T02:50:31.873Z
2023-09-11T20:09:55.077Z
2023-09-11T20:16:45.309Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35800
Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators.
https://advisories.stormshield.eu
2023-06-17T00:00:00
2023-06-27T00:00:00
2023-06-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35945
Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r
2023-06-20T14:02:45.597Z
2023-07-13T20:41:15.690Z
2023-07-13T20:41:15.690Z
{'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.3, >= 1.25.0, < 1.25.8, >= 1.24.0, < 1.24.9, >= 1.23.0, < 1.23.11'}
CVE-2023-35695
A remote attacker could leverage a vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 to download a particular log file which may contain sensitive information regarding the product.
https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US
2023-06-15T05:43:32.973Z
2023-06-26T21:58:45.861Z
2023-06-26T21:58:45.861Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Moibile Security for Enterprise', 'Versions': '9.8 SP5'}
CVE-2023-35380
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380
2023-06-14T23:09:47.637Z
2023-08-08T17:08:34.191Z
2023-12-14T20:03:07.706Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35857
In Siren Investigate before 13.2.2, session keys remain active even after logging out.
https://community.siren.io/c/announcements
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35154
Knowage is an open source analytics and business intelligence suite. Starting in version 6.0.0 and prior to version 8.1.8, an attacker can register and activate their account without having to click on the link included in the email, allowing them access to the application as a normal user. This issue has been patched in version 8.1.8.
https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-48hp-jvv8-cf62
2023-06-14T14:17:52.177Z
2023-06-23T20:20:49.978Z
2023-06-23T20:20:49.978Z
{'Vendor': 'KnowageLabs', 'Product': 'Knowage-Server', 'Versions': '< 8.1.8'}
CVE-2023-35011
IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 257705.
https://www.ibm.com/support/pages/node/7026692
2023-06-11T20:38:02.325Z
2023-08-16T22:46:33.755Z
2023-08-16T22:48:38.229Z
{'Vendor': 'IBM', 'Product': 'Cognos Analytics', 'Versions': '11.1.7, 11.2.0, 11.2.1'}
CVE-2023-35912
Cross-Site Request Forgery (CSRF) vulnerability in WP Zone Potent Donations for WooCommerce plugin <= 1.1.9 versions.
https://patchstack.com/database/vulnerability/donations-for-woocommerce/wordpress-potent-donations-for-woocommerce-plugin-1-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-20T09:05:43.962Z
2023-07-10T15:47:34.388Z
2023-07-10T15:47:34.388Z
{'Vendor': 'WP Zone', 'Product': 'Potent Donations for WooCommerce', 'Versions': 'n/a'}
CVE-2023-35338
Windows Peer Name Resolution Protocol Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35338
2023-06-14T23:09:47.621Z
2023-07-11T17:02:47.917Z
2023-12-14T19:52:46.373Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35965
Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787
2023-06-20T18:36:46.429Z
2023-10-11T15:14:28.499Z
2023-10-11T17:00:07.572Z
{'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'}
CVE-2023-35066
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Infodrom Software E-Invoice Approval System allows SQL Injection.This issue affects E-Invoice Approval System: before v.20230701.
https://www.usom.gov.tr/bildirim/tr-23-0419
2023-06-12T19:32:44.799Z
2023-07-25T06:08:45.438Z
2023-07-25T06:08:45.438Z
{'Vendor': 'Infodrom Software', 'Product': 'E-Invoice Approval System', 'Versions': '0'}
CVE-2023-35089
Cross-Site Request Forgery (CSRF) vulnerability in Really Simple Plugins Recipe Maker For Your Food Blog from Zip Recipes plugin <= 8.0.7 versions.
https://patchstack.com/database/vulnerability/zip-recipes/wordpress-recipe-maker-for-your-food-blog-from-zip-recipes-plugin-8-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-13T15:10:42.888Z
2023-07-17T13:31:13.212Z
2023-07-17T13:31:13.212Z
{'Vendor': 'Really Simple Plugins', 'Product': 'Recipe Maker For Your Food Blog from Zip Recipes', 'Versions': 'n/a'}
CVE-2023-35318
Remote Procedure Call Runtime Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35318
2023-06-14T23:09:47.615Z
2023-07-11T17:02:37.564Z
2023-12-14T19:52:37.921Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35031
Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, and Manager V10 R0 allow command injection by authenticated users, aka OSFOURK-24036.
https://networks.unify.com/security/advisories/OBSO-2305-01.pdf
2023-06-12T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35898
IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information due to an insecure security configuration in InfoSphere Data Flow Designer. IBM X-Force ID: 259352.
https://www.ibm.com/support/pages/node/7009205
2023-06-20T02:24:31.593Z
2023-07-19T00:46:41.821Z
2023-07-19T00:46:41.821Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-35932
jcvi is a Python library to facilitate genome assembly, annotation, and comparative genomics. A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. The impact of a configuration injection may vary. Under some conditions, it may lead to command injection if there is for instance shell code execution from the configuration file values. This vulnerability does not currently have a fix.
https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q
2023-06-20T14:02:45.593Z
2023-06-23T21:05:32.790Z
2023-06-23T21:05:32.790Z
{'Vendor': 'tanghaibao', 'Product': 'jcvi', 'Versions': '<= 1.3.5'}
CVE-2023-35877
Cross-Site Request Forgery (CSRF) vulnerability in Vadym K. Extra User Details allows Stored XSS.This issue affects Extra User Details: from n/a through 0.5.
https://patchstack.com/database/vulnerability/extra-user-details/wordpress-extra-user-details-plugin-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-19T13:54:57.634Z
2023-11-13T17:06:24.296Z
2023-11-13T17:06:24.296Z
{'Vendor': 'Vadym K.', 'Product': 'Extra User Details', 'Versions': 'n/a'}
CVE-2023-35174
Livebook is a web application for writing interactive and collaborative code notebooks. On Windows, it is possible to open a `livebook://` link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine. Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser. This vulnerability has been fixed in version 0.8.2 and 0.9.3.
https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9
2023-06-14T14:17:52.180Z
2023-06-22T13:34:38.492Z
2023-06-22T13:34:38.492Z
{'Vendor': 'livebook-dev', 'Product': 'livebook', 'Versions': '>= 0.8.0, < 0.8.2, >= 0.9.0, < 0.9.3'}
CVE-2023-35924
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.8, GLPI inventory endpoint can be used to drive a SQL injection attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.
https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm
2023-06-20T14:02:45.592Z
2023-07-05T19:35:33.232Z
2023-07-05T19:35:33.232Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 10.0.0, < 10.0.8'}
CVE-2023-35162
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the previewactions template to perform a XSS, e.g. by using URL such as: > <hostname>/xwiki/bin/get/FlamingoThemes/Cerulean xpage=xpart&vm=previewactions.vm&xcontinue=javascript:alert(document.domain). This vulnerability exists since XWiki 6.1-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q9hg-9qj2-mxf9
2023-06-14T14:17:52.178Z
2023-06-23T18:52:19.725Z
2023-06-23T18:52:19.725Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 6.1-rc-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'}
CVE-2023-35861
A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC.
https://www.supermicro.com/en/products/motherboards
2023-06-19T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35359
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359
2023-06-14T23:09:47.628Z
2023-08-08T17:08:17.717Z
2023-12-14T20:02:52.445Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35070
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VegaGroup Web Collection allows SQL Injection.This issue affects Web Collection: before 31197.
https://www.usom.gov.tr/bildirim/tr-23-0406
2023-06-12T19:32:44.800Z
2023-07-13T13:23:26.561Z
2023-07-13T13:23:26.561Z
{'Vendor': 'VegaGroup ', 'Product': 'Web Collection', 'Versions': '0'}
CVE-2023-35973
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt
2023-06-20T18:41:22.736Z
2023-07-05T14:45:39.756Z
2023-07-05T14:45:39.756Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central', 'Versions': '- ArubaOS 10.4.x.x: 10.4.0.1 and below, - ArubaOS 8.11.x.x: 8.11.1.0 and below, - ArubaOS 8.10.x.x: 8.10.0.6 and below, - ArubaOS 8.6.x.x: 8.6.0.20 and below'}
CVE-2023-35836
An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. An attacker within RF range can obtain a cleartext copy of the network configuration of the device, including the Wi-Fi PSK, during device setup and reconfiguration. Upon success, the attacker is able to further infiltrate the target's Wi-Fi networks.
https://yougottahackthat.com/blog/
2023-06-18T00:00:00
2024-01-23T00:00:00
2024-01-23T22:39:13.908409
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35322
Windows Deployment Services Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35322
2023-06-14T23:09:47.616Z
2023-07-11T17:02:39.901Z
2023-12-14T19:52:39.911Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-35772
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alain Gonzalez Google Map Shortcode plugin <= 3.1.2 versions.
https://patchstack.com/database/vulnerability/google-map-shortcode/wordpress-google-map-shortcode-plugin-3-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-16T08:57:49.306Z
2023-06-19T13:54:25.261Z
2023-06-19T13:54:25.261Z
{'Vendor': 'Alain Gonzalez', 'Product': 'Google Map Shortcode', 'Versions': 'n/a'}
CVE-2023-35908
Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL. It is recommended to upgrade to a version that is not affected
https://github.com/apache/airflow/pull/32014
2023-06-20T03:18:55.291Z
2023-07-12T09:14:10.491Z
2023-07-12T09:14:10.491Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-35660
In lwis_transaction_client_cleanup of lwis_transaction.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-06-15T02:50:10.272Z
2023-10-11T19:24:44.146Z
2023-10-11T19:24:44.146Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35363
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35363
2023-06-14T23:09:47.634Z
2023-07-11T17:02:59.935Z
2023-12-14T19:52:56.948Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35699
Cleartext Storage on Disk in the SICK ICR890-4 could allow an unauthenticated attacker with local access to the device to disclose sensitive information by accessing a SD card.
https://sick.com/psirt
2023-06-15T11:32:19.767Z
2023-07-10T09:39:45.804Z
2023-07-10T09:40:55.151Z
{'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'}
CVE-2023-35676
In createQuickShareAction of SaveImageInBackgroundTask.java, there is a possible way to trigger a background activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/109e58b62dc9fedcee93983678ef9d4931e72afa
2023-06-15T02:50:31.872Z
2023-09-11T20:09:53.971Z
2023-09-11T20:16:43.088Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12'}
CVE-2023-35621
Microsoft Dynamics 365 Finance and Operations Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35621
2023-06-15T01:03:28.506Z
2023-12-12T18:10:56.691Z
2023-12-15T21:02:59.354Z
{'Vendor': 'Microsoft', 'Product': 'Dynamics 365 for Finance and Operations', 'Versions': '10.0.38'}
CVE-2023-35158
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 9.4-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mwxj-g7fw-7hc8
2023-06-14T14:17:52.178Z
2023-06-23T18:26:37.121Z
2023-06-23T18:26:37.121Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 9.4-rc-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'}
CVE-2023-35780
Cross-Site Request Forgery (CSRF) vulnerability in Andy Whalen Galleria plugin <= 1.0.3 versions.
https://patchstack.com/database/vulnerability/galleria/wordpress-galleria-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-16T08:57:49.308Z
2023-07-11T11:04:24.781Z
2023-07-11T11:04:24.781Z
{'Vendor': 'Andy Whalen', 'Product': 'Galleria', 'Versions': 'n/a'}
CVE-2023-35153
XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update `AppWithinMinutes.ClassEditSheet` with a patch.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97
2023-06-14T14:17:52.177Z
2023-06-23T17:19:59.290Z
2023-06-23T17:19:59.290Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 5.4.4, < 14.4.8, >= 14.5, < 14.10.4, >= 15.0-rc-1, < 15.0'}
CVE-2023-35850
SUNNET WMPro portal's file management function has a vulnerability of insufficient filtering for user input. A remote attacker with administrator privilege or a privileged account can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operations or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7373-4ef46-1.html
2023-06-19T02:28:47.605Z
2023-09-18T02:30:35.609Z
2023-09-18T02:36:51.501Z
{'Vendor': 'SUNNET', 'Product': 'WMPro', 'Versions': 'V5'}
CVE-2023-35915
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 5.9.0.
https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woocommerce-payments-plugin-5-9-0-sql-injection-vulnerability?_s_id=cve
2023-06-20T09:05:43.963Z
2023-12-20T15:15:38.226Z
2023-12-20T15:15:38.226Z
{'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'}
CVE-2023-35016
IBM Security Verify Governance, Identity Manager 10.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 257772.
https://www.ibm.com/support/pages/node/7014397
2023-06-11T20:38:21.241Z
2023-07-31T00:29:37.729Z
2023-07-31T00:29:37.729Z
{'Vendor': 'IBM', 'Product': 'Security Verify Governance, Identity Manager', 'Versions': '10.0'}
CVE-2023-35368
Microsoft Exchange Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35368
2023-06-14T23:09:47.636Z
2023-08-08T17:08:18.275Z
2023-12-14T20:02:53.074Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 13', 'Versions': '15.02.0'}
CVE-2023-35692
In getLocationCache of GeoLocation.java, there is a possible way to send a mock location during an emergency call due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-07-01
2023-06-15T02:50:33.964Z
2023-07-14T15:57:35.248Z
2023-07-14T15:57:35.248Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35387
Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35387
2023-06-14T23:09:47.638Z
2023-08-08T17:08:38.255Z
2023-12-14T20:03:11.219Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35041
Cross-Site Request Forgery (CSRF) vulnerability leading to Local File Inclusion (LF) in Webpushr Web Push Notifications Web Push Notifications – Webpushr plugin <= 4.34.0 versions.
https://patchstack.com/database/vulnerability/webpushr-web-push-notifications/wordpress-web-push-notifications-webpushr-plugin-4-34-0-csrf-leading-to-lfi-vulnerability?_s_id=cve
2023-06-12T09:05:49.596Z
2023-11-13T02:12:18.580Z
2023-11-13T02:12:18.580Z
{'Vendor': 'Webpushr Web Push Notifications', 'Product': 'Web Push Notifications – Webpushr', 'Versions': 'n/a'}
CVE-2023-35942
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update.
https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4
2023-06-20T14:02:45.596Z
2023-07-25T18:24:11.613Z
2023-07-25T18:24:11.613Z
{'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.4, >= 1.25.0, < 1.25.9, >= 1.24.0, < 1.24.10, < 1.23.12'}
CVE-2023-35684
In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to an integer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/668bbca29797728004d88db4c9b69102f3939008
2023-06-15T02:50:31.873Z
2023-09-11T20:09:55.266Z
2023-09-11T20:16:45.658Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-35391
ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391
2023-06-14T23:09:47.640Z
2023-08-08T18:52:30.105Z
2023-12-14T20:03:26.704Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2022 version 17.2', 'Versions': '17.2.0'}
CVE-2023-35811
An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected.
https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/
2023-06-17T00:00:00
2023-06-17T00:00:00
2023-08-23T15:06:20.287101
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35057
An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821
2023-07-28T14:17:15.195Z
2024-01-08T14:47:42.619Z
2024-01-08T18:00:24.317Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-35779
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Seed Webs Seed Fonts plugin <= 2.3.1 versions.
https://patchstack.com/database/vulnerability/seed-fonts/wordpress-seed-fonts-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-16T08:57:49.308Z
2023-06-19T13:21:16.714Z
2023-06-19T13:21:16.714Z
{'Vendor': 'Seed Webs', 'Product': 'Seed Fonts', 'Versions': '2.3.1'}
CVE-2023-35329
Windows Authentication Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35329
2023-06-14T23:09:47.618Z
2023-07-11T17:02:43.437Z
2023-12-14T19:52:42.908Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35796
A vulnerability has been identified in SINEMA Server V14 (All versions). The affected application improperly sanitizes certain SNMP configuration data retrieved from monitored devices. An attacker with access to a monitored device could perform a stored cross-site scripting (XSS) attack that may lead to arbitrary code execution with `SYSTEM` privileges on the application server. (ZDI-CAN-19823)
https://cert-portal.siemens.com/productcert/pdf/ssa-594373.pdf
2023-06-17T10:50:05.752Z
2023-10-10T10:21:20.721Z
2023-10-10T10:21:20.721Z
{'Vendor': 'Siemens', 'Product': 'SINEMA Server V14', 'Versions': 'All versions'}
CVE-2023-35846
VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not check the transport layer length in a frame before performing port filtering.
https://github.com/virtualsquare/picotcp/commit/d561990a358899178115e156871cc054a1c55ffe
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-35145
Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission.
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3155
2023-06-14T08:58:33.245Z
2023-06-14T12:53:08.081Z
2023-10-24T12:50:38.587Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Sonargraph Integration Plugin', 'Versions': '0'}