CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-35913 | Cross-Site Request Forgery (CSRF) vulnerability in OOPSpam OOPSpam Anti-Spam plugin <= 1.1.44 versions. | https://patchstack.com/database/vulnerability/oopspam-anti-spam/wordpress-oopspam-anti-spam-plugin-1-1-44-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-20T09:05:43.962Z | 2023-07-11T08:21:34.594Z | 2023-07-11T08:21:34.594Z | {'Vendor': 'OOPSpam', 'Product': 'OOPSpam Anti-Spam', 'Versions': 'n/a'} |
CVE-2023-35694 | In DMPixelLogger_ProcessDmCommand of DMPixelLogger.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-07-01 | 2023-06-15T02:50:33.964Z | 2023-07-12T23:56:38.081Z | 2023-07-12T23:56:38.081Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35381 | Windows Fax Service Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35381 | 2023-06-14T23:09:47.637Z | 2023-08-08T17:08:34.784Z | 2023-12-14T20:03:08.221Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35801 | A directory traversal vulnerability in Safe Software FME Server before 2022.2.5 allows an attacker to bypass validation when editing a network-based resource connection, resulting in the unauthorized reading and writing of arbitrary files. Successful exploitation requires an attacker to have access to a user account with write privileges. FME Flow 2023.0 is also a fixed version. | https://community.safe.com/s/ | 2023-06-17T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35944 | Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as `htTp` or `htTps`, or the bypassing of some requests such as `https` in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue. | https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g | 2023-06-20T14:02:45.597Z | 2023-07-25T18:35:59.135Z | 2023-07-25T18:35:59.135Z | {'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.4, >= 1.25.0, < 1.25.9, >= 1.24.0, < 1.24.10, < 1.23.12'} |
CVE-2023-35047 | Cross-Site Request Forgery (CSRF) vulnerability in AREOI All Bootstrap Blocks plugin <= 1.3.6 versions. | https://patchstack.com/database/vulnerability/all-bootstrap-blocks/wordpress-all-bootstrap-blocks-plugin-1-3-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-12T15:16:17.293Z | 2023-07-11T11:14:45.579Z | 2023-07-11T11:14:45.579Z | {'Vendor': 'AREOI', 'Product': 'All Bootstrap Blocks', 'Versions': 'n/a'} |
CVE-2023-35378 | Windows Projected File System Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35378 | 2023-06-14T23:09:47.637Z | 2023-08-08T17:08:33.069Z | 2023-12-14T20:03:06.717Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35682 | In hasPermissionForActivity of PackageManagerHelper.java, there is a possible way to start arbitrary components due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. | https://android.googlesource.com/platform/packages/apps/Launcher3/+/09f8b0e52e45a0b39bab457534ba2e5ae91ffad0 | 2023-06-15T02:50:31.873Z | 2023-09-11T20:09:54.893Z | 2023-09-11T20:16:44.869Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35790 | An issue was discovered in dec_patch_dictionary.cc in libjxl before 0.8.2. An integer underflow in patch decoding can lead to a denial of service, such as an infinite loop. | https://github.com/libjxl/libjxl/releases/tag/v0.8.2 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35143 | Jenkins Maven Repository Server Plugin 1.10 and earlier does not escape the versions of build artifacts on the Build Artifacts As Maven Repository page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control maven project versions in `pom.xml`. | https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3156 | 2023-06-14T08:58:33.245Z | 2023-06-14T12:53:06.654Z | 2023-10-24T12:50:36.351Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Maven Repository Server Plugin', 'Versions': '0'} |
CVE-2023-35840 | _joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver connector. | https://github.com/Studio-42/elFinder/security/advisories/GHSA-wm5g-p99q-66g4 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35905 | IBM FileNet Content Manager 5.5.8, 5.5.10, and 5.5.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 259384. | https://www.ibm.com/support/pages/node/7014389 | 2023-06-20T02:24:31.594Z | 2023-10-04T00:38:39.565Z | 2023-10-04T00:38:39.565Z | {'Vendor': 'IBM', 'Product': 'FileNet Content Manager', 'Versions': '5.5.8, 5.5.10, 5.5.11'} |
CVE-2023-35641 | Internet Connection Sharing (ICS) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35641 | 2023-06-15T01:03:28.508Z | 2023-12-12T18:10:49.435Z | 2023-12-15T21:02:52.240Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35704 | Multiple stack-based buffer overflow vulnerabilities exist in the FST LEB128 varint functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the fstReaderVarint32WithSkip function. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783 | 2023-06-15T13:56:19.639Z | 2024-01-08T14:48:01.458Z | 2024-01-08T18:00:08.436Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35138 | A command injection vulnerability in the “show_zysync_server_contents” function of the Zyxel NAS326 firmware version V5.21(AAZF.14)C0 and NAS542 firmware version V5.21(ABAG.11)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-authentication-bypass-and-command-injection-vulnerabilities-in-nas-products | 2023-06-14T06:26:48.564Z | 2023-11-30T01:30:44.661Z | 2023-11-30T01:41:35.390Z | {'Vendor': 'Zyxel', 'Product': 'NAS326 firmware', 'Versions': 'V5.21(AAZF.14)C0'} |
CVE-2023-35092 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Abhay Yadav Breadcrumb simple plugin <= 1.3 versions. | https://patchstack.com/database/vulnerability/breadcrumb-simple/wordpress-breadcrumb-simple-plugin-1-3-cross-site-scripting-xss?_s_id=cve | 2023-06-13T15:10:42.889Z | 2023-08-30T15:19:56.920Z | 2023-08-30T15:19:56.920Z | {'Vendor': 'Abhay Yadav', 'Product': 'Breadcrumb simple', 'Versions': 'n/a'} |
CVE-2023-35991 | Hidden functionality vulnerability in LOGITEC wireless LAN routers allows an unauthenticated attacker to log in to the product's certain management console and execute arbitrary OS commands. Affected products and versions are as follows: LAN-W300N/DR all versions, LAN-WH300N/DR all versions, LAN-W300N/P all versions, LAN-WH450N/GP all versions, LAN-WH300AN/DGP all versions, LAN-WH300N/DGP all versions, and LAN-WH300ANDGPE all versions. | https://www.elecom.co.jp/news/security/20230810-01/ | 2023-08-09T11:54:58.462Z | 2023-08-18T09:37:37.744Z | 2023-08-18T09:37:37.744Z | {'Vendor': 'LOGITEC CORPORATION', 'Product': 'LAN-W300N/DR', 'Versions': 'all versions'} |
CVE-2023-35303 | USB Audio Class System Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35303 | 2023-06-14T23:09:47.612Z | 2023-07-11T17:03:23.268Z | 2023-12-14T19:53:19.302Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35180 | The SolarWinds Access Rights Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows authenticated users to abuse SolarWinds ARM API. | https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35180 | 2023-06-14T20:03:23.107Z | 2023-10-19T14:23:48.383Z | 2023-10-19T14:23:48.383Z | {'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'} |
CVE-2023-35883 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Magazine3 Core Web Vitals & PageSpeed Booster.This issue affects Core Web Vitals & PageSpeed Booster: from n/a through 1.0.12.
| https://patchstack.com/database/vulnerability/core-web-vitals-pagespeed-booster/wordpress-core-web-vitals-pagespeed-booster-plugin-1-0-12-open-redirection-vulnerability?_s_id=cve | 2023-06-19T13:54:57.634Z | 2023-12-19T20:11:11.659Z | 2023-12-19T20:11:11.659Z | {'Vendor': 'Magazine3', 'Product': 'Core Web Vitals & PageSpeed Booster', 'Versions': 'n/a'} |
CVE-2023-35929 | Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix. | https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268 | 2023-06-20T14:02:45.593Z | 2023-07-25T17:30:22.017Z | 2023-07-25T17:30:22.017Z | {'Vendor': 'Enalean', 'Product': 'tuleap', 'Versions': 'Tuleap Community Edition < 14.10.99.4, Tuleap Enterprise Edition < 14.9-5, Tuleap Enterprise Edition >= 14.10, < 14.10-2'} |
CVE-2023-35315 | Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35315 | 2023-06-14T23:09:47.614Z | 2023-07-11T17:02:35.868Z | 2023-12-14T19:52:36.429Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35895 | IBM Informix JDBC Driver 4.10 and 4.50 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 259116. | https://www.ibm.com/support/pages/node/7099762 | 2023-06-20T02:24:14.840Z | 2023-12-20T14:18:56.529Z | 2023-12-20T14:18:56.529Z | {'Vendor': 'IBM', 'Product': 'Informix JDBC', 'Versions': '4.10, 4.50'} |
CVE-2023-35179 |
A vulnerability has been identified within Serv-U 15.4 that, if exploited, allows an actor to bypass multi-factor/two-factor authentication. The actor must have administrator-level access to Serv-U to perform this action.
| https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35179 | 2023-06-14T20:03:23.106Z | 2023-08-10T23:14:48.081Z | 2023-09-14T19:05:04.546Z | {'Vendor': 'SolarWinds ', 'Product': 'Serv-U ', 'Versions': '15.4 '} |
CVE-2023-35342 | Windows Image Acquisition Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35342 | 2023-06-14T23:09:47.623Z | 2023-07-11T17:02:50.242Z | 2023-12-14T19:52:48.434Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35968 | Two heap-based buffer overflow vulnerabilities exist in the gwcfg_cgi_set_manage_post_data functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the realloc function. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1788 | 2023-06-20T18:37:39.611Z | 2023-10-11T15:14:27.992Z | 2023-10-11T17:00:06.292Z | {'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'} |
CVE-2023-35987 |
PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01 | 2023-06-27T16:55:52.738Z | 2023-07-06T22:58:06.843Z | 2023-07-07T16:30:12.852Z | {'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'} |
CVE-2023-35084 | Unsafe Deserialization of User Input could lead to Execution of Unauthorized Operations in Ivanti Endpoint Manager 2022 su3 and all previous versions, which could allow an attacker to execute commands remotely. | https://forums.ivanti.com/s/article/SA-2023-08-08-CVE-2023-35084?language=en_US | 2023-06-13T01:00:11.784Z | 2023-10-18T03:52:06.581Z | 2023-10-18T03:52:06.581Z | {'Vendor': 'Ivanti', 'Product': 'Endpoint Manager', 'Versions': '2022 su3'} |
CVE-2023-35969 | Multiple heap-based buffer overflow vulnerabilities exist in the fstReaderIterBlocks2 chain_table parsing functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the chain_table of `FST_BL_VCDATA` and `FST_BL_VCDATA_DYN_ALIAS` section types. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789 | 2023-06-20T18:38:18.618Z | 2024-01-08T14:47:57.931Z | 2024-01-08T18:00:10.173Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35986 |
Sante DICOM Viewer Pro lacks proper validation of user-supplied data when parsing DICOM files. This could lead to a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
| https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-285-01 | 2023-09-12T20:04:59.924Z | 2023-10-19T17:35:00.379Z | 2023-10-19T17:35:00.379Z | {'Vendor': 'Santesoft', 'Product': 'Sante DICOM Viewer Pro', 'Versions': '0'} |
CVE-2023-35085 | An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.50 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update the UniFi Switches to Version 6.5.59 or later. | https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | 2023-06-13T01:00:11.784Z | 2023-08-10T18:58:17.222Z | 2023-08-10T18:58:17.222Z | {'Vendor': 'Ubiquiti Inc', 'Product': 'UniFi Access Points', 'Versions': '6.5.50'} |
CVE-2023-35656 | In multiple functions of protocolembmsadapter.cpp, there is a possible out
of bounds read due to a missing bounds check. This could lead to remote
information disclosure with no additional execution privileges needed. User
interaction is not needed for exploitation. | https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:10.271Z | 2023-10-18T19:10:32.026Z | 2023-10-18T19:10:32.026Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35343 | Windows Geolocation Service Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35343 | 2023-06-14T23:09:47.623Z | 2023-07-11T17:02:50.827Z | 2023-12-14T19:52:48.936Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35178 | Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow when performing a GET request to scan jobs. | https://support.hp.com/us-en/document/ish_8651729-8651769-16/hpsbpi03854 | 2023-06-14T15:14:52.289Z | 2023-06-30T15:54:06.696Z | 2023-06-30T15:54:06.696Z | {'Vendor': 'HP Inc.', 'Product': 'HP LaserJet Pro', 'Versions': 'See HP Security Bulletin reference for affected versions.'} |
CVE-2023-35314 | Remote Procedure Call Runtime Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35314 | 2023-06-14T23:09:47.614Z | 2023-07-11T17:02:35.354Z | 2023-12-14T19:52:35.929Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35181 | The SolarWinds Access Rights Manager was susceptible to Privilege Escalation Vulnerability. This vulnerability allows users to abuse incorrect folder permission resulting in Privilege Escalation. | https://www.solarwinds.com/trust-center/security-advisories/CVE-2023-35181 | 2023-06-14T20:03:23.107Z | 2023-10-19T14:24:54.662Z | 2023-10-19T14:24:54.662Z | {'Vendor': 'SolarWinds', 'Product': 'Access Rights Manager', 'Versions': 'previous versions'} |
CVE-2023-35882 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Team Heateor Super Socializer plugin <= 7.13.52 versions. | https://patchstack.com/database/vulnerability/super-socializer/wordpress-super-socializer-plugin-7-13-52-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-19T13:54:57.634Z | 2023-06-20T07:53:58.274Z | 2023-06-20T07:53:58.274Z | {'Vendor': 'Team Heateor', 'Product': 'Super Socializer', 'Versions': 'n/a'} |
CVE-2023-35928 | Nextcloud Server is a space for data storage on Nextcloud, a self-hosted productivity playform. In NextCloud Server versions 25.0.0 until 25.0.7 and 26.0.0 until 26.0.2 and Nextcloud Enterprise Server versions 19.0.0 until 19.0.13.9, 20.0.0 until 20.0.14.14, 21.0.0 until 21.0.9.12, 22.0.0 until 22.2.10.12, 23.0.0 until 23.0.12.7, 24.0.0 until 24.0.12.2, 25.0.0 until 25.0.7, and 26.0.0 until 26.0.2, a user could use this functionality to get access to the login credentials of another user and take over their account. This issue has been patched in Nextcloud Server versions 25.0.7 and 26.0.2 and NextCloud Enterprise Server versions 19.0.13.9, 20.0.14.14, 21.0.9.12, 22.2.10.12, 23.0.12.7, 24.0.12.2, 25.0.7, and 26.0.2.
Three workarounds are available. Disable app files_external. Change config setting "Allow users to mount external storage" to disabled in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages`. Change config setting to disallow users to create external storages in "Administration" > "External storage" settings `…/index.php/settings/admin/externalstorages` with the types FTP, Nextcloud, SFTP, and/or WebDAV. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-637g-xp2c-qh5h | 2023-06-20T14:02:45.593Z | 2023-06-23T20:58:33.225Z | 2023-06-23T20:58:33.225Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': 'Nextcloud Enterprise Server >= 19.0.0, < 19.0.13.9, Nextcloud Enterprise Server >= 20.0.0.0, < 20.0.14.14, Nextcloud Enterprise Server >= 21.0.0.0, < 21.0.9.12, Nextcloud Enterprise Server >= 22.0.0.0, < 22.2.10.12, Nextcloud Enterprise Server >= 23.0.0.0, < 23.0.12.7, Nextcloud Enterprise Server >= 24.0.0.0, < 24.0.12.2, Nextcloud Enterprise Server >= 25.0.0, < 25.0.7 , Nextcloud Enterprise Server >= 26.0.0, < 26.0.2, Nextcloud Server >= 25.0.0, < 25.0.7, Nextcloud Server >= 26.0.0, < 26.0.2'} |
CVE-2023-35302 | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35302 | 2023-06-14T23:09:47.612Z | 2023-07-11T17:03:22.689Z | 2023-12-14T19:53:18.801Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35139 | A cross-site scripting (XSS) vulnerability in the CGI program of the Zyxel ATP series firmware versions 5.10 through 5.37, USG FLEX series firmware versions 5.00 through 5.37, USG FLEX 50(W) series firmware versions 5.10 through 5.37, USG20(W)-VPN series firmware versions 5.10 through 5.37, and VPN series firmware versions 5.00 through 5.37, could allow an unauthenticated LAN-based attacker to store malicious scripts in a vulnerable device. A successful XSS attack could then result in the stored malicious scripts being executed to steal cookies when the user visits the specific CGI used for dumping ZTP logs. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps | 2023-06-14T06:26:48.564Z | 2023-11-28T01:22:07.985Z | 2023-11-28T01:22:07.985Z | {'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': 'versions 5.10 through 5.37'} |
CVE-2023-35093 | Broken Access Control vulnerability in StylemixThemes MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin <= 3.0.8 versions allows any logged-in users, such as subscribers to view the "Orders" of the plugin and get the data related to the order like email, username, and more. | https://patchstack.com/database/vulnerability/masterstudy-lms-learning-management-system/wordpress-masterstudy-lms-plugin-3-0-7-broken-access-control-vulnerability?_s_id=cve | 2023-06-13T15:10:42.889Z | 2023-06-22T11:07:21.020Z | 2023-06-22T11:07:21.020Z | {'Vendor': 'StylemixThemes', 'Product': 'MasterStudy LMS WordPress Plugin – for Online Courses and Education', 'Versions': 'n/a'} |
CVE-2023-35990 | The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17, watchOS 10, iOS 16.7 and iPadOS 16.7, macOS Sonoma 14. An app may be able to identify what other apps a user has installed. | https://support.apple.com/en-us/HT213938 | 2023-07-20T15:03:50.160Z | 2023-09-26T20:14:46.575Z | 2023-09-26T20:14:46.575Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-35355 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35355 | 2023-06-14T23:09:47.627Z | 2023-09-12T16:58:16.704Z | 2023-12-14T20:11:32.976Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35142 | Jenkins Checkmarx Plugin 2022.4.3 and earlier disables SSL/TLS validation for connections to the Checkmarx server by default. | https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2870 | 2023-06-14T08:58:33.244Z | 2023-06-14T12:53:05.967Z | 2023-10-24T12:50:35.200Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Checkmarx Plugin', 'Versions': '0'} |
CVE-2023-35791 | Vound Intella Connect 2.6.0.3 has an Open Redirect vulnerability. | https://excellium-services.com/cert-xlm-advisory/CVE-2023-35791 | 2023-06-16T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35379 | Reliability Analysis Metrics Calculation Engine (RACEng) Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35379 | 2023-06-14T23:09:47.637Z | 2023-08-08T17:08:33.613Z | 2023-12-14T20:03:07.219Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2008 R2 Service Pack 1', 'Versions': '6.1.0'} |
CVE-2023-35683 | In bindSelection of DatabaseUtils.java, there is a possible way to access files from other applications due to SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/providers/MediaProvider/+/23d156ed1bed6d2c2b325f0be540d0afca510c49 | 2023-06-15T02:50:31.873Z | 2023-09-11T20:09:55.077Z | 2023-09-11T20:16:45.309Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35800 | Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators. | https://advisories.stormshield.eu | 2023-06-17T00:00:00 | 2023-06-27T00:00:00 | 2023-06-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35945 | Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11. | https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r | 2023-06-20T14:02:45.597Z | 2023-07-13T20:41:15.690Z | 2023-07-13T20:41:15.690Z | {'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.3, >= 1.25.0, < 1.25.8, >= 1.24.0, < 1.24.9, >= 1.23.0, < 1.23.11'} |
CVE-2023-35695 | A remote attacker could leverage a vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 to download a particular log file which may contain sensitive information regarding the product. | https://success.trendmicro.com/dcx/s/solution/000293106?language=en_US | 2023-06-15T05:43:32.973Z | 2023-06-26T21:58:45.861Z | 2023-06-26T21:58:45.861Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Moibile Security for Enterprise', 'Versions': '9.8 SP5'} |
CVE-2023-35380 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35380 | 2023-06-14T23:09:47.637Z | 2023-08-08T17:08:34.191Z | 2023-12-14T20:03:07.706Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35857 | In Siren Investigate before 13.2.2, session keys remain active even after logging out. | https://community.siren.io/c/announcements | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35154 | Knowage is an open source analytics and business intelligence suite. Starting in version 6.0.0 and prior to version 8.1.8, an attacker can register and activate their account without having to click on the link included in the email, allowing them access to the application as a normal user. This issue has been patched in version 8.1.8. | https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-48hp-jvv8-cf62 | 2023-06-14T14:17:52.177Z | 2023-06-23T20:20:49.978Z | 2023-06-23T20:20:49.978Z | {'Vendor': 'KnowageLabs', 'Product': 'Knowage-Server', 'Versions': '< 8.1.8'} |
CVE-2023-35011 | IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 257705. | https://www.ibm.com/support/pages/node/7026692 | 2023-06-11T20:38:02.325Z | 2023-08-16T22:46:33.755Z | 2023-08-16T22:48:38.229Z | {'Vendor': 'IBM', 'Product': 'Cognos Analytics', 'Versions': '11.1.7, 11.2.0, 11.2.1'} |
CVE-2023-35912 | Cross-Site Request Forgery (CSRF) vulnerability in WP Zone Potent Donations for WooCommerce plugin <= 1.1.9 versions. | https://patchstack.com/database/vulnerability/donations-for-woocommerce/wordpress-potent-donations-for-woocommerce-plugin-1-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-20T09:05:43.962Z | 2023-07-10T15:47:34.388Z | 2023-07-10T15:47:34.388Z | {'Vendor': 'WP Zone', 'Product': 'Potent Donations for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-35338 | Windows Peer Name Resolution Protocol Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35338 | 2023-06-14T23:09:47.621Z | 2023-07-11T17:02:47.917Z | 2023-12-14T19:52:46.373Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35965 | Two heap-based buffer overflow vulnerabilities exist in the httpd manage_post functionality of Yifan YF325 v1.0_20221108. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger these vulnerabilities.This integer overflow result is used as argument for the malloc function. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1787 | 2023-06-20T18:36:46.429Z | 2023-10-11T15:14:28.499Z | 2023-10-11T17:00:07.572Z | {'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'} |
CVE-2023-35066 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Infodrom Software E-Invoice Approval System allows SQL Injection.This issue affects E-Invoice Approval System: before v.20230701.
| https://www.usom.gov.tr/bildirim/tr-23-0419 | 2023-06-12T19:32:44.799Z | 2023-07-25T06:08:45.438Z | 2023-07-25T06:08:45.438Z | {'Vendor': 'Infodrom Software', 'Product': 'E-Invoice Approval System', 'Versions': '0'} |
CVE-2023-35089 | Cross-Site Request Forgery (CSRF) vulnerability in Really Simple Plugins Recipe Maker For Your Food Blog from Zip Recipes plugin <= 8.0.7 versions. | https://patchstack.com/database/vulnerability/zip-recipes/wordpress-recipe-maker-for-your-food-blog-from-zip-recipes-plugin-8-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-13T15:10:42.888Z | 2023-07-17T13:31:13.212Z | 2023-07-17T13:31:13.212Z | {'Vendor': 'Really Simple Plugins', 'Product': 'Recipe Maker For Your Food Blog from Zip Recipes', 'Versions': 'n/a'} |
CVE-2023-35318 | Remote Procedure Call Runtime Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35318 | 2023-06-14T23:09:47.615Z | 2023-07-11T17:02:37.564Z | 2023-12-14T19:52:37.921Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35031 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, and Manager V10 R0 allow command injection by authenticated users, aka OSFOURK-24036. | https://networks.unify.com/security/advisories/OBSO-2305-01.pdf | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35898 | IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information due to an insecure security configuration in InfoSphere Data Flow Designer. IBM X-Force ID: 259352. | https://www.ibm.com/support/pages/node/7009205 | 2023-06-20T02:24:31.593Z | 2023-07-19T00:46:41.821Z | 2023-07-19T00:46:41.821Z | {'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'} |
CVE-2023-35932 | jcvi is a Python library to facilitate genome assembly, annotation, and comparative genomics. A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. The impact of a configuration injection may vary. Under some conditions, it may lead to command injection if there is for instance shell code execution from the configuration file values. This vulnerability does not currently have a fix.
| https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q | 2023-06-20T14:02:45.593Z | 2023-06-23T21:05:32.790Z | 2023-06-23T21:05:32.790Z | {'Vendor': 'tanghaibao', 'Product': 'jcvi', 'Versions': '<= 1.3.5'} |
CVE-2023-35877 | Cross-Site Request Forgery (CSRF) vulnerability in Vadym K. Extra User Details allows Stored XSS.This issue affects Extra User Details: from n/a through 0.5.
| https://patchstack.com/database/vulnerability/extra-user-details/wordpress-extra-user-details-plugin-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-19T13:54:57.634Z | 2023-11-13T17:06:24.296Z | 2023-11-13T17:06:24.296Z | {'Vendor': 'Vadym K.', 'Product': 'Extra User Details', 'Versions': 'n/a'} |
CVE-2023-35174 | Livebook is a web application for writing interactive and collaborative code notebooks. On Windows, it is possible to open a `livebook://` link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine. Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser. This vulnerability has been fixed in version 0.8.2 and 0.9.3.
| https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9 | 2023-06-14T14:17:52.180Z | 2023-06-22T13:34:38.492Z | 2023-06-22T13:34:38.492Z | {'Vendor': 'livebook-dev', 'Product': 'livebook', 'Versions': '>= 0.8.0, < 0.8.2, >= 0.9.0, < 0.9.3'} |
CVE-2023-35924 | GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.8, GLPI inventory endpoint can be used to drive a SQL injection attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory. | https://github.com/glpi-project/glpi/security/advisories/GHSA-gxh4-j63w-8jmm | 2023-06-20T14:02:45.592Z | 2023-07-05T19:35:33.232Z | 2023-07-05T19:35:33.232Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 10.0.0, < 10.0.8'} |
CVE-2023-35162 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the previewactions template to perform a XSS, e.g. by using URL such as: > <hostname>/xwiki/bin/get/FlamingoThemes/Cerulean xpage=xpart&vm=previewactions.vm&xcontinue=javascript:alert(document.domain). This vulnerability exists since XWiki 6.1-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q9hg-9qj2-mxf9 | 2023-06-14T14:17:52.178Z | 2023-06-23T18:52:19.725Z | 2023-06-23T18:52:19.725Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 6.1-rc-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'} |
CVE-2023-35861 | A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC. | https://www.supermicro.com/en/products/motherboards | 2023-06-19T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35359 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359 | 2023-06-14T23:09:47.628Z | 2023-08-08T17:08:17.717Z | 2023-12-14T20:02:52.445Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35070 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VegaGroup Web Collection allows SQL Injection.This issue affects Web Collection: before 31197.
| https://www.usom.gov.tr/bildirim/tr-23-0406 | 2023-06-12T19:32:44.800Z | 2023-07-13T13:23:26.561Z | 2023-07-13T13:23:26.561Z | {'Vendor': 'VegaGroup ', 'Product': 'Web Collection', 'Versions': '0'} |
CVE-2023-35973 | Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt | 2023-06-20T18:41:22.736Z | 2023-07-05T14:45:39.756Z | 2023-07-05T14:45:39.756Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central', 'Versions': '- ArubaOS 10.4.x.x: 10.4.0.1 and below, - ArubaOS 8.11.x.x: 8.11.1.0 and below, - ArubaOS 8.10.x.x: 8.10.0.6 and below, - ArubaOS 8.6.x.x: 8.6.0.20 and below'} |
CVE-2023-35836 | An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. An attacker within RF range can obtain a cleartext copy of the network configuration of the device, including the Wi-Fi PSK, during device setup and reconfiguration. Upon success, the attacker is able to further infiltrate the target's Wi-Fi networks. | https://yougottahackthat.com/blog/ | 2023-06-18T00:00:00 | 2024-01-23T00:00:00 | 2024-01-23T22:39:13.908409 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35322 | Windows Deployment Services Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35322 | 2023-06-14T23:09:47.616Z | 2023-07-11T17:02:39.901Z | 2023-12-14T19:52:39.911Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-35772 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alain Gonzalez Google Map Shortcode plugin <= 3.1.2 versions. | https://patchstack.com/database/vulnerability/google-map-shortcode/wordpress-google-map-shortcode-plugin-3-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-16T08:57:49.306Z | 2023-06-19T13:54:25.261Z | 2023-06-19T13:54:25.261Z | {'Vendor': 'Alain Gonzalez', 'Product': 'Google Map Shortcode', 'Versions': 'n/a'} |
CVE-2023-35908 | Apache Airflow, versions before 2.6.3, is affected by a vulnerability that allows unauthorized read access to a DAG through the URL. It is recommended to upgrade to a version that is not affected | https://github.com/apache/airflow/pull/32014 | 2023-06-20T03:18:55.291Z | 2023-07-12T09:14:10.491Z | 2023-07-12T09:14:10.491Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'} |
CVE-2023-35660 | In lwis_transaction_client_cleanup of lwis_transaction.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-06-15T02:50:10.272Z | 2023-10-11T19:24:44.146Z | 2023-10-11T19:24:44.146Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35363 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35363 | 2023-06-14T23:09:47.634Z | 2023-07-11T17:02:59.935Z | 2023-12-14T19:52:56.948Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35699 |
Cleartext Storage on Disk in the SICK ICR890-4 could allow an unauthenticated attacker with local access to the device to disclose sensitive information by accessing a SD card.
| https://sick.com/psirt | 2023-06-15T11:32:19.767Z | 2023-07-10T09:39:45.804Z | 2023-07-10T09:40:55.151Z | {'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'} |
CVE-2023-35676 | In createQuickShareAction of SaveImageInBackgroundTask.java, there is a possible way to trigger a background activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/109e58b62dc9fedcee93983678ef9d4931e72afa | 2023-06-15T02:50:31.872Z | 2023-09-11T20:09:53.971Z | 2023-09-11T20:16:43.088Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12'} |
CVE-2023-35621 | Microsoft Dynamics 365 Finance and Operations Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35621 | 2023-06-15T01:03:28.506Z | 2023-12-12T18:10:56.691Z | 2023-12-15T21:02:59.354Z | {'Vendor': 'Microsoft', 'Product': 'Dynamics 365 for Finance and Operations', 'Versions': '10.0.38'} |
CVE-2023-35158 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 9.4-rc-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mwxj-g7fw-7hc8 | 2023-06-14T14:17:52.178Z | 2023-06-23T18:26:37.121Z | 2023-06-23T18:26:37.121Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 9.4-rc-1, < 14.10.5, >= 15.0-rc-1, < 15.1-rc-1'} |
CVE-2023-35780 | Cross-Site Request Forgery (CSRF) vulnerability in Andy Whalen Galleria plugin <= 1.0.3 versions. | https://patchstack.com/database/vulnerability/galleria/wordpress-galleria-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-16T08:57:49.308Z | 2023-07-11T11:04:24.781Z | 2023-07-11T11:04:24.781Z | {'Vendor': 'Andy Whalen', 'Product': 'Galleria', 'Versions': 'n/a'} |
CVE-2023-35153 | XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update `AppWithinMinutes.ClassEditSheet` with a patch. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97 | 2023-06-14T14:17:52.177Z | 2023-06-23T17:19:59.290Z | 2023-06-23T17:19:59.290Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 5.4.4, < 14.4.8, >= 14.5, < 14.10.4, >= 15.0-rc-1, < 15.0'} |
CVE-2023-35850 |
SUNNET WMPro portal's file management function has a vulnerability of insufficient filtering for user input. A remote attacker with administrator privilege or a privileged account can exploit this vulnerability to inject and execute arbitrary system commands to perform arbitrary system operations or disrupt service.
| https://www.twcert.org.tw/tw/cp-132-7373-4ef46-1.html | 2023-06-19T02:28:47.605Z | 2023-09-18T02:30:35.609Z | 2023-09-18T02:36:51.501Z | {'Vendor': 'SUNNET', 'Product': 'WMPro', 'Versions': 'V5'} |
CVE-2023-35915 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Automattic WooPayments – Fully Integrated Solution Built and Supported by Woo.This issue affects WooPayments – Fully Integrated Solution Built and Supported by Woo: from n/a through 5.9.0.
| https://patchstack.com/database/vulnerability/woocommerce-payments/wordpress-woocommerce-payments-plugin-5-9-0-sql-injection-vulnerability?_s_id=cve | 2023-06-20T09:05:43.963Z | 2023-12-20T15:15:38.226Z | 2023-12-20T15:15:38.226Z | {'Vendor': 'Automattic', 'Product': 'WooPayments – Fully Integrated Solution Built and Supported by Woo', 'Versions': 'n/a'} |
CVE-2023-35016 | IBM Security Verify Governance, Identity Manager 10.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 257772. | https://www.ibm.com/support/pages/node/7014397 | 2023-06-11T20:38:21.241Z | 2023-07-31T00:29:37.729Z | 2023-07-31T00:29:37.729Z | {'Vendor': 'IBM', 'Product': 'Security Verify Governance, Identity Manager', 'Versions': '10.0'} |
CVE-2023-35368 | Microsoft Exchange Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35368 | 2023-06-14T23:09:47.636Z | 2023-08-08T17:08:18.275Z | 2023-12-14T20:02:53.074Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 13', 'Versions': '15.02.0'} |
CVE-2023-35692 | In getLocationCache of GeoLocation.java, there is a possible way to send a mock location during an emergency call due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-07-01 | 2023-06-15T02:50:33.964Z | 2023-07-14T15:57:35.248Z | 2023-07-14T15:57:35.248Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35387 | Windows Bluetooth A2DP driver Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35387 | 2023-06-14T23:09:47.638Z | 2023-08-08T17:08:38.255Z | 2023-12-14T20:03:11.219Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35041 | Cross-Site Request Forgery (CSRF) vulnerability leading to Local File Inclusion (LF) in Webpushr Web Push Notifications Web Push Notifications – Webpushr plugin <= 4.34.0 versions. | https://patchstack.com/database/vulnerability/webpushr-web-push-notifications/wordpress-web-push-notifications-webpushr-plugin-4-34-0-csrf-leading-to-lfi-vulnerability?_s_id=cve | 2023-06-12T09:05:49.596Z | 2023-11-13T02:12:18.580Z | 2023-11-13T02:12:18.580Z | {'Vendor': 'Webpushr Web Push Notifications', 'Product': 'Web Push Notifications – Webpushr', 'Versions': 'n/a'} |
CVE-2023-35942 | Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, gRPC access loggers using listener's global scope can cause a `use-after-free` crash when the listener is drained. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, disable gRPC access log or stop listener update. | https://github.com/envoyproxy/envoy/security/advisories/GHSA-69vr-g55c-v2v4 | 2023-06-20T14:02:45.596Z | 2023-07-25T18:24:11.613Z | 2023-07-25T18:24:11.613Z | {'Vendor': 'envoyproxy', 'Product': 'envoy', 'Versions': '>= 1.26.0, < 1.26.4, >= 1.25.0, < 1.25.9, >= 1.24.0, < 1.24.10, < 1.23.12'} |
CVE-2023-35684 | In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to an integer overflow. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/668bbca29797728004d88db4c9b69102f3939008 | 2023-06-15T02:50:31.873Z | 2023-09-11T20:09:55.266Z | 2023-09-11T20:16:45.658Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-35391 | ASP.NET Core SignalR and Visual Studio Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35391 | 2023-06-14T23:09:47.640Z | 2023-08-08T18:52:30.105Z | 2023-12-14T20:03:26.704Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2022 version 17.2', 'Versions': '17.2.0'} |
CVE-2023-35811 | An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected. | https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/ | 2023-06-17T00:00:00 | 2023-06-17T00:00:00 | 2023-08-23T15:06:20.287101 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35057 | An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace value elements allocation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821 | 2023-07-28T14:17:15.195Z | 2024-01-08T14:47:42.619Z | 2024-01-08T18:00:24.317Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-35779 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Seed Webs Seed Fonts plugin <= 2.3.1 versions. | https://patchstack.com/database/vulnerability/seed-fonts/wordpress-seed-fonts-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-16T08:57:49.308Z | 2023-06-19T13:21:16.714Z | 2023-06-19T13:21:16.714Z | {'Vendor': 'Seed Webs', 'Product': 'Seed Fonts', 'Versions': '2.3.1'} |
CVE-2023-35329 | Windows Authentication Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35329 | 2023-06-14T23:09:47.618Z | 2023-07-11T17:02:43.437Z | 2023-12-14T19:52:42.908Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35796 | A vulnerability has been identified in SINEMA Server V14 (All versions). The affected application improperly sanitizes certain SNMP configuration data retrieved from monitored devices. An attacker with access to a monitored device could perform a stored cross-site scripting (XSS) attack that may lead to arbitrary code execution with `SYSTEM` privileges on the application server. (ZDI-CAN-19823) | https://cert-portal.siemens.com/productcert/pdf/ssa-594373.pdf | 2023-06-17T10:50:05.752Z | 2023-10-10T10:21:20.721Z | 2023-10-10T10:21:20.721Z | {'Vendor': 'Siemens', 'Product': 'SINEMA Server V14', 'Versions': 'All versions'} |
CVE-2023-35846 | VirtualSquare picoTCP (aka PicoTCP-NG) through 2.1 does not check the transport layer length in a frame before performing port filtering. | https://github.com/virtualsquare/picotcp/commit/d561990a358899178115e156871cc054a1c55ffe | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-35145 | Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission. | https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3155 | 2023-06-14T08:58:33.245Z | 2023-06-14T12:53:08.081Z | 2023-10-24T12:50:38.587Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Sonargraph Integration Plugin', 'Versions': '0'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.