CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-35693 | In incfs_kill_sb of fs/incfs/vfs.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
| https://android.googlesource.com/kernel/common/+/8ff940b3513cb | 2023-06-15T02:50:33.964Z | 2023-07-12T23:56:14.984Z | 2023-07-12T23:56:16.874Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-35386 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35386 | 2023-06-14T23:09:47.638Z | 2023-08-08T17:08:37.737Z | 2023-12-14T20:03:10.721Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-35152 | XWiki Platform is a generic wiki platform. Starting in version 12.9-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.1, any logged in user can add dangerous content in their first name field and see it executed with programming rights. Leading to rights escalation. The vulnerability has been fixed on XWiki 14.4.8, 14.10.6, and 15.1. As a workaround, one may apply the patch manually. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rf8j-q39g-7xfm | 2023-06-14T14:17:52.177Z | 2023-06-23T16:41:51.268Z | 2023-06-23T16:41:51.268Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 12.9-rc-1, < 14.4.8, >= 14.5, < 14.10.6, >= 15.0-rc-1, < 15.1'} |
CVE-2023-35851 |
SUNNET WMPro portal's FAQ function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL commands to obtain sensitive information via a database.
| https://www.twcert.org.tw/tw/cp-132-7372-3994a-1.html | 2023-06-19T02:28:47.605Z | 2023-09-18T02:33:59.550Z | 2023-09-18T02:33:59.550Z | {'Vendor': 'SUNNET', 'Product': 'WMPro', 'Versions': 'V5'} |
CVE-2023-35914 | Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce Woo Subscriptions.This issue affects Woo Subscriptions: from n/a through 5.1.2.
| https://patchstack.com/database/vulnerability/woocommerce-subscriptions/wordpress-woocommerce-subscriptions-plugin-5-1-2-insecure-direct-object-references-idor-vulnerability?_s_id=cve | 2023-06-20T09:05:43.962Z | 2023-12-20T15:18:16.247Z | 2023-12-20T15:18:16.247Z | {'Vendor': 'WooCommerce', 'Product': 'Woo Subscriptions', 'Versions': 'n/a'} |
CVE-2023-35781 | Cross-Site Request Forgery (CSRF) vulnerability in LWS Cleaner plugin <= 2.3.0 versions. | https://patchstack.com/database/vulnerability/lws-cleaner/wordpress-lws-cleaner-plugin-2-3-0-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-06-16T08:57:49.308Z | 2023-07-11T07:58:24.909Z | 2023-07-11T07:58:24.909Z | {'Vendor': 'LWS', 'Product': 'LWS Cleaner', 'Versions': 'n/a'} |
CVE-2023-25080 | Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00901.html | 2023-03-01T18:23:25.217Z | 2023-11-14T19:04:59.211Z | 2023-11-14T19:04:59.211Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Distribution of OpenVINO toolkit software', 'Versions': 'before version 2023.0.0'} |
CVE-2023-25983 | Improper Neutralization of Formula Elements in a CSV File vulnerability in WPOmnia KB Support.This issue affects KB Support: from n/a through 1.5.84.
| https://patchstack.com/database/vulnerability/kb-support/wordpress-kb-support-wordpress-help-desk-plugin-1-5-84-csv-injection-vulnerability?_s_id=cve | 2023-02-17T13:47:13.226Z | 2023-11-07T15:13:15.808Z | 2023-11-07T15:13:15.808Z | {'Vendor': 'WPOmnia', 'Product': 'KB Support', 'Versions': 'n/a'} |
CVE-2023-25829 | There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and 10.9.1 that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks. | https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/ | 2023-02-15T17:59:31.095Z | 2023-05-09T16:00:29.494Z | 2023-05-09T16:40:50.118Z | {'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '11.0, 10.9.1'} |
CVE-2023-25595 | A vulnerability exists in the ClearPass OnGuard Ubuntu agent that allows for an attacker with local Ubuntu instance access to potentially obtain sensitive information. Successful Exploitation of this vulnerability allows an attacker to retrieve information that is of a sensitive nature to the ClearPass/OnGuard environment. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt | 2023-02-07T20:24:22.480Z | 2023-03-14T14:55:37.876Z | 2023-03-22T04:39:15.803375Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'} |
CVE-2023-25346 | A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the id parameter of /churchcrm/v2/family/not-found. | https://github.com/ChurchCRM/CRM | 2023-02-06T00:00:00 | 2023-04-25T00:00:00 | 2023-04-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25716 | Auth (admin+) Stored Cross-Site Scripting (XSS) vulnerability in gqevu6bsiz Announce from the Dashboard plugin <= 1.5.1 versions. | https://patchstack.com/database/vulnerability/announce-from-the-dashboard/wordpress-announce-from-the-dashboard-plugin-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-13T04:14:01.866Z | 2023-04-07T11:58:50.645Z | 2023-04-07T11:58:50.645Z | {'Vendor': 'gqevu6bsiz', 'Product': 'Announce from the Dashboard', 'Versions': 'n/a'} |
CVE-2023-25653 | node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0, when using the non-default "fallback" crypto back-end, ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run. | https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw | 2023-02-09T20:58:21.856Z | 2023-02-16T18:15:27.085Z | 2023-02-16T18:15:27.085Z | {'Vendor': 'cisco', 'Product': 'node-jose', 'Versions': '< 2.2.0'} |
CVE-2023-25487 | Cross-Site Request Forgery (CSRF) vulnerability in Pixelgrade PixTypes plugin <= 1.4.14 versions. | https://patchstack.com/database/vulnerability/pixtypes/wordpress-pixtypes-plugin-1-4-14-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:09.645Z | 2023-07-11T07:25:16.209Z | 2023-07-11T07:25:16.209Z | {'Vendor': 'Pixelgrade', 'Product': 'PixTypes', 'Versions': 'n/a'} |
CVE-2023-25038 | Cross-Site Request Forgery (CSRF) vulnerability in 984.Ru For the visually impaired plugin <= 0.58 versions. | https://patchstack.com/database/vulnerability/for-the-visually-impaired/wordpress-for-the-visually-impaired-plugin-0-58-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-02T09:58:49.594Z | 2023-05-26T12:00:47.881Z | 2023-05-26T12:00:47.881Z | {'Vendor': '984.ru', 'Product': 'For the visually impaired', 'Versions': 'n/a'} |
CVE-2023-25192 | AMI MegaRAC SPX devices allow User Enumeration through Redfish. The fixed versions are SPx12-update-7.00 and SPx13-update-5.00. | https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023002.pdf | 2023-02-04T00:00:00 | 2023-02-15T00:00:00 | 2023-02-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25468 | Cross-Site Request Forgery (CSRF) vulnerability in Reservation.Studio Reservation.Studio widget plugin <= 1.0.11 versions. | https://patchstack.com/database/vulnerability/reservation-studio-widget/wordpress-reservation-studio-widget-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:06.874Z | 2023-07-11T07:42:56.617Z | 2023-07-11T07:42:56.617Z | {'Vendor': 'Reservation.Studio', 'Product': 'Reservation.Studio widget', 'Versions': 'n/a'} |
CVE-2023-25891 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25741 | When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. This vulnerability affects Firefox < 110. | https://www.mozilla.org/security/advisories/mfsa2023-05/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25604 | An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs. | https://fortiguard.com/psirt/FG-IR-23-052 | 2023-02-08T13:42:03.366Z | 2023-10-10T16:49:40.699Z | 2023-10-10T16:49:40.699Z | {'Vendor': 'Fortinet', 'Product': 'FortiGuest', 'Versions': '1.0.0'} |
CVE-2023-25491 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Samuel Marshall JCH Optimize plugin <= 3.2.2 versions. | https://patchstack.com/database/vulnerability/jch-optimize/wordpress-jch-optimize-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:09.645Z | 2023-05-06T22:55:17.758Z | 2023-05-06T22:55:17.758Z | {'Vendor': 'Samuel Marshall', 'Product': 'JCH Optimize', 'Versions': 'n/a'} |
CVE-2023-25868 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25887 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25184 | Use of weak credentials exists in Seiko Solutions SkyBridge and SkySpider series, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier. | https://www.seiko-sol.co.jp/archives/73969/ | 2023-03-15T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A200, SkyBridge BASIC MB-A130, and SkySpider MB-R210', 'Versions': 'SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier'} |
CVE-2023-25307 | nothub mrpack-install <= v0.16.2 is vulnerable to Directory Traversal. | https://github.com/nothub/mrpack-install/security/advisories/GHSA-r887-gfxh-m9rr | 2023-02-06T00:00:00 | 2023-06-26T00:00:00 | 2023-06-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25757 | Improper access control in some Intel(R) Unison(TM) software before version 10.12 may allow a privileged user to potentially enable escalation of privilege via network access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00897.html | 2023-03-04T04:00:03.418Z | 2023-08-11T02:37:21.352Z | 2023-08-11T02:37:21.352Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Unison(TM) software', 'Versions': 'before version 10.12'} |
CVE-2023-25096 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.071Z | 2023-07-06T14:53:24.646Z | 2023-07-17T19:35:20.712Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25583 | Two OS command injection vulnerabilities exist in the zebra vlan_name functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the code branch that manages a new vlan configuration. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723 | 2023-02-07T17:10:42.215Z | 2023-07-06T14:53:22.122Z | 2023-07-06T17:00:17.356Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25700 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.
| https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-1-10-unauthenticated-sql-injection-vulnerability?_s_id=cve | 2023-02-13T04:13:47.557Z | 2023-11-03T16:44:47.440Z | 2023-11-03T16:44:47.440Z | {'Vendor': 'Themeum', 'Product': 'Tutor LMS', 'Versions': 'n/a'} |
CVE-2023-25350 | Faveo Helpdesk 1.0-1.11.1 is vulnerable to SQL Injection. When the user logs in through the login box, he has no judgment on the validity of the user's input data. The parameters passed from the front end to the back end are controllable, which will lead to SQL injection. | https://github.com/ladybirdweb/faveo-helpdesk/issues/7827 | 2023-02-06T00:00:00 | 2023-03-24T00:00:00 | 2023-03-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25645 | There is a permission and access control vulnerability in some ZTE AndroidTV STBs. Due to improper permission settings, non-privileged application can perform functions that are protected with signature/privilege-level permissions. Exploitation of this vulnerability could clear personal data and applications on the user's device, affecting device operation. | https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1031464 | 2023-02-09T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'UP T2 4K, ZXV10 B866V2-H, ZXV10 B866V2, ZXV10 B860H V5D0, ZXV10 B866V2F', 'Versions': 'V84511302.1427,V84711321.0038,V84711321.0040,V84711321.0045,V84711321.0049,V82811306.3021,V84711309.0016,V84711309.0018,V84711309.0019,V82815416.1027,V82815416.1028,V82815416.1029,V82815416.2012,V83011303.0049,V83011303.0051,V83011303.0053,V83011303.0063,V83011303.0069,V86111338.0026,V86111338.0031,V86111338.0033,V86111338.0035'} |
CVE-2023-25215 | Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the saveParentControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://github.com/DrizzlingSun/Tenda/blob/main/AC5/3/3.md | 2023-02-06T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25002 | A maliciously crafted SKP file in Autodesk products is used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution. | https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0002 | 2023-02-01T00:00:00 | 2023-06-27T00:00:00 | 2023-06-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'Multiple', 'Versions': '2023, 2022, 2021'} |
CVE-2023-25452 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Michael Pretty (prettyboymp) CMS Press plugin <= 0.2.3 versions. | https://patchstack.com/database/vulnerability/cms-press/wordpress-cms-press-plugin-0-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:05.559Z | 2023-05-08T12:18:46.572Z | 2023-05-08T12:18:46.572Z | {'Vendor': 'Michael Pretty (prettyboymp)', 'Product': 'CMS Press', 'Versions': 'n/a'} |
CVE-2023-25901 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25147 | An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process.
Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this. | https://success.trendmicro.com/solution/000292209 | 2023-02-03T15:46:02.643Z | 2023-03-07T22:20:04.864Z | 2023-03-10T20:05:13.704141Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'} |
CVE-2023-25517 |
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a guest OS may be able to control resources for which it is not authorized, which may lead to information disclosure and data tampering.
| https://nvidia.custhelp.com/app/answers/detail/a_id/5468 | 2023-02-07T02:57:17.084Z | 2023-07-03T23:27:05.649Z | 2023-07-03T23:27:05.649Z | {'Vendor': 'NVIDIA', 'Product': 'vGPU software', 'Versions': 'All versions prior to and including 15.2, 13.7, and 11.12, and all versions prior to and including the May 2023 release'} |
CVE-2023-25794 | Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Mighty Digital Nooz plugin <= 1.6.0 versions. | https://patchstack.com/database/vulnerability/nooz/wordpress-nooz-plugin-1-6-0-cross-site-scripting-xss?_s_id=cve | 2023-02-15T12:11:10.695Z | 2023-03-20T10:33:06.780Z | 2023-03-20T10:33:06.780Z | {'Vendor': 'Mighty Digital', 'Product': 'Nooz', 'Versions': 'n/a'} |
CVE-2023-25281 | A stack overflow vulnerability exists in pingV4Msg component in D-Link DIR820LA1_FW105B03, allows attackers to cause a denial of service via the nextPage parameter to ping.ccp. | https://www.dlink.com/en/security-bulletin/ | 2023-02-06T00:00:00 | 2023-03-16T00:00:00 | 2023-03-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25956 | Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider.
This issue affects Apache Airflow AWS Provider versions before 7.2.1.
| https://github.com/apache/airflow/pull/29587 | 2023-02-17T10:12:03.880Z | 2023-02-24T11:48:33.110Z | 2023-03-07T08:23:44.307Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow AWS Provider', 'Versions': '0'} |
CVE-2023-25055 | Cross-Site Request Forgery (CSRF) vulnerability in Amit Agarwal Google XML Sitemap for Videos plugin <= 2.6.1 versions. | https://patchstack.com/database/vulnerability/xml-sitemaps-for-videos/wordpress-google-xml-sitemap-for-videos-plugin-2-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-02T09:58:51.822Z | 2023-06-15T13:24:26.086Z | 2023-06-15T13:24:26.086Z | {'Vendor': 'Amit Agarwal', 'Product': 'Google XML Sitemap for Videos', 'Versions': 'n/a'} |
CVE-2023-25540 |
Dell PowerScale OneFS 9.4.0.x contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability to overwrite arbitrary files causing denial of service.
| https://www.dell.com/support/kbdoc/en-us/000209895/dell-emc-powerscale-onefs-security-updates-for-multiple-security | 2023-02-07T09:35:27.080Z | 2023-02-28T16:30:31.210Z | 2023-02-28T16:30:31.210Z | {'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': '9.4.0.0 through 9.4.0.11'} |
CVE-2023-25110 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the remote_virtual_ip variable. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.073Z | 2023-07-06T14:53:25.909Z | 2023-07-17T19:35:22.544Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25813 | Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query. | https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw | 2023-02-15T16:34:48.773Z | 2023-02-22T18:14:44.579Z | 2023-02-22T18:14:44.579Z | {'Vendor': 'sequelize', 'Product': 'sequelize', 'Versions': '< 6.19.1'} |
CVE-2023-25669 | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give a floating point exception. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rcf8-g8jv-vg6p | 2023-02-09T20:58:21.858Z | 2023-03-24T23:32:57.394Z | 2023-03-24T23:32:57.394Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25686 | IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 247601. | https://www.ibm.com/support/pages/node/6962729 | 2023-02-11T18:09:03.127Z | 2023-03-21T15:55:53.821Z | 2023-03-21T15:55:53.821Z | {'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'} |
CVE-2023-25413 | Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. The device allows unauthenticated access to Telnet and SNMP credentials. | https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit/ | 2023-02-06T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25940 |
Dell PowerScale OneFS version 9.5.0.0 contains improper link resolution before file access vulnerability in isi_gather_info. A high privileged local attacker could potentially exploit this vulnerability, leading to system takeover and it breaks the compliance mode guarantees.
| https://www.dell.com/support/kbdoc/en-us/000211539/dell-emc-powerscale-onefs-security | 2023-02-17T06:15:08.304Z | 2023-04-04T10:14:28.339Z | 2023-06-22T06:11:18.185Z | {'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': '9.5.0.0'} |
CVE-2023-25805 | versionn, software for changing version information across multiple files, has a command injection vulnerability in all versions prior to version 1.1.0. This issue is patched in version 1.1.0. | https://github.com/commenthol/versionn/security/advisories/GHSA-fj78-2vc5-f6cm | 2023-02-15T16:34:48.772Z | 2023-02-20T15:45:43.255Z | 2023-02-20T15:45:43.255Z | {'Vendor': 'commenthol', 'Product': 'versionn', 'Versions': '< 1.1.0'} |
CVE-2023-25106 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the local_virtual_ip and the local_virtual_mask variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.073Z | 2023-07-06T14:53:25.578Z | 2023-07-17T19:35:22.056Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25556 |
A CWE-287: Improper Authentication vulnerability exists that could allow a device to be
compromised when a key of less than seven digits is entered and the attacker has access to the
KNX installation.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-03.pdf | 2023-02-07T17:00:03.780Z | 2023-04-18T17:03:07.661Z | 2023-04-18T17:03:07.661Z | {'Vendor': 'Schneider Electric', 'Product': 'Merten INSTABUS Tastermodul 1fach System M 625199', 'Versions': 'Program Version 1.0'} |
CVE-2023-25690 | Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.
Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
or ProxyPassMatch in which a non-specific pattern matches
some portion of the user-supplied request-target (URL) data and is then
re-inserted into the proxied request-target using variable
substitution. For example, something like:
RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/
Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
| https://httpd.apache.org/security/vulnerabilities_24.html | 2023-02-12T13:28:31.657Z | 2023-03-07T15:09:03.080Z | 2023-03-07T15:09:03.080Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache HTTP Server', 'Versions': '2.4.0'} |
CVE-2023-25014 | An issue was discovered in the femanager extension before 5.5.3, 6.x before 6.3.4, and 7.x before 7.1.0 for TYPO3. Missing access checks in the InvitationController allow an unauthenticated user to delete all frontend users. | https://typo3.org/help/security-advisories | 2023-02-01T00:00:00 | 2023-02-02T00:00:00 | 2023-02-02T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25151 | opentelemetry-go-contrib is a collection of extensions for OpenTelemetry-Go. The v0.38.0 release of `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` uses the `httpconv.ServerRequest` function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments. The `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not "forget" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack. This issue has been addressed in version 0.39.0. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh | 2023-02-03T16:59:18.242Z | 2023-02-08T19:21:37.401Z | null | {'Vendor': 'open-telemetry', 'Product': 'opentelemetry-go-contrib', 'Versions': '>= 0.38.0, < 0.39.0'} |
CVE-2023-25782 | Auth. (admin+) vulnerability in Second2none Service Area Postcode Checker plugin <= 2.0.8 versions. | https://patchstack.com/database/vulnerability/service-area-postcode-checker/wordpress-service-area-postcode-checker-plugin-2-0-8-cross-site-scripting-xss?_s_id=cve | 2023-02-15T12:10:40.366Z | 2023-03-20T09:49:40.615Z | 2023-03-20T09:49:40.615Z | {'Vendor': 'Second2none', 'Product': 'Service Area Postcode Checker', 'Versions': 'n/a'} |
CVE-2023-25825 | ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 are vulnerable to Cross-site Scripting. Log entries can be injected into the database logs, containing a malicious referrer field. This is unescaped when viewing the logs in the web ui. This issue is patched in version 1.36.33. | https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-68vf-g4qm-jr6v | 2023-02-15T16:34:48.774Z | 2023-02-25T00:44:25.132Z | 2023-02-25T00:44:25.132Z | {'Vendor': 'ZoneMinder', 'Product': 'zoneminder', 'Versions': '< 1.36.33'} |
CVE-2023-25126 | null | null | 2023-02-02T00:00:00 | null | 2023-02-03T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-25576 | @fastify/multipart is a Fastify plugin to parse the multipart content-type. Prior to versions 7.4.1 and 6.0.1, @fastify/multipart may experience denial of service due to a number of situations in which an unlimited number of parts are accepted. This includes the multipart body parser accepting an unlimited number of file parts, the multipart body parser accepting an unlimited number of field parts, and the multipart body parser accepting an unlimited number of empty parts as field parts. This is fixed in v7.4.1 (for Fastify v4.x) and v6.0.1 (for Fastify v3.x). There are no known workarounds. | https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g | 2023-02-07T17:10:00.742Z | 2023-02-14T15:04:11.119Z | 2023-02-14T15:04:11.119Z | {'Vendor': 'fastify', 'Product': 'fastify-multipart', 'Versions': '< 6.0.1, >= 7.0.0, < 7.4.1'} |
CVE-2023-25599 | A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2, 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts. | https://www.mitel.com/support/security-advisories | 2023-02-08T00:00:00 | 2023-05-24T00:00:00 | 2023-08-17T18:52:33.354621 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25063 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anadnet Quick Page/Post Redirect Plugin plugin <= 5.2.3 versions. | https://patchstack.com/database/vulnerability/quick-pagepost-redirect-plugin/wordpress-quick-page-post-redirect-plugin-plugin-5-2-3-cross-site-scripting-xss?_s_id=cve | 2023-02-02T09:58:52.947Z | 2023-08-08T11:38:42.668Z | 2023-08-08T11:38:42.668Z | {'Vendor': 'Anadnet', 'Product': 'Quick Page/Post Redirect Plugin', 'Versions': 'n/a'} |
CVE-2023-25433 | libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV. | https://gitlab.com/libtiff/libtiff/-/issues/520 | 2023-02-06T00:00:00 | 2023-06-29T00:00:00 | 2023-08-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25960 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zendrop Zendrop – Global Dropshipping zendrop-dropshipping-and-fulfillment allows SQL Injection.This issue affects Zendrop – Global Dropshipping: from n/a through 1.0.0.
| https://patchstack.com/database/vulnerability/zendrop-dropshipping-and-fulfillment/wordpress-zendrop-global-dropshipping-plugin-1-0-0-arbitrary-code-execution?_s_id=cve | 2023-02-17T13:47:07.370Z | 2023-11-03T12:23:32.831Z | 2023-11-03T12:23:32.831Z | {'Vendor': 'Zendrop', 'Product': 'Zendrop – Global Dropshipping', 'Versions': 'n/a'} |
CVE-2023-25608 | An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments. | https://fortiguard.com/psirt/FG-IR-22-120 | 2023-02-08T13:42:03.367Z | 2023-09-13T12:28:51.497Z | 2023-09-13T12:28:51.497Z | {'Vendor': 'Fortinet', 'Product': 'FortiAP-W2', 'Versions': '7.2.0, 7.0.3, 7.0.0, 6.4.0, 6.2.0, 6.0.0'} |
CVE-2023-25521 |
NVIDIA DGX A100/A800 contains a vulnerability in SBIOS where an attacker may cause execution with unnecessary privileges by leveraging a weakness whereby proper input parameter validation is not performed. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering.
| https://nvidia.custhelp.com/app/answers/detail/a_id/5461 | 2023-02-07T02:57:17.086Z | 2023-07-03T23:27:26.659Z | 2023-07-03T23:27:26.659Z | {'Vendor': 'NVIDIA', 'Product': 'DGX A100/A800', 'Versions': 'All SBIOS versions prior to 1.21'} |
CVE-2023-25171 | Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources. Users should upgrade to v12.0 or later to receive a patch. As potential workarounds, users may install and configure a rate-limiting proxy in front of Kiwi TCMS and/or configure rate limits on their email server when possible. | https://kiwitcms.org/blog/kiwi-tcms-team/2023/02/15/kiwi-tcms-120/ | 2023-02-03T00:00:00 | 2023-02-15T00:00:00 | 2023-02-15T00:00:00 | {'Vendor': 'kiwitcms', 'Product': 'kiwi', 'Versions': '12.0'} |
CVE-2023-25872 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25937 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-02-17T06:15:08.303Z | 2023-06-23T09:40:06.788Z | 2023-06-23T09:40:06.788Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-25464 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in StreamWeasels Twitch Player plugin <= 2.1.0 versions. | https://patchstack.com/database/vulnerability/ttv-easy-embed-player/wordpress-twitch-player-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:06.873Z | 2023-04-07T12:03:55.178Z | 2023-04-07T12:03:55.178Z | {'Vendor': 'StreamWeasels', 'Product': 'Twitch Player', 'Versions': 'n/a'} |
CVE-2023-25034 | Cross-Site Request Forgery (CSRF) vulnerability in BoLiQuan WP Clean Up plugin <= 1.2.3 versions. | https://patchstack.com/database/vulnerability/wp-clean-up/wordpress-wp-clean-up-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-02T09:58:49.593Z | 2023-05-26T14:14:18.640Z | 2023-05-26T14:14:18.640Z | {'Vendor': 'BoLiQuan', 'Product': 'WP Clean Up', 'Versions': 'n/a'} |
CVE-2023-25864 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25167 | Discourse is an open source discussion platform. In affected versions a malicious user can cause a regular expression denial of service using a carefully crafted git URL. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/discourse/discourse/security/advisories/GHSA-4w55-w26q-r35w | 2023-02-03T16:59:18.246Z | 2023-02-08T19:31:59.994Z | null | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.0.1, >= 3.1.0.beta, < 3.1.0.beta2'} |
CVE-2023-25537 |
Dell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.
| https://www.dell.com/support/kbdoc/en-us/000213550/dsa-2023-098-security-update-for-dell-poweredge-14g-server-bios-for-an-out-of-bounds-write-vulnerability | 2023-02-07T09:35:27.079Z | 2023-05-22T10:48:45.847Z | 2023-05-22T10:48:45.847Z | {'Vendor': 'Dell', 'Product': 'PowerEdge Platform', 'Versions': 'Versions prior to 2.18.1 '} |
CVE-2023-25022 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Watu Quiz plugin <= 3.3.8 versions. | https://patchstack.com/database/vulnerability/watu/wordpress-watu-quiz-plugin-3-3-8-cross-site-scripting-xss?_s_id=cve | 2023-02-02T09:58:48.540Z | 2023-04-07T10:40:07.890Z | 2023-04-07T10:40:07.890Z | {'Vendor': 'Kiboko Labs', 'Product': 'Watu Quiz', 'Versions': 'n/a'} |
CVE-2023-25188 | An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. If/when CSP (as a BTS administrator) removes security hardenings from the Nokia Single RAN BTS baseband unit, the BTS baseband unit diagnostic tool AaShell (which is by default disabled) allows unauthenticated access from the mobile network solution internal BTS management network to the BTS embedded Linux operating-system level. | https://Nokia.com | 2023-02-04T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25472 | Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher plugin <= 3.8.3 versions. | https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-3-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:08.235Z | 2023-05-23T12:20:06.741Z | 2023-05-23T12:20:06.741Z | {'Vendor': 'Podlove', 'Product': 'Podlove Podcast Publisher', 'Versions': 'n/a'} |
CVE-2023-25219 | Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromDhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://github.com/DrizzlingSun/Tenda/blob/main/AC5/11/11.md | 2023-02-06T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25649 |
There is a command injection vulnerability in a mobile internet product of ZTE. Due to insufficient validation of SET_DEVICE_LED interface parameter, an authenticated attacker could use the vulnerability to execute arbitrary commands.
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032544 | 2023-02-09T19:47:48.023Z | 2023-08-25T09:37:36.684Z | 2023-08-25T09:37:36.684Z | {'Vendor': 'ZTE', 'Product': 'MF286R', 'Versions': 'CR_LVWRGBMF286RV1.0.0B04'} |
CVE-2023-25560 | DataHub is an open-source metadata platform. The AuthServiceClient which is responsible for creation of new accounts, verifying credentials, resetting them or requesting access tokens, crafts multiple JSON strings using format strings with user-controlled data. This means that an attacker may be able to augment these JSON strings to be sent to the backend and that can potentially be abused by including new or colliding values. This issue may lead to an authentication bypass and the creation of system accounts, which effectively can lead to full system compromise. Users are advised to upgrade. There are no known workarounds for this vulnerability. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-080. | https://github.com/datahub-project/datahub/security/advisories/GHSA-6rpf-5cfg-h8f3 | 2023-02-07T17:10:00.733Z | 2023-02-10T22:03:03.926Z | null | {'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.8.45'} |
CVE-2023-25130 | null | null | 2023-02-02T00:00:00 | null | 2023-02-03T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-25833 | There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered). | https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/ | 2023-02-15T00:00:00 | 2023-05-10T00:00:00 | 2023-05-22T00:00:00 | {'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': 'not down converted'} |
CVE-2023-25976 | Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Integration for Contact Form 7 and Zoho CRM, Bigin plugin <= 1.2.2 versions. | https://patchstack.com/database/vulnerability/cf7-zoho/wordpress-integration-for-contact-form-7-and-zoho-crm-bigin-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-17T13:47:09.999Z | 2023-05-26T11:13:08.035Z | 2023-05-26T11:13:08.035Z | {'Vendor': 'CRM Perks', 'Product': 'Integration for Contact Form 7 and Zoho CRM, Bigin', 'Versions': 'n/a'} |
CVE-2023-25075 | Unquoted search path in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html | 2023-02-24T04:00:02.142Z | 2023-11-14T19:04:39.620Z | 2023-11-14T19:04:39.620Z | {'Vendor': 'n/a', 'Product': 'Intel Server Configuration Utility software', 'Versions': 'before version 16.0.9'} |
CVE-2023-25798 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Olevmedia Olevmedia Shortcodes plugin <= 1.1.9 versions. | https://patchstack.com/database/vulnerability/olevmedia-shortcodes/wordpress-olevmedia-shortcodes-plugin-1-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-15T12:11:10.695Z | 2023-05-03T11:04:18.393Z | 2023-05-03T11:04:18.393Z | {'Vendor': 'Olevmedia', 'Product': 'Olevmedia Shortcodes', 'Versions': 'n/a'} |
CVE-2023-25262 | Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web). | http://stimulsoft.com | 2023-02-06T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25632 | The Android Mobile Whale browser app before 3.0.1.2 allows the attacker to bypass its browser unlock function via 'Open in Whale' feature. | https://cve.naver.com/detail/cve-2023-25632.html | 2023-02-09T15:55:25.113Z | 2023-11-27T07:03:12.145Z | 2023-11-30T00:36:28.752Z | {'Vendor': 'NAVER', 'Product': 'NAVER Whale browser', 'Versions': '3.0.1.2'} |
CVE-2023-25848 |
ArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue.
The information disclosed is limited to a single attribute in a database connection string. No business data is disclosed.
| https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-map-and-feature-service-security-2023-update-1-patch/ | 2023-02-15T17:59:31.099Z | 2023-08-25T18:44:14.016Z | 2023-08-25T18:44:14.016Z | {'Vendor': 'Esri', 'Product': 'Server', 'Versions': '10.8.1, 10.9.1, 11.0, 11.1'} |
CVE-2023-25665 | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1. | https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g | 2023-02-09T20:58:21.858Z | 2023-03-24T23:39:26.921Z | 2023-03-24T23:39:26.921Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25235 | Tenda AC500 V2.0.1.9(1307) is vulnerable to Buffer Overflow in function formOneSsidCfgSet via parameter ssid. | https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2 | 2023-02-06T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25059 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in avalex GmbH avalex – Automatically secure legal texts plugin <= 3.0.3 versions. | https://patchstack.com/database/vulnerability/avalex/wordpress-avalex-plugin-3-0-3-cross-site-scripting-xss?_s_id=cve | 2023-02-02T09:58:52.946Z | 2023-04-07T08:40:21.555Z | 2023-04-07T08:40:21.555Z | {'Vendor': 'avalex GmbH', 'Product': 'avalex – Automatically secure legal texts', 'Versions': 'n/a'} |
CVE-2023-25409 | Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have access to other users outlets. | https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit | 2023-02-06T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25223 | CRMEB <=1.3.4 is vulnerable to SQL Injection via /api/admin/user/list. | https://github.com/crmeb/crmeb_java/issues/9 | 2023-02-06T00:00:00 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25673 | TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a Floating Point Exception in TensorListSplit with XLA. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-647v-r7qq-24fh | 2023-02-09T20:58:21.859Z | 2023-03-24T23:30:41.556Z | 2023-03-24T23:30:41.556Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25366 | In Siglent SDS 1104X-E SDS1xx4X-E_V6.1.37R9.ADS, insecure SCPI interface discloses web password. | https://siglent.com | 2023-02-06T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25736 | An invalid downcast from `nsHTMLDocument` to `nsIContent` could have lead to undefined behavior. This vulnerability affects Firefox < 110. | https://bugzilla.mozilla.org/show_bug.cgi?id=1811331 | 2023-02-13T08:46:16.517Z | 2023-06-19T10:22:11.713Z | 2023-06-19T10:22:11.713Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25809 | runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add `/sys/fs/cgroup` to `maskedPaths`.
| https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc | 2023-02-15T16:34:48.772Z | 2023-03-29T18:22:56.875Z | 2023-03-29T18:22:56.875Z | {'Vendor': 'opencontainers', 'Product': 'runc', 'Versions': '< 1.1.5'} |
CVE-2023-25761 | Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin. | https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032 | 2023-02-14T00:00:00 | 2023-02-15T00:00:00 | 2023-10-24T12:48:53.961Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins JUnit Plugin', 'Versions': 'unspecified, 1119.1124.va_a_8ccde5658f'} |
CVE-2023-25018 | RIFARTEK IOT Wall transportation function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can inject JavaScript to perform reflected XSS (Reflected Cross-site scripting) attack. | https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html | 2023-02-02T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Rifartek', 'Product': 'IOT Wall', 'Versions': '22'} |
CVE-2023-25448 | Cross-Site Request Forgery (CSRF) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin <= 1.7.4 versions. | https://patchstack.com/database/vulnerability/archivist-custom-archive-templates/wordpress-archivist-custom-archive-templates-plugin-1-7-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:03.962Z | 2023-05-22T14:20:33.166Z | 2023-05-22T14:20:33.166Z | {'Vendor': 'Eric Teubert', 'Product': 'Archivist – Custom Archive Templates', 'Versions': 'n/a'} |
CVE-2023-25019 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Premio Chaty plugin <= 3.0.9 versions | https://patchstack.com/database/vulnerability/chaty/wordpress-chaty-plugin-3-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-02T09:58:48.539Z | 2023-08-30T11:51:48.807Z | 2023-08-30T11:51:48.807Z | {'Vendor': 'Premio', 'Product': 'Chaty', 'Versions': 'n/a'} |
CVE-2023-25449 | Cross-Site Request Forgery (CSRF) vulnerability in Oliver Seidel, Bastian Germann cformsII plugin <= 15.0.4 versions. | https://patchstack.com/database/vulnerability/cforms2/wordpress-cformsii-plugin-15-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:03.962Z | 2023-06-15T11:58:41.088Z | 2023-06-15T11:58:41.088Z | {'Vendor': 'Oliver Seidel, Bastian Germann', 'Product': 'cformsII', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.