CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-35693
In incfs_kill_sb of fs/incfs/vfs.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/kernel/common/+/8ff940b3513cb
2023-06-15T02:50:33.964Z
2023-07-12T23:56:14.984Z
2023-07-12T23:56:16.874Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-35386
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35386
2023-06-14T23:09:47.638Z
2023-08-08T17:08:37.737Z
2023-12-14T20:03:10.721Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-35152
XWiki Platform is a generic wiki platform. Starting in version 12.9-rc-1 and prior to versions 14.4.8, 14.10.6, and 15.1, any logged in user can add dangerous content in their first name field and see it executed with programming rights. Leading to rights escalation. The vulnerability has been fixed on XWiki 14.4.8, 14.10.6, and 15.1. As a workaround, one may apply the patch manually.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rf8j-q39g-7xfm
2023-06-14T14:17:52.177Z
2023-06-23T16:41:51.268Z
2023-06-23T16:41:51.268Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 12.9-rc-1, < 14.4.8, >= 14.5, < 14.10.6, >= 15.0-rc-1, < 15.1'}
CVE-2023-35851
SUNNET WMPro portal's FAQ function has insufficient validation for user input. An unauthenticated remote attacker can inject arbitrary SQL commands to obtain sensitive information via a database.
https://www.twcert.org.tw/tw/cp-132-7372-3994a-1.html
2023-06-19T02:28:47.605Z
2023-09-18T02:33:59.550Z
2023-09-18T02:33:59.550Z
{'Vendor': 'SUNNET', 'Product': 'WMPro', 'Versions': 'V5'}
CVE-2023-35914
Authorization Bypass Through User-Controlled Key vulnerability in WooCommerce Woo Subscriptions.This issue affects Woo Subscriptions: from n/a through 5.1.2.
https://patchstack.com/database/vulnerability/woocommerce-subscriptions/wordpress-woocommerce-subscriptions-plugin-5-1-2-insecure-direct-object-references-idor-vulnerability?_s_id=cve
2023-06-20T09:05:43.962Z
2023-12-20T15:18:16.247Z
2023-12-20T15:18:16.247Z
{'Vendor': 'WooCommerce', 'Product': 'Woo Subscriptions', 'Versions': 'n/a'}
CVE-2023-35781
Cross-Site Request Forgery (CSRF) vulnerability in LWS Cleaner plugin <= 2.3.0 versions.
https://patchstack.com/database/vulnerability/lws-cleaner/wordpress-lws-cleaner-plugin-2-3-0-multiple-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-06-16T08:57:49.308Z
2023-07-11T07:58:24.909Z
2023-07-11T07:58:24.909Z
{'Vendor': 'LWS', 'Product': 'LWS Cleaner', 'Versions': 'n/a'}
CVE-2023-25080
Protection mechanism failure in some Intel(R) Distribution of OpenVINO toolkit software before version 2023.0.0 may allow an authenticated user to potentially enable information disclosure via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00901.html
2023-03-01T18:23:25.217Z
2023-11-14T19:04:59.211Z
2023-11-14T19:04:59.211Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Distribution of OpenVINO toolkit software', 'Versions': 'before version 2023.0.0'}
CVE-2023-25983
Improper Neutralization of Formula Elements in a CSV File vulnerability in WPOmnia KB Support.This issue affects KB Support: from n/a through 1.5.84.
https://patchstack.com/database/vulnerability/kb-support/wordpress-kb-support-wordpress-help-desk-plugin-1-5-84-csv-injection-vulnerability?_s_id=cve
2023-02-17T13:47:13.226Z
2023-11-07T15:13:15.808Z
2023-11-07T15:13:15.808Z
{'Vendor': 'WPOmnia', 'Product': 'KB Support', 'Versions': 'n/a'}
CVE-2023-25829
There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.0 and 10.9.1 that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/
2023-02-15T17:59:31.095Z
2023-05-09T16:00:29.494Z
2023-05-09T16:40:50.118Z
{'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '11.0, 10.9.1'}
CVE-2023-25595
A vulnerability exists in the ClearPass OnGuard Ubuntu agent that allows for an attacker with local Ubuntu instance access to potentially obtain sensitive information. Successful Exploitation of this vulnerability allows an attacker to retrieve information that is of a sensitive nature to the ClearPass/OnGuard environment.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt
2023-02-07T20:24:22.480Z
2023-03-14T14:55:37.876Z
2023-03-22T04:39:15.803375Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'}
CVE-2023-25346
A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the id parameter of /churchcrm/v2/family/not-found.
https://github.com/ChurchCRM/CRM
2023-02-06T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25716
Auth (admin+) Stored Cross-Site Scripting (XSS) vulnerability in gqevu6bsiz Announce from the Dashboard plugin <= 1.5.1 versions.
https://patchstack.com/database/vulnerability/announce-from-the-dashboard/wordpress-announce-from-the-dashboard-plugin-1-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-13T04:14:01.866Z
2023-04-07T11:58:50.645Z
2023-04-07T11:58:50.645Z
{'Vendor': 'gqevu6bsiz', 'Product': 'Announce from the Dashboard', 'Versions': 'n/a'}
CVE-2023-25653
node-jose is a JavaScript implementation of the JSON Object Signing and Encryption (JOSE) for web browsers and node.js-based servers. Prior to version 2.2.0, when using the non-default "fallback" crypto back-end, ECC operations in `node-jose` can trigger a Denial-of-Service (DoS) condition, due to a possible infinite loop in an internal calculation. For some ECC operations, this condition is triggered randomly; for others, it can be triggered by malicious input. The issue has been patched in version 2.2.0. Since this issue is only present in the "fallback" crypto implementation, it can be avoided by ensuring that either WebCrypto or the Node `crypto` module is available in the JS environment where `node-jose` is being run.
https://github.com/cisco/node-jose/security/advisories/GHSA-5h4j-qrvg-9xhw
2023-02-09T20:58:21.856Z
2023-02-16T18:15:27.085Z
2023-02-16T18:15:27.085Z
{'Vendor': 'cisco', 'Product': 'node-jose', 'Versions': '< 2.2.0'}
CVE-2023-25487
Cross-Site Request Forgery (CSRF) vulnerability in Pixelgrade PixTypes plugin <= 1.4.14 versions.
https://patchstack.com/database/vulnerability/pixtypes/wordpress-pixtypes-plugin-1-4-14-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:09.645Z
2023-07-11T07:25:16.209Z
2023-07-11T07:25:16.209Z
{'Vendor': 'Pixelgrade', 'Product': 'PixTypes', 'Versions': 'n/a'}
CVE-2023-25038
Cross-Site Request Forgery (CSRF) vulnerability in 984.Ru For the visually impaired plugin <= 0.58 versions.
https://patchstack.com/database/vulnerability/for-the-visually-impaired/wordpress-for-the-visually-impaired-plugin-0-58-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:49.594Z
2023-05-26T12:00:47.881Z
2023-05-26T12:00:47.881Z
{'Vendor': '984.ru', 'Product': 'For the visually impaired', 'Versions': 'n/a'}
CVE-2023-25192
AMI MegaRAC SPX devices allow User Enumeration through Redfish. The fixed versions are SPx12-update-7.00 and SPx13-update-5.00.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023002.pdf
2023-02-04T00:00:00
2023-02-15T00:00:00
2023-02-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25468
Cross-Site Request Forgery (CSRF) vulnerability in Reservation.Studio Reservation.Studio widget plugin <= 1.0.11 versions.
https://patchstack.com/database/vulnerability/reservation-studio-widget/wordpress-reservation-studio-widget-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:06.874Z
2023-07-11T07:42:56.617Z
2023-07-11T07:42:56.617Z
{'Vendor': 'Reservation.Studio', 'Product': 'Reservation.Studio widget', 'Versions': 'n/a'}
CVE-2023-25891
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25741
When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. This vulnerability affects Firefox < 110.
https://www.mozilla.org/security/advisories/mfsa2023-05/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25604
An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs.
https://fortiguard.com/psirt/FG-IR-23-052
2023-02-08T13:42:03.366Z
2023-10-10T16:49:40.699Z
2023-10-10T16:49:40.699Z
{'Vendor': 'Fortinet', 'Product': 'FortiGuest', 'Versions': '1.0.0'}
CVE-2023-25491
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Samuel Marshall JCH Optimize plugin <= 3.2.2 versions.
https://patchstack.com/database/vulnerability/jch-optimize/wordpress-jch-optimize-plugin-3-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:09.645Z
2023-05-06T22:55:17.758Z
2023-05-06T22:55:17.758Z
{'Vendor': 'Samuel Marshall', 'Product': 'JCH Optimize', 'Versions': 'n/a'}
CVE-2023-25868
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25887
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25184
Use of weak credentials exists in Seiko Solutions SkyBridge and SkySpider series, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product. Affected products and versions are as follows: SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier.
https://www.seiko-sol.co.jp/archives/73969/
2023-03-15T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A200, SkyBridge BASIC MB-A130, and SkySpider MB-R210', 'Versions': 'SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, and SkySpider MB-R210 firmware Ver. 1.01.00 and earlier'}
CVE-2023-25307
nothub mrpack-install <= v0.16.2 is vulnerable to Directory Traversal.
https://github.com/nothub/mrpack-install/security/advisories/GHSA-r887-gfxh-m9rr
2023-02-06T00:00:00
2023-06-26T00:00:00
2023-06-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25757
Improper access control in some Intel(R) Unison(TM) software before version 10.12 may allow a privileged user to potentially enable escalation of privilege via network access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00897.html
2023-03-04T04:00:03.418Z
2023-08-11T02:37:21.352Z
2023-08-11T02:37:21.352Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Unison(TM) software', 'Versions': 'before version 10.12'}
CVE-2023-25096
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.071Z
2023-07-06T14:53:24.646Z
2023-07-17T19:35:20.712Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25583
Two OS command injection vulnerabilities exist in the zebra vlan_name functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is in the code branch that manages a new vlan configuration.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1723
2023-02-07T17:10:42.215Z
2023-07-06T14:53:22.122Z
2023-07-06T17:00:17.356Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25700
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.
https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-1-10-unauthenticated-sql-injection-vulnerability?_s_id=cve
2023-02-13T04:13:47.557Z
2023-11-03T16:44:47.440Z
2023-11-03T16:44:47.440Z
{'Vendor': 'Themeum', 'Product': 'Tutor LMS', 'Versions': 'n/a'}
CVE-2023-25350
Faveo Helpdesk 1.0-1.11.1 is vulnerable to SQL Injection. When the user logs in through the login box, he has no judgment on the validity of the user's input data. The parameters passed from the front end to the back end are controllable, which will lead to SQL injection.
https://github.com/ladybirdweb/faveo-helpdesk/issues/7827
2023-02-06T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25645
There is a permission and access control vulnerability in some ZTE AndroidTV STBs. Due to improper permission settings, non-privileged application can perform functions that are protected with signature/privilege-level permissions. Exploitation of this vulnerability could clear personal data and applications on the user's device, affecting device operation.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1031464
2023-02-09T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'UP T2 4K, ZXV10 B866V2-H, ZXV10 B866V2, ZXV10 B860H V5D0, ZXV10 B866V2F', 'Versions': 'V84511302.1427,V84711321.0038,V84711321.0040,V84711321.0045,V84711321.0049,V82811306.3021,V84711309.0016,V84711309.0018,V84711309.0019,V82815416.1027,V82815416.1028,V82815416.1029,V82815416.2012,V83011303.0049,V83011303.0051,V83011303.0053,V83011303.0063,V83011303.0069,V86111338.0026,V86111338.0031,V86111338.0033,V86111338.0035'}
CVE-2023-25215
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the saveParentControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/3/3.md
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25002
A maliciously crafted SKP file in Autodesk products is used to trigger use-after-free vulnerability. Exploitation of this vulnerability may lead to code execution.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0002
2023-02-01T00:00:00
2023-06-27T00:00:00
2023-06-27T00:00:00
{'Vendor': 'n/a', 'Product': 'Multiple', 'Versions': '2023, 2022, 2021'}
CVE-2023-25452
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Michael Pretty (prettyboymp) CMS Press plugin <= 0.2.3 versions.
https://patchstack.com/database/vulnerability/cms-press/wordpress-cms-press-plugin-0-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:05.559Z
2023-05-08T12:18:46.572Z
2023-05-08T12:18:46.572Z
{'Vendor': 'Michael Pretty (prettyboymp)', 'Product': 'CMS Press', 'Versions': 'n/a'}
CVE-2023-25901
Adobe Dimension versions 3.4.7 (and earlier) is affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25147
An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this.
https://success.trendmicro.com/solution/000292209
2023-02-03T15:46:02.643Z
2023-03-07T22:20:04.864Z
2023-03-10T20:05:13.704141Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'}
CVE-2023-25517
NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a guest OS may be able to control resources for which it is not authorized, which may lead to information disclosure and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5468
2023-02-07T02:57:17.084Z
2023-07-03T23:27:05.649Z
2023-07-03T23:27:05.649Z
{'Vendor': 'NVIDIA', 'Product': 'vGPU software', 'Versions': 'All versions prior to and including 15.2, 13.7, and 11.12, and all versions prior to and including the May 2023 release'}
CVE-2023-25794
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Mighty Digital Nooz plugin <= 1.6.0 versions.
https://patchstack.com/database/vulnerability/nooz/wordpress-nooz-plugin-1-6-0-cross-site-scripting-xss?_s_id=cve
2023-02-15T12:11:10.695Z
2023-03-20T10:33:06.780Z
2023-03-20T10:33:06.780Z
{'Vendor': 'Mighty Digital', 'Product': 'Nooz', 'Versions': 'n/a'}
CVE-2023-25281
A stack overflow vulnerability exists in pingV4Msg component in D-Link DIR820LA1_FW105B03, allows attackers to cause a denial of service via the nextPage parameter to ping.ccp.
https://www.dlink.com/en/security-bulletin/
2023-02-06T00:00:00
2023-03-16T00:00:00
2023-03-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25956
Generation of Error Message Containing Sensitive Information vulnerability in the Apache Airflow AWS Provider. This issue affects Apache Airflow AWS Provider versions before 7.2.1.
https://github.com/apache/airflow/pull/29587
2023-02-17T10:12:03.880Z
2023-02-24T11:48:33.110Z
2023-03-07T08:23:44.307Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow AWS Provider', 'Versions': '0'}
CVE-2023-25055
Cross-Site Request Forgery (CSRF) vulnerability in Amit Agarwal Google XML Sitemap for Videos plugin <= 2.6.1 versions.
https://patchstack.com/database/vulnerability/xml-sitemaps-for-videos/wordpress-google-xml-sitemap-for-videos-plugin-2-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:51.822Z
2023-06-15T13:24:26.086Z
2023-06-15T13:24:26.086Z
{'Vendor': 'Amit Agarwal', 'Product': 'Google XML Sitemap for Videos', 'Versions': 'n/a'}
CVE-2023-25540
Dell PowerScale OneFS 9.4.0.x contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability to overwrite arbitrary files causing denial of service.
https://www.dell.com/support/kbdoc/en-us/000209895/dell-emc-powerscale-onefs-security-updates-for-multiple-security
2023-02-07T09:35:27.080Z
2023-02-28T16:30:31.210Z
2023-02-28T16:30:31.210Z
{'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': '9.4.0.0 through 9.4.0.11'}
CVE-2023-25110
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the remote_virtual_ip variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.073Z
2023-07-06T14:53:25.909Z
2023-07-17T19:35:22.544Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25813
Sequelize is a Node.js ORM tool. In versions prior to 6.19.1 a SQL injection exploit exists related to replacements. Parameters which are passed through replacements are not properly escaped which can lead to arbitrary SQL injection depending on the specific queries in use. The issue has been fixed in Sequelize 6.19.1. Users are advised to upgrade. Users unable to upgrade should not use the `replacements` and the `where` option in the same query.
https://github.com/sequelize/sequelize/security/advisories/GHSA-wrh9-cjv3-2hpw
2023-02-15T16:34:48.773Z
2023-02-22T18:14:44.579Z
2023-02-22T18:14:44.579Z
{'Vendor': 'sequelize', 'Product': 'sequelize', 'Versions': '< 6.19.1'}
CVE-2023-25669
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, if the stride and window size are not positive for `tf.raw_ops.AvgPoolGrad`, it can give a floating point exception. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rcf8-g8jv-vg6p
2023-02-09T20:58:21.858Z
2023-03-24T23:32:57.394Z
2023-03-24T23:32:57.394Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25686
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 247601.
https://www.ibm.com/support/pages/node/6962729
2023-02-11T18:09:03.127Z
2023-03-21T15:55:53.821Z
2023-03-21T15:55:53.821Z
{'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'}
CVE-2023-25413
Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. The device allows unauthenticated access to Telnet and SNMP credentials.
https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit/
2023-02-06T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25940
Dell PowerScale OneFS version 9.5.0.0 contains improper link resolution before file access vulnerability in isi_gather_info. A high privileged local attacker could potentially exploit this vulnerability, leading to system takeover and it breaks the compliance mode guarantees.
https://www.dell.com/support/kbdoc/en-us/000211539/dell-emc-powerscale-onefs-security
2023-02-17T06:15:08.304Z
2023-04-04T10:14:28.339Z
2023-06-22T06:11:18.185Z
{'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': '9.5.0.0'}
CVE-2023-25805
versionn, software for changing version information across multiple files, has a command injection vulnerability in all versions prior to version 1.1.0. This issue is patched in version 1.1.0.
https://github.com/commenthol/versionn/security/advisories/GHSA-fj78-2vc5-f6cm
2023-02-15T16:34:48.772Z
2023-02-20T15:45:43.255Z
2023-02-20T15:45:43.255Z
{'Vendor': 'commenthol', 'Product': 'versionn', 'Versions': '< 1.1.0'}
CVE-2023-25106
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the local_virtual_ip and the local_virtual_mask variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.073Z
2023-07-06T14:53:25.578Z
2023-07-17T19:35:22.056Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25556
A CWE-287: Improper Authentication vulnerability exists that could allow a device to be compromised when a key of less than seven digits is entered and the attacker has access to the KNX installation.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-03.pdf
2023-02-07T17:00:03.780Z
2023-04-18T17:03:07.661Z
2023-04-18T17:03:07.661Z
{'Vendor': 'Schneider Electric', 'Product': 'Merten INSTABUS Tastermodul 1fach System M 625199', 'Versions': 'Program Version 1.0'}
CVE-2023-25690
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
https://httpd.apache.org/security/vulnerabilities_24.html
2023-02-12T13:28:31.657Z
2023-03-07T15:09:03.080Z
2023-03-07T15:09:03.080Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache HTTP Server', 'Versions': '2.4.0'}
CVE-2023-25014
An issue was discovered in the femanager extension before 5.5.3, 6.x before 6.3.4, and 7.x before 7.1.0 for TYPO3. Missing access checks in the InvitationController allow an unauthenticated user to delete all frontend users.
https://typo3.org/help/security-advisories
2023-02-01T00:00:00
2023-02-02T00:00:00
2023-02-02T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25151
opentelemetry-go-contrib is a collection of extensions for OpenTelemetry-Go. The v0.38.0 release of `go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp` uses the `httpconv.ServerRequest` function to annotate metric measurements for the `http.server.request_content_length`, `http.server.response_content_length`, and `http.server.duration` instruments. The `ServerRequest` function sets the `http.target` attribute value to be the whole request URI (including the query string)[^1]. The metric instruments do not "forget" previous measurement attributes when `cumulative` temporality is used, this means the cardinality of the measurements allocated is directly correlated with the unique URIs handled. If the query string is constantly random, this will result in a constant increase in memory allocation that can be used in a denial-of-service attack. This issue has been addressed in version 0.39.0. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-5r5m-65gx-7vrh
2023-02-03T16:59:18.242Z
2023-02-08T19:21:37.401Z
null
{'Vendor': 'open-telemetry', 'Product': 'opentelemetry-go-contrib', 'Versions': '>= 0.38.0, < 0.39.0'}
CVE-2023-25782
Auth. (admin+) vulnerability in Second2none Service Area Postcode Checker plugin <= 2.0.8 versions.
https://patchstack.com/database/vulnerability/service-area-postcode-checker/wordpress-service-area-postcode-checker-plugin-2-0-8-cross-site-scripting-xss?_s_id=cve
2023-02-15T12:10:40.366Z
2023-03-20T09:49:40.615Z
2023-03-20T09:49:40.615Z
{'Vendor': 'Second2none', 'Product': 'Service Area Postcode Checker', 'Versions': 'n/a'}
CVE-2023-25825
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 are vulnerable to Cross-site Scripting. Log entries can be injected into the database logs, containing a malicious referrer field. This is unescaped when viewing the logs in the web ui. This issue is patched in version 1.36.33.
https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-68vf-g4qm-jr6v
2023-02-15T16:34:48.774Z
2023-02-25T00:44:25.132Z
2023-02-25T00:44:25.132Z
{'Vendor': 'ZoneMinder', 'Product': 'zoneminder', 'Versions': '< 1.36.33'}
CVE-2023-25126
null
null
2023-02-02T00:00:00
null
2023-02-03T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25576
@fastify/multipart is a Fastify plugin to parse the multipart content-type. Prior to versions 7.4.1 and 6.0.1, @fastify/multipart may experience denial of service due to a number of situations in which an unlimited number of parts are accepted. This includes the multipart body parser accepting an unlimited number of file parts, the multipart body parser accepting an unlimited number of field parts, and the multipart body parser accepting an unlimited number of empty parts as field parts. This is fixed in v7.4.1 (for Fastify v4.x) and v6.0.1 (for Fastify v3.x). There are no known workarounds.
https://github.com/fastify/fastify-multipart/security/advisories/GHSA-hpp2-2cr5-pf6g
2023-02-07T17:10:00.742Z
2023-02-14T15:04:11.119Z
2023-02-14T15:04:11.119Z
{'Vendor': 'fastify', 'Product': 'fastify-multipart', 'Versions': '< 6.0.1, >= 7.0.0, < 7.4.1'}
CVE-2023-25599
A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2, 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts.
https://www.mitel.com/support/security-advisories
2023-02-08T00:00:00
2023-05-24T00:00:00
2023-08-17T18:52:33.354621
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25063
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anadnet Quick Page/Post Redirect Plugin plugin <= 5.2.3 versions.
https://patchstack.com/database/vulnerability/quick-pagepost-redirect-plugin/wordpress-quick-page-post-redirect-plugin-plugin-5-2-3-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:52.947Z
2023-08-08T11:38:42.668Z
2023-08-08T11:38:42.668Z
{'Vendor': 'Anadnet', 'Product': 'Quick Page/Post Redirect Plugin', 'Versions': 'n/a'}
CVE-2023-25433
libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
https://gitlab.com/libtiff/libtiff/-/issues/520
2023-02-06T00:00:00
2023-06-29T00:00:00
2023-08-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25960
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zendrop Zendrop – Global Dropshipping zendrop-dropshipping-and-fulfillment allows SQL Injection.This issue affects Zendrop – Global Dropshipping: from n/a through 1.0.0.
https://patchstack.com/database/vulnerability/zendrop-dropshipping-and-fulfillment/wordpress-zendrop-global-dropshipping-plugin-1-0-0-arbitrary-code-execution?_s_id=cve
2023-02-17T13:47:07.370Z
2023-11-03T12:23:32.831Z
2023-11-03T12:23:32.831Z
{'Vendor': 'Zendrop', 'Product': 'Zendrop – Global Dropshipping', 'Versions': 'n/a'}
CVE-2023-25608
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
https://fortiguard.com/psirt/FG-IR-22-120
2023-02-08T13:42:03.367Z
2023-09-13T12:28:51.497Z
2023-09-13T12:28:51.497Z
{'Vendor': 'Fortinet', 'Product': 'FortiAP-W2', 'Versions': '7.2.0, 7.0.3, 7.0.0, 6.4.0, 6.2.0, 6.0.0'}
CVE-2023-25521
NVIDIA DGX A100/A800 contains a vulnerability in SBIOS where an attacker may cause execution with unnecessary privileges by leveraging a weakness whereby proper input parameter validation is not performed. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5461
2023-02-07T02:57:17.086Z
2023-07-03T23:27:26.659Z
2023-07-03T23:27:26.659Z
{'Vendor': 'NVIDIA', 'Product': 'DGX A100/A800', 'Versions': 'All SBIOS versions prior to 1.21'}
CVE-2023-25171
Kiwi TCMS, an open source test management system, does not impose rate limits in versions prior to 12.0. This makes it easier to attempt denial-of-service attacks against the Password reset page. An attacker could potentially send a large number of emails if they know the email addresses of users in Kiwi TCMS. Additionally that may strain SMTP resources. Users should upgrade to v12.0 or later to receive a patch. As potential workarounds, users may install and configure a rate-limiting proxy in front of Kiwi TCMS and/or configure rate limits on their email server when possible.
https://kiwitcms.org/blog/kiwi-tcms-team/2023/02/15/kiwi-tcms-120/
2023-02-03T00:00:00
2023-02-15T00:00:00
2023-02-15T00:00:00
{'Vendor': 'kiwitcms', 'Product': 'kiwi', 'Versions': '12.0'}
CVE-2023-25872
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25937
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-02-17T06:15:08.303Z
2023-06-23T09:40:06.788Z
2023-06-23T09:40:06.788Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-25464
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in StreamWeasels Twitch Player plugin <= 2.1.0 versions.
https://patchstack.com/database/vulnerability/ttv-easy-embed-player/wordpress-twitch-player-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:06.873Z
2023-04-07T12:03:55.178Z
2023-04-07T12:03:55.178Z
{'Vendor': 'StreamWeasels', 'Product': 'Twitch Player', 'Versions': 'n/a'}
CVE-2023-25034
Cross-Site Request Forgery (CSRF) vulnerability in BoLiQuan WP Clean Up plugin <= 1.2.3 versions.
https://patchstack.com/database/vulnerability/wp-clean-up/wordpress-wp-clean-up-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:49.593Z
2023-05-26T14:14:18.640Z
2023-05-26T14:14:18.640Z
{'Vendor': 'BoLiQuan', 'Product': 'WP Clean Up', 'Versions': 'n/a'}
CVE-2023-25864
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25167
Discourse is an open source discussion platform. In affected versions a malicious user can cause a regular expression denial of service using a carefully crafted git URL. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/discourse/discourse/security/advisories/GHSA-4w55-w26q-r35w
2023-02-03T16:59:18.246Z
2023-02-08T19:31:59.994Z
null
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '< 3.0.1, >= 3.1.0.beta, < 3.1.0.beta2'}
CVE-2023-25537
Dell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.
https://www.dell.com/support/kbdoc/en-us/000213550/dsa-2023-098-security-update-for-dell-poweredge-14g-server-bios-for-an-out-of-bounds-write-vulnerability
2023-02-07T09:35:27.079Z
2023-05-22T10:48:45.847Z
2023-05-22T10:48:45.847Z
{'Vendor': 'Dell', 'Product': 'PowerEdge Platform', 'Versions': 'Versions prior to 2.18.1 '}
CVE-2023-25022
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Watu Quiz plugin <= 3.3.8 versions.
https://patchstack.com/database/vulnerability/watu/wordpress-watu-quiz-plugin-3-3-8-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:48.540Z
2023-04-07T10:40:07.890Z
2023-04-07T10:40:07.890Z
{'Vendor': 'Kiboko Labs', 'Product': 'Watu Quiz', 'Versions': 'n/a'}
CVE-2023-25188
An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. If/when CSP (as a BTS administrator) removes security hardenings from the Nokia Single RAN BTS baseband unit, the BTS baseband unit diagnostic tool AaShell (which is by default disabled) allows unauthenticated access from the mobile network solution internal BTS management network to the BTS embedded Linux operating-system level.
https://Nokia.com
2023-02-04T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25472
Cross-Site Request Forgery (CSRF) vulnerability in Podlove Podlove Podcast Publisher plugin <= 3.8.3 versions.
https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-3-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:08.235Z
2023-05-23T12:20:06.741Z
2023-05-23T12:20:06.741Z
{'Vendor': 'Podlove', 'Product': 'Podlove Podcast Publisher', 'Versions': 'n/a'}
CVE-2023-25219
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromDhcpListClient function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/11/11.md
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25649
There is a command injection vulnerability in a mobile internet product of ZTE. Due to insufficient validation of SET_DEVICE_LED interface parameter, an authenticated attacker could use the vulnerability to execute arbitrary commands.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032544
2023-02-09T19:47:48.023Z
2023-08-25T09:37:36.684Z
2023-08-25T09:37:36.684Z
{'Vendor': 'ZTE', 'Product': 'MF286R', 'Versions': 'CR_LVWRGBMF286RV1.0.0B04'}
CVE-2023-25560
DataHub is an open-source metadata platform. The AuthServiceClient which is responsible for creation of new accounts, verifying credentials, resetting them or requesting access tokens, crafts multiple JSON strings using format strings with user-controlled data. This means that an attacker may be able to augment these JSON strings to be sent to the backend and that can potentially be abused by including new or colliding values. This issue may lead to an authentication bypass and the creation of system accounts, which effectively can lead to full system compromise. Users are advised to upgrade. There are no known workarounds for this vulnerability. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-080.
https://github.com/datahub-project/datahub/security/advisories/GHSA-6rpf-5cfg-h8f3
2023-02-07T17:10:00.733Z
2023-02-10T22:03:03.926Z
null
{'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.8.45'}
CVE-2023-25130
null
null
2023-02-02T00:00:00
null
2023-02-03T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25833
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered).
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/
2023-02-15T00:00:00
2023-05-10T00:00:00
2023-05-22T00:00:00
{'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': 'not down converted'}
CVE-2023-25976
Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Integration for Contact Form 7 and Zoho CRM, Bigin plugin <= 1.2.2 versions.
https://patchstack.com/database/vulnerability/cf7-zoho/wordpress-integration-for-contact-form-7-and-zoho-crm-bigin-plugin-1-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-17T13:47:09.999Z
2023-05-26T11:13:08.035Z
2023-05-26T11:13:08.035Z
{'Vendor': 'CRM Perks', 'Product': 'Integration for Contact Form 7 and Zoho CRM, Bigin', 'Versions': 'n/a'}
CVE-2023-25075
Unquoted search path in the installer for some Intel Server Configuration Utility software before version 16.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00925.html
2023-02-24T04:00:02.142Z
2023-11-14T19:04:39.620Z
2023-11-14T19:04:39.620Z
{'Vendor': 'n/a', 'Product': 'Intel Server Configuration Utility software', 'Versions': 'before version 16.0.9'}
CVE-2023-25798
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Olevmedia Olevmedia Shortcodes plugin <= 1.1.9 versions.
https://patchstack.com/database/vulnerability/olevmedia-shortcodes/wordpress-olevmedia-shortcodes-plugin-1-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-15T12:11:10.695Z
2023-05-03T11:04:18.393Z
2023-05-03T11:04:18.393Z
{'Vendor': 'Olevmedia', 'Product': 'Olevmedia Shortcodes', 'Versions': 'n/a'}
CVE-2023-25262
Stimulsoft GmbH Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Server Side Request Forgery (SSRF). TThe Reporting Designer (Web) offers the possibility to embed sources from external locations. If the user chooses an external location, the request to that resource is performed by the server rather than the client. Therefore, the server causes outbound traffic and potentially imports data. An attacker may also leverage this behaviour to exfiltrate data of machines on the internal network of the server hosting the Stimulsoft Reporting Designer (Web).
http://stimulsoft.com
2023-02-06T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25632
The Android Mobile Whale browser app before 3.0.1.2 allows the attacker to bypass its browser unlock function via 'Open in Whale' feature.
https://cve.naver.com/detail/cve-2023-25632.html
2023-02-09T15:55:25.113Z
2023-11-27T07:03:12.145Z
2023-11-30T00:36:28.752Z
{'Vendor': 'NAVER', 'Product': 'NAVER Whale browser', 'Versions': '3.0.1.2'}
CVE-2023-25848
ArcGIS Enterprise Server versions 11.0 and below have an information disclosure vulnerability where a remote, unauthorized attacker may submit a crafted query that may result in a low severity information disclosure issue. The information disclosed is limited to a single attribute in a database connection string. No business data is disclosed.
https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-map-and-feature-service-security-2023-update-1-patch/
2023-02-15T17:59:31.099Z
2023-08-25T18:44:14.016Z
2023-08-25T18:44:14.016Z
{'Vendor': 'Esri', 'Product': 'Server', 'Versions': '10.8.1, 10.9.1, 11.0, 11.1'}
CVE-2023-25665
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when `SparseSparseMaximum` is given invalid sparse tensors as inputs, it can give a null pointer error. A fix is included in TensorFlow version 2.12 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-558h-mq8x-7q9g
2023-02-09T20:58:21.858Z
2023-03-24T23:39:26.921Z
2023-03-24T23:39:26.921Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25235
Tenda AC500 V2.0.1.9(1307) is vulnerable to Buffer Overflow in function formOneSsidCfgSet via parameter ssid.
https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/113_2
2023-02-06T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25059
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in avalex GmbH avalex – Automatically secure legal texts plugin <= 3.0.3 versions.
https://patchstack.com/database/vulnerability/avalex/wordpress-avalex-plugin-3-0-3-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:52.946Z
2023-04-07T08:40:21.555Z
2023-04-07T08:40:21.555Z
{'Vendor': 'avalex GmbH', 'Product': 'avalex – Automatically secure legal texts', 'Versions': 'n/a'}
CVE-2023-25409
Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have access to other users outlets.
https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit
2023-02-06T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25223
CRMEB <=1.3.4 is vulnerable to SQL Injection via /api/admin/user/list.
https://github.com/crmeb/crmeb_java/issues/9
2023-02-06T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25673
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a Floating Point Exception in TensorListSplit with XLA. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-647v-r7qq-24fh
2023-02-09T20:58:21.859Z
2023-03-24T23:30:41.556Z
2023-03-24T23:30:41.556Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25366
In Siglent SDS 1104X-E SDS1xx4X-E_V6.1.37R9.ADS, insecure SCPI interface discloses web password.
https://siglent.com
2023-02-06T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25736
An invalid downcast from `nsHTMLDocument` to `nsIContent` could have lead to undefined behavior. This vulnerability affects Firefox < 110.
https://bugzilla.mozilla.org/show_bug.cgi?id=1811331
2023-02-13T08:46:16.517Z
2023-06-19T10:22:11.713Z
2023-06-19T10:22:11.713Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25809
runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add `/sys/fs/cgroup` to `maskedPaths`.
https://github.com/opencontainers/runc/security/advisories/GHSA-m8cg-xc2p-r3fc
2023-02-15T16:34:48.772Z
2023-03-29T18:22:56.875Z
2023-03-29T18:22:56.875Z
{'Vendor': 'opencontainers', 'Product': 'runc', 'Versions': '< 1.1.5'}
CVE-2023-25761
Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032
2023-02-14T00:00:00
2023-02-15T00:00:00
2023-10-24T12:48:53.961Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins JUnit Plugin', 'Versions': 'unspecified, 1119.1124.va_a_8ccde5658f'}
CVE-2023-25018
RIFARTEK IOT Wall transportation function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can inject JavaScript to perform reflected XSS (Reflected Cross-site scripting) attack.
https://www.twcert.org.tw/tw/cp-132-6963-7d2ee-1.html
2023-02-02T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Rifartek', 'Product': 'IOT Wall', 'Versions': '22'}
CVE-2023-25448
Cross-Site Request Forgery (CSRF) vulnerability in Eric Teubert Archivist – Custom Archive Templates plugin <= 1.7.4 versions.
https://patchstack.com/database/vulnerability/archivist-custom-archive-templates/wordpress-archivist-custom-archive-templates-plugin-1-7-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:03.962Z
2023-05-22T14:20:33.166Z
2023-05-22T14:20:33.166Z
{'Vendor': 'Eric Teubert', 'Product': 'Archivist – Custom Archive Templates', 'Versions': 'n/a'}
CVE-2023-25019
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Premio Chaty plugin <= 3.0.9 versions
https://patchstack.com/database/vulnerability/chaty/wordpress-chaty-plugin-3-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-02T09:58:48.539Z
2023-08-30T11:51:48.807Z
2023-08-30T11:51:48.807Z
{'Vendor': 'Premio', 'Product': 'Chaty', 'Versions': 'n/a'}
CVE-2023-25449
Cross-Site Request Forgery (CSRF) vulnerability in Oliver Seidel, Bastian Germann cformsII plugin <= 15.0.4 versions.
https://patchstack.com/database/vulnerability/cforms2/wordpress-cformsii-plugin-15-0-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:03.962Z
2023-06-15T11:58:41.088Z
2023-06-15T11:58:41.088Z
{'Vendor': 'Oliver Seidel, Bastian Germann', 'Product': 'cformsII', 'Versions': 'n/a'}