CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-25212
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromSetWirelessRepeat function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/6/6.md
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25091
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface variable when out_acl is -1.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.070Z
2023-07-06T14:53:24.243Z
2023-07-17T19:35:20.108Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25838
There is SQL injection vulnerability in Esri ArcGIS Insights 2022.1 for ArcGIS Enterprise and that may allow a remote, authorized attacker to execute arbitrary SQL commands against the back-end database. The effort required to generate the crafted input required to exploit this issue is complex and requires significant effort before a successful attack can be expected.
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-insights-security-patches-for-arcgis-insights-2022-1-are-now-available/
2023-02-15T17:59:31.097Z
2023-07-19T15:37:14.946Z
2023-07-19T15:37:23.439Z
{'Vendor': 'Esri', 'Product': 'ArcGIS Insights', 'Versions': '2022.1'}
CVE-2023-25992
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CreativeMindsSolutions CM Answers plugin <= 3.1.9 versions.
https://patchstack.com/database/vulnerability/cm-answers/wordpress-cm-answers-plugin-3-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:16.259Z
2023-03-23T16:18:28.849Z
2023-03-23T16:18:28.849Z
{'Vendor': 'CreativeMindsSolutions', 'Product': 'CM Answers', 'Versions': 'n/a'}
CVE-2023-25584
An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils.
https://access.redhat.com/security/cve/CVE-2023-25584
2023-02-07T19:03:20.220Z
2023-09-14T20:50:58.267Z
2023-09-14T20:50:58.267Z
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': ''}
CVE-2023-25750
Under certain circumstances, a ServiceWorker's offline cache may have leaked to the file system when using private browsing mode. This vulnerability affects Firefox < 111.
https://www.mozilla.org/security/advisories/mfsa2023-09/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25615
Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.
https://launchpad.support.sap.com/#/notes/3289844
2023-02-09T13:30:50.223Z
2023-03-14T04:40:25.108Z
2023-04-11T21:28:52.633Z
{'Vendor': 'SAP', 'Product': 'ABAP\xa0Platform', 'Versions': '751, 753, 754, 756, 757, 791'}
CVE-2023-25496
A privilege escalation vulnerability was reported in Lenovo Drivers Management Lenovo Driver Manager that could allow a local user to execute code with elevated privileges.
https://iknow.lenovo.com.cn/detail/dc_415202.html
2023-02-06T15:09:03.709Z
2023-04-28T21:13:41.817Z
2023-04-28T21:13:41.817Z
{'Vendor': 'Lenovo', 'Product': 'Lenovo Drivers Management', 'Versions': 'Versions prior to 3.1.1307.1308'}
CVE-2023-25183
In Snap One OvrC Pro versions prior to 7.2, when logged into the superuser account, a new functionality appears that could allow users to execute arbitrary commands on the hub device.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01
2023-04-26T19:18:23.272Z
2023-05-22T20:04:36.888Z
2023-05-22T20:04:36.888Z
{'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'}
CVE-2023-25479
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Podlove Podlove Subscribe button plugin <= 1.3.7 versions.
https://patchstack.com/database/vulnerability/podlove-subscribe-button/wordpress-podlove-subscribe-button-plugin-1-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:08.237Z
2023-04-25T12:00:04.202Z
2023-04-25T12:00:04.202Z
{'Vendor': 'Podlove', 'Product': 'Podlove Subscribe button', 'Versions': 'n/a'}
CVE-2023-25029
Cross-Site Request Forgery (CSRF) vulnerability in utahta WP Social Bookmarking Light plugin <= 2.0.7 versions.
https://patchstack.com/database/vulnerability/wp-social-bookmarking-light/wordpress-wp-social-bookmarking-light-plugin-2-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:49.593Z
2023-05-26T13:46:52.366Z
2023-05-26T13:46:52.366Z
{'Vendor': 'utahta', 'Product': 'WP Social Bookmarking Light', 'Versions': 'n/a'}
CVE-2023-25880
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25746
Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.8 and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
CVE-2023-25603
A permissive cross-domain policy with untrusted domains vulnerability in Fortinet FortiADC 7.1.0 - 7.1.1, FortiDDoS-F 6.3.0 - 6.3.4 and 6.4.0 - 6.4.1 allow an unauthorized attacker to carry out privileged actions and retrieve sensitive information via crafted web requests.
https://fortiguard.com/psirt/FG-IR-22-518
2023-02-08T13:42:03.366Z
2023-11-14T18:08:16.641Z
2023-11-14T18:08:16.641Z
{'Vendor': 'Fortinet', 'Product': 'FortiDDoS-F', 'Versions': '6.4.0, 6.3.0'}
CVE-2023-25480
Cross-Site Request Forgery (CSRF) vulnerability in BoldGrid Post and Page Builder by BoldGrid – Visual Drag and Drop Editor plugin <= 1.24.1 versions.
https://patchstack.com/database/vulnerability/post-and-page-builder/wordpress-post-and-page-builder-by-boldgrid-plugin-1-24-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:08.237Z
2023-10-06T12:41:32.577Z
2023-10-06T12:41:32.577Z
{'Vendor': 'BoldGrid', 'Product': 'Post and Page Builder by BoldGrid – Visual Drag and Drop Editor', 'Versions': 'n/a'}
CVE-2023-25879
Adobe Dimension versions 3.4.7 (and earlier) is affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25896
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25195
Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache Fineract. Authorized users with limited permissions can gain access to server and may be able to use server for any outbound traffic.  This issue affects Apache Fineract: from 1.4 through 1.8.3.
https://lists.apache.org/thread/m58fdjmtkfp9h4c0r4l48rv995w3qhb6
2023-02-06T01:32:05.395Z
2023-03-28T11:16:28.304Z
2023-03-28T11:16:28.304Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Fineract', 'Versions': '1.4'}
CVE-2023-25711
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPGlobus WPGlobus Translate Options plugin <= 2.1.0 versions.
https://patchstack.com/database/vulnerability/wpglobus-translate-options/wordpress-wpglobus-translate-options-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-13T04:14:01.863Z
2023-04-07T12:24:52.786Z
2023-04-07T12:24:52.786Z
{'Vendor': 'WPGlobus', 'Product': 'WPGlobus Translate Options', 'Versions': 'n/a'}
CVE-2023-25654
baserCMS is a Content Management system. Prior to version 4.7.5, there is a Remote Code Execution (RCE) Vulnerability in the management system of baserCMS. Version 4.7.5 contains a patch.
https://github.com/baserproject/basercms/security/advisories/GHSA-h4cc-fxpp-pgw9
2023-02-09T20:58:21.856Z
2023-03-23T19:22:30.154Z
2023-03-23T19:22:30.154Z
{'Vendor': 'baserproject', 'Product': 'basercms', 'Versions': '< 4.7.4'}
CVE-2023-25984
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Rigorous & Factory Pattern Dovetail plugin <= 1.2.13 versions.
https://patchstack.com/database/vulnerability/dovetail/wordpress-dovetail-plugin-1-2-13-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:13.226Z
2023-08-08T12:07:35.910Z
2023-08-08T12:07:35.910Z
{'Vendor': 'Rigorous & Factory Pattern', 'Product': 'Dovetail', 'Versions': 'n/a'}
CVE-2023-25087
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and to_dport variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.069Z
2023-07-06T14:53:23.907Z
2023-07-17T19:35:19.635Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25438
An issue was discovered in Genomedics MilleGP5 5.9.2, allows remote attackers to execute arbitrary code and gain escalated privileges via modifying specific files.
https://millegpg.it/
2023-02-06T00:00:00
2023-05-04T00:00:00
2023-05-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25592
Vulnerabilities within the web-based management interface of ClearPass Policy Manager could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt
2023-02-07T20:24:22.480Z
2023-03-14T14:51:34.731Z
2023-03-22T04:39:15.803375Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'}
CVE-2023-25859
Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/illustrator/apsb23-19.html
2023-02-15T00:00:00
2023-03-22T00:00:00
2023-03-22T00:00:00
{'Vendor': 'Adobe', 'Product': 'Illustrator', 'Versions': 'unspecified, unspecified, unspecified'}
CVE-2023-25789
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tapfiliate plugin <= 3.0.12 versions.
https://patchstack.com/database/vulnerability/tapfiliate/wordpress-tapfiliate-plugin-3-0-12-cross-site-scripting-xss?_s_id=cve
2023-02-15T12:10:40.367Z
2023-05-03T10:43:20.195Z
2023-05-03T10:43:20.195Z
{'Vendor': 'Tapfiliate', 'Product': 'Tapfiliate', 'Versions': 'n/a'}
CVE-2023-25766
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1757
2023-02-14T00:00:00
2023-02-15T00:00:00
2023-10-24T12:48:59.562Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Azure Credentials Plugin', 'Versions': 'unspecified'}
CVE-2023-25674
TensorFlow is an open source machine learning platform. Versions prior to 2.12.0 and 2.11.1 have a null pointer error in RandomShuffle with XLA enabled. A fix is included in TensorFlow 2.12.0 and 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579
2023-02-09T20:58:21.859Z
2023-03-24T23:13:05.753Z
2023-03-24T23:13:05.753Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25361
A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
https://bugs.webkit.org/show_bug.cgi?id=244249
2023-02-06T00:00:00
2023-03-02T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25731
Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110.
https://www.mozilla.org/security/advisories/mfsa2023-05/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25818
Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp
2023-02-15T16:34:48.773Z
2023-03-27T20:00:01.019Z
2023-03-27T20:00:01.019Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.0, < 24.0.10, >= 25.0.0, < 25.0.4'}
CVE-2023-25662
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 are vulnerable to integer overflow in EditDistance. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7jvm-xxmr-v5cw
2023-02-09T20:58:21.857Z
2023-03-24T23:41:15.425Z
2023-03-24T23:41:15.425Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25727
In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.
https://www.phpmyadmin.net/security/PMASA-2023-1/
2023-02-13T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25459
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Postsnippets Post Snippets plugin <= 4.0.2 versions.
https://patchstack.com/database/vulnerability/post-snippets/wordpress-post-snippets-custom-wordpress-code-snippets-customizer-plugin-4-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:05.560Z
2023-08-08T11:03:15.092Z
2023-08-08T11:03:15.092Z
{'Vendor': 'Postsnippets', 'Product': 'Post Snippets', 'Versions': 'n/a'}
CVE-2023-25009
A malicious actor may convince a user to open a malicious USD file that may trigger an out-of-bounds write vulnerability which could result in code execution.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008
2023-02-01T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'Autodesk 3ds Max USD Plugin', 'Versions': '0.3'}
CVE-2023-25265
Docmosis Tornado <= 2.9.4 is vulnerable to Directory Traversal leading to the disclosure of arbitrary content on the file system.
https://resources.docmosis.com/content/documentation/tornado-v2-9-5-release-notes
2023-02-06T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25770
Controller DoS may occur due to buffer overflow when an error is generated in response to a specially crafted message.
https://process.honeywell.com
2023-02-28T23:51:16.657Z
2023-07-13T10:59:58.825Z
2023-07-13T10:59:58.825Z
{'Vendor': 'Honeywell', 'Product': 'C300', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'}
CVE-2023-25834
Changes to user permissions in Portal for ArcGIS 10.9.1 and below are incompletely applied in specific use cases. This issue may allow users to access content that they are no longer privileged to access.
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/
2023-02-15T00:00:00
2023-05-09T00:00:00
2023-05-22T00:00:00
{'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '10.7.1'}
CVE-2023-25567
GSS-NTLMSSP, a mechglue plugin for the GSSAPI library that implements NTLM authentication, has an out-of-bounds read when decoding target information prior to version 1.2.0. The length of the `av_pair` is not checked properly for two of the elements which can trigger an out-of-bound read. The out-of-bounds read can be triggered via the main `gss_accept_sec_context` entry point and could cause a denial-of-service if the memory is unmapped. The issue is fixed in version 1.2.0.
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-24pf-6prf-24ch
2023-02-07T17:10:00.738Z
2023-02-14T17:35:59.571Z
2023-02-14T17:35:59.571Z
{'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'}
CVE-2023-25588
A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.
https://access.redhat.com/security/cve/CVE-2023-25588
2023-02-07T19:03:20.221Z
2023-09-14T20:47:16.974Z
2023-09-14T20:47:16.974Z
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': ''}
CVE-2023-25072
Use of weak credentials exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product.
https://www.seiko-sol.co.jp/archives/73969/
2023-03-15T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A100/110', 'Versions': 'firmware Ver. 4.2.0 and earlier'}
CVE-2023-25971
Cross-Site Request Forgery (CSRF) vulnerability in FixBD Educare plugin <= 1.4.1 versions.
https://patchstack.com/database/vulnerability/educare/wordpress-educare-students-result-management-system-plugin-1-4-1-cross-site-request-forgery-csrf?_s_id=cve
2023-02-17T13:47:09.997Z
2023-05-26T11:06:05.388Z
2023-05-26T11:06:05.388Z
{'Vendor': 'FixBD', 'Product': 'Educare', 'Versions': 'n/a'}
CVE-2023-25160
Nextcloud Mail is an email app for the Nextcloud home server platform. Prior to versions 2.2.1, 1.14.5, 1.12.9, and 1.11.8, an attacker can access the mail box by ID getting the subjects and the first characters of the emails. Users should upgrade to Mail 2.2.1 for Nextcloud 25, Mail 1.14.5 for Nextcloud 22-24, Mail 1.12.9 for Nextcloud 21, or Mail 1.11.8 for Nextcloud 20 to receive a patch. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m45f-r5gh-h6cx
2023-02-03T16:59:18.245Z
2023-02-13T20:19:08.774Z
2023-02-13T20:19:08.774Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 1.11.8, >= 1.12.0, < 1.12.9, >= 1.13.0, < 1.14.5, >= 2.0.0, < 2.2.1'}
CVE-2023-25530
NVIDIA DGX H100 BMC contains a vulnerability in the KVM service, where an attacker may cause improper input validation. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, and information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
2023-02-07T02:57:25.084Z
2023-09-20T00:09:17.195Z
2023-09-20T00:09:17.195Z
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
CVE-2023-25863
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25025
Cross-Site Request Forgery (CSRF) vulnerability in Chetan Gole WP-CopyProtect [Protect your blog posts] plugin <= 3.1.0 versions.
https://patchstack.com/database/vulnerability/wp-copyprotect/wordpress-wp-copyprotect-protect-your-blog-posts-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:48.540Z
2023-10-04T13:24:21.886Z
2023-10-04T13:24:21.886Z
{'Vendor': 'Chetan Gole', 'Product': 'WP-CopyProtect [Protect your blog posts]', 'Versions': 'n/a'}
CVE-2023-25475
Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Smart YouTube PRO plugin <= 4.3 versions.
https://patchstack.com/database/vulnerability/smart-youtube/wordpress-smart-youtube-pro-plugin-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:08.236Z
2023-07-18T11:58:20.481Z
2023-07-18T11:58:20.481Z
{'Vendor': 'Vladimir Prelovac', 'Product': 'Smart YouTube PRO', 'Versions': 'n/a'}
CVE-2023-25619
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when communicating over the Modbus TCP protocol.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-05.pdf
2023-02-09T13:42:27.387Z
2023-04-19T07:53:15.405Z
2023-05-12T03:15:17.732918Z
{'Vendor': 'Schneider Electric', 'Product': 'Modicon M340 CPU (part numbers BMXP34*) ', 'Versions': 'prior to SV3.51'}
CVE-2023-25875
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25526
NVIDIA Cumulus Linux contains a vulnerability in neighmgrd and nlmanager where an attacker on an adjacent network may cause an uncaught exception by injecting a crafted packet. A successful exploit may lead to denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5480
2023-02-07T02:57:25.081Z
2023-09-20T00:04:40.571Z
2023-09-20T00:04:40.571Z
{'Vendor': 'NVIDIA', 'Product': 'Cumulus Linux', 'Versions': 'All versions prior to 5.5.0'}
CVE-2023-25463
Cross-Site Request Forgery (CSRF) vulnerability in Gopi Ramasamy WP tell a friend popup form plugin <= 7.1 versions.
https://patchstack.com/database/vulnerability/wp-tell-a-friend-popup-form/wordpress-wp-tell-a-friend-popup-form-plugin-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:06.873Z
2023-10-03T10:27:35.298Z
2023-10-03T10:27:35.298Z
{'Vendor': 'Gopi Ramasamy', 'Product': 'WP tell a friend popup form', 'Versions': 'n/a'}
CVE-2023-25033
Cross-Site Request Forgery (CSRF) vulnerability in Sumo Social Share Boost plugin <= 4.5 versions.
https://patchstack.com/database/vulnerability/social-share-boost/wordpress-social-share-boost-plugin-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:49.593Z
2023-10-06T12:49:29.048Z
2023-10-06T12:49:29.048Z
{'Vendor': 'Sumo', 'Product': 'Social Share Boost', 'Versions': 'n/a'}
CVE-2023-25930
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.1, 11.1, and 11.5 is vulnerable to a denial of service. Under rare conditions, setting a special register may cause the Db2 server to terminate abnormally. IBM X-Force ID: 247862.
https://www.ibm.com/support/pages/node/6985677
2023-02-16T16:39:45.213Z
2023-04-28T17:35:43.607Z
2023-05-12T03:15:17.732918Z
{'Vendor': 'IBM', 'Product': 'DB2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1 ,11.5'}
CVE-2023-25121
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the secrets_local variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.078Z
2023-07-06T14:53:26.848Z
2023-07-17T19:35:23.854Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25571
Backstage is an open platform for building developer portals. `@backstage/catalog-model` prior to version 1.2.0, `@backstage/core-components` prior to 0.12.4, and `@backstage/plugin-catalog-backend` prior to 1.7.2 are affected by a cross-site scripting vulnerability. This vulnerability allows a malicious actor with access to add or modify content in an instance of the Backstage software catalog to inject script URLs in the entities stored in the catalog. If users of the catalog then click on said URLs, that can lead to an XSS attack. This vulnerability has been patched in both the frontend and backend implementations. The default `Link` component from `@backstage/core-components` version 1.2.0 and greater will now reject `javascript:` URLs, and there is a global override of `window.open` to do the same. In addition, the catalog model v0.12.4 and greater as well as the catalog backend v1.7.2 and greater now has additional validation built in that prevents `javascript:` URLs in known annotations. As a workaround, the general practice of limiting access to modifying catalog content and requiring code reviews greatly help mitigate this vulnerability.
https://github.com/backstage/backstage/security/advisories/GHSA-7hv8-3fr9-j2hv
2023-02-07T17:10:00.739Z
2023-02-14T17:00:19.154Z
2023-02-14T17:00:19.154Z
{'Vendor': 'backstage', 'Product': 'backstage', 'Versions': '< 1.2.0, < 0.12.4, < 1.7.2'}
CVE-2023-25822
ReportPortal is an AI-powered test automation platform. Prior to version 5.10.0 of the `com.epam.reportportal:service-api` module, corresponding to ReportPortal version 23.2, the ReportPortal database becomes unstable and reporting almost fully stops except for small launches with approximately 1 test inside when the test_item.path field is exceeded the allowable `ltree` field type indexing limit (path length>=120, approximately recursive nesting of the nested steps). REINDEX INDEX path_gist_idx and path_idx aren't helped. The problem was fixed in `com.epam.reportportal:service-api` module version 5.10.0 (product release 23.2), where the maximum number of nested elements were programmatically limited. A workaround is available. After deletion of the data with long paths, and reindexing both indexes (path_gist_idx and path_idx), the database becomes stable and ReportPortal works properly.
https://github.com/reportportal/reportportal/security/advisories/GHSA-mj24-gpw7-23m9
2023-02-15T16:34:48.774Z
2023-10-09T13:13:53.391Z
2023-10-09T13:13:53.391Z
{'Vendor': 'reportportal', 'Product': 'reportportal', 'Versions': '< 5.10.0'}
CVE-2023-25967
Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo plugin <= 6.0.2.0 versions.
https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-2-0-cross-site-request-forgery-csrf?_s_id=cve
2023-02-17T13:47:07.371Z
2023-05-03T15:29:45.820Z
2023-05-03T15:29:45.820Z
{'Vendor': 'PeepSo', 'Product': 'Community by PeepSo', 'Versions': 'n/a'}
CVE-2023-25064
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Matteo Candura WP htpasswd plugin <= 1.7 versions.
https://patchstack.com/database/vulnerability/wp-htpasswd/wordpress-wp-htpasswd-plugin-1-7-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:52.947Z
2023-03-20T10:40:49.050Z
2023-03-20T10:40:49.050Z
{'Vendor': 'Matteo Candura', 'Product': 'WP htpasswd', 'Versions': 'n/a'}
CVE-2023-25434
libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215.
https://gitlab.com/libtiff/libtiff/-/issues/519
2023-02-06T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25658
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6
2023-02-09T20:58:21.857Z
2023-03-24T23:42:46.482Z
2023-03-24T23:42:46.482Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25159
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Office is a document collaboration app for the same platform. Nextcloud Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, Nextcloud Enterprise Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, and Nextcloud Office (Richdocuments) App 6.x prior to 6.3.1 and 7.x prior to 7.0.1 have previews accessible without a watermark. The download should be hidden and the watermark should get applied. This issue is fixed in Nextcloud Server 25.0.1 and 24.0.8, Nextcloud Enterprise Server 25.0.1 and 24.0.8, and Nextcloud Office (Richdocuments) App 7.0.1 (for 25) and 6.3.1 (for 24). No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92g2-h5jv-jjmg
2023-02-03T16:59:18.244Z
2023-02-13T16:43:12.227Z
null
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.4, < 24.0.8, = 25.0.0, >= 6.0.0, < 6.3.1, = 7.0.0'}
CVE-2023-25509
NVIDIA DGX-1 SBIOS contains a vulnerability in Bds, which may lead to code execution, denial of service, and escalation of privileges.
https://nvidia.custhelp.com/app/answers/detail/a_id/5458
2023-02-07T02:57:11.658Z
2023-04-22T02:32:42.396Z
2023-04-22T02:32:42.396Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All SBIOS prior to S2W_3A13'}
CVE-2023-25765
In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM.
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939
2023-02-14T00:00:00
2023-02-15T00:00:00
2023-10-24T12:48:58.427Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Email Extension Plugin', 'Versions': 'unspecified, 2.89.0.1'}
CVE-2023-25620
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when a malicious project file is loaded onto the controller by an authenticated user.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-05.pdf
2023-02-09T13:42:27.387Z
2023-04-19T08:17:57.240Z
2023-05-12T03:15:17.732918Z
{'Vendor': 'Schneider Electric', 'Product': 'Modicon M340 CPU (part numbers BMXP34*) ', 'Versions': 'prior to SV3.51'}
CVE-2023-25948
Server information leak of configuration data when an error is generated in response to a specially crafted message.
https://process.honeywell.com
2023-02-28T23:51:16.642Z
2023-07-13T11:09:30.893Z
2023-07-13T11:09:30.893Z
{'Vendor': 'Honeywell', 'Product': 'Experion Server', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'}
CVE-2023-25698
Cross-Site Request Forgery (CSRF) vulnerability in Studio Wombat Shoppable Images plugin <= 1.2.3 versions.
https://patchstack.com/database/vulnerability/mabel-shoppable-images-lite/wordpress-shoppable-images-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-13T04:13:47.556Z
2023-05-18T10:45:15.968Z
2023-05-18T10:45:15.968Z
{'Vendor': 'Studio Wombat', 'Product': 'Shoppable Images', 'Versions': 'n/a'}
CVE-2023-25362
A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
https://bugs.webkit.org/show_bug.cgi?id=244802
2023-02-06T00:00:00
2023-03-02T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25732
When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25118
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the username and the password variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.076Z
2023-07-06T14:53:26.573Z
2023-07-17T19:35:23.508Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25548
A CWE-863: Incorrect Authorization vulnerability exists that could allow access to device credentials on specific DCE endpoints not being properly secured when a hacker is using a low privileged user. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf
2023-02-07T17:00:03.777Z
2023-04-18T20:32:42.718Z
2023-04-18T20:32:42.718Z
{'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'}
CVE-2023-25724
null
null
2023-02-13T00:00:00
null
2023-02-14T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25661
TensorFlow is an Open Source Machine Learning Framework. In versions prior to 2.11.1 a malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack. A proof of concept can be constructed with the `Convolution3DTranspose` function. This Convolution3DTranspose layer is a very common API in modern neural networks. The ML models containing such vulnerable components could be deployed in ML applications or as cloud services. This failure could be potentially used to trigger a denial of service attack on ML cloud services. An attacker must have privilege to provide input to a `Convolution3DTranspose` call. This issue has been patched and users are advised to upgrade to version 2.11.1. There are no known workarounds for this vulnerability.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxgc-95xx-grvq
2023-02-09T20:58:21.857Z
2023-03-27T19:52:07.826Z
2023-03-27T19:52:07.826Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25231
Tenda Router W30E V1.0.1.25(633) is vulnerable to Buffer Overflow in function fromRouteStatic via parameters entrys and mitInterface.
https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104
2023-02-06T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25909
HGiga OAKlouds file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary command or disrupt service.
https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html
2023-02-16T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'HGIGA INC.', 'Product': 'HGiga OAKlouds', 'Versions': '2, 3'}
CVE-2023-25289
Directory Traversal vulnerability in virtualreception Digital Receptie version win7sp1_rtm.101119-1850 6.1.7601.1.0.65792 in embedded web server, allows attacker to gain sensitive information via a crafted GET request.
https://www.exploit-db.com/exploits/51142
2023-02-06T00:00:00
2023-05-04T00:00:00
2023-05-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25773
Improper access control in the Intel(R) Unite(R) Hub software installer for Windows before version 4.2.34962 may allow an authenticated user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00826.html
2023-02-15T04:00:02.893Z
2023-08-11T02:37:04.317Z
2023-08-11T02:37:04.317Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Unite(R) Hub software installer for Windows', 'Versions': 'before version 4.2.34962'}
CVE-2023-25266
An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE).
https://resources.docmosis.com/content/documentation/tornado-v2-9-5-release-notes
2023-02-06T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25972
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in IKSWEB WordPress Старт plugin <= 3.7 versions.
https://patchstack.com/database/vulnerability/iksweb/wordpress-start-plugin-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:09.997Z
2023-06-15T12:28:29.649Z
2023-06-15T12:28:29.649Z
{'Vendor': 'IKSWEB', 'Product': 'WordPress Старт', 'Versions': 'n/a'}
CVE-2023-25071
NULL pointer dereference in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows Drviers before version 31.0.101.4255 may allow authenticated user to potentially enable denial of service via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html
2023-03-22T03:00:05.340Z
2023-11-14T19:04:23.342Z
2023-11-14T19:04:23.342Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows Drviers', 'Versions': 'before version 31.0.101.4255'}
CVE-2023-25564
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, memory corruption can be triggered when decoding UTF16 strings. The variable `outlen` was not initialized and could cause writing a zero to an arbitrary place in memory if `ntlm_str_convert()` were to fail, which would leave `outlen` uninitialized. This can lead to a denial of service if the write hits unmapped memory or randomly corrupts a byte in the application memory space. This vulnerability can trigger an out-of-bounds write, leading to memory corruption. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This issue is fixed in version 1.2.0.
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-r85x-q5px-9xfq
2023-02-07T17:10:00.735Z
2023-02-14T17:35:26.294Z
2023-02-14T17:35:26.294Z
{'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'}
CVE-2023-25134
McAfee Total Protection prior to 16.0.50 may allow an adversary (with full administrative access) to modify a McAfee specific Component Object Model (COM) in the Windows Registry. This can result in the loading of a malicious payload.
https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html
2023-02-03T00:00:00
2023-03-21T00:00:00
2023-03-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25837
There is a Cross-site Scripting vulnerability in Esri ArcGIS Enterprise Sites versions 10.8.1 – 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser.  The privileges required to execute this attack are high.   
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/
2023-02-15T17:59:31.097Z
2023-07-21T03:42:24.610Z
2023-11-30T15:30:27.302Z
{'Vendor': 'Esri', 'Product': 'Portal sites', 'Versions': '10.8.1'}
CVE-2023-25358
A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
https://bugs.webkit.org/show_bug.cgi?id=242683
2023-02-06T00:00:00
2023-03-02T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25708
Cross-Site Request Forgery (CSRF) vulnerability in Rextheme WP VR – 360 Panorama and Virtual Tour Builder For WordPress plugin <= 8.2.7 versions.
https://patchstack.com/database/vulnerability/wpvr/wordpress-wp-vr-360-panorama-and-virtual-tour-builder-plugin-8-2-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-13T04:14:01.863Z
2023-03-15T10:30:25.030Z
2023-03-15T10:30:25.030Z
{'Vendor': 'Rextheme', 'Product': 'WP VR – 360 Panorama and Virtual Tour Builder For WordPress', 'Versions': 'n/a'}
CVE-2023-25476
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ezoic AmpedSense – AdSense Split Tester plugin <= 4.68 versions.
https://patchstack.com/database/vulnerability/ampedsense-adsense-split-tester/wordpress-ampedsense-adsense-split-tester-plugin-4-68-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:08.236Z
2023-10-18T07:56:06.571Z
2023-10-18T07:56:06.571Z
{'Vendor': 'Ezoic', 'Product': 'AmpedSense – AdSense Split Tester', 'Versions': 'n/a'}
CVE-2023-25860
Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/illustrator/apsb23-19.html
2023-02-15T00:00:00
2023-03-22T00:00:00
2023-03-22T00:00:00
{'Vendor': 'Adobe', 'Product': 'Illustrator', 'Versions': 'unspecified, unspecified, unspecified'}
CVE-2023-25499
When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential information disclosure.
https://vaadin.com/security/CVE-2023-25499
2023-02-06T20:44:44.569Z
2023-06-22T12:47:57.760Z
2023-06-22T12:47:57.760Z
{'Vendor': 'vaadin', 'Product': 'vaadin', 'Versions': '10.0.0, 11.0.0, 15.0.0, 23.0.0, 24.0.0, 24.1.0.alpha1'}
CVE-2023-25163
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway. A patch for this vulnerability has been released in version 2.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw
2023-02-03T16:59:18.245Z
2023-02-08T20:44:17.940Z
null
{'Vendor': 'argoproj', 'Product': 'argo-cd', 'Versions': '>= 2.6.0-rc1, < 2.6.1'}
CVE-2023-25533
NVIDIA DGX H100 BMC contains a vulnerability in the web UI, where an attacker may cause improper input validation. A successful exploit of this vulnerability may lead to information disclosure, code execution, and escalation of privileges.
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
2023-02-07T02:57:25.085Z
2023-09-20T00:54:06.187Z
2023-09-20T00:54:06.187Z
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
CVE-2023-25899
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25933
A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
https://www.facebook.com/security/advisories/cve-2023-25933
2023-02-16T19:48:39.503Z
2023-05-18T21:24:58.365Z
2023-05-18T21:24:58.365Z
{'Vendor': 'Facebook', 'Product': 'Hermes', 'Versions': '0'}
CVE-2023-25460
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CodeSolz Easy Ad Manager plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/easy-ad-manager/wordpress-easy-ad-manager-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:05.561Z
2023-05-12T15:19:32.051Z
2023-05-12T15:19:32.051Z
{'Vendor': 'CodeSolz', 'Product': 'Easy Ad Manager', 'Versions': 'n/a'}
CVE-2023-25525
NVIDIA Cumulus Linux contains a vulnerability in forwarding where a VxLAN-encapsulated IPv6 packet received on an SVI interface with DMAC/DIPv6 set to the link-local address of the SVI interface may be incorrectly forwarded. A successful exploit may lead to information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5480
2023-02-07T02:57:25.081Z
2023-09-20T00:03:02.330Z
2023-09-20T00:03:02.330Z
{'Vendor': 'NVIDIA', 'Product': 'Cumulus Linux', 'Versions': 'All versions prior to 5.6.0'}
CVE-2023-25175
Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html
2023-02-15T04:00:02.876Z
2023-05-10T13:17:06.661Z
2023-05-10T13:17:06.661Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BMC firmware', 'Versions': 'before version 2.90'}
CVE-2023-25876
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25749
Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so. <br>*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111.
https://www.mozilla.org/security/advisories/mfsa2023-09/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25437
An issue was discovered in vTech VCS754 version 1.1.1.A before 1.1.1.H, allows attackers to gain escalated privileges and gain sensitive information due to cleartext passwords passed in the raw HTML.
https://i.imgur.com/aDuiY8q.png
2023-02-06T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25964
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Noah Hearle, Design Extreme We’re Open! plugin <= 1.46 versions.
https://patchstack.com/database/vulnerability/opening-hours/wordpress-we-re-open-plugin-1-46-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:07.371Z
2023-06-13T14:07:00.353Z
2023-06-13T14:07:00.353Z
{'Vendor': 'Noah Hearle, Design Extreme', 'Product': 'We’re Open!', 'Versions': 'n/a'}
CVE-2023-25821
Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w6h-5qgw-4j94
2023-02-15T16:34:48.774Z
2023-02-24T23:39:51.684Z
2023-02-24T23:39:51.684Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.4, < 24.0.7, >= 25.0.0, < 25.0.1'}
CVE-2023-25122
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the old_remote_subnet and the old_remote_mask variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.078Z
2023-07-06T14:53:26.927Z
2023-07-17T19:35:23.969Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}