CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-25212 | Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromSetWirelessRepeat function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://github.com/DrizzlingSun/Tenda/blob/main/AC5/6/6.md | 2023-02-06T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25091 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface variable when out_acl is -1. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.070Z | 2023-07-06T14:53:24.243Z | 2023-07-17T19:35:20.108Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25838 |
There is SQL injection vulnerability in Esri ArcGIS Insights 2022.1 for ArcGIS Enterprise and that may allow a remote, authorized attacker to execute arbitrary SQL commands against the back-end database. The effort required to generate the crafted input required to exploit this issue is complex and requires significant effort before a successful attack can be expected.
| https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-insights-security-patches-for-arcgis-insights-2022-1-are-now-available/ | 2023-02-15T17:59:31.097Z | 2023-07-19T15:37:14.946Z | 2023-07-19T15:37:23.439Z | {'Vendor': 'Esri', 'Product': 'ArcGIS Insights', 'Versions': '2022.1'} |
CVE-2023-25992 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CreativeMindsSolutions CM Answers plugin <= 3.1.9 versions. | https://patchstack.com/database/vulnerability/cm-answers/wordpress-cm-answers-plugin-3-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:16.259Z | 2023-03-23T16:18:28.849Z | 2023-03-23T16:18:28.849Z | {'Vendor': 'CreativeMindsSolutions', 'Product': 'CM Answers', 'Versions': 'n/a'} |
CVE-2023-25584 | An out-of-bounds read flaw was found in the parse_module function in bfd/vms-alpha.c in Binutils. | https://access.redhat.com/security/cve/CVE-2023-25584 | 2023-02-07T19:03:20.220Z | 2023-09-14T20:50:58.267Z | 2023-09-14T20:50:58.267Z | {'Vendor': 'n/a', 'Product': 'binutils', 'Versions': ''} |
CVE-2023-25750 | Under certain circumstances, a ServiceWorker's offline cache may have leaked to the file system when using private browsing mode. This vulnerability affects Firefox < 111. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25615 | Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.
| https://launchpad.support.sap.com/#/notes/3289844 | 2023-02-09T13:30:50.223Z | 2023-03-14T04:40:25.108Z | 2023-04-11T21:28:52.633Z | {'Vendor': 'SAP', 'Product': 'ABAP\xa0Platform', 'Versions': '751, 753, 754, 756, 757, 791'} |
CVE-2023-25496 | A privilege escalation vulnerability was reported in Lenovo Drivers Management Lenovo Driver Manager that could allow a local user to execute code with elevated privileges. | https://iknow.lenovo.com.cn/detail/dc_415202.html | 2023-02-06T15:09:03.709Z | 2023-04-28T21:13:41.817Z | 2023-04-28T21:13:41.817Z | {'Vendor': 'Lenovo', 'Product': 'Lenovo Drivers Management', 'Versions': 'Versions prior to 3.1.1307.1308'} |
CVE-2023-25183 |
In Snap One OvrC Pro versions prior to 7.2, when logged into the superuser account, a new functionality appears that could allow users to execute arbitrary commands on the hub device.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | 2023-04-26T19:18:23.272Z | 2023-05-22T20:04:36.888Z | 2023-05-22T20:04:36.888Z | {'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'} |
CVE-2023-25479 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Podlove Podlove Subscribe button plugin <= 1.3.7 versions. | https://patchstack.com/database/vulnerability/podlove-subscribe-button/wordpress-podlove-subscribe-button-plugin-1-3-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:08.237Z | 2023-04-25T12:00:04.202Z | 2023-04-25T12:00:04.202Z | {'Vendor': 'Podlove', 'Product': 'Podlove Subscribe button', 'Versions': 'n/a'} |
CVE-2023-25029 | Cross-Site Request Forgery (CSRF) vulnerability in utahta WP Social Bookmarking Light plugin <= 2.0.7 versions. | https://patchstack.com/database/vulnerability/wp-social-bookmarking-light/wordpress-wp-social-bookmarking-light-plugin-2-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-02T09:58:49.593Z | 2023-05-26T13:46:52.366Z | 2023-05-26T13:46:52.366Z | {'Vendor': 'utahta', 'Product': 'WP Social Bookmarking Light', 'Versions': 'n/a'} |
CVE-2023-25880 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25746 | Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.8 and Firefox ESR < 102.8. | https://www.mozilla.org/security/advisories/mfsa2023-06/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'} |
CVE-2023-25603 | A permissive cross-domain policy with untrusted domains vulnerability in Fortinet FortiADC 7.1.0 - 7.1.1, FortiDDoS-F 6.3.0 - 6.3.4 and 6.4.0 - 6.4.1 allow an unauthorized attacker to carry out privileged actions and retrieve sensitive information via crafted web requests. | https://fortiguard.com/psirt/FG-IR-22-518 | 2023-02-08T13:42:03.366Z | 2023-11-14T18:08:16.641Z | 2023-11-14T18:08:16.641Z | {'Vendor': 'Fortinet', 'Product': 'FortiDDoS-F', 'Versions': '6.4.0, 6.3.0'} |
CVE-2023-25480 | Cross-Site Request Forgery (CSRF) vulnerability in BoldGrid Post and Page Builder by BoldGrid – Visual Drag and Drop Editor plugin <= 1.24.1 versions. | https://patchstack.com/database/vulnerability/post-and-page-builder/wordpress-post-and-page-builder-by-boldgrid-plugin-1-24-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:08.237Z | 2023-10-06T12:41:32.577Z | 2023-10-06T12:41:32.577Z | {'Vendor': 'BoldGrid', 'Product': 'Post and Page Builder by BoldGrid – Visual Drag and Drop Editor', 'Versions': 'n/a'} |
CVE-2023-25879 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25896 | Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25195 | Server-Side Request Forgery (SSRF) vulnerability in Apache Software Foundation Apache Fineract.
Authorized users with limited permissions can gain access to server and may be able to use server for any outbound traffic.
This issue affects Apache Fineract: from 1.4 through 1.8.3.
| https://lists.apache.org/thread/m58fdjmtkfp9h4c0r4l48rv995w3qhb6 | 2023-02-06T01:32:05.395Z | 2023-03-28T11:16:28.304Z | 2023-03-28T11:16:28.304Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Fineract', 'Versions': '1.4'} |
CVE-2023-25711 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPGlobus WPGlobus Translate Options plugin <= 2.1.0 versions. | https://patchstack.com/database/vulnerability/wpglobus-translate-options/wordpress-wpglobus-translate-options-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-13T04:14:01.863Z | 2023-04-07T12:24:52.786Z | 2023-04-07T12:24:52.786Z | {'Vendor': 'WPGlobus', 'Product': 'WPGlobus Translate Options', 'Versions': 'n/a'} |
CVE-2023-25654 | baserCMS is a Content Management system. Prior to version 4.7.5, there is a Remote Code Execution (RCE) Vulnerability in the management system of baserCMS. Version 4.7.5 contains a patch. | https://github.com/baserproject/basercms/security/advisories/GHSA-h4cc-fxpp-pgw9 | 2023-02-09T20:58:21.856Z | 2023-03-23T19:22:30.154Z | 2023-03-23T19:22:30.154Z | {'Vendor': 'baserproject', 'Product': 'basercms', 'Versions': '< 4.7.4'} |
CVE-2023-25984 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Rigorous & Factory Pattern Dovetail plugin <= 1.2.13 versions. | https://patchstack.com/database/vulnerability/dovetail/wordpress-dovetail-plugin-1-2-13-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:13.226Z | 2023-08-08T12:07:35.910Z | 2023-08-08T12:07:35.910Z | {'Vendor': 'Rigorous & Factory Pattern', 'Product': 'Dovetail', 'Versions': 'n/a'} |
CVE-2023-25087 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and to_dport variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.069Z | 2023-07-06T14:53:23.907Z | 2023-07-17T19:35:19.635Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25438 | An issue was discovered in Genomedics MilleGP5 5.9.2, allows remote attackers to execute arbitrary code and gain escalated privileges via modifying specific files. | https://millegpg.it/ | 2023-02-06T00:00:00 | 2023-05-04T00:00:00 | 2023-05-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25592 | Vulnerabilities within the web-based management interface of ClearPass Policy Manager could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt | 2023-02-07T20:24:22.480Z | 2023-03-14T14:51:34.731Z | 2023-03-22T04:39:15.803375Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'} |
CVE-2023-25859 | Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/illustrator/apsb23-19.html | 2023-02-15T00:00:00 | 2023-03-22T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Illustrator', 'Versions': 'unspecified, unspecified, unspecified'} |
CVE-2023-25789 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Tapfiliate plugin <= 3.0.12 versions. | https://patchstack.com/database/vulnerability/tapfiliate/wordpress-tapfiliate-plugin-3-0-12-cross-site-scripting-xss?_s_id=cve | 2023-02-15T12:10:40.367Z | 2023-05-03T10:43:20.195Z | 2023-05-03T10:43:20.195Z | {'Vendor': 'Tapfiliate', 'Product': 'Tapfiliate', 'Versions': 'n/a'} |
CVE-2023-25766 | A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1757 | 2023-02-14T00:00:00 | 2023-02-15T00:00:00 | 2023-10-24T12:48:59.562Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Azure Credentials Plugin', 'Versions': 'unspecified'} |
CVE-2023-25674 | TensorFlow is an open source machine learning platform. Versions prior to 2.12.0 and 2.11.1 have a null pointer error in RandomShuffle with XLA enabled. A fix is included in TensorFlow 2.12.0 and 2.11.1. | https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf97-q72m-7579 | 2023-02-09T20:58:21.859Z | 2023-03-24T23:13:05.753Z | 2023-03-24T23:13:05.753Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25361 | A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely. | https://bugs.webkit.org/show_bug.cgi?id=244249 | 2023-02-06T00:00:00 | 2023-03-02T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25731 | Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110. | https://www.mozilla.org/security/advisories/mfsa2023-05/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25818 | Nextcloud server is an open source, personal cloud implementation. In affected versions a malicious user could try to reset the password of another user and then brute force the 62^21 combinations for the password reset token. As of commit `704eb3aa` password reset attempts are now throttled. Note that 62^21 combinations would significant compute resources to brute force. None the less it is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. There are no known workarounds for this vulnerability. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-v243-x6jc-42mp | 2023-02-15T16:34:48.773Z | 2023-03-27T20:00:01.019Z | 2023-03-27T20:00:01.019Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.0, < 24.0.10, >= 25.0.0, < 25.0.4'} |
CVE-2023-25662 | TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 are vulnerable to integer overflow in EditDistance. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7jvm-xxmr-v5cw | 2023-02-09T20:58:21.857Z | 2023-03-24T23:41:15.425Z | 2023-03-24T23:41:15.425Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25727 | In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface. | https://www.phpmyadmin.net/security/PMASA-2023-1/ | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25459 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Postsnippets Post Snippets plugin <= 4.0.2 versions. | https://patchstack.com/database/vulnerability/post-snippets/wordpress-post-snippets-custom-wordpress-code-snippets-customizer-plugin-4-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:05.560Z | 2023-08-08T11:03:15.092Z | 2023-08-08T11:03:15.092Z | {'Vendor': 'Postsnippets', 'Product': 'Post Snippets', 'Versions': 'n/a'} |
CVE-2023-25009 | A malicious actor may convince a user to open a malicious USD file that may trigger an out-of-bounds write vulnerability which could result in code execution. | https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008 | 2023-02-01T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'Autodesk 3ds Max USD Plugin', 'Versions': '0.3'} |
CVE-2023-25265 | Docmosis Tornado <= 2.9.4 is vulnerable to Directory Traversal leading to the disclosure of arbitrary content on the file system. | https://resources.docmosis.com/content/documentation/tornado-v2-9-5-release-notes | 2023-02-06T00:00:00 | 2023-02-28T00:00:00 | 2023-02-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25770 | Controller DoS may occur due to buffer overflow when an error is generated in response to a specially crafted message. | https://process.honeywell.com | 2023-02-28T23:51:16.657Z | 2023-07-13T10:59:58.825Z | 2023-07-13T10:59:58.825Z | {'Vendor': 'Honeywell', 'Product': 'C300', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'} |
CVE-2023-25834 | Changes to user permissions in Portal for ArcGIS 10.9.1 and below are incompletely applied in specific use cases. This issue may allow users to access content that they are no longer privileged to access. | https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/ | 2023-02-15T00:00:00 | 2023-05-09T00:00:00 | 2023-05-22T00:00:00 | {'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '10.7.1'} |
CVE-2023-25567 | GSS-NTLMSSP, a mechglue plugin for the GSSAPI library that implements NTLM authentication, has an out-of-bounds read when decoding target information prior to version 1.2.0. The length of the `av_pair` is not checked properly for two of the elements which can trigger an out-of-bound read. The out-of-bounds read can be triggered via the main `gss_accept_sec_context` entry point and could cause a denial-of-service if the memory is unmapped. The issue is fixed in version 1.2.0. | https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-24pf-6prf-24ch | 2023-02-07T17:10:00.738Z | 2023-02-14T17:35:59.571Z | 2023-02-14T17:35:59.571Z | {'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'} |
CVE-2023-25588 | A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service. | https://access.redhat.com/security/cve/CVE-2023-25588 | 2023-02-07T19:03:20.221Z | 2023-09-14T20:47:16.974Z | 2023-09-14T20:47:16.974Z | {'Vendor': 'n/a', 'Product': 'binutils', 'Versions': ''} |
CVE-2023-25072 | Use of weak credentials exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to decrypt password for the WebUI of the product. | https://www.seiko-sol.co.jp/archives/73969/ | 2023-03-15T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A100/110', 'Versions': 'firmware Ver. 4.2.0 and earlier'} |
CVE-2023-25971 | Cross-Site Request Forgery (CSRF) vulnerability in FixBD Educare plugin <= 1.4.1 versions. | https://patchstack.com/database/vulnerability/educare/wordpress-educare-students-result-management-system-plugin-1-4-1-cross-site-request-forgery-csrf?_s_id=cve | 2023-02-17T13:47:09.997Z | 2023-05-26T11:06:05.388Z | 2023-05-26T11:06:05.388Z | {'Vendor': 'FixBD', 'Product': 'Educare', 'Versions': 'n/a'} |
CVE-2023-25160 | Nextcloud Mail is an email app for the Nextcloud home server platform. Prior to versions 2.2.1, 1.14.5, 1.12.9, and 1.11.8, an attacker can access the mail box by ID getting the subjects and the first characters of the emails. Users should upgrade to Mail 2.2.1 for Nextcloud 25, Mail 1.14.5 for Nextcloud 22-24, Mail 1.12.9 for Nextcloud 21, or Mail 1.11.8 for Nextcloud 20 to receive a patch. No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m45f-r5gh-h6cx | 2023-02-03T16:59:18.245Z | 2023-02-13T20:19:08.774Z | 2023-02-13T20:19:08.774Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 1.11.8, >= 1.12.0, < 1.12.9, >= 1.13.0, < 1.14.5, >= 2.0.0, < 2.2.1'} |
CVE-2023-25530 | NVIDIA DGX H100 BMC contains a vulnerability in the KVM service, where an attacker may cause improper input validation. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, and information disclosure. | https://nvidia.custhelp.com/app/answers/detail/a_id/5473 | 2023-02-07T02:57:25.084Z | 2023-09-20T00:09:17.195Z | 2023-09-20T00:09:17.195Z | {'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'} |
CVE-2023-25863 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25025 | Cross-Site Request Forgery (CSRF) vulnerability in Chetan Gole WP-CopyProtect [Protect your blog posts] plugin <= 3.1.0 versions. | https://patchstack.com/database/vulnerability/wp-copyprotect/wordpress-wp-copyprotect-protect-your-blog-posts-plugin-3-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-02T09:58:48.540Z | 2023-10-04T13:24:21.886Z | 2023-10-04T13:24:21.886Z | {'Vendor': 'Chetan Gole', 'Product': 'WP-CopyProtect [Protect your blog posts]', 'Versions': 'n/a'} |
CVE-2023-25475 | Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Smart YouTube PRO plugin <= 4.3 versions. | https://patchstack.com/database/vulnerability/smart-youtube/wordpress-smart-youtube-pro-plugin-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:08.236Z | 2023-07-18T11:58:20.481Z | 2023-07-18T11:58:20.481Z | {'Vendor': 'Vladimir Prelovac', 'Product': 'Smart YouTube PRO', 'Versions': 'n/a'} |
CVE-2023-25619 |
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that
could cause denial of service of the controller when communicating over the Modbus TCP
protocol.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-05.pdf | 2023-02-09T13:42:27.387Z | 2023-04-19T07:53:15.405Z | 2023-05-12T03:15:17.732918Z | {'Vendor': 'Schneider Electric', 'Product': 'Modicon M340 CPU (part numbers BMXP34*) ', 'Versions': 'prior to SV3.51'} |
CVE-2023-25875 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25526 | NVIDIA Cumulus Linux contains a vulnerability in neighmgrd and nlmanager where an attacker on an adjacent network may cause an uncaught exception by injecting a crafted packet. A successful exploit may lead to denial of service. | https://nvidia.custhelp.com/app/answers/detail/a_id/5480 | 2023-02-07T02:57:25.081Z | 2023-09-20T00:04:40.571Z | 2023-09-20T00:04:40.571Z | {'Vendor': 'NVIDIA', 'Product': 'Cumulus Linux', 'Versions': 'All versions prior to 5.5.0'} |
CVE-2023-25463 | Cross-Site Request Forgery (CSRF) vulnerability in Gopi Ramasamy WP tell a friend popup form plugin <= 7.1 versions. | https://patchstack.com/database/vulnerability/wp-tell-a-friend-popup-form/wordpress-wp-tell-a-friend-popup-form-plugin-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:06.873Z | 2023-10-03T10:27:35.298Z | 2023-10-03T10:27:35.298Z | {'Vendor': 'Gopi Ramasamy', 'Product': 'WP tell a friend popup form', 'Versions': 'n/a'} |
CVE-2023-25033 | Cross-Site Request Forgery (CSRF) vulnerability in Sumo Social Share Boost plugin <= 4.5 versions. | https://patchstack.com/database/vulnerability/social-share-boost/wordpress-social-share-boost-plugin-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-02T09:58:49.593Z | 2023-10-06T12:49:29.048Z | 2023-10-06T12:49:29.048Z | {'Vendor': 'Sumo', 'Product': 'Social Share Boost', 'Versions': 'n/a'} |
CVE-2023-25930 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.1, 11.1, and 11.5 is vulnerable to a denial of service. Under rare conditions, setting a special register may cause the Db2 server to terminate abnormally. IBM X-Force ID: 247862. | https://www.ibm.com/support/pages/node/6985677 | 2023-02-16T16:39:45.213Z | 2023-04-28T17:35:43.607Z | 2023-05-12T03:15:17.732918Z | {'Vendor': 'IBM', 'Product': 'DB2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1 ,11.5'} |
CVE-2023-25121 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the secrets_local variable. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.078Z | 2023-07-06T14:53:26.848Z | 2023-07-17T19:35:23.854Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25571 | Backstage is an open platform for building developer portals. `@backstage/catalog-model` prior to version 1.2.0, `@backstage/core-components` prior to 0.12.4, and `@backstage/plugin-catalog-backend` prior to 1.7.2 are affected by a cross-site scripting vulnerability. This vulnerability allows a malicious actor with access to add or modify content in an instance of the Backstage software catalog to inject script URLs in the entities stored in the catalog. If users of the catalog then click on said URLs, that can lead to an XSS attack.
This vulnerability has been patched in both the frontend and backend implementations. The default `Link` component from `@backstage/core-components` version 1.2.0 and greater will now reject `javascript:` URLs, and there is a global override of `window.open` to do the same. In addition, the catalog model v0.12.4 and greater as well as the catalog backend v1.7.2 and greater now has additional validation built in that prevents `javascript:` URLs in known annotations. As a workaround, the general practice of limiting access to modifying catalog content and requiring code reviews greatly help mitigate this vulnerability. | https://github.com/backstage/backstage/security/advisories/GHSA-7hv8-3fr9-j2hv | 2023-02-07T17:10:00.739Z | 2023-02-14T17:00:19.154Z | 2023-02-14T17:00:19.154Z | {'Vendor': 'backstage', 'Product': 'backstage', 'Versions': '< 1.2.0, < 0.12.4, < 1.7.2'} |
CVE-2023-25822 | ReportPortal is an AI-powered test automation platform. Prior to version 5.10.0 of the `com.epam.reportportal:service-api` module, corresponding to ReportPortal version 23.2, the ReportPortal database becomes unstable and reporting almost fully stops except for small launches with approximately 1 test inside when the test_item.path field is exceeded the allowable `ltree` field type indexing limit (path length>=120, approximately recursive nesting of the nested steps). REINDEX INDEX path_gist_idx and path_idx aren't helped. The problem was fixed in `com.epam.reportportal:service-api` module version 5.10.0 (product release 23.2), where the maximum number of nested elements were programmatically limited. A workaround is available. After deletion of the data with long paths, and reindexing both indexes (path_gist_idx and path_idx), the database becomes stable and ReportPortal works properly. | https://github.com/reportportal/reportportal/security/advisories/GHSA-mj24-gpw7-23m9 | 2023-02-15T16:34:48.774Z | 2023-10-09T13:13:53.391Z | 2023-10-09T13:13:53.391Z | {'Vendor': 'reportportal', 'Product': 'reportportal', 'Versions': '< 5.10.0'} |
CVE-2023-25967 | Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo plugin <= 6.0.2.0 versions. | https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-2-0-cross-site-request-forgery-csrf?_s_id=cve | 2023-02-17T13:47:07.371Z | 2023-05-03T15:29:45.820Z | 2023-05-03T15:29:45.820Z | {'Vendor': 'PeepSo', 'Product': 'Community by PeepSo', 'Versions': 'n/a'} |
CVE-2023-25064 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Matteo Candura WP htpasswd plugin <= 1.7 versions. | https://patchstack.com/database/vulnerability/wp-htpasswd/wordpress-wp-htpasswd-plugin-1-7-cross-site-scripting-xss?_s_id=cve | 2023-02-02T09:58:52.947Z | 2023-03-20T10:40:49.050Z | 2023-03-20T10:40:49.050Z | {'Vendor': 'Matteo Candura', 'Product': 'WP htpasswd', 'Versions': 'n/a'} |
CVE-2023-25434 | libtiff 4.5.0 is vulnerable to Buffer Overflow via extractContigSamplesBytes() at /libtiff/tools/tiffcrop.c:3215. | https://gitlab.com/libtiff/libtiff/-/issues/519 | 2023-02-06T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25658 | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6 | 2023-02-09T20:58:21.857Z | 2023-03-24T23:42:46.482Z | 2023-03-24T23:42:46.482Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25159 | Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Office is a document collaboration app for the same platform. Nextcloud Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, Nextcloud Enterprise Server 24.0.x prior to 24.0.8 and 25.0.x prior to 25.0.1, and Nextcloud Office (Richdocuments) App 6.x prior to 6.3.1 and 7.x prior to 7.0.1 have previews accessible without a watermark. The download should be hidden and the watermark should get applied. This issue is fixed in Nextcloud Server 25.0.1 and 24.0.8, Nextcloud Enterprise Server 25.0.1 and 24.0.8, and Nextcloud Office (Richdocuments) App 7.0.1 (for 25) and 6.3.1 (for 24). No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92g2-h5jv-jjmg | 2023-02-03T16:59:18.244Z | 2023-02-13T16:43:12.227Z | null | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.4, < 24.0.8, = 25.0.0, >= 6.0.0, < 6.3.1, = 7.0.0'} |
CVE-2023-25509 | NVIDIA DGX-1 SBIOS contains a vulnerability in Bds, which may lead to code execution, denial of service, and escalation of privileges. | https://nvidia.custhelp.com/app/answers/detail/a_id/5458 | 2023-02-07T02:57:11.658Z | 2023-04-22T02:32:42.396Z | 2023-04-22T02:32:42.396Z | {'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All SBIOS prior to S2W_3A13'} |
CVE-2023-25765 | In Jenkins Email Extension Plugin 2.93 and earlier, templates defined inside a folder were not subject to Script Security protection, allowing attackers able to define email templates in folders to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. | https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2939 | 2023-02-14T00:00:00 | 2023-02-15T00:00:00 | 2023-10-24T12:48:58.427Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Email Extension Plugin', 'Versions': 'unspecified, 2.89.0.1'} |
CVE-2023-25620 |
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that
could cause denial of service of the controller when a malicious project file is loaded onto the
controller by an authenticated user.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-05.pdf | 2023-02-09T13:42:27.387Z | 2023-04-19T08:17:57.240Z | 2023-05-12T03:15:17.732918Z | {'Vendor': 'Schneider Electric', 'Product': 'Modicon M340 CPU (part numbers BMXP34*) ', 'Versions': 'prior to SV3.51'} |
CVE-2023-25948 | Server information leak of configuration data when an error is generated in response to a specially crafted message. | https://process.honeywell.com | 2023-02-28T23:51:16.642Z | 2023-07-13T11:09:30.893Z | 2023-07-13T11:09:30.893Z | {'Vendor': 'Honeywell', 'Product': 'Experion Server', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'} |
CVE-2023-25698 | Cross-Site Request Forgery (CSRF) vulnerability in Studio Wombat Shoppable Images plugin <= 1.2.3 versions. | https://patchstack.com/database/vulnerability/mabel-shoppable-images-lite/wordpress-shoppable-images-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-13T04:13:47.556Z | 2023-05-18T10:45:15.968Z | 2023-05-18T10:45:15.968Z | {'Vendor': 'Studio Wombat', 'Product': 'Shoppable Images', 'Versions': 'n/a'} |
CVE-2023-25362 | A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely. | https://bugs.webkit.org/show_bug.cgi?id=244802 | 2023-02-06T00:00:00 | 2023-03-02T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25732 | When encoding data from an <code>inputStream</code> in <code>xpcom</code> the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. | https://www.mozilla.org/security/advisories/mfsa2023-06/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25118 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the username and the password variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.076Z | 2023-07-06T14:53:26.573Z | 2023-07-17T19:35:23.508Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25548 |
A CWE-863: Incorrect Authorization vulnerability exists that could allow access to device
credentials on specific DCE endpoints not being properly secured when a hacker is using a low
privileged user.
Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf | 2023-02-07T17:00:03.777Z | 2023-04-18T20:32:42.718Z | 2023-04-18T20:32:42.718Z | {'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'} |
CVE-2023-25724 | null | null | 2023-02-13T00:00:00 | null | 2023-02-14T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-25661 | TensorFlow is an Open Source Machine Learning Framework. In versions prior to 2.11.1 a malicious invalid input crashes a tensorflow model (Check Failed) and can be used to trigger a denial of service attack. A proof of concept can be constructed with the `Convolution3DTranspose` function. This Convolution3DTranspose layer is a very common API in modern neural networks. The ML models containing such vulnerable components could be deployed in ML applications or as cloud services. This failure could be potentially used to trigger a denial of service attack on ML cloud services. An attacker must have privilege to provide input to a `Convolution3DTranspose` call. This issue has been patched and users are advised to upgrade to version 2.11.1. There are no known workarounds for this vulnerability. | https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxgc-95xx-grvq | 2023-02-09T20:58:21.857Z | 2023-03-27T19:52:07.826Z | 2023-03-27T19:52:07.826Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25231 | Tenda Router W30E V1.0.1.25(633) is vulnerable to Buffer Overflow in function fromRouteStatic via parameters entrys and mitInterface. | https://github.com/Funcy33/Vluninfo_Repo/tree/main/CNVDs/104 | 2023-02-06T00:00:00 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25909 | HGiga OAKlouds file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary command or disrupt service. | https://www.twcert.org.tw/tw/cp-132-6973-45872-1.html | 2023-02-16T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'HGIGA INC.', 'Product': 'HGiga OAKlouds', 'Versions': '2, 3'} |
CVE-2023-25289 | Directory Traversal vulnerability in virtualreception Digital Receptie version win7sp1_rtm.101119-1850 6.1.7601.1.0.65792 in embedded web server, allows attacker to gain sensitive information via a crafted GET request. | https://www.exploit-db.com/exploits/51142 | 2023-02-06T00:00:00 | 2023-05-04T00:00:00 | 2023-05-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25773 | Improper access control in the Intel(R) Unite(R) Hub software installer for Windows before version 4.2.34962 may allow an authenticated user to potentially enable escalation of privilege via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00826.html | 2023-02-15T04:00:02.893Z | 2023-08-11T02:37:04.317Z | 2023-08-11T02:37:04.317Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Unite(R) Hub software installer for Windows', 'Versions': 'before version 4.2.34962'} |
CVE-2023-25266 | An issue was discovered in Docmosis Tornado prior to version 2.9.5. An authenticated attacker can change the Office directory setting pointing to an arbitrary remote network path. This triggers the execution of the soffice binary under the attackers control leading to arbitrary remote code execution (RCE). | https://resources.docmosis.com/content/documentation/tornado-v2-9-5-release-notes | 2023-02-06T00:00:00 | 2023-02-28T00:00:00 | 2023-02-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25972 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in IKSWEB WordPress Старт plugin <= 3.7 versions. | https://patchstack.com/database/vulnerability/iksweb/wordpress-start-plugin-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:09.997Z | 2023-06-15T12:28:29.649Z | 2023-06-15T12:28:29.649Z | {'Vendor': 'IKSWEB', 'Product': 'WordPress Старт', 'Versions': 'n/a'} |
CVE-2023-25071 | NULL pointer dereference in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows Drviers before version 31.0.101.4255 may allow authenticated user to potentially enable denial of service via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | 2023-03-22T03:00:05.340Z | 2023-11-14T19:04:23.342Z | 2023-11-14T19:04:23.342Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows Drviers', 'Versions': 'before version 31.0.101.4255'} |
CVE-2023-25564 | GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, memory corruption can be triggered when decoding UTF16 strings. The variable `outlen` was not initialized and could cause writing a zero to an arbitrary place in memory if `ntlm_str_convert()` were to fail, which would leave `outlen` uninitialized. This can lead to a denial of service if the write hits unmapped memory or randomly corrupts a byte in the application memory space. This vulnerability can trigger an out-of-bounds write, leading to memory corruption. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This issue is fixed in version 1.2.0. | https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-r85x-q5px-9xfq | 2023-02-07T17:10:00.735Z | 2023-02-14T17:35:26.294Z | 2023-02-14T17:35:26.294Z | {'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'} |
CVE-2023-25134 | McAfee Total Protection prior to 16.0.50 may allow an adversary (with full administrative access) to modify a McAfee specific Component Object Model (COM) in the Windows Registry. This can result in the loading of a malicious payload. | https://www.mcafee.com/en-us/consumer-corporate/mcafee-labs/product-security-bulletins.html | 2023-02-03T00:00:00 | 2023-03-21T00:00:00 | 2023-03-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25837 |
There is a Cross-site Scripting vulnerability in Esri ArcGIS Enterprise Sites versions 10.8.1 – 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. The privileges required to execute this attack are high.
| https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/ | 2023-02-15T17:59:31.097Z | 2023-07-21T03:42:24.610Z | 2023-11-30T15:30:27.302Z | {'Vendor': 'Esri', 'Product': 'Portal sites', 'Versions': '10.8.1'} |
CVE-2023-25358 | A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely. | https://bugs.webkit.org/show_bug.cgi?id=242683 | 2023-02-06T00:00:00 | 2023-03-02T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25708 | Cross-Site Request Forgery (CSRF) vulnerability in Rextheme WP VR – 360 Panorama and Virtual Tour Builder For WordPress plugin <= 8.2.7 versions. | https://patchstack.com/database/vulnerability/wpvr/wordpress-wp-vr-360-panorama-and-virtual-tour-builder-plugin-8-2-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-13T04:14:01.863Z | 2023-03-15T10:30:25.030Z | 2023-03-15T10:30:25.030Z | {'Vendor': 'Rextheme', 'Product': 'WP VR – 360 Panorama and Virtual Tour Builder For WordPress', 'Versions': 'n/a'} |
CVE-2023-25476 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ezoic AmpedSense – AdSense Split Tester plugin <= 4.68 versions. | https://patchstack.com/database/vulnerability/ampedsense-adsense-split-tester/wordpress-ampedsense-adsense-split-tester-plugin-4-68-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:08.236Z | 2023-10-18T07:56:06.571Z | 2023-10-18T07:56:06.571Z | {'Vendor': 'Ezoic', 'Product': 'AmpedSense – AdSense Split Tester', 'Versions': 'n/a'} |
CVE-2023-25860 | Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/illustrator/apsb23-19.html | 2023-02-15T00:00:00 | 2023-03-22T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Illustrator', 'Versions': 'unspecified, unspecified, unspecified'} |
CVE-2023-25499 | When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential information disclosure.
| https://vaadin.com/security/CVE-2023-25499 | 2023-02-06T20:44:44.569Z | 2023-06-22T12:47:57.760Z | 2023-06-22T12:47:57.760Z | {'Vendor': 'vaadin', 'Product': 'vaadin', 'Versions': '10.0.0, 11.0.0, 15.0.0, 23.0.0, 24.0.0, 24.1.0.alpha1'} |
CVE-2023-25163 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All versions of Argo CD starting with v2.6.0-rc1 have an output sanitization bug which leaks repository access credentials in error messages. These error messages are visible to the user, and they are logged. The error message is visible when a user attempts to create or update an Application via the Argo CD API (and therefor the UI or CLI). The user must have `applications, create` or `applications, update` RBAC access to reach the code which may produce the error. The user is not guaranteed to be able to trigger the error message. They may attempt to spam the API with requests to trigger a rate limit error from the upstream repository. If the user has `repositories, update` access, they may edit an existing repository to introduce a URL typo or otherwise force an error message. But if they have that level of access, they are probably intended to have access to the credentials anyway. A patch for this vulnerability has been released in version 2.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw | 2023-02-03T16:59:18.245Z | 2023-02-08T20:44:17.940Z | null | {'Vendor': 'argoproj', 'Product': 'argo-cd', 'Versions': '>= 2.6.0-rc1, < 2.6.1'} |
CVE-2023-25533 | NVIDIA DGX H100 BMC contains a vulnerability in the web UI, where an attacker may cause improper input validation. A successful exploit of this vulnerability may lead to information disclosure, code execution, and escalation of privileges. | https://nvidia.custhelp.com/app/answers/detail/a_id/5473 | 2023-02-07T02:57:25.085Z | 2023-09-20T00:54:06.187Z | 2023-09-20T00:54:06.187Z | {'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'} |
CVE-2023-25899 | Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25933 | A type confusion bug in TypedArray prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could have been used by a malicious attacker to execute arbitrary code via untrusted JavaScript. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected. | https://www.facebook.com/security/advisories/cve-2023-25933 | 2023-02-16T19:48:39.503Z | 2023-05-18T21:24:58.365Z | 2023-05-18T21:24:58.365Z | {'Vendor': 'Facebook', 'Product': 'Hermes', 'Versions': '0'} |
CVE-2023-25460 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CodeSolz Easy Ad Manager plugin <= 1.0.0 versions. | https://patchstack.com/database/vulnerability/easy-ad-manager/wordpress-easy-ad-manager-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:05.561Z | 2023-05-12T15:19:32.051Z | 2023-05-12T15:19:32.051Z | {'Vendor': 'CodeSolz', 'Product': 'Easy Ad Manager', 'Versions': 'n/a'} |
CVE-2023-25525 | NVIDIA Cumulus Linux contains a vulnerability in forwarding where a VxLAN-encapsulated IPv6 packet received on an SVI interface with DMAC/DIPv6 set to the link-local address of the SVI interface may be incorrectly forwarded. A successful exploit may lead to information disclosure. | https://nvidia.custhelp.com/app/answers/detail/a_id/5480 | 2023-02-07T02:57:25.081Z | 2023-09-20T00:03:02.330Z | 2023-09-20T00:03:02.330Z | {'Vendor': 'NVIDIA', 'Product': 'Cumulus Linux', 'Versions': 'All versions prior to 5.6.0'} |
CVE-2023-25175 | Improper input validation in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable information disclosure via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html | 2023-02-15T04:00:02.876Z | 2023-05-10T13:17:06.661Z | 2023-05-10T13:17:06.661Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BMC firmware', 'Versions': 'before version 2.90'} |
CVE-2023-25876 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25749 | Android applications with unpatched vulnerabilities can be launched from a browser using Intents, exposing users to these vulnerabilities. Firefox will now confirm with users that they want to launch an external application before doing so. <br>*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25437 | An issue was discovered in vTech VCS754 version 1.1.1.A before 1.1.1.H, allows attackers to gain escalated privileges and gain sensitive information due to cleartext passwords passed in the raw HTML. | 2023-02-06T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
|
CVE-2023-25964 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Noah Hearle, Design Extreme We’re Open! plugin <= 1.46 versions. | https://patchstack.com/database/vulnerability/opening-hours/wordpress-we-re-open-plugin-1-46-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:07.371Z | 2023-06-13T14:07:00.353Z | 2023-06-13T14:07:00.353Z | {'Vendor': 'Noah Hearle, Design Extreme', 'Product': 'We’re Open!', 'Versions': 'n/a'} |
CVE-2023-25821 | Nextcloud is an Open Source private cloud software. Versions 24.0.4 and above, prior to 24.0.7, and 25.0.0 and above, prior to 25.0.1, contain Improper Access Control. Secure view for internal shares can be circumvented if reshare permissions are also given. This issue is patched in versions 24.0.7 and 25.0.1. No workaround is available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w6h-5qgw-4j94 | 2023-02-15T16:34:48.774Z | 2023-02-24T23:39:51.684Z | 2023-02-24T23:39:51.684Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.4, < 24.0.7, >= 25.0.0, < 25.0.1'} |
CVE-2023-25122 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the old_remote_subnet and the old_remote_mask variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.078Z | 2023-07-06T14:53:26.927Z | 2023-07-17T19:35:23.969Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.