CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-25088
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and description variables.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.069Z
|
2023-07-06T14:53:23.991Z
|
2023-07-17T19:35:19.756Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25572
|
react-admin is a frontend framework for building browser applications on top of REST/GraphQL APIs. react-admin prior to versions 3.19.12 and 4.7.6, along with ra-ui-materialui prior to 3.19.12 and 4.7.6, are vulnerable to cross-site scripting. All React applications built with react-admin and using the `<RichTextField>` are affected. `<RichTextField>` outputs the field value using `dangerouslySetInnerHTML` without client-side sanitization. If the data isn't sanitized server-side, this opens a possible cross-site scripting (XSS) attack. Versions 3.19.12 and 4.7.6 now use `DOMPurify` to escape the HTML before outputting it with React and `dangerouslySetInnerHTML`. Users who already sanitize HTML data server-side do not need to upgrade. As a workaround, users may replace the `<RichTextField>` by a custom field doing sanitization by hand.
|
https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v
|
2023-02-07T17:10:00.739Z
|
2023-02-13T20:49:54.340Z
|
2023-02-13T20:49:54.340Z
|
{'Vendor': 'marmelab', 'Product': 'react-admin', 'Versions': '< 3.19.12, >= 4.0.0, < 4.7.6'}
|
CVE-2023-25786
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Thom Stark Eyes Only: User Access Shortcode plugin <= 1.8.2 versions.
|
https://patchstack.com/database/vulnerability/eyes-only-user-access-shortcode/wordpress-eyes-only-user-access-shortcode-plugin-1-8-2-cross-site-scripting-xss?_s_id=cve
|
2023-02-15T12:10:40.366Z
|
2023-05-03T10:47:20.339Z
|
2023-05-03T10:47:20.339Z
|
{'Vendor': 'Thom Stark', 'Product': 'Eyes Only: User Access Shortcode', 'Versions': 'n/a'}
|
CVE-2023-25505
|
NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler of the AMI MegaRAC BMC , where an attacker with the appropriate level of authorization can cause a buffer overflow, which may lead to denial of service, information disclosure, or arbitrary code execution.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5458
|
2023-02-07T02:57:11.656Z
|
2023-04-22T02:29:45.535Z
|
2023-04-22T02:29:45.535Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 3.39.3'}
|
CVE-2023-25155
|
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
|
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83
|
2023-02-03T16:59:18.242Z
|
2023-03-02T03:01:36.879Z
|
2023-03-02T03:01:36.879Z
|
{'Vendor': 'redis', 'Product': 'redis', 'Versions': '< 6.0.18, >= 7.0.0, < 7.0.9, >= 6.2.0, < 6.2.11'}
|
CVE-2023-25913
|
Because of an authentication flaw an attacker would be capable of generating a web report that discloses sensitive information such as internal IP addresses, usernames, store names and other sensitive information.
|
https://csirt.divd.nl/CVE-2023-25913
|
2023-02-16T14:22:41.966Z
|
2023-08-21T20:30:03.854Z
|
2023-08-21T20:30:03.854Z
|
{'Vendor': 'Danfoss', 'Product': 'AK-SM800A', 'Versions': '< 3.3'}
|
CVE-2023-25440
|
Stored Cross Site Scripting (XSS) vulnerability in the add contact function CiviCRM 5.59.alpha1, allows attackers to execute arbitrary code in first/second name field.
|
https://civicrm.org/
|
2023-02-06T00:00:00
|
2023-05-23T00:00:00
|
2023-05-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25010
|
A malicious actor may convince a victim to open a malicious USD file that may trigger an uninitialized variable which may result in code execution.
|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0003
|
2023-02-01T00:00:00
|
2023-04-17T00:00:00
|
2023-04-17T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Autodesk Maya USD Plugin', 'Versions': '0.22.0'}
|
CVE-2023-25694
| null | null |
2023-02-13T00:00:00
| null |
2023-03-01T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-25801
|
TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1.
|
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47q
|
2023-02-15T16:34:48.771Z
|
2023-03-24T23:08:50.251Z
|
2023-03-24T23:08:50.251Z
|
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
|
CVE-2023-25102
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the hub_ip and the hub_gre_ip variables.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.072Z
|
2023-07-06T14:53:25.150Z
|
2023-07-17T19:35:21.517Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25552
|
A CWE-862: Missing Authorization vulnerability exists that could allow viewing of unauthorized
content, changes or deleting of content, or performing unauthorized functions when tampering
the Device File Transfer settings on DCE endpoints.
Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf
|
2023-02-07T17:00:03.778Z
|
2023-04-18T20:33:50.548Z
|
2023-04-18T20:33:50.548Z
|
{'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'}
|
CVE-2023-25047
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David F. Carr RSVPMaker rsvpmaker allows SQL Injection.This issue affects RSVPMaker: from n/a through 9.9.3.
|
https://patchstack.com/database/vulnerability/rsvpmaker/wordpress-rsvpmaker-plugin-9-9-3-sql-injection-vulnerability-2?_s_id=cve
|
2023-02-02T09:58:50.692Z
|
2023-10-31T13:50:20.810Z
|
2023-10-31T13:50:20.810Z
|
{'Vendor': 'David F. Carr', 'Product': 'RSVPMaker', 'Versions': 'n/a'}
|
CVE-2023-25944
|
Uncontrolled search path element in some Intel(R) VCUST Tool software downloaded before February 3nd 2023 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00844.html
|
2023-02-24T04:00:02.190Z
|
2023-08-11T02:37:09.754Z
|
2023-08-11T02:37:09.754Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) VCUST Tool software', 'Versions': 'downloaded before February 3nd 2023'}
|
CVE-2023-25682
|
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.1 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 247034.
|
https://www.ibm.com/support/pages/node/7080172
|
2023-02-11T18:09:03.126Z
|
2023-11-22T18:45:52.341Z
|
2023-11-22T18:45:52.341Z
|
{'Vendor': 'IBM', 'Product': 'Sterling B2B Integrator Standard Edition', 'Versions': '6.0.0.0, 6.1.0.0'}
|
CVE-2023-25728
|
The <code>Content-Security-Policy-Report-Only</code> header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
|
https://www.mozilla.org/security/advisories/mfsa2023-06/
|
2023-02-13T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-25544
|
Dell NetWorker versions 19.5 and earlier contain 'Apache Tomcat' version disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and may launch target-specific attacks.
|
https://www.dell.com/support/kbdoc/en-us/000210471/dsa-2023-058-dell-networker-security-update-for-version-disclosure-vulnerability
|
2023-02-07T09:35:27.080Z
|
2023-03-01T14:26:43.920Z
|
2023-03-01T14:26:43.920Z
|
{'Vendor': 'Dell', 'Product': 'Dell NetWorker, NVE', 'Versions': '19.5 and earlier versions'}
|
CVE-2023-25114
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the expert_options variable.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.074Z
|
2023-07-06T14:53:26.242Z
|
2023-07-17T19:35:23.045Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25817
|
Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability.
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8v5c-f752-fgpv
|
2023-02-15T16:34:48.773Z
|
2023-03-27T20:04:15.316Z
|
2023-03-27T20:04:15.316Z
|
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.0, < 24.0.9'}
|
CVE-2023-25952
|
Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable denial of service via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html
|
2023-03-08T04:00:03.712Z
|
2023-11-14T19:04:22.210Z
|
2023-11-14T19:04:22.210Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers', 'Versions': 'before version 31.0.101.4255'}
|
CVE-2023-25051
|
Cross-Site Request Forgery (CSRF) vulnerability in Denishua Comment Reply Notification plugin <= 1.4 versions.
|
https://patchstack.com/database/vulnerability/comment-reply-notification/wordpress-comment-reply-notification-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-02-02T09:58:51.821Z
|
2023-07-11T07:19:05.851Z
|
2023-07-11T07:19:05.851Z
|
{'Vendor': 'Denishua', 'Product': 'Comment Reply Notification', 'Versions': 'n/a'}
|
CVE-2023-25840
|
There is a Cross-site Scripting vulnerability in ArcGIS Server in versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser. The privileges required to execute this attack are high.
|
https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-security-2023-update-1-patch-available/
|
2023-02-15T17:59:31.098Z
|
2023-07-21T18:37:34.431Z
|
2023-07-21T18:40:32.877Z
|
{'Vendor': 'Esri', 'Product': 'Server', 'Versions': '10.8.1'}
|
CVE-2023-25143
|
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products.
|
https://success.trendmicro.com/solution/000292209
|
2023-02-03T15:46:02.643Z
|
2023-03-07T22:19:14.593Z
|
2023-03-10T20:05:13.704141Z
|
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'}
|
CVE-2023-25513
|
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5456
|
2023-02-07T02:57:11.658Z
|
2023-04-22T02:35:39.055Z
|
2023-04-22T02:35:39.055Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA CUDA Toolkit', 'Versions': 'All versions prior to 12.0 Update 1'}
|
CVE-2023-25006
|
A malicious actor may convince a user to open a malicious USD file that may trigger a use-after-free vulnerability which could result in code execution.
|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008
|
2023-02-01T00:00:00
|
2023-05-12T00:00:00
|
2023-05-12T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Autodesk 3ds Max USD Plugin', 'Versions': '0.3'}
|
CVE-2023-25456
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Klaviyo, Inc. Klaviyo plugin <= 3.0.7 versions.
|
https://patchstack.com/database/vulnerability/klaviyo/wordpress-klaviyo-plugin-3-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-02-06T12:38:05.559Z
|
2023-03-23T16:56:03.224Z
|
2023-03-23T16:56:03.224Z
|
{'Vendor': 'Klaviyo, Inc.', 'Product': 'Klaviyo', 'Versions': 'n/a'}
|
CVE-2023-25905
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
|
2023-02-15T00:00:00
|
2023-03-28T00:00:00
|
2023-03-28T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-25211
|
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
|
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/2/2.md
|
2023-02-06T00:00:00
|
2023-04-07T00:00:00
|
2023-04-07T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25704
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mehjabin Orthi Interactive SVG Image Map Builder plugin <= 1.0 versions.
|
https://patchstack.com/database/vulnerability/interactive-image-map-builder/wordpress-interactive-svg-image-map-builder-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-02-13T04:13:47.558Z
|
2023-03-28T08:19:55.148Z
|
2023-03-28T08:19:55.148Z
|
{'Vendor': 'Mehjabin Orthi', 'Product': 'Interactive SVG Image Map Builder', 'Versions': 'n/a'}
|
CVE-2023-25587
| null | null |
2023-02-07T00:00:00
| null |
2023-03-30T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-25991
|
Cross-Site Request Forgery (CSRF) vulnerability in RegistrationMagic plugin <= 5.1.9.2 versions.
|
https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-custom-registration-forms-user-registration-and-user-login-plugin-plugin-5-1-9-2-multiple-cross-site-request-forgery-csrf?_s_id=cve
|
2023-02-17T13:47:16.259Z
|
2023-03-13T13:58:38.233Z
|
2023-03-13T13:58:38.233Z
|
{'Vendor': 'RegistrationMagic', 'Product': 'RegistrationMagic', 'Versions': 'n/a'}
|
CVE-2023-25092
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface and out_acl variables.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.071Z
|
2023-07-06T14:53:24.324Z
|
2023-07-17T19:35:20.231Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25568
|
Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap server, those allocations are lasting even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server and also affects users using the old API stubs at `github.com/ipfs/go-libipfs/bitswap` because users then transitively import `github.com/ipfs/go-libipfs/bitswap/server`. Boxo versions 0.6.0 and 0.4.1 contain a patch for this issue. As a workaround, those who are using the stub object at `github.com/ipfs/go-libipfs/bitswap` not taking advantage of the features provided by the server can refactor their code to use the new split API that will allow them to run in a client only mode: `github.com/ipfs/go-libipfs/bitswap/client`.
|
https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916
|
2023-02-07T00:00:00
|
2023-05-10T00:00:00
|
2023-05-10T00:00:00
|
{'Vendor': 'ipfs', 'Product': 'boxo', 'Versions': '0.4.0, 0.5.0'}
|
CVE-2023-25616
|
In some scenario, SAP Business Objects Business Intelligence Platform (CMC) - versions 420, 430, Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileges. Successful attack could highly impact the confidentiality, Integrity, and Availability of the system.
|
https://launchpad.support.sap.com/#/notes/3245526
|
2023-02-09T13:30:50.223Z
|
2023-03-14T04:41:28.901Z
|
2023-04-11T21:28:38.999Z
|
{'Vendor': 'SAP', 'Product': 'Business Objects Business Intelligence Platform (CMC)', 'Versions': '420, 430'}
|
CVE-2023-25303
|
ATLauncher <= 3.4.26.0 is vulnerable to Directory Traversal. A mrpack file can be maliciously crafted to create arbitrary files outside of the installation directory.
|
https://github.com/ATLauncher/ATLauncher/security/advisories/GHSA-7cff-8xv4-mvx6
|
2023-02-06T00:00:00
|
2023-04-04T00:00:00
|
2023-04-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25753
|
There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter.
Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing.
This issue affects Apache ShenYu: 2.5.1.
Upgrade to Apache ShenYu 2.6.0 or apply patch https://github.com/apache/shenyu/pull/4776 .
|
https://lists.apache.org/thread/chprswxvb22z35vnoxv9tt3zknsm977d
|
2023-02-13T14:14:30.512Z
|
2023-10-19T08:35:24.075Z
|
2023-10-19T08:35:31.452Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache ShenYu', 'Versions': '0'}
|
CVE-2023-25883
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
|
2023-02-15T00:00:00
|
2023-03-28T00:00:00
|
2023-03-28T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-25929
|
IBM Cognos Analytics 11.1 and 11.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 247861.
|
https://www.ibm.com/support/pages/node/7012621
|
2023-02-16T16:39:45.212Z
|
2023-07-22T01:45:13.409Z
|
2023-07-22T01:45:13.409Z
|
{'Vendor': 'IBM', 'Product': 'Cognos Analytics', 'Versions': '11.1, 11.2'}
|
CVE-2023-25180
| null | null |
2023-03-23T08:54:23.439Z
| null |
2023-07-20T20:27:05.089Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-25495
|
A valid, authenticated administrative user can query a web interface API to reveal the configured LDAP client password used by XCC to authenticate to an external LDAP server in certain configurations. There is no exposure where no LDAP client password is configured
|
https://support.lenovo.com/us/en/product_security/LEN-99936
|
2023-02-06T15:09:03.709Z
|
2023-04-28T21:26:12.202Z
|
2023-04-28T21:26:12.202Z
|
{'Vendor': 'Lenovo', 'Product': 'XClarity Controller', 'Versions': 'Refer to Mitigation strategy section in LEN-99936'}
|
CVE-2023-25600
|
An issue was discovered in InsydeH2O. A malicious operating system can tamper with a runtime-writable EFI variable, leading to out-of-bounds memory reads and a denial of service. This is fixed in version 01.01.04.0016.
|
https://www.insyde.com/security-pledge
|
2023-02-08T00:00:00
|
2023-08-03T00:00:00
|
2023-08-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25745
|
Memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110.
|
https://www.mozilla.org/security/advisories/mfsa2023-05/
|
2023-02-13T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-25196
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache Fineract.
Authorized users may be able to change or add data in certain components.
This issue affects Apache Fineract: from 1.4 through 1.8.2.
|
https://lists.apache.org/thread/m9x3vpn3bry4fympkzxnnz4qx0oc0w8m
|
2023-02-06T01:32:54.479Z
|
2023-03-28T11:16:57.603Z
|
2023-03-28T11:16:57.603Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Fineract', 'Versions': '1.4'}
|
CVE-2023-25895
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
|
2023-02-15T00:00:00
|
2023-03-28T00:00:00
|
2023-03-28T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-25483
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ankit Agarwal, Priyanshu Mittal Easy Coming Soon plugin <= 2.3 versions.
|
https://patchstack.com/database/vulnerability/easy-coming-soon/wordpress-easy-coming-soon-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-02-06T12:38:09.644Z
|
2023-09-27T07:42:48.470Z
|
2023-09-27T07:42:48.470Z
|
{'Vendor': 'Ankit Agarwal, Priyanshu Mittal', 'Product': 'Easy Coming Soon', 'Versions': 'n/a'}
|
CVE-2023-25179
|
Uncontrolled resource consumption in the Intel(R) Unite(R) android application before Release 17 may allow an authenticated user to potentially enable denial of service via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00825.html
|
2023-02-15T04:00:02.965Z
|
2023-05-10T13:17:24.420Z
|
2023-05-10T13:17:24.420Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) Unite(R) android application', 'Versions': 'before Release 17'}
|
CVE-2023-25529
|
NVIDIA DGX H100 BMC and DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a leak of another user’s session token by observing timing discrepancies between server responses. A successful exploit of this vulnerability may lead to information disclosure, escalation of privileges, and data tampering.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
|
2023-02-07T02:57:25.083Z
|
2023-09-20T00:08:17.345Z
|
2024-01-25T18:09:15.767Z
|
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
|
CVE-2023-25207
|
PrestaShop dpdfrance <6.1.3 is vulnerable to SQL Injection via dpdfrance/ajax.php.
|
https://addons.prestashop.com/fr/transporteurs/19414-dpd-france.html
|
2023-02-06T00:00:00
|
2023-03-13T00:00:00
|
2023-03-13T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25657
|
Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions earlier than 1.5.7 are impacted by a remote code execution vulnerability. Nautobot did not properly sandbox Jinja2 template rendering. In Nautobot 1.5.7 has enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: `extras.ComputedField`, `extras.CustomLink`, `extras.ExportTemplate`, `extras.Secret`, `extras.Webhook`. While no active exploits of this vulnerability are known this change has been made as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code. This change forces the Jinja2 template engine to use a `SandboxedEnvironment` on all new installations of Nautobot. This addresses any potential unsafe code execution everywhere the helper function `nautobot.utilities.utils.render_jinja2` is called. Additionally, the documentation that had previously suggesting the direct use of `jinja2.Template` has been revised to suggest `render_jinja2`. Users are advised to upgrade to Nautobot 1.5.7 or newer. For users that are unable to upgrade to the latest release of Nautobot, you may add the following setting to your `nautobot_config.py` to apply the sandbox environment enforcement: `TEMPLATES[1]["OPTIONS"]["environment"] = "jinja2.sandbox.SandboxedEnvironment"` After applying this change, you must restart all Nautobot services, including any Celery worker processes. **Note:** *Nautobot specifies two template engines by default, the first being “django” for the Django built-in template engine, and the second being “jinja” for the Jinja2 template engine. This recommended setting will update the second item in the list of template engines, which is the Jinja2 engine.* For users that are unable to immediately update their configuration such as if a Nautobot service restart is too disruptive to operations, access to provide custom Jinja2 template values may be mitigated using permissions to restrict “change” (write) actions to the affected object types listed in the first section. **Note:** *This solution is intended to be stopgap until you can successfully update your `nautobot_config.py` or upgrade your Nautobot instance to apply the sandboxed environment enforcement.*
|
https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m
|
2023-02-09T20:58:21.857Z
|
2023-02-21T20:51:39.926Z
|
2023-02-21T20:51:39.926Z
|
{'Vendor': 'nautobot', 'Product': 'nautobot', 'Versions': '< 1.5.7'}
|
CVE-2023-25712
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP-Buddy Google Analytics Opt-Out plugin <= 2.3.4 versions.
|
https://patchstack.com/database/vulnerability/google-analytics-opt-out/wordpress-opt-out-for-google-analytics-plugin-2-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-02-13T04:14:01.864Z
|
2023-04-07T12:29:39.096Z
|
2023-04-07T12:29:39.096Z
|
{'Vendor': 'WP-Buddy', 'Product': 'Google Analytics Opt-Out', 'Versions': 'n/a'}
|
CVE-2023-25968
|
Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs, Madalin Ungureanu, Antohe Cristian Client Portal – Private user pages and login plugin <= 1.1.8 versions.
|
https://patchstack.com/database/vulnerability/client-portal/wordpress-client-portal-plugin-1-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-02-17T13:47:09.997Z
|
2023-03-15T10:20:38.279Z
|
2023-03-15T10:20:38.279Z
|
{'Vendor': 'Cozmoslabs, Madalin Ungureanu, Antohe Cristian', 'Product': 'Client Portal – Private user pages and login', 'Versions': 'n/a'}
|
CVE-2023-25591
|
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further privileges on the ClearPass instance.
|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt
|
2023-02-07T20:24:22.479Z
|
2023-03-14T14:49:52.855Z
|
2023-03-22T04:39:15.803375Z
|
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'}
|
CVE-2023-25084
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the ip, mac and description variables.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.069Z
|
2023-07-06T14:53:23.569Z
|
2023-07-17T19:35:19.250Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25987
|
Cross-Site Request Forgery (CSRF) vulnerability in Aleksandar Urošević My YouTube Channel plugin <= 3.23.3 versions.
|
https://patchstack.com/database/vulnerability/youtube-channel/wordpress-my-youtube-channel-plugin-3-23-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-02-17T13:47:13.227Z
|
2023-11-22T17:51:20.693Z
|
2023-11-22T17:51:20.693Z
|
{'Vendor': 'Aleksandar Urošević', 'Product': 'My YouTube Channel', 'Versions': 'n/a'}
|
CVE-2023-25590
|
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance.
|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt
|
2023-02-07T20:24:22.479Z
|
2023-03-14T14:47:56.899Z
|
2023-03-22T04:39:15.803375Z
|
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'}
|
CVE-2023-25085
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and to_dst variables.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.069Z
|
2023-07-06T14:53:23.697Z
|
2023-07-17T19:35:19.373Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25986
|
Cross-Site Request Forgery (CSRF) vulnerability in WattIsIt PayGreen – Ancienne version plugin <= 4.10.2 versions.
|
https://patchstack.com/database/vulnerability/paygreen-woocommerce/wordpress-paygreen-plugin-4-10-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-02-17T13:47:13.227Z
|
2023-11-22T17:53:43.649Z
|
2023-11-22T17:53:43.649Z
|
{'Vendor': 'WattIsIt', 'Product': 'PayGreen – Ancienne version', 'Versions': 'n/a'}
|
CVE-2023-25206
|
PrestaShop ws_productreviews < 3.6.2 is vulnerable to SQL Injection.
|
https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html
|
2023-02-06T00:00:00
|
2023-03-14T00:00:00
|
2023-03-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25656
|
notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.
|
https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3
|
2023-02-09T00:00:00
|
2023-02-20T00:00:00
|
2023-02-21T00:00:00
|
{'Vendor': 'notaryproject', 'Product': 'notation-go', 'Versions': '1.0.0-rc.3'}
|
CVE-2023-25713
|
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Fullworks Quick Paypal Payments plugin <= 5.7.25 versions.
|
https://patchstack.com/database/vulnerability/quick-paypal-payments/wordpress-quick-paypal-payments-plugin-5-7-25-cross-site-scripting-xss-2?_s_id=cve
|
2023-02-13T04:14:01.864Z
|
2023-04-07T12:54:32.032Z
|
2023-04-07T12:54:32.032Z
|
{'Vendor': 'Fullworks', 'Product': 'Quick Paypal Payments', 'Versions': 'n/a'}
|
CVE-2023-25197
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract.
Authorized users may be able to exploit this for limited impact on components.
This issue affects apache fineract: from 1.4 through 1.8.2.
|
https://lists.apache.org/thread/v0q9x86sx6f6l2nzr1z0nwm3y9qlng04
|
2023-02-06T01:33:31.192Z
|
2023-03-28T11:17:19.026Z
|
2023-03-28T11:17:19.026Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'apache fineract', 'Versions': '1.4'}
|
CVE-2023-25894
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
|
2023-02-15T00:00:00
|
2023-03-28T00:00:00
|
2023-03-28T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-25482
|
Cross-Site Request Forgery (CSRF) vulnerability in Mike Martel WP Tiles plugin <= 1.1.2 versions.
|
https://patchstack.com/database/vulnerability/wp-tiles/wordpress-wp-tiles-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-02-06T12:38:09.644Z
|
2023-07-18T11:29:24.352Z
|
2023-07-18T11:29:24.352Z
|
{'Vendor': 'Mike Martel', 'Product': 'WP Tiles', 'Versions': 'n/a'}
|
CVE-2023-25178
|
Controller may be loaded with malicious firmware which could enable remote code execution
|
https://process.honeywell.com
|
2023-02-28T23:51:16.663Z
|
2023-07-13T10:59:16.333Z
|
2023-07-13T10:59:16.333Z
|
{'Vendor': 'Honeywell', 'Product': 'C300', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'}
|
CVE-2023-25528
|
NVIDIA DGX H100 baseboard management controller (BMC) contains a vulnerability in a web server plugin, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
|
2023-02-07T02:57:25.083Z
|
2023-09-20T00:07:01.320Z
|
2023-09-20T00:07:01.320Z
|
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
|
CVE-2023-25601
|
On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.
|
https://lists.apache.org/thread/25g77jqczp3t8cz56hk1p65q7m6c64rf
|
2023-02-08T08:41:54.068Z
|
2023-04-20T15:07:00.310Z
|
2023-04-20T15:07:00.310Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '3.0.0'}
|
CVE-2023-25744
|
Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.
|
https://www.mozilla.org/security/advisories/mfsa2023-06/
|
2023-02-13T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-25314
|
Cross Site Scripting (XSS) vulnerability in World Wide Broadcast Network AVideo before 12.4, allows attackers to gain sensitive information via the success parameter to /user.
|
https://github.com/WWBN/AVideo/commit/2b44dee815b208da85e1dcafa9839391c3de2655
|
2023-02-06T00:00:00
|
2023-04-25T00:00:00
|
2023-04-25T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25882
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
|
2023-02-15T00:00:00
|
2023-03-28T00:00:00
|
2023-03-28T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-25928
|
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 247646.
|
https://www.ibm.com/support/pages/node/6956598
|
2023-02-16T16:39:45.212Z
|
2023-02-21T13:51:33.769Z
|
2023-02-21T13:51:33.769Z
|
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
|
CVE-2023-25181
|
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726
|
2023-02-14T16:35:25.764Z
|
2023-11-14T09:14:53.482Z
|
2023-11-14T18:00:06.813Z
|
{'Vendor': 'Silicon Labs', 'Product': 'Gecko Platform', 'Versions': '4.3.1.0'}
|
CVE-2023-25617
|
SAP Business Object (Adaptive Job Server) - versions 420, 430, allows remote execution of arbitrary commands on Unix, when program objects execution is enabled, to authenticated users with scheduling rights, using the BI Launchpad, Central Management Console or a custom application based on the public java SDK. Programs could impact the confidentiality, integrity and availability of the system.
|
https://launchpad.support.sap.com/#/notes/3283438
|
2023-02-09T13:30:50.223Z
|
2023-03-14T04:42:40.759Z
|
2023-04-11T21:28:20.677Z
|
{'Vendor': 'SAP', 'Product': 'Business Objects (Adaptive Job Server)', 'Versions': '420, 430'}
|
CVE-2023-25752
|
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
|
https://www.mozilla.org/security/advisories/mfsa2023-09/
|
2023-02-13T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-25586
|
A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.
|
https://access.redhat.com/security/cve/CVE-2023-25586
|
2023-02-07T19:03:20.221Z
|
2023-09-14T20:49:15.468Z
|
2023-09-14T20:49:15.468Z
|
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': ''}
|
CVE-2023-25990
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.
|
https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-1-10-multiple-tutor-instructor-sql-injection-vulnerability?_s_id=cve
|
2023-02-17T13:47:16.259Z
|
2023-11-03T16:22:46.607Z
|
2023-11-03T16:22:46.607Z
|
{'Vendor': 'Themeum', 'Product': 'Tutor LMS', 'Versions': 'n/a'}
|
CVE-2023-25139
|
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.
|
https://sourceware.org/bugzilla/show_bug.cgi?id=30068
|
2023-02-03T00:00:00
|
2023-02-03T00:00:00
|
2023-03-02T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25093
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the class_name variable..
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.071Z
|
2023-07-06T14:53:24.401Z
|
2023-07-17T19:35:20.349Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25569
|
Apollo is a configuration management system. Prior to version 2.1.0, a low-privileged user can create a special web page. If an authenticated portal admin visits this page, the page can silently send a request to assign new roles for that user without any confirmation from the Portal admin. Cookie SameSite strategy was set to Lax in version 2.1.0. As a workaround, avoid visiting unknown source pages.
|
https://github.com/apolloconfig/apollo/security/advisories/GHSA-fmxq-v8mg-qh25
|
2023-02-07T17:10:00.738Z
|
2023-02-20T15:12:35.031Z
|
2023-02-20T15:12:35.031Z
|
{'Vendor': 'apolloconfig', 'Product': 'apollo', 'Versions': '< 2.1.0'}
|
CVE-2023-25210
|
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromSetSysTime function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
|
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/1/1.md
|
2023-02-06T00:00:00
|
2023-04-07T00:00:00
|
2023-04-07T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25705
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Go Prayer WP Prayer plugin <= 1.9.6 versions.
|
https://patchstack.com/database/vulnerability/wp-prayer/wordpress-wp-prayer-plugin-1-9-6-cross-site-scripting-xss?_s_id=cve
|
2023-02-13T04:13:47.558Z
|
2023-04-07T12:33:48.818Z
|
2023-04-07T12:33:48.818Z
|
{'Vendor': 'Go Prayer', 'Product': 'WP Prayer', 'Versions': 'n/a'}
|
CVE-2023-25355
|
CoreDial sipXcom up to and including 21.04 is vulnerable to Insecure Permissions. A user who has the ability to run commands as the `daemon` user on a sipXcom server can overwrite a service file, and escalate their privileges to `root`.
|
https://seclists.org/fulldisclosure/2023/Mar/5
|
2023-02-06T00:00:00
|
2023-04-04T00:00:00
|
2023-04-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25841
|
There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 – 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
Mitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities.
|
https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-security-2023-update-1-patch-available/
|
2023-02-15T17:59:31.098Z
|
2023-07-21T18:38:24.437Z
|
2023-08-02T04:57:29.256Z
|
{'Vendor': 'Esri', 'Product': 'Server', 'Versions': '10.8.1'}
|
CVE-2023-25512
|
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds memory read by running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5456
|
2023-02-07T02:57:11.658Z
|
2023-04-22T02:35:01.098Z
|
2023-04-22T02:35:01.098Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA CUDA Toolkit', 'Versions': 'All versions prior to 12.1'}
|
CVE-2023-25007
|
A malicious actor may convince a user to open a malicious USD file that may trigger an uninitialized pointer which could result in code execution.
|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008
|
2023-02-01T00:00:00
|
2023-05-12T00:00:00
|
2023-05-12T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Autodesk 3ds Max USD Plugin', 'Versions': '0.3'}
|
CVE-2023-25904
|
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
|
2023-02-15T00:00:00
|
2023-03-28T00:00:00
|
2023-03-28T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-25545
|
Improper buffer restrictions in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html
|
2023-02-15T04:00:03.037Z
|
2023-05-10T13:17:04.014Z
|
2023-05-10T13:17:04.014Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BMC firmware', 'Versions': 'before version 2.90'}
|
CVE-2023-25115
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_ip and the port variables.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.075Z
|
2023-07-06T14:53:26.323Z
|
2023-07-17T19:35:23.164Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25816
|
Nextcloud is an Open Source private cloud software. Versions 25.0.0 and above, prior to 25.0.3, are subject to Uncontrolled Resource Consumption. A user can configure a very long password, consuming more resources on password validation than desired. This issue is patched in 25.0.3 No workaround is available.
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83
|
2023-02-15T16:34:48.773Z
|
2023-02-24T23:17:41.839Z
|
2023-02-24T23:17:41.839Z
|
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.3'}
|
CVE-2023-25953
|
Code injection vulnerability in Drive Explorer for macOS versions 3.5.4 and earlier allows an attacker who can login to the client where the affected product is installed to inject arbitrary code while processing the product execution. Since a full disk access privilege is required to execute LINE WORKS Drive Explorer, the attacker may be able to read and/or write to arbitrary files without the access privileges.
|
https://line.worksmobile.com/jp/release-notes/20230216/
|
2023-03-15T00:00:00
|
2023-05-23T00:00:00
|
2023-05-23T00:00:00
|
{'Vendor': 'WORKS MOBILE Japan Corp.', 'Product': 'Drive Explorer for macOS', 'Versions': 'versions 3.5.4 and earlier'}
|
CVE-2023-25683
|
IBM PowerVM Hypervisor FW950.00 through FW950.71, FW1010.00 through FW1010.40, FW1020.00 through FW1020.20, and FW1030.00 through FW1030.11 could allow an attacker to obtain sensitive information if they gain service access to the HMC. IBM X-Force ID: 247592.
|
https://www.ibm.com/support/pages/node/7002721
|
2023-02-11T18:09:03.126Z
|
2023-06-15T00:59:47.051Z
|
2023-06-15T00:59:47.051Z
|
{'Vendor': 'IBM', 'Product': 'PowerVM Hypervisor', 'Versions': 'FW950.00, FW1010.00, FW1020.00, FW1030.00'}
|
CVE-2023-25729
|
Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
|
https://www.mozilla.org/security/advisories/mfsa2023-06/
|
2023-02-13T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-25396
|
Privilege escalation in the MSI repair functionality in Caphyon Advanced Installer 20.0 and below allows attackers to access and manipulate system files.
|
https://www.advancedinstaller.com/release-20.1.html
|
2023-02-06T00:00:00
|
2023-02-08T00:00:00
|
2023-02-08T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-25800
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.2.0.
|
https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-1-10-multiple-student-sql-injection-vulnerability?_s_id=cve
|
2023-02-15T12:11:10.695Z
|
2023-11-03T16:26:12.916Z
|
2023-11-03T16:26:12.916Z
|
{'Vendor': 'Themeum', 'Product': 'Tutor LMS', 'Versions': 'n/a'}
|
CVE-2023-25103
|
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the gre_ip and the gre_mask variables.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
|
2023-02-02T20:42:36.072Z
|
2023-07-06T14:53:25.271Z
|
2023-07-17T19:35:21.714Z
|
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
|
CVE-2023-25553
|
A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site
Scripting') vulnerability exists on a DCE endpoint through the logging capabilities of the
webserver.
Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf
|
2023-02-07T17:00:03.779Z
|
2023-04-18T20:38:01.298Z
|
2023-04-18T20:38:01.298Z
|
{'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'}
|
CVE-2023-25046
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Podlove Podlove Podcast Publisher plugin <= 3.8.2 versions.
|
https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-3-8-2-cross-site-scripting-xss?_s_id=cve
|
2023-02-02T09:58:50.692Z
|
2023-04-07T09:26:09.940Z
|
2023-04-07T09:26:09.940Z
|
{'Vendor': 'Podlove', 'Product': 'Podlove Podcast Publisher', 'Versions': 'n/a'}
|
CVE-2023-25695
|
Generation of Error Message Containing Sensitive Information vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.5.2.
|
https://github.com/apache/airflow/pull/29501
|
2023-02-13T00:21:30.680Z
|
2023-03-15T09:37:11.437Z
|
2023-03-15T09:37:11.437Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
|
CVE-2023-25504
|
A malicious actor who has been authenticated and granted specific permissions in Apache Superset may use the import dataset feature in order to conduct Server-Side Request Forgery
attacks and query internal resources on behalf of the server where Superset
is deployed. This vulnerability exists in Apache Superset versions up to and including 2.0.1.
|
https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx
|
2023-02-06T21:18:11.420Z
|
2023-04-17T16:29:43.729Z
|
2023-04-17T16:29:43.729Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0'}
|
CVE-2023-25154
|
Misskey is an open source, decentralized social media platform. In versions prior to 13.5.0 the link to the instance to the sender that appears when viewing a user or note received through ActivityPub is not properly validated, so by inserting a URL with a javascript scheme an attacker may execute JavaScript code in the context of the recipient. This issue has been fixed in version 13.5.0. Users are advised to upgrade. Users unable to upgrade should not "view on remote" for untrusted instances.
|
https://github.com/misskey-dev/misskey/security/advisories/GHSA-pfp5-r48x-fg25
|
2023-02-03T16:59:18.242Z
|
2023-02-22T19:00:25.905Z
|
2023-02-22T19:00:25.905Z
|
{'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.5.0'}
|
CVE-2023-25912
|
The webreport generation feature in the Danfoss AK-EM100 allows an unauthorized actor to generate a web report that discloses sensitive information such as the internal IP address, usernames and internal device values.
|
https://divd.nl/cves/CVE-2023-25912
|
2023-02-16T14:22:41.966Z
|
2023-06-11T13:17:01.462Z
|
2023-06-11T13:17:01.462Z
|
{'Vendor': 'Danfoss', 'Product': 'AK-EM100', 'Versions': '< 2.2.0.12'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.