CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-25088
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and description variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.069Z
2023-07-06T14:53:23.991Z
2023-07-17T19:35:19.756Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25572
react-admin is a frontend framework for building browser applications on top of REST/GraphQL APIs. react-admin prior to versions 3.19.12 and 4.7.6, along with ra-ui-materialui prior to 3.19.12 and 4.7.6, are vulnerable to cross-site scripting. All React applications built with react-admin and using the `<RichTextField>` are affected. `<RichTextField>` outputs the field value using `dangerouslySetInnerHTML` without client-side sanitization. If the data isn't sanitized server-side, this opens a possible cross-site scripting (XSS) attack. Versions 3.19.12 and 4.7.6 now use `DOMPurify` to escape the HTML before outputting it with React and `dangerouslySetInnerHTML`. Users who already sanitize HTML data server-side do not need to upgrade. As a workaround, users may replace the `<RichTextField>` by a custom field doing sanitization by hand.
https://github.com/marmelab/react-admin/security/advisories/GHSA-5jcr-82fh-339v
2023-02-07T17:10:00.739Z
2023-02-13T20:49:54.340Z
2023-02-13T20:49:54.340Z
{'Vendor': 'marmelab', 'Product': 'react-admin', 'Versions': '< 3.19.12, >= 4.0.0, < 4.7.6'}
CVE-2023-25786
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Thom Stark Eyes Only: User Access Shortcode plugin <= 1.8.2 versions.
https://patchstack.com/database/vulnerability/eyes-only-user-access-shortcode/wordpress-eyes-only-user-access-shortcode-plugin-1-8-2-cross-site-scripting-xss?_s_id=cve
2023-02-15T12:10:40.366Z
2023-05-03T10:47:20.339Z
2023-05-03T10:47:20.339Z
{'Vendor': 'Thom Stark', 'Product': 'Eyes Only: User Access Shortcode', 'Versions': 'n/a'}
CVE-2023-25505
NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler of the AMI MegaRAC BMC , where an attacker with the appropriate level of authorization can cause a buffer overflow, which may lead to denial of service, information disclosure, or arbitrary code execution.
https://nvidia.custhelp.com/app/answers/detail/a_id/5458
2023-02-07T02:57:11.656Z
2023-04-22T02:29:45.535Z
2023-04-22T02:29:45.535Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 3.39.3'}
CVE-2023-25155
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83
2023-02-03T16:59:18.242Z
2023-03-02T03:01:36.879Z
2023-03-02T03:01:36.879Z
{'Vendor': 'redis', 'Product': 'redis', 'Versions': '< 6.0.18, >= 7.0.0, < 7.0.9, >= 6.2.0, < 6.2.11'}
CVE-2023-25913
Because of an authentication flaw an attacker would be capable of generating a web report that discloses sensitive information such as internal IP addresses, usernames, store names and other sensitive information.
https://csirt.divd.nl/CVE-2023-25913
2023-02-16T14:22:41.966Z
2023-08-21T20:30:03.854Z
2023-08-21T20:30:03.854Z
{'Vendor': 'Danfoss', 'Product': 'AK-SM800A', 'Versions': '< 3.3'}
CVE-2023-25440
Stored Cross Site Scripting (XSS) vulnerability in the add contact function CiviCRM 5.59.alpha1, allows attackers to execute arbitrary code in first/second name field.
https://civicrm.org/
2023-02-06T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25010
A malicious actor may convince a victim to open a malicious USD file that may trigger an uninitialized variable which may result in code execution.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0003
2023-02-01T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'n/a', 'Product': 'Autodesk Maya USD Plugin', 'Versions': '0.22.0'}
CVE-2023-25694
null
null
2023-02-13T00:00:00
null
2023-03-01T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25801
TensorFlow is an open source machine learning platform. Prior to versions 2.12.0 and 2.11.1, `nn_ops.fractional_avg_pool_v2` and `nn_ops.fractional_max_pool_v2` require the first and fourth elements of their parameter `pooling_ratio` to be equal to 1.0, as pooling on batch and channel dimensions is not supported. A fix is included in TensorFlow 2.12.0 and 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f49c-87jh-g47q
2023-02-15T16:34:48.771Z
2023-03-24T23:08:50.251Z
2023-03-24T23:08:50.251Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25102
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the hub_ip and the hub_gre_ip variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.072Z
2023-07-06T14:53:25.150Z
2023-07-17T19:35:21.517Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25552
A CWE-862: Missing Authorization vulnerability exists that could allow viewing of unauthorized content, changes or deleting of content, or performing unauthorized functions when tampering the Device File Transfer settings on DCE endpoints. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf
2023-02-07T17:00:03.778Z
2023-04-18T20:33:50.548Z
2023-04-18T20:33:50.548Z
{'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'}
CVE-2023-25047
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David F. Carr RSVPMaker rsvpmaker allows SQL Injection.This issue affects RSVPMaker: from n/a through 9.9.3.
https://patchstack.com/database/vulnerability/rsvpmaker/wordpress-rsvpmaker-plugin-9-9-3-sql-injection-vulnerability-2?_s_id=cve
2023-02-02T09:58:50.692Z
2023-10-31T13:50:20.810Z
2023-10-31T13:50:20.810Z
{'Vendor': 'David F. Carr', 'Product': 'RSVPMaker', 'Versions': 'n/a'}
CVE-2023-25944
Uncontrolled search path element in some Intel(R) VCUST Tool software downloaded before February 3nd 2023 may allow an authenticated user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00844.html
2023-02-24T04:00:02.190Z
2023-08-11T02:37:09.754Z
2023-08-11T02:37:09.754Z
{'Vendor': 'n/a', 'Product': 'Intel(R) VCUST Tool software', 'Versions': 'downloaded before February 3nd 2023'}
CVE-2023-25682
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.1 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 247034.
https://www.ibm.com/support/pages/node/7080172
2023-02-11T18:09:03.126Z
2023-11-22T18:45:52.341Z
2023-11-22T18:45:52.341Z
{'Vendor': 'IBM', 'Product': 'Sterling B2B Integrator Standard Edition', 'Versions': '6.0.0.0, 6.1.0.0'}
CVE-2023-25728
The <code>Content-Security-Policy-Report-Only</code> header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25544
Dell NetWorker versions 19.5 and earlier contain 'Apache Tomcat' version disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and may launch target-specific attacks.
https://www.dell.com/support/kbdoc/en-us/000210471/dsa-2023-058-dell-networker-security-update-for-version-disclosure-vulnerability
2023-02-07T09:35:27.080Z
2023-03-01T14:26:43.920Z
2023-03-01T14:26:43.920Z
{'Vendor': 'Dell', 'Product': 'Dell NetWorker, NVE', 'Versions': '19.5 and earlier versions'}
CVE-2023-25114
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the expert_options variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.074Z
2023-07-06T14:53:26.242Z
2023-07-17T19:35:23.045Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25817
Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8v5c-f752-fgpv
2023-02-15T16:34:48.773Z
2023-03-27T20:04:15.316Z
2023-03-27T20:04:15.316Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 24.0.0, < 24.0.9'}
CVE-2023-25952
Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable denial of service via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html
2023-03-08T04:00:03.712Z
2023-11-14T19:04:22.210Z
2023-11-14T19:04:22.210Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers', 'Versions': 'before version 31.0.101.4255'}
CVE-2023-25051
Cross-Site Request Forgery (CSRF) vulnerability in Denishua Comment Reply Notification plugin <= 1.4 versions.
https://patchstack.com/database/vulnerability/comment-reply-notification/wordpress-comment-reply-notification-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:51.821Z
2023-07-11T07:19:05.851Z
2023-07-11T07:19:05.851Z
{'Vendor': 'Denishua', 'Product': 'Comment Reply Notification', 'Versions': 'n/a'}
CVE-2023-25840
There is a Cross-site Scripting vulnerability in ArcGIS Server in versions 10.8.1 – 11.1 that may allow a remote, authenticated attacker to create a crafted link which onmouseover wont execute but could potentially render an image in the victims browser.  The privileges required to execute this attack are high.
https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-security-2023-update-1-patch-available/
2023-02-15T17:59:31.098Z
2023-07-21T18:37:34.431Z
2023-07-21T18:40:32.877Z
{'Vendor': 'Esri', 'Product': 'Server', 'Versions': '10.8.1'}
CVE-2023-25143
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products.
https://success.trendmicro.com/solution/000292209
2023-02-03T15:46:02.643Z
2023-03-07T22:19:14.593Z
2023-03-10T20:05:13.704141Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'}
CVE-2023-25513
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5456
2023-02-07T02:57:11.658Z
2023-04-22T02:35:39.055Z
2023-04-22T02:35:39.055Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA CUDA Toolkit', 'Versions': 'All versions prior to 12.0 Update 1'}
CVE-2023-25006
A malicious actor may convince a user to open a malicious USD file that may trigger a use-after-free vulnerability which could result in code execution.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008
2023-02-01T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'Autodesk 3ds Max USD Plugin', 'Versions': '0.3'}
CVE-2023-25456
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Klaviyo, Inc. Klaviyo plugin <= 3.0.7 versions.
https://patchstack.com/database/vulnerability/klaviyo/wordpress-klaviyo-plugin-3-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:05.559Z
2023-03-23T16:56:03.224Z
2023-03-23T16:56:03.224Z
{'Vendor': 'Klaviyo, Inc.', 'Product': 'Klaviyo', 'Versions': 'n/a'}
CVE-2023-25905
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25211
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/2/2.md
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25704
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mehjabin Orthi Interactive SVG Image Map Builder plugin <= 1.0 versions.
https://patchstack.com/database/vulnerability/interactive-image-map-builder/wordpress-interactive-svg-image-map-builder-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-13T04:13:47.558Z
2023-03-28T08:19:55.148Z
2023-03-28T08:19:55.148Z
{'Vendor': 'Mehjabin Orthi', 'Product': 'Interactive SVG Image Map Builder', 'Versions': 'n/a'}
CVE-2023-25587
null
null
2023-02-07T00:00:00
null
2023-03-30T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25991
Cross-Site Request Forgery (CSRF) vulnerability in RegistrationMagic plugin <= 5.1.9.2 versions.
https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-custom-registration-forms-user-registration-and-user-login-plugin-plugin-5-1-9-2-multiple-cross-site-request-forgery-csrf?_s_id=cve
2023-02-17T13:47:16.259Z
2023-03-13T13:58:38.233Z
2023-03-13T13:58:38.233Z
{'Vendor': 'RegistrationMagic', 'Product': 'RegistrationMagic', 'Versions': 'n/a'}
CVE-2023-25092
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface and out_acl variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.071Z
2023-07-06T14:53:24.324Z
2023-07-17T19:35:20.231Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25568
Boxo, formerly known as go-libipfs, is a library for building IPFS applications and implementations. In versions 0.4.0 and 0.5.0, if an attacker is able allocate arbitrary many bytes in the Bitswap server, those allocations are lasting even if the connection is closed. This affects users accepting untrusted connections with the Bitswap server and also affects users using the old API stubs at `github.com/ipfs/go-libipfs/bitswap` because users then transitively import `github.com/ipfs/go-libipfs/bitswap/server`. Boxo versions 0.6.0 and 0.4.1 contain a patch for this issue. As a workaround, those who are using the stub object at `github.com/ipfs/go-libipfs/bitswap` not taking advantage of the features provided by the server can refactor their code to use the new split API that will allow them to run in a client only mode: `github.com/ipfs/go-libipfs/bitswap/client`.
https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916
2023-02-07T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'ipfs', 'Product': 'boxo', 'Versions': '0.4.0, 0.5.0'}
CVE-2023-25616
In some scenario, SAP Business Objects Business Intelligence Platform (CMC) - versions 420, 430, Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileges. Successful attack could highly impact the confidentiality, Integrity, and Availability of the system.
https://launchpad.support.sap.com/#/notes/3245526
2023-02-09T13:30:50.223Z
2023-03-14T04:41:28.901Z
2023-04-11T21:28:38.999Z
{'Vendor': 'SAP', 'Product': 'Business Objects Business Intelligence Platform (CMC)', 'Versions': '420, 430'}
CVE-2023-25303
ATLauncher <= 3.4.26.0 is vulnerable to Directory Traversal. A mrpack file can be maliciously crafted to create arbitrary files outside of the installation directory.
https://github.com/ATLauncher/ATLauncher/security/advisories/GHSA-7cff-8xv4-mvx6
2023-02-06T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25753
There exists an SSRF (Server-Side Request Forgery) vulnerability located at the /sandbox/proxyGateway endpoint. This vulnerability allows us to manipulate arbitrary requests and retrieve corresponding responses by inputting any URL into the requestUrl parameter. Of particular concern is our ability to exert control over the HTTP method, cookies, IP address, and headers. This effectively grants us the capability to dispatch complete HTTP requests to hosts of our choosing. This issue affects Apache ShenYu: 2.5.1. Upgrade to Apache ShenYu 2.6.0 or apply patch  https://github.com/apache/shenyu/pull/4776  .
https://lists.apache.org/thread/chprswxvb22z35vnoxv9tt3zknsm977d
2023-02-13T14:14:30.512Z
2023-10-19T08:35:24.075Z
2023-10-19T08:35:31.452Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache ShenYu', 'Versions': '0'}
CVE-2023-25883
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25929
IBM Cognos Analytics 11.1 and 11.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 247861.
https://www.ibm.com/support/pages/node/7012621
2023-02-16T16:39:45.212Z
2023-07-22T01:45:13.409Z
2023-07-22T01:45:13.409Z
{'Vendor': 'IBM', 'Product': 'Cognos Analytics', 'Versions': '11.1, 11.2'}
CVE-2023-25180
null
null
2023-03-23T08:54:23.439Z
null
2023-07-20T20:27:05.089Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25495
A valid, authenticated administrative user can query a web interface API to reveal the configured LDAP client password used by XCC to authenticate to an external LDAP server in certain configurations. There is no exposure where no LDAP client password is configured
https://support.lenovo.com/us/en/product_security/LEN-99936
2023-02-06T15:09:03.709Z
2023-04-28T21:26:12.202Z
2023-04-28T21:26:12.202Z
{'Vendor': 'Lenovo', 'Product': 'XClarity Controller', 'Versions': 'Refer to Mitigation strategy section in LEN-99936'}
CVE-2023-25600
An issue was discovered in InsydeH2O. A malicious operating system can tamper with a runtime-writable EFI variable, leading to out-of-bounds memory reads and a denial of service. This is fixed in version 01.01.04.0016.
https://www.insyde.com/security-pledge
2023-02-08T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25745
Memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110.
https://www.mozilla.org/security/advisories/mfsa2023-05/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25196
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache Fineract. Authorized users may be able to change or add data in certain components.   This issue affects Apache Fineract: from 1.4 through 1.8.2.
https://lists.apache.org/thread/m9x3vpn3bry4fympkzxnnz4qx0oc0w8m
2023-02-06T01:32:54.479Z
2023-03-28T11:16:57.603Z
2023-03-28T11:16:57.603Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Fineract', 'Versions': '1.4'}
CVE-2023-25895
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25483
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ankit Agarwal, Priyanshu Mittal Easy Coming Soon plugin <= 2.3 versions.
https://patchstack.com/database/vulnerability/easy-coming-soon/wordpress-easy-coming-soon-plugin-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:09.644Z
2023-09-27T07:42:48.470Z
2023-09-27T07:42:48.470Z
{'Vendor': 'Ankit Agarwal, Priyanshu Mittal', 'Product': 'Easy Coming Soon', 'Versions': 'n/a'}
CVE-2023-25179
Uncontrolled resource consumption in the Intel(R) Unite(R) android application before Release 17 may allow an authenticated user to potentially enable denial of service via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00825.html
2023-02-15T04:00:02.965Z
2023-05-10T13:17:24.420Z
2023-05-10T13:17:24.420Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Unite(R) android application', 'Versions': 'before Release 17'}
CVE-2023-25529
NVIDIA DGX H100 BMC and DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a leak of another user’s session token by observing timing discrepancies between server responses. A successful exploit of this vulnerability may lead to information disclosure, escalation of privileges, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
2023-02-07T02:57:25.083Z
2023-09-20T00:08:17.345Z
2024-01-25T18:09:15.767Z
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
CVE-2023-25207
PrestaShop dpdfrance <6.1.3 is vulnerable to SQL Injection via dpdfrance/ajax.php.
https://addons.prestashop.com/fr/transporteurs/19414-dpd-france.html
2023-02-06T00:00:00
2023-03-13T00:00:00
2023-03-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25657
Nautobot is a Network Source of Truth and Network Automation Platform. All users of Nautobot versions earlier than 1.5.7 are impacted by a remote code execution vulnerability. Nautobot did not properly sandbox Jinja2 template rendering. In Nautobot 1.5.7 has enabled sandboxed environments for the Jinja2 template engine used internally for template rendering for the following objects: `extras.ComputedField`, `extras.CustomLink`, `extras.ExportTemplate`, `extras.Secret`, `extras.Webhook`. While no active exploits of this vulnerability are known this change has been made as a preventative measure to protect against any potential remote code execution attacks utilizing maliciously crafted template code. This change forces the Jinja2 template engine to use a `SandboxedEnvironment` on all new installations of Nautobot. This addresses any potential unsafe code execution everywhere the helper function `nautobot.utilities.utils.render_jinja2` is called. Additionally, the documentation that had previously suggesting the direct use of `jinja2.Template` has been revised to suggest `render_jinja2`. Users are advised to upgrade to Nautobot 1.5.7 or newer. For users that are unable to upgrade to the latest release of Nautobot, you may add the following setting to your `nautobot_config.py` to apply the sandbox environment enforcement: `TEMPLATES[1]["OPTIONS"]["environment"] = "jinja2.sandbox.SandboxedEnvironment"` After applying this change, you must restart all Nautobot services, including any Celery worker processes. **Note:** *Nautobot specifies two template engines by default, the first being “django” for the Django built-in template engine, and the second being “jinja” for the Jinja2 template engine. This recommended setting will update the second item in the list of template engines, which is the Jinja2 engine.* For users that are unable to immediately update their configuration such as if a Nautobot service restart is too disruptive to operations, access to provide custom Jinja2 template values may be mitigated using permissions to restrict “change” (write) actions to the affected object types listed in the first section. **Note:** *This solution is intended to be stopgap until you can successfully update your `nautobot_config.py` or upgrade your Nautobot instance to apply the sandboxed environment enforcement.*
https://github.com/nautobot/nautobot/security/advisories/GHSA-8mfq-f5wj-vw5m
2023-02-09T20:58:21.857Z
2023-02-21T20:51:39.926Z
2023-02-21T20:51:39.926Z
{'Vendor': 'nautobot', 'Product': 'nautobot', 'Versions': '< 1.5.7'}
CVE-2023-25712
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP-Buddy Google Analytics Opt-Out plugin <= 2.3.4 versions.
https://patchstack.com/database/vulnerability/google-analytics-opt-out/wordpress-opt-out-for-google-analytics-plugin-2-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-13T04:14:01.864Z
2023-04-07T12:29:39.096Z
2023-04-07T12:29:39.096Z
{'Vendor': 'WP-Buddy', 'Product': 'Google Analytics Opt-Out', 'Versions': 'n/a'}
CVE-2023-25968
Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs, Madalin Ungureanu, Antohe Cristian Client Portal – Private user pages and login plugin <= 1.1.8 versions.
https://patchstack.com/database/vulnerability/client-portal/wordpress-client-portal-plugin-1-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-17T13:47:09.997Z
2023-03-15T10:20:38.279Z
2023-03-15T10:20:38.279Z
{'Vendor': 'Cozmoslabs, Madalin Ungureanu, Antohe Cristian', 'Product': 'Client Portal – Private user pages and login', 'Versions': 'n/a'}
CVE-2023-25591
A vulnerability in the web-based management interface of ClearPass Policy Manager could allow a remote attacker authenticated with low privileges to access sensitive information. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further privileges on the ClearPass instance.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt
2023-02-07T20:24:22.479Z
2023-03-14T14:49:52.855Z
2023-03-22T04:39:15.803375Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'}
CVE-2023-25084
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the ip, mac and description variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.069Z
2023-07-06T14:53:23.569Z
2023-07-17T19:35:19.250Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25987
Cross-Site Request Forgery (CSRF) vulnerability in Aleksandar Urošević My YouTube Channel plugin <= 3.23.3 versions.
https://patchstack.com/database/vulnerability/youtube-channel/wordpress-my-youtube-channel-plugin-3-23-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-17T13:47:13.227Z
2023-11-22T17:51:20.693Z
2023-11-22T17:51:20.693Z
{'Vendor': 'Aleksandar Urošević', 'Product': 'My YouTube Channel', 'Versions': 'n/a'}
CVE-2023-25590
A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt
2023-02-07T20:24:22.479Z
2023-03-14T14:47:56.899Z
2023-03-22T04:39:15.803375Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'}
CVE-2023-25085
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the index and to_dst variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.069Z
2023-07-06T14:53:23.697Z
2023-07-17T19:35:19.373Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25986
Cross-Site Request Forgery (CSRF) vulnerability in WattIsIt PayGreen – Ancienne version plugin <= 4.10.2 versions.
https://patchstack.com/database/vulnerability/paygreen-woocommerce/wordpress-paygreen-plugin-4-10-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-17T13:47:13.227Z
2023-11-22T17:53:43.649Z
2023-11-22T17:53:43.649Z
{'Vendor': 'WattIsIt', 'Product': 'PayGreen – Ancienne version', 'Versions': 'n/a'}
CVE-2023-25206
PrestaShop ws_productreviews < 3.6.2 is vulnerable to SQL Injection.
https://addons.prestashop.com/en/customer-reviews/22373-advanced-reviews-photos-reminder-google-snippets.html
2023-02-06T00:00:00
2023-03-14T00:00:00
2023-03-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25656
notation-go is a collection of libraries for supporting Notation sign, verify, push, and pull of oci artifacts. Prior to version 1.0.0-rc.3, notation-go users will find their application using excessive memory when verifying signatures. The application will be killed, and thus availability is impacted. The problem has been patched in the release v1.0.0-rc.3. Some workarounds are available. Users can review their own trust policy file and check if the identity string contains `=#`. Meanwhile, users should only put trusted certificates in their trust stores referenced by their own trust policy files, and make sure the `authenticity` validation is set to `enforce`.
https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.3
2023-02-09T00:00:00
2023-02-20T00:00:00
2023-02-21T00:00:00
{'Vendor': 'notaryproject', 'Product': 'notation-go', 'Versions': '1.0.0-rc.3'}
CVE-2023-25713
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Fullworks Quick Paypal Payments plugin <= 5.7.25 versions.
https://patchstack.com/database/vulnerability/quick-paypal-payments/wordpress-quick-paypal-payments-plugin-5-7-25-cross-site-scripting-xss-2?_s_id=cve
2023-02-13T04:14:01.864Z
2023-04-07T12:54:32.032Z
2023-04-07T12:54:32.032Z
{'Vendor': 'Fullworks', 'Product': 'Quick Paypal Payments', 'Versions': 'n/a'}
CVE-2023-25197
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation apache fineract. Authorized users may be able to exploit this for limited impact on components.   This issue affects apache fineract: from 1.4 through 1.8.2.
https://lists.apache.org/thread/v0q9x86sx6f6l2nzr1z0nwm3y9qlng04
2023-02-06T01:33:31.192Z
2023-03-28T11:17:19.026Z
2023-03-28T11:17:19.026Z
{'Vendor': 'Apache Software Foundation', 'Product': 'apache fineract', 'Versions': '1.4'}
CVE-2023-25894
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25482
Cross-Site Request Forgery (CSRF) vulnerability in Mike Martel WP Tiles plugin <= 1.1.2 versions.
https://patchstack.com/database/vulnerability/wp-tiles/wordpress-wp-tiles-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:09.644Z
2023-07-18T11:29:24.352Z
2023-07-18T11:29:24.352Z
{'Vendor': 'Mike Martel', 'Product': 'WP Tiles', 'Versions': 'n/a'}
CVE-2023-25178
Controller may be loaded with malicious firmware which could enable remote code execution
https://process.honeywell.com
2023-02-28T23:51:16.663Z
2023-07-13T10:59:16.333Z
2023-07-13T10:59:16.333Z
{'Vendor': 'Honeywell', 'Product': 'C300', 'Versions': '501.1, 510.1, 511.1, 520.1, 520.2'}
CVE-2023-25528
NVIDIA DGX H100 baseboard management controller (BMC) contains a vulnerability in a web server plugin, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
2023-02-07T02:57:25.083Z
2023-09-20T00:07:01.320Z
2023-09-20T00:07:01.320Z
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
CVE-2023-25601
On version 3.0.0 through 3.1.1, Apache DolphinScheduler's python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above.
https://lists.apache.org/thread/25g77jqczp3t8cz56hk1p65q7m6c64rf
2023-02-08T08:41:54.068Z
2023-04-20T15:07:00.310Z
2023-04-20T15:07:00.310Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache DolphinScheduler', 'Versions': '3.0.0'}
CVE-2023-25744
Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25314
Cross Site Scripting (XSS) vulnerability in World Wide Broadcast Network AVideo before 12.4, allows attackers to gain sensitive information via the success parameter to /user.
https://github.com/WWBN/AVideo/commit/2b44dee815b208da85e1dcafa9839391c3de2655
2023-02-06T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25882
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25928
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 247646.
https://www.ibm.com/support/pages/node/6956598
2023-02-16T16:39:45.212Z
2023-02-21T13:51:33.769Z
2023-02-21T13:51:33.769Z
{'Vendor': 'IBM', 'Product': 'InfoSphere Information Server', 'Versions': '11.7'}
CVE-2023-25181
A heap-based buffer overflow vulnerability exists in the HTTP Server functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send a malicious packet to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1726
2023-02-14T16:35:25.764Z
2023-11-14T09:14:53.482Z
2023-11-14T18:00:06.813Z
{'Vendor': 'Silicon Labs', 'Product': 'Gecko Platform', 'Versions': '4.3.1.0'}
CVE-2023-25617
SAP Business Object (Adaptive Job Server) - versions 420, 430, allows remote execution of arbitrary commands on Unix, when program objects execution is enabled, to authenticated users with scheduling rights, using the BI Launchpad, Central Management Console or a custom application based on the public java SDK. Programs could impact the confidentiality, integrity and availability of the system.
https://launchpad.support.sap.com/#/notes/3283438
2023-02-09T13:30:50.223Z
2023-03-14T04:42:40.759Z
2023-04-11T21:28:20.677Z
{'Vendor': 'SAP', 'Product': 'Business Objects (Adaptive Job Server)', 'Versions': '420, 430'}
CVE-2023-25752
When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9.
https://www.mozilla.org/security/advisories/mfsa2023-09/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25586
A flaw was found in Binutils. A logic fail in the bfd_init_section_decompress_status function may lead to the use of an uninitialized variable that can cause a crash and local denial of service.
https://access.redhat.com/security/cve/CVE-2023-25586
2023-02-07T19:03:20.221Z
2023-09-14T20:49:15.468Z
2023-09-14T20:49:15.468Z
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': ''}
CVE-2023-25990
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.1.10.
https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-1-10-multiple-tutor-instructor-sql-injection-vulnerability?_s_id=cve
2023-02-17T13:47:16.259Z
2023-11-03T16:22:46.607Z
2023-11-03T16:22:46.607Z
{'Vendor': 'Themeum', 'Product': 'Tutor LMS', 'Versions': 'n/a'}
CVE-2023-25139
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.
https://sourceware.org/bugzilla/show_bug.cgi?id=30068
2023-02-03T00:00:00
2023-02-03T00:00:00
2023-03-02T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25093
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the class_name variable..
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.071Z
2023-07-06T14:53:24.401Z
2023-07-17T19:35:20.349Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25569
Apollo is a configuration management system. Prior to version 2.1.0, a low-privileged user can create a special web page. If an authenticated portal admin visits this page, the page can silently send a request to assign new roles for that user without any confirmation from the Portal admin. Cookie SameSite strategy was set to Lax in version 2.1.0. As a workaround, avoid visiting unknown source pages.
https://github.com/apolloconfig/apollo/security/advisories/GHSA-fmxq-v8mg-qh25
2023-02-07T17:10:00.738Z
2023-02-20T15:12:35.031Z
2023-02-20T15:12:35.031Z
{'Vendor': 'apolloconfig', 'Product': 'apollo', 'Versions': '< 2.1.0'}
CVE-2023-25210
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the fromSetSysTime function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/1/1.md
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25705
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Go Prayer WP Prayer plugin <= 1.9.6 versions.
https://patchstack.com/database/vulnerability/wp-prayer/wordpress-wp-prayer-plugin-1-9-6-cross-site-scripting-xss?_s_id=cve
2023-02-13T04:13:47.558Z
2023-04-07T12:33:48.818Z
2023-04-07T12:33:48.818Z
{'Vendor': 'Go Prayer', 'Product': 'WP Prayer', 'Versions': 'n/a'}
CVE-2023-25355
CoreDial sipXcom up to and including 21.04 is vulnerable to Insecure Permissions. A user who has the ability to run commands as the `daemon` user on a sipXcom server can overwrite a service file, and escalate their privileges to `root`.
https://seclists.org/fulldisclosure/2023/Mar/5
2023-02-06T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25841
There is a stored Cross-site Scripting vulnerability in Esri ArcGIS Server versions 10.8.1 – 11.0 on Windows and Linux platforms that may allow a remote, unauthenticated attacker to create crafted content which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. Mitigation: Disable anonymous access to ArcGIS Feature services with edit capabilities.
https://www.esri.com/arcgis-blog/products/trust-arcgis/announcements/arcgis-server-security-2023-update-1-patch-available/
2023-02-15T17:59:31.098Z
2023-07-21T18:38:24.437Z
2023-08-02T04:57:29.256Z
{'Vendor': 'Esri', 'Product': 'Server', 'Versions': '10.8.1'}
CVE-2023-25512
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds memory read by running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5456
2023-02-07T02:57:11.658Z
2023-04-22T02:35:01.098Z
2023-04-22T02:35:01.098Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA CUDA Toolkit', 'Versions': 'All versions prior to 12.1'}
CVE-2023-25007
A malicious actor may convince a user to open a malicious USD file that may trigger an uninitialized pointer which could result in code execution.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0008
2023-02-01T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'Autodesk 3ds Max USD Plugin', 'Versions': '0.3'}
CVE-2023-25904
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25545
Improper buffer restrictions in some Intel(R) Server Board BMC firmware before version 2.90 may allow a privileged user to enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html
2023-02-15T04:00:03.037Z
2023-05-10T13:17:04.014Z
2023-05-10T13:17:04.014Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Server Board BMC firmware', 'Versions': 'before version 2.90'}
CVE-2023-25115
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_ip and the port variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.075Z
2023-07-06T14:53:26.323Z
2023-07-17T19:35:23.164Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25816
Nextcloud is an Open Source private cloud software. Versions 25.0.0 and above, prior to 25.0.3, are subject to Uncontrolled Resource Consumption. A user can configure a very long password, consuming more resources on password validation than desired. This issue is patched in 25.0.3 No workaround is available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-53q2-cm29-7j83
2023-02-15T16:34:48.773Z
2023-02-24T23:17:41.839Z
2023-02-24T23:17:41.839Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.3'}
CVE-2023-25953
Code injection vulnerability in Drive Explorer for macOS versions 3.5.4 and earlier allows an attacker who can login to the client where the affected product is installed to inject arbitrary code while processing the product execution. Since a full disk access privilege is required to execute LINE WORKS Drive Explorer, the attacker may be able to read and/or write to arbitrary files without the access privileges.
https://line.worksmobile.com/jp/release-notes/20230216/
2023-03-15T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'WORKS MOBILE Japan Corp.', 'Product': 'Drive Explorer for macOS', 'Versions': 'versions 3.5.4 and earlier'}
CVE-2023-25683
IBM PowerVM Hypervisor FW950.00 through FW950.71, FW1010.00 through FW1010.40, FW1020.00 through FW1020.20, and FW1030.00 through FW1030.11 could allow an attacker to obtain sensitive information if they gain service access to the HMC. IBM X-Force ID: 247592.
https://www.ibm.com/support/pages/node/7002721
2023-02-11T18:09:03.126Z
2023-06-15T00:59:47.051Z
2023-06-15T00:59:47.051Z
{'Vendor': 'IBM', 'Product': 'PowerVM Hypervisor', 'Versions': 'FW950.00, FW1010.00, FW1020.00, FW1030.00'}
CVE-2023-25729
Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25396
Privilege escalation in the MSI repair functionality in Caphyon Advanced Installer 20.0 and below allows attackers to access and manipulate system files.
https://www.advancedinstaller.com/release-20.1.html
2023-02-06T00:00:00
2023-02-08T00:00:00
2023-02-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25800
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themeum Tutor LMS allows SQL Injection.This issue affects Tutor LMS: from n/a through 2.2.0.
https://patchstack.com/database/vulnerability/tutor/wordpress-tutor-lms-plugin-2-1-10-multiple-student-sql-injection-vulnerability?_s_id=cve
2023-02-15T12:11:10.695Z
2023-11-03T16:26:12.916Z
2023-11-03T16:26:12.916Z
{'Vendor': 'Themeum', 'Product': 'Tutor LMS', 'Versions': 'n/a'}
CVE-2023-25103
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_dmvpn function with the gre_ip and the gre_mask variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.072Z
2023-07-06T14:53:25.271Z
2023-07-17T19:35:21.714Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25553
A CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists on a DCE endpoint through the logging capabilities of the webserver. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf
2023-02-07T17:00:03.779Z
2023-04-18T20:38:01.298Z
2023-04-18T20:38:01.298Z
{'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'}
CVE-2023-25046
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Podlove Podlove Podcast Publisher plugin <= 3.8.2 versions.
https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-3-8-2-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:50.692Z
2023-04-07T09:26:09.940Z
2023-04-07T09:26:09.940Z
{'Vendor': 'Podlove', 'Product': 'Podlove Podcast Publisher', 'Versions': 'n/a'}
CVE-2023-25695
Generation of Error Message Containing Sensitive Information vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.5.2.
https://github.com/apache/airflow/pull/29501
2023-02-13T00:21:30.680Z
2023-03-15T09:37:11.437Z
2023-03-15T09:37:11.437Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-25504
A malicious actor who has been authenticated and granted specific permissions in Apache Superset may use the import dataset feature in order to conduct Server-Side Request Forgery attacks and query internal resources on behalf of the server where Superset is deployed. This vulnerability exists in Apache Superset versions up to and including 2.0.1.
https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx
2023-02-06T21:18:11.420Z
2023-04-17T16:29:43.729Z
2023-04-17T16:29:43.729Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Superset', 'Versions': '0'}
CVE-2023-25154
Misskey is an open source, decentralized social media platform. In versions prior to 13.5.0 the link to the instance to the sender that appears when viewing a user or note received through ActivityPub is not properly validated, so by inserting a URL with a javascript scheme an attacker may execute JavaScript code in the context of the recipient. This issue has been fixed in version 13.5.0. Users are advised to upgrade. Users unable to upgrade should not "view on remote" for untrusted instances.
https://github.com/misskey-dev/misskey/security/advisories/GHSA-pfp5-r48x-fg25
2023-02-03T16:59:18.242Z
2023-02-22T19:00:25.905Z
2023-02-22T19:00:25.905Z
{'Vendor': 'misskey-dev', 'Product': 'misskey', 'Versions': '< 13.5.0'}
CVE-2023-25912
The webreport generation feature in the Danfoss AK-EM100 allows an unauthorized actor to generate a web report that discloses sensitive information such as the internal IP address, usernames and internal device values.
https://divd.nl/cves/CVE-2023-25912
2023-02-16T14:22:41.966Z
2023-06-11T13:17:01.462Z
2023-06-11T13:17:01.462Z
{'Vendor': 'Danfoss', 'Product': 'AK-EM100', 'Versions': '< 2.2.0.12'}