CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-25011 | PC settings tool Ver10.1.26.0 and earlier, PC settings tool Ver11.0.22.0 and earlier allows a attacker to write to the registry as administrator privileges with standard user privileges. | https://jpn.nec.com/security-info/secinfo/nv23-001_en.html | 2023-02-01T00:00:00 | 2023-02-15T00:00:00 | 2023-02-15T00:00:00 | {'Vendor': 'NEC Corporation', 'Product': 'PC settings tool', 'Versions': 'PC settings tool Ver10.1.26.0 and earlier, PC settings tool Ver11.0.22.0 and earlier.'} |
CVE-2023-25292 | Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie. | http://group-office.com | 2023-02-06T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25768 | A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server. | https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756 | 2023-02-14T00:00:00 | 2023-02-15T00:00:00 | 2023-10-24T12:49:01.830Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Azure Credentials Plugin', 'Versions': 'unspecified'} |
CVE-2023-25787 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Wbolt team WP资源下载管理 plugin <= 1.3.9 versions. | https://patchstack.com/database/vulnerability/download-info-page/wordpress-wp-plugin-1-3-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-15T12:10:40.366Z | 2023-05-03T10:29:48.025Z | 2023-05-03T10:29:48.025Z | {'Vendor': 'Wbolt team', 'Product': 'WP资源下载管理', 'Versions': 'n/a'} |
CVE-2023-25066 | Cross-Site Request Forgery (CSRF) vulnerability in FolioVision FV Flowplayer Video Player plugin <= 7.5.30.7212 versions. | https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-30-7212-cross-site-request-forgery-csrf?_s_id=cve | 2023-02-02T09:58:52.947Z | 2023-02-14T05:32:00.895Z | 2023-02-14T05:32:00.895Z | {'Vendor': 'FolioVision', 'Product': 'FV Flowplayer Video Player', 'Versions': 'n/a'} |
CVE-2023-25820 | Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x | 2023-02-15T16:34:48.774Z | 2023-03-22T18:22:54.139Z | 2023-03-22T18:22:54.139Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': 'Nextcloud Server >= 24.0.0, < 24.0.10, Nextcloud Server >= 25.0.0, < 25.0.4, Nextcloud Enterprise Server >= 25.0.0, < 25.0.4, Nextcloud Enterprise Server >= 24.0.0, < 24.0.10, Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.5, Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.10, Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.10'} |
CVE-2023-25123 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables when action is 2. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.078Z | 2023-07-06T14:53:27.013Z | 2023-07-17T19:35:24.087Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25089 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface variable when in_acl is -1. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.069Z | 2023-07-06T14:53:24.074Z | 2023-07-17T19:35:19.867Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25573 | metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/metersphere/metersphere/security/advisories/GHSA-mcwr-j9vm-5g8h | 2023-02-07T17:10:00.741Z | 2023-03-09T16:33:40.592Z | 2023-03-09T16:33:40.592Z | {'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 1.20.20 lts, >= 2.0.0, < 2.7.1'} |
CVE-2023-25748 | By displaying a prompt with a long description, the fullscreen notification could have been hidden, resulting in potential user confusion or spoofing attacks. <br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 111. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25898 | Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25461 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in namithjawahar Wp-Insert plugin <= 2.5.0 versions. | https://patchstack.com/database/vulnerability/wp-insert/wordpress-wp-insert-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:05.561Z | 2023-04-25T19:13:26.196Z | 2023-04-25T19:13:26.196Z | {'Vendor': 'namithjawahar', 'Product': 'Wp-Insert', 'Versions': 'n/a'} |
CVE-2023-25031 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1 versions. | https://patchstack.com/database/vulnerability/bft-autoresponder/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-1-cross-site-scripting-xss?_s_id=cve | 2023-02-02T09:58:49.593Z | 2023-04-07T11:01:41.539Z | 2023-04-07T11:01:41.539Z | {'Vendor': 'Kiboko Labs', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': 'n/a'} |
CVE-2023-25524 |
NVIDIA Omniverse Workstation Launcher for Windows and Linux contains a vulnerability in the authentication flow, where a user’s access token is displayed in the browser user's address bar. An attacker could use this token to impersonate the user to access launcher resources. A successful exploit of this vulnerability may lead to information disclosure.
| https://nvidia.custhelp.com/app/answers/detail/a_id/5472 | 2023-02-07T02:57:17.086Z | 2023-08-03T16:34:47.809Z | 2023-08-03T16:34:47.809Z | {'Vendor': 'NVIDIA', 'Product': 'Omniverse Workstation Launcher', 'Versions': '\t1.8.7 and prior versions'} |
CVE-2023-25877 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25027 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Chained Quiz plugin <= 1.3.2.5 versions. | https://patchstack.com/database/vulnerability/chained-quiz/wordpress-chained-quiz-plugin-1-3-2-5-cross-site-scripting-xss?_s_id=cve | 2023-02-02T09:58:48.541Z | 2023-04-07T10:46:24.610Z | 2023-04-07T10:46:24.610Z | {'Vendor': 'Kiboko Labs', 'Product': 'Chained Quiz', 'Versions': 'n/a'} |
CVE-2023-25477 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Yotuwp Video Gallery plugin <= 1.3.12 versions. | https://patchstack.com/database/vulnerability/yotuwp-easy-youtube-embed/wordpress-video-gallery-youtube-playlist-channel-gallery-by-yotuwp-plugin-1-3-12-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:08.237Z | 2023-09-01T10:38:21.616Z | 2023-09-01T10:38:21.616Z | {'Vendor': 'Yotuwp', 'Product': 'Video Gallery', 'Versions': 'n/a'} |
CVE-2023-25924 | IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 could allow an authenticated user to perform actions that they should not have access to due to improper authorization. IBM X-Force ID: 247630. | https://www.ibm.com/support/pages/node/6962729 | 2023-02-16T16:39:45.212Z | 2023-03-21T14:53:38.493Z | 2023-03-22T04:39:15.803375Z | {'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1 , 4.1.1'} |
CVE-2023-25861 | Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/illustrator/apsb23-19.html | 2023-02-15T00:00:00 | 2023-03-22T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Illustrator', 'Versions': 'unspecified, unspecified, unspecified'} |
CVE-2023-25162 | Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to 24.0.8 and 23.0.12 and Nextcloud Enterprise server prior to 24.0.8 and 23.0.12 are vulnerable to server-side request forgery (SSRF). Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF, which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. Nextcloud Server 24.0.8 and 23.0.2 and Nextcloud Enterprise Server 24.0.8 and 23.0.12 contain a patch for this issue. No known workarounds are available. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m | 2023-02-03T16:59:18.245Z | 2023-02-13T20:34:29.201Z | 2023-02-13T20:34:29.201Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 23.0.12, >= 24.0.0, < 24.0.8'} |
CVE-2023-25532 | NVIDIA DGX H100 BMC contains a vulnerability in IPMI, where an attacker may cause insufficient protection of credentials. A successful exploit of this vulnerability may lead to information disclosure. | https://nvidia.custhelp.com/app/answers/detail/a_id/5473 | 2023-02-07T02:57:25.085Z | 2023-09-20T00:29:20.539Z | 2023-09-20T00:29:20.539Z | {'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'} |
CVE-2023-25709 | Cross-Site Request Forgery (CSRF) vulnerability in Plainware Locatoraid Store Locator plugin <= 3.9.11 versions. | https://patchstack.com/database/vulnerability/locatoraid/wordpress-locatoraid-store-locator-plugin-3-9-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-13T04:14:01.863Z | 2023-03-15T10:25:14.062Z | 2023-03-15T10:25:14.062Z | {'Vendor': 'Plainware', 'Product': 'Locatoraid Store Locator', 'Versions': 'n/a'} |
CVE-2023-25973 | Cross-Site Request Forgery (CSRF) vulnerability in Lucian Apostol Auto Affiliate Links plugin <= 6.3.0.2 versions. | https://patchstack.com/database/vulnerability/wp-auto-affiliate-links/wordpress-auto-affiliate-links-plugin-6-3-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-17T13:47:09.998Z | 2023-03-13T14:14:05.882Z | 2023-03-13T14:14:05.882Z | {'Vendor': 'Lucian Apostol', 'Product': 'Auto Affiliate Links', 'Versions': 'n/a'} |
CVE-2023-25070 | Cleartext transmission of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier. If the telnet connection is enabled, a remote unauthenticated attacker may eavesdrop on or alter the administrator's communication to the product. | https://www.seiko-sol.co.jp/archives/73969/ | 2023-03-15T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A100/110', 'Versions': 'firmware Ver. 4.2.0 and earlier'} |
CVE-2023-25565 | GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, an incorrect free when decoding target information can trigger a denial of service. The error condition incorrectly assumes the `cb` and `sh` buffers contain a copy of the data that needs to be freed. However, that is not the case. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This will likely trigger an assertion failure in `free`, causing a denial-of-service. This issue is fixed in version 1.2.0. | https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-7q7f-wqcg-mvfg | 2023-02-07T17:10:00.737Z | 2023-02-14T17:35:41.222Z | 2023-02-14T17:35:41.222Z | {'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'} |
CVE-2023-25135 | vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1. | https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | 2023-02-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25836 |
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 – 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser. The privileges required to execute this attack are low.
| https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/ | 2023-02-15T17:59:31.097Z | 2023-07-21T03:41:09.485Z | 2023-11-30T15:24:14.908Z | {'Vendor': 'Esri', 'Product': 'Portal sites', 'Versions': '10.8.1'} |
CVE-2023-25772 | Improper input validation in the Intel(R) Retail Edge Mobile Android application before version 3.0.301126-RELEASE may allow an authenticated user to potentially enable denial of service via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html | 2023-03-02T04:00:03.052Z | 2023-05-10T13:40:57.384Z | 2023-05-10T13:40:57.384Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Retail Edge Mobile Android application', 'Versions': 'before version 3.0.301126-RELEASE'} |
CVE-2023-25267 | An issue was discovered in GFI Kerio Connect 9.4.1 patch 1 (fixed in 10.0.0). There is a stack-based Buffer Overflow in the webmail component's 2FASetup function via an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI. | https://support.kerioconnect.gfi.com/hc/en-us/articles/9044634878226-Kerio-Connect-10-0-0-Release-Notes | 2023-02-06T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25908 | Adobe Photoshop versions 23.5.3 (and earlier) and 24.1.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/photoshop/apsb23-23.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Photoshop', 'Versions': 'unspecified, unspecified, unspecified'} |
CVE-2023-25725 | HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31. | https://www.haproxy.org/ | 2023-02-13T00:00:00 | 2023-02-14T00:00:00 | 2023-02-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25660 | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray<bool>` will reference to a nullptr, leading to a seg fault. A fix is included in TensorFlow version 2.12 and version 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjqc-vqcf-5qvj | 2023-02-09T20:58:21.857Z | 2023-03-24T23:44:30.233Z | 2023-03-24T23:44:30.233Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.1.1'} |
CVE-2023-25230 | loonflow r2.0.14 is vulnerable to server-side request forgery (SSRF). | https://github.com/blackholll/loonflow/issues/402 | 2023-02-06T00:00:00 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25119 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_pptp function with the remote_subnet and the remote_mask variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.076Z | 2023-07-06T14:53:26.664Z | 2023-07-17T19:35:23.621Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25549 |
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that
allows for remote code execution when using a parameter of the DCE network settings
endpoint.
Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf | 2023-02-07T17:00:03.778Z | 2023-04-18T20:35:42.008Z | 2023-04-18T20:35:42.008Z | {'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'} |
CVE-2023-25363 | A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely. | https://bugs.webkit.org/show_bug.cgi?id=242684 | 2023-02-06T00:00:00 | 2023-03-02T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25733 | The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110. | https://bugzilla.mozilla.org/show_bug.cgi?id=1808632 | 2023-02-13T08:46:16.516Z | 2023-06-19T10:22:03.034Z | 2023-06-19T10:22:03.034Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25676 | TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero. A fix is available in TensorFlow 2.12.0 and 2.11.1. | https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq | 2023-02-09T20:58:21.859Z | 2023-03-24T23:10:30.431Z | 2023-03-24T23:10:30.431Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25949 | Uncontrolled resource consumption in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | 2023-03-29T03:00:02.485Z | 2023-11-14T19:04:52.332Z | 2023-11-14T19:04:52.332Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Aptio* V UEFI Firmware Integrator Tools', 'Versions': 'See references'} |
CVE-2023-25764 | Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates. | https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934 | 2023-02-14T00:00:00 | 2023-02-15T00:00:00 | 2023-10-24T14:16:55.183Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Email Extension Plugin', 'Versions': '0, 2.89.0.1'} |
CVE-2023-25621 | Privilege Escalation vulnerability in Apache Software Foundation Apache Sling.
Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to "Info".
This issue affects the i18n module of Apache Sling up to version 2.5.18. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps).
Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.
| https://sling.apache.org/news.html | 2023-02-09T14:35:46.767Z | 2023-02-23T08:42:37.104Z | 2023-02-23T08:42:37.104Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Sling', 'Versions': 'Apache Sling i18n'} |
CVE-2023-25158 | GeoTools is an open source Java library that provides tools for geospatial data. GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore. SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations. Users are advised to upgrade to either version 27.4 or to 28.2 to resolve this issue. Users unable to upgrade may disable `encode functions` for PostGIS DataStores or enable `prepared statements` for JDBCDataStores as a partial mitigation. | https://github.com/geotools/geotools/security/advisories/GHSA-99c3-qc2q-p94m | 2023-02-03T16:59:18.244Z | 2023-02-21T20:57:47.754Z | 2023-02-21T20:57:47.754Z | {'Vendor': 'geotools', 'Product': 'geotools', 'Versions': '>= 28.0, < 28.2, < 27.4'} |
CVE-2023-25508 | NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler, where an attacker with the appropriate level of authorization can upload and download arbitrary files under certain circumstances, which may lead to denial of service, escalation of privileges, information disclosure, and data tampering. | https://nvidia.custhelp.com/app/answers/detail/a_id/5458 | 2023-02-07T02:57:11.657Z | 2023-04-22T02:32:04.737Z | 2023-04-22T02:32:04.737Z | {'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 3.39.3'} |
CVE-2023-25295 | A Cross Site Scripting (XSS) vulnerability in evewa3ajax.php in GRUEN eVEWA3 Community 31 through 53 allows attackers to obtain escalated privileges via a crafted request to the login panel. | https://blog.munz4u.de/posts/2023/03/cve-2023-25295-ato-via-rxss-in-evewa3-community/ | 2023-02-06T00:00:00 | 2024-01-17T00:00:00 | 2024-01-24T14:47:24.429530 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25780 | It is identified a vulnerability of insufficient authentication in an important specific function of Status PowerBPM. A LAN attacker with normal user privilege can exploit this vulnerability to modify substitute agent to arbitrary users, resulting in serious consequence. | https://www.twcert.org.tw/tw/cp-132-7152-d7f5b-1.html | 2023-02-15T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Status Internet Co.,Ltd.', 'Product': 'PowerBPM', 'Versions': '2.0'} |
CVE-2023-25153 | containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images. | https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2 | 2023-02-03T16:59:18.242Z | 2023-02-16T14:09:08.519Z | 2023-02-16T14:09:08.519Z | {'Vendor': 'containerd', 'Product': 'containerd', 'Versions': '< 1.5.18, >= 1.6.0, < 1.6.18'} |
CVE-2023-25016 | Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposes Sensitive Information to an Unauthorized Actor. | https://forums.couchbase.com/tags/security | 2023-02-02T00:00:00 | 2023-02-06T00:00:00 | 2023-02-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25915 | Due to improper input validation, a remote attacker could execute arbitrary commands on the target system. | https://csirt.divd.nl/CVE-2023-25915 | 2023-02-16T14:22:41.966Z | 2023-08-21T20:30:02.375Z | 2023-08-21T20:30:02.375Z | {'Vendor': 'Danfoss', 'Product': 'AK-SM800A', 'Versions': '< 3.3'} |
CVE-2023-25738 | Members of the <code>DEVMODEW</code> struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. | https://www.mozilla.org/security/advisories/mfsa2023-06/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25692 | Improper Input Validation vulnerability in the Apache Airflow Google Provider.
This issue affects Apache Airflow Google Provider versions before 8.10.0.
| https://github.com/apache/airflow/pull/29499 | 2023-02-12T22:58:06.942Z | 2023-02-24T11:48:00.202Z | 2023-02-24T11:48:00.202Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow Google Provider', 'Versions': '0'} |
CVE-2023-25368 | Siglent SDS 1104X-E SDS1xx4X-E_V6.1.37R9.ADS is vulnerable to Incorrect Access Control. An unauthenticated attacker can overwrite firmnware. | https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25368.md | 2023-02-06T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25104 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the username and the password variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.073Z | 2023-07-06T14:53:25.382Z | 2023-07-17T19:35:21.824Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25554 |
A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS
Command Injection') vulnerability exists that allows a local privilege escalation on the appliance
when a maliciously crafted Operating System command is entered on the device.
Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf | 2023-02-07T17:00:03.780Z | 2023-04-18T20:34:40.438Z | 2023-04-18T20:34:40.438Z | {'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'} |
CVE-2023-25807 | DataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3.
| https://github.com/dataease/dataease/security/advisories/GHSA-xj3h-3wmw-j5vf | 2023-02-15T16:34:48.772Z | 2023-02-28T15:05:33.087Z | 2023-02-28T15:05:33.087Z | {'Vendor': 'dataease', 'Product': 'dataease', 'Versions': '< 1.18.3'} |
CVE-2023-25942 |
Dell PowerScale OneFS versions 8.2.x-9.4.x contain an uncontrolled resource consumption vulnerability. A malicious network user with low privileges could potentially exploit this vulnerability in SMB, leading to a potential denial of service.
| https://www.dell.com/support/kbdoc/en-us/000211539/dell-emc-powerscale-onefs-security | 2023-02-17T06:15:08.304Z | 2023-04-04T10:28:04.862Z | 2023-04-04T10:28:04.862Z | {'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': '9.2.1.0 through 9.2.1.21 9.4.0.0 through 9.4.0.12 9.5.0.0, 9.1.0.0 through 9.1.0.28, Any other version'} |
CVE-2023-25041 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cththemes Monolit theme <= 2.0.6 versions. | https://patchstack.com/database/vulnerability/monolit/wordpress-monolit-theme-theme-2-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-02T09:58:50.691Z | 2023-04-07T11:17:04.191Z | 2023-04-07T11:17:04.191Z | {'Vendor': 'Cththemes', 'Product': 'Monolit', 'Versions': 'n/a'} |
CVE-2023-25411 | Aten PE8108 2.4.232 is vulnerable to Cross Site Request Forgery (CSRF). | https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit/ | 2023-02-06T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25684 | IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 247597. | https://www.ibm.com/support/pages/node/6962729 | 2023-02-11T18:09:03.126Z | 2023-03-21T16:13:23.239Z | 2023-03-21T16:13:23.239Z | {'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'} |
CVE-2023-25811 | Uptime Kuma is a self-hosted monitoring tool. In versions prior to 1.20.0 the Uptime Kuma `name` parameter allows a persistent XSS attack. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp | 2023-02-15T16:34:48.773Z | 2023-02-21T20:45:39.863Z | 2023-02-21T20:45:39.863Z | {'Vendor': 'louislam', 'Product': 'uptime-kuma', 'Versions': '< 1.20.0'} |
CVE-2023-25542 |
Dell Trusted Device Agent, versions prior to 5.3.0, contain(s) an improper installation permissions vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to escalated privileges.
| https://www.dell.com/support/kbdoc/en-us/000209461/dsa-2023-074 | 2023-02-07T09:35:27.080Z | 2023-04-06T06:17:11.024Z | 2023-06-06T06:35:01.624Z | {'Vendor': 'Dell', 'Product': '\tDell Trusted Device Client', 'Versions': 'Versions prior to 5.3.0'} |
CVE-2023-25112 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_l2tp function with the remote_subnet and the remote_mask variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.074Z | 2023-07-06T14:53:26.072Z | 2023-07-17T19:35:22.768Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25407 | Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have read access to administrator credentials. | https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit/ | 2023-02-06T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25057 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Libsyn Libsyn Publisher Hub.This issue affects Libsyn Publisher Hub: from n/a through 1.3.2.
| https://patchstack.com/database/vulnerability/libsyn-podcasting/wordpress-libsyn-publisher-hub-plugin-1-3-2-sensitive-data-exposure-vulnerability?_s_id=cve | 2023-02-02T09:58:51.822Z | 2023-11-30T15:43:43.615Z | 2023-11-30T15:43:43.615Z | {'Vendor': 'Libsyn', 'Product': 'Libsyn Publisher Hub', 'Versions': 'n/a'} |
CVE-2023-25954 | KYOCERA Mobile Print' v3.2.0.230119 and earlier, 'UTAX/TA MobilePrint' v3.2.0.230119 and earlier, and 'Olivetti Mobile Print' v3.2.0.230119 and earlier are vulnerable to improper intent handling. When a malicious app is installed on the victim user's Android device, the app may send an intent and direct the affected app to download malicious files or apps to the device without notification. | https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2023-04-11.html | 2023-03-15T00:00:00 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | {'Vendor': 'Kyocera Document Solutions, TA Triumph-Adler GmbH, and Olivetti SpA', 'Product': 'KYOCERA Mobile Print, UTAX/TA MobilePrint, and Olivetti Mobile Print', 'Versions': "KYOCERA Mobile Print' v3.2.0.230119 and earlier, 'UTAX/TA MobilePrint' v3.2.0.230119 and earlier, and 'Olivetti Mobile Print' v3.2.0.230119 and earlier"} |
CVE-2023-25283 | A stack overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the reserveDHCP_HostName_1.1.1.0 parameter to lan.asp. | https://www.dlink.com/en/security-bulletin/ | 2023-02-06T00:00:00 | 2023-03-13T00:00:00 | 2023-03-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25796 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Include WP BaiDu Submit plugin <= 1.2.1 versions. | https://patchstack.com/database/vulnerability/wp-baidu-submit/wordpress-wp-baidu-submit-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-15T12:11:10.695Z | 2023-05-03T11:08:14.427Z | 2023-05-03T11:08:14.427Z | {'Vendor': 'Include', 'Product': 'WP BaiDu Submit', 'Versions': 'n/a'} |
CVE-2023-25145 | A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | https://success.trendmicro.com/solution/000292209 | 2023-02-03T15:46:02.643Z | 2023-03-07T22:19:42.286Z | 2023-03-10T20:05:13.704141Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'} |
CVE-2023-25515 |
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
| https://https://nvidia.custhelp.com/app/answers/detail/a_id/5468 | 2023-02-07T02:57:17.083Z | 2023-06-23T17:07:50.994Z | 2023-07-03T23:26:15.468Z | {'Vendor': 'NVIDIA', 'Product': 'GPU Display Driver for Windows and Linux', 'Versions': 'All versions prior to and including 15.2, 13.7, and 11.12, and all versions prior to and including the May 2023 release'} |
CVE-2023-25903 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25000 | HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9. | https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078 | 2023-02-01T17:54:13.893Z | 2023-03-30T00:17:46.230Z | 2023-03-30T00:24:51.132Z | {'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.12.0, 1.11.0, 0'} |
CVE-2023-25450 | Cross-Site Request Forgery (CSRF) vulnerability in GiveWP GiveWP – Donation Plugin and Fundraising Platform plugin <= 2.25.1 versions. | https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-25-1-cross-site-request-forgery-csrf-via-give-cache-flush-vulnerability?_s_id=cve | 2023-02-06T12:38:03.962Z | 2023-06-15T12:21:35.740Z | 2023-06-15T12:21:35.740Z | {'Vendor': 'GiveWP', 'Product': 'GiveWP – Donation Plugin and Fundraising Platform', 'Versions': 'n/a'} |
CVE-2023-25647 |
There is a permission and access control vulnerability in some ZTE mobile phones. Due to improper access control, applications in mobile phone could monitor the touch event.
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032264 | 2023-02-09T19:47:48.022Z | 2023-08-17T02:13:19.932Z | 2023-08-30T00:56:20.949Z | {'Vendor': 'ZTE', 'Product': 'Some ZTE Mobile Phones', 'Versions': 'NON_EEA_P870F21V1.0.0B01, GEN_ZTE_PQ82A01V1.0.0B01MR, GEN_ZTE_P870A01V3.0.0B01, GEN_ZTE_P898A01V2.0.0B01'} |
CVE-2023-25217 | Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formWifiBasicSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://github.com/DrizzlingSun/Tenda/blob/main/AC5/10/10.md | 2023-02-06T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25702 | Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in Fullworks Quick Paypal Payments plugin <= 5.7.25 versions. | https://patchstack.com/database/vulnerability/quick-paypal-payments/wordpress-quick-paypal-payments-plugin-5-7-25-cross-site-scripting-xss?_s_id=cve | 2023-02-13T04:13:47.557Z | 2023-04-07T12:39:15.119Z | 2023-04-07T12:39:15.119Z | {'Vendor': 'Fullworks', 'Product': 'Quick Paypal Payments', 'Versions': 'n/a'} |
CVE-2023-25978 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Nate Reist Protected Posts Logout Button plugin <= 1.4.5 versions. | https://patchstack.com/database/vulnerability/protected-posts-logout-button/wordpress-protected-posts-logout-button-plugin-1-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:13.226Z | 2023-06-13T15:09:31.271Z | 2023-06-13T15:09:31.271Z | {'Vendor': 'Nate Reist', 'Product': 'Protected Posts Logout Button', 'Versions': 'n/a'} |
CVE-2023-25094 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the into_class_node function with either the class_name or old_class_name variable. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.071Z | 2023-07-06T14:53:24.484Z | 2023-07-17T19:35:20.465Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25240 | An improper SameSite Attribute vulnerability in pimCore v10.5.15 allows attackers to execute arbitrary code. | https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions | 2023-02-06T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25305 | PolyMC Launcher <= 1.4.3 is vulnerable to Directory Traversal. A mrpack file can be maliciously crafted to create arbitrary files outside of the installation directory. | https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/ | 2023-02-06T00:00:00 | 2023-04-04T00:00:00 | 2023-04-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25755 | Screen Creator Advance 2 Ver.0.1.1.4 Build01A and earlier is vulnerable to improper restriction of operations within the bounds of a memory buffer (CWE-119) due to improper check of its data size when processing a project file. If a user of Screen Creator Advance 2 opens a specially crafted project file, information may be disclosed and/or arbitrary code may be executed. | https://www.electronics.jtekt.co.jp/en/topics/202303315311/ | 2023-03-15T00:00:00 | 2023-04-11T00:00:00 | 2023-04-11T00:00:00 | {'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'Screen Creator Advance 2', 'Versions': 'Ver.0.1.1.4 Build01A and earlier'} |
CVE-2023-25186 | An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. If/when CSP (as a BTS administrator) removes security hardenings from a Nokia Single RAN BTS baseband unit, a directory path traversal in the Nokia BTS baseband unit diagnostic tool AaShell (which is by default disabled) provides access to the BTS baseband unit internal filesystem from the mobile network solution internal BTS management network. | https://Nokia.com | 2023-02-04T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25885 | Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25539 |
Dell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.
| https://www.dell.com/support/kbdoc/en-us/000211267/dsa-2023-060-dell-networker-security-update-for-an-nsrcapinfo-vulnerability | 2023-02-07T09:35:27.080Z | 2023-05-31T04:50:27.879Z | 2023-05-31T04:50:27.879Z | {'Vendor': 'Dell', 'Product': 'NetWorker NVE', 'Versions': 'NetWorker 19.6.1.2 Linux and prior releases, NetWorker 19.7.0.3 Linux and prior releases, 19.7.1 Linux'} |
CVE-2023-25169 | discourse-yearly-review is a discourse plugin which publishes an automated Year in Review topic. In affected versions a user present in a yearly review topic that is then anonymised will still have some data linked to its original account. This issue has been patched in commit `b3ab33bbf7` which is included in the latest version of the Discourse Yearly Review plugin. Users are advised to upgrade. Users unable to upgrade may disable the `yearly_review_enabled` setting to fully mitigate the issue. Also, it's possible to edit the anonymised user's old data in the yearly review topics manually. | https://github.com/discourse/discourse-yearly-review/security/advisories/GHSA-x2r8-v85c-x3x7 | 2023-02-03T16:59:18.246Z | 2023-03-06T17:40:45.721Z | 2023-03-06T17:40:45.721Z | {'Vendor': 'discourse', 'Product': 'discourse-yearly-review', 'Versions': '< 0.2'} |
CVE-2023-25606 | An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-23] in FortiAnalyzer and FortiManager management interface 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions may allow a remote and authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests. | https://fortiguard.com/psirt/FG-IR-22-471 | 2023-02-08T13:42:03.366Z | 2023-07-11T16:52:51.034Z | 2023-07-11T16:52:51.034Z | {'Vendor': 'Fortinet', 'Product': 'FortiManager', 'Versions': '7.2.0, 7.0.0, 6.4.0'} |
CVE-2023-25743 | A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome.<br>*This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8. | https://www.mozilla.org/security/advisories/mfsa2023-06/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25313 | OS injection vulnerability in World Wide Broadcast Network AVideo version before 12.4, allows attackers to execute arbitrary code via the video link field to the Embed a video link feature. | https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw | 2023-02-06T00:00:00 | 2023-04-25T00:00:00 | 2023-04-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25893 | Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25485 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bernhard Kux JSON Content Importer plugin <= 1.3.15 versions. | https://patchstack.com/database/vulnerability/json-content-importer/wordpress-json-content-importer-plugin-1-3-15-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:09.645Z | 2023-04-25T18:33:47.611Z | 2023-04-25T18:33:47.611Z | {'Vendor': 'Bernhard Kux', 'Product': 'JSON Content Importer', 'Versions': 'n/a'} |
CVE-2023-25201 | Cross Site Request Forgery (CSRF) vulnerability in MultiTech Conduit AP MTCAP2-L4E1 MTCAP2-L4E1-868-042A v.6.0.0 allows a remote attacker to execute arbitrary code via a crafted script upload. | https://herolab.usd.de/security-advisories/ | 2023-02-06T00:00:00 | 2023-07-07T00:00:00 | 2023-07-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25651 |
There is a SQL injection vulnerability in some ZTE mobile internet products. Due to insufficient input validation of SMS interface parameter, an authenticated attacker could use the vulnerability to execute SQL injection and cause information leak.
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032684 | 2023-02-09T19:47:48.023Z | 2023-12-14T07:03:54.704Z | 2023-12-14T08:17:53.412Z | {'Vendor': 'ZTE', 'Product': 'Mobile Internet Products', 'Versions': 'BD_MF833U1V1.0.0B01, CR_LVWRGBMF286RV1.0.0B04'} |
CVE-2023-25344 | An issue was discovered in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to execute arbitrary code via crafted Object.prototype anonymous function. | https://github.com/node-swig/swig-templates/issues/89 | 2023-02-06T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25597 | A vulnerability in the web conferencing component of Mitel MiCollab through 9.6.2.9 could allow an unauthenticated attacker to download a shared file via a crafted request - including the exact path and filename - due to improper authentication control. A successful exploit could allow access to sensitive information. | https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0002 | 2023-02-08T00:00:00 | 2023-04-14T00:00:00 | 2023-04-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25981 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ThemeKraft Post Form plugin <= 2.8.1 versions. | https://patchstack.com/database/vulnerability/buddyforms/wordpress-buddyforms-plugin-2-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:13.226Z | 2023-08-25T09:54:38.822Z | 2023-08-25T09:54:38.822Z | {'Vendor': 'ThemeKraft', 'Product': 'Post Form', 'Versions': 'n/a'} |
CVE-2023-25082 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the old_ip and old_mac variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.068Z | 2023-07-06T14:53:23.374Z | 2023-07-17T19:35:19.018Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25578 | Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 1.5.2, the request body parsing in `starlite` allows a potentially unauthenticated attacker to consume a large amount of CPU time and RAM. The multipart body parser processes an unlimited number of file parts and an unlimited number of field parts. This is a remote, potentially unauthenticated Denial of Service vulnerability. This vulnerability affects applications with a request handler that accepts a `Body(media_type=RequestEncodingType.MULTI_PART)`. The large amount of CPU time required for processing requests can block all available worker processes and significantly delay or slow down the processing of legitimate user requests. The large amount of RAM accumulated while processing requests can lead to Out-Of-Memory kills. Complete DoS is achievable by sending many concurrent multipart requests in a loop. Version 1.51.2 contains a patch for this issue.
| https://github.com/starlite-api/starlite/security/advisories/GHSA-p24m-863f-fm6q | 2023-02-07T17:10:00.743Z | 2023-02-15T14:58:31.829Z | 2023-02-15T14:58:31.829Z | {'Vendor': 'starlite-api', 'Product': 'starlite', 'Versions': '< 1.51.2'} |
CVE-2023-25128 | null | null | 2023-02-02T00:00:00 | null | 2023-02-03T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-25763 | Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields. | https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2931 | 2023-02-14T00:00:00 | 2023-02-15T00:00:00 | 2023-10-24T12:48:56.193Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Email Extension Plugin', 'Versions': 'unspecified, 2.89.0.1'} |
CVE-2023-25558 | DataHub is an open-source metadata platform. When the DataHub frontend is configured to authenticate via SSO, it will leverage the pac4j library. The processing of the `id_token` is done in an unsafe manner which is not properly accounted for by the DataHub frontend. Specifically, if any of the id_token claims value start with the {#sb64} prefix, pac4j considers the value to be a serialized Java object and will deserialize it. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. Users are advised to upgrade. There are no known workarounds. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-086. | https://github.com/datahub-project/datahub/security/advisories/GHSA-hrwp-2q5c-86wv | 2023-02-07T17:10:00.733Z | 2023-02-10T22:03:07.330Z | null | {'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.9.5'} |
CVE-2023-25108 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the remote_ip variable. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.073Z | 2023-07-06T14:53:25.744Z | 2023-07-17T19:35:22.289Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25734 | After downloading a Windows <code>.url</code> shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. | https://www.mozilla.org/security/advisories/mfsa2023-06/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.