CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-25011
PC settings tool Ver10.1.26.0 and earlier, PC settings tool Ver11.0.22.0 and earlier allows a attacker to write to the registry as administrator privileges with standard user privileges.
https://jpn.nec.com/security-info/secinfo/nv23-001_en.html
2023-02-01T00:00:00
2023-02-15T00:00:00
2023-02-15T00:00:00
{'Vendor': 'NEC Corporation', 'Product': 'PC settings tool', 'Versions': 'PC settings tool Ver10.1.26.0 and earlier, PC settings tool Ver11.0.22.0 and earlier.'}
CVE-2023-25292
Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie.
http://group-office.com
2023-02-06T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25768
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-1756
2023-02-14T00:00:00
2023-02-15T00:00:00
2023-10-24T12:49:01.830Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Azure Credentials Plugin', 'Versions': 'unspecified'}
CVE-2023-25787
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Wbolt team WP资源下载管理 plugin <= 1.3.9 versions.
https://patchstack.com/database/vulnerability/download-info-page/wordpress-wp-plugin-1-3-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-15T12:10:40.366Z
2023-05-03T10:29:48.025Z
2023-05-03T10:29:48.025Z
{'Vendor': 'Wbolt team', 'Product': 'WP资源下载管理', 'Versions': 'n/a'}
CVE-2023-25066
Cross-Site Request Forgery (CSRF) vulnerability in FolioVision FV Flowplayer Video Player plugin <= 7.5.30.7212 versions.
https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-30-7212-cross-site-request-forgery-csrf?_s_id=cve
2023-02-02T09:58:52.947Z
2023-02-14T05:32:00.895Z
2023-02-14T05:32:00.895Z
{'Vendor': 'FolioVision', 'Product': 'FV Flowplayer Video Player', 'Versions': 'n/a'}
CVE-2023-25820
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform, and Nextcloud Enterprise Server is the enterprise version of the file server software. In Nextcloud Server versions 25.0.x prior to 25.0.5 and versions 24.0.x prior to 24.0.10 as well as Nextcloud Enterprise Server versions 25.0.x prior to 25.0.4, 24.0.x prior to 24.0.10, 23.0.x prior to 23.0.12.5, 22.x prior to 22.2.0.10, and 21.x prior to 21.0.9.10, when an attacker gets access to an already logged in user session they can then brute force the password on the confirmation endpoint. Nextcloud Server should upgraded to 24.0.10 or 25.0.4 and Nextcloud Enterprise Server should upgraded to 21.0.9.10, 22.2.10.10, 23.0.12.5, 24.0.10, or 25.0.4 to receive a patch. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-36g6-wjx2-333x
2023-02-15T16:34:48.774Z
2023-03-22T18:22:54.139Z
2023-03-22T18:22:54.139Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': 'Nextcloud Server >= 24.0.0, < 24.0.10, Nextcloud Server >= 25.0.0, < 25.0.4, Nextcloud Enterprise Server >= 25.0.0, < 25.0.4, Nextcloud Enterprise Server >= 24.0.0, < 24.0.10, Nextcloud Enterprise Server >= 23.0.0, < 23.0.12.5, Nextcloud Enterprise Server >= 22.0.0, < 22.2.10.10, Nextcloud Enterprise Server >= 21.0.0, < 21.0.9.10'}
CVE-2023-25123
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables when action is 2.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.078Z
2023-07-06T14:53:27.013Z
2023-07-17T19:35:24.087Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25089
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the handle_interface_acl function with the interface variable when in_acl is -1.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.069Z
2023-07-06T14:53:24.074Z
2023-07-17T19:35:19.867Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25573
metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/metersphere/metersphere/security/advisories/GHSA-mcwr-j9vm-5g8h
2023-02-07T17:10:00.741Z
2023-03-09T16:33:40.592Z
2023-03-09T16:33:40.592Z
{'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 1.20.20 lts, >= 2.0.0, < 2.7.1'}
CVE-2023-25748
By displaying a prompt with a long description, the fullscreen notification could have been hidden, resulting in potential user confusion or spoofing attacks. <br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 111.
https://www.mozilla.org/security/advisories/mfsa2023-09/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25898
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25461
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in namithjawahar Wp-Insert plugin <= 2.5.0 versions.
https://patchstack.com/database/vulnerability/wp-insert/wordpress-wp-insert-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:05.561Z
2023-04-25T19:13:26.196Z
2023-04-25T19:13:26.196Z
{'Vendor': 'namithjawahar', 'Product': 'Wp-Insert', 'Versions': 'n/a'}
CVE-2023-25031
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1 versions.
https://patchstack.com/database/vulnerability/bft-autoresponder/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-1-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:49.593Z
2023-04-07T11:01:41.539Z
2023-04-07T11:01:41.539Z
{'Vendor': 'Kiboko Labs', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': 'n/a'}
CVE-2023-25524
NVIDIA Omniverse Workstation Launcher for Windows and Linux contains a vulnerability in the authentication flow, where a user’s access token is displayed in the browser user's address bar. An attacker could use this token to impersonate the user to access launcher resources. A successful exploit of this vulnerability may lead to information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5472
2023-02-07T02:57:17.086Z
2023-08-03T16:34:47.809Z
2023-08-03T16:34:47.809Z
{'Vendor': 'NVIDIA', 'Product': 'Omniverse Workstation Launcher', 'Versions': '\t1.8.7 and prior versions'}
CVE-2023-25877
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25027
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Chained Quiz plugin <= 1.3.2.5 versions.
https://patchstack.com/database/vulnerability/chained-quiz/wordpress-chained-quiz-plugin-1-3-2-5-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:48.541Z
2023-04-07T10:46:24.610Z
2023-04-07T10:46:24.610Z
{'Vendor': 'Kiboko Labs', 'Product': 'Chained Quiz', 'Versions': 'n/a'}
CVE-2023-25477
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Yotuwp Video Gallery plugin <= 1.3.12 versions.
https://patchstack.com/database/vulnerability/yotuwp-easy-youtube-embed/wordpress-video-gallery-youtube-playlist-channel-gallery-by-yotuwp-plugin-1-3-12-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:08.237Z
2023-09-01T10:38:21.616Z
2023-09-01T10:38:21.616Z
{'Vendor': 'Yotuwp', 'Product': 'Video Gallery', 'Versions': 'n/a'}
CVE-2023-25924
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 could allow an authenticated user to perform actions that they should not have access to due to improper authorization. IBM X-Force ID: 247630.
https://www.ibm.com/support/pages/node/6962729
2023-02-16T16:39:45.212Z
2023-03-21T14:53:38.493Z
2023-03-22T04:39:15.803375Z
{'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1 , 4.1.1'}
CVE-2023-25861
Illustrator version 26.5.2 (and earlier) and 27.2.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/illustrator/apsb23-19.html
2023-02-15T00:00:00
2023-03-22T00:00:00
2023-03-22T00:00:00
{'Vendor': 'Adobe', 'Product': 'Illustrator', 'Versions': 'unspecified, unspecified, unspecified'}
CVE-2023-25162
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to 24.0.8 and 23.0.12 and Nextcloud Enterprise server prior to 24.0.8 and 23.0.12 are vulnerable to server-side request forgery (SSRF). Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF, which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. Nextcloud Server 24.0.8 and 23.0.2 and Nextcloud Enterprise Server 24.0.8 and 23.0.12 contain a patch for this issue. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m
2023-02-03T16:59:18.245Z
2023-02-13T20:34:29.201Z
2023-02-13T20:34:29.201Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 23.0.12, >= 24.0.0, < 24.0.8'}
CVE-2023-25532
NVIDIA DGX H100 BMC contains a vulnerability in IPMI, where an attacker may cause insufficient protection of credentials. A successful exploit of this vulnerability may lead to information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
2023-02-07T02:57:25.085Z
2023-09-20T00:29:20.539Z
2023-09-20T00:29:20.539Z
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
CVE-2023-25709
Cross-Site Request Forgery (CSRF) vulnerability in Plainware Locatoraid Store Locator plugin <= 3.9.11 versions.
https://patchstack.com/database/vulnerability/locatoraid/wordpress-locatoraid-store-locator-plugin-3-9-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-13T04:14:01.863Z
2023-03-15T10:25:14.062Z
2023-03-15T10:25:14.062Z
{'Vendor': 'Plainware', 'Product': 'Locatoraid Store Locator', 'Versions': 'n/a'}
CVE-2023-25973
Cross-Site Request Forgery (CSRF) vulnerability in Lucian Apostol Auto Affiliate Links plugin <= 6.3.0.2 versions.
https://patchstack.com/database/vulnerability/wp-auto-affiliate-links/wordpress-auto-affiliate-links-plugin-6-3-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-17T13:47:09.998Z
2023-03-13T14:14:05.882Z
2023-03-13T14:14:05.882Z
{'Vendor': 'Lucian Apostol', 'Product': 'Auto Affiliate Links', 'Versions': 'n/a'}
CVE-2023-25070
Cleartext transmission of sensitive information exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier. If the telnet connection is enabled, a remote unauthenticated attacker may eavesdrop on or alter the administrator's communication to the product.
https://www.seiko-sol.co.jp/archives/73969/
2023-03-15T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'Seiko Solutions Inc.', 'Product': 'SkyBridge MB-A100/110', 'Versions': 'firmware Ver. 4.2.0 and earlier'}
CVE-2023-25565
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, an incorrect free when decoding target information can trigger a denial of service. The error condition incorrectly assumes the `cb` and `sh` buffers contain a copy of the data that needs to be freed. However, that is not the case. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point. This will likely trigger an assertion failure in `free`, causing a denial-of-service. This issue is fixed in version 1.2.0.
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-7q7f-wqcg-mvfg
2023-02-07T17:10:00.737Z
2023-02-14T17:35:41.222Z
2023-02-14T17:35:41.222Z
{'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'}
CVE-2023-25135
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
https://www.ambionics.io/blog/vbulletin-unserializable-but-unreachable
2023-02-03T00:00:00
2023-02-03T00:00:00
2023-02-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25836
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 – 10.9 that may allow a remote, authenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victims browser.  The privileges required to execute this attack are low.
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-enterprise-sites-security-patch-is-now-available/
2023-02-15T17:59:31.097Z
2023-07-21T03:41:09.485Z
2023-11-30T15:24:14.908Z
{'Vendor': 'Esri', 'Product': 'Portal sites', 'Versions': '10.8.1'}
CVE-2023-25772
Improper input validation in the Intel(R) Retail Edge Mobile Android application before version 3.0.301126-RELEASE may allow an authenticated user to potentially enable denial of service via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html
2023-03-02T04:00:03.052Z
2023-05-10T13:40:57.384Z
2023-05-10T13:40:57.384Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Retail Edge Mobile Android application', 'Versions': 'before version 3.0.301126-RELEASE'}
CVE-2023-25267
An issue was discovered in GFI Kerio Connect 9.4.1 patch 1 (fixed in 10.0.0). There is a stack-based Buffer Overflow in the webmail component's 2FASetup function via an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI.
https://support.kerioconnect.gfi.com/hc/en-us/articles/9044634878226-Kerio-Connect-10-0-0-Release-Notes
2023-02-06T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25908
Adobe Photoshop versions 23.5.3 (and earlier) and 24.1.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/photoshop/apsb23-23.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Photoshop', 'Versions': 'unspecified, unspecified, unspecified'}
CVE-2023-25725
HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.
https://www.haproxy.org/
2023-02-13T00:00:00
2023-02-14T00:00:00
2023-02-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25660
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, when the parameter `summarize` of `tf.raw_ops.Print` is zero, the new method `SummarizeArray<bool>` will reference to a nullptr, leading to a seg fault. A fix is included in TensorFlow version 2.12 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qjqc-vqcf-5qvj
2023-02-09T20:58:21.857Z
2023-03-24T23:44:30.233Z
2023-03-24T23:44:30.233Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.1.1'}
CVE-2023-25230
loonflow r2.0.14 is vulnerable to server-side request forgery (SSRF).
https://github.com/blackholll/loonflow/issues/402
2023-02-06T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25119
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_pptp function with the remote_subnet and the remote_mask variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.076Z
2023-07-06T14:53:26.664Z
2023-07-17T19:35:23.621Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25549
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that allows for remote code execution when using a parameter of the DCE network settings endpoint. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf
2023-02-07T17:00:03.778Z
2023-04-18T20:35:42.008Z
2023-04-18T20:35:42.008Z
{'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'}
CVE-2023-25363
A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
https://bugs.webkit.org/show_bug.cgi?id=242684
2023-02-06T00:00:00
2023-03-02T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25733
The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110.
https://bugzilla.mozilla.org/show_bug.cgi?id=1808632
2023-02-13T08:46:16.516Z
2023-06-19T10:22:03.034Z
2023-06-19T10:22:03.034Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25676
TensorFlow is an open source machine learning platform. When running versions prior to 2.12.0 and 2.11.1 with XLA, `tf.raw_ops.ParallelConcat` segfaults with a nullptr dereference when given a parameter `shape` with rank that is not greater than zero. A fix is available in TensorFlow 2.12.0 and 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6wfh-89q8-44jq
2023-02-09T20:58:21.859Z
2023-03-24T23:10:30.431Z
2023-03-24T23:10:30.431Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25949
Uncontrolled resource consumption in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable denial of service via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
2023-03-29T03:00:02.485Z
2023-11-14T19:04:52.332Z
2023-11-14T19:04:52.332Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Aptio* V UEFI Firmware Integrator Tools', 'Versions': 'See references'}
CVE-2023-25764
Jenkins Email Extension Plugin 2.93 and earlier does not escape, sanitize, or sandbox rendered email template output or log output generated during template rendering, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create or change custom email templates.
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2934
2023-02-14T00:00:00
2023-02-15T00:00:00
2023-10-24T14:16:55.183Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Email Extension Plugin', 'Versions': '0, 2.89.0.1'}
CVE-2023-25621
Privilege Escalation vulnerability in Apache Software Foundation Apache Sling. Any content author is able to create i18n dictionaries in the repository in a location the author has write access to. As these translations are used across the whole product, it allows an author to change any text or dialog in the product. For example an attacker might fool someone by changing the text on a delete button to "Info". This issue affects the i18n module of Apache Sling up to version 2.5.18. Version 2.6.2 and higher limit by default i18m dictionaries to certain paths in the repository (/libs and /apps). Users of the module are advised to update to version 2.6.2 or higher, check the configuration for resource loading and then adjust the access permissions for the configured path accordingly.
https://sling.apache.org/news.html
2023-02-09T14:35:46.767Z
2023-02-23T08:42:37.104Z
2023-02-23T08:42:37.104Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Sling', 'Versions': 'Apache Sling i18n'}
CVE-2023-25158
GeoTools is an open source Java library that provides tools for geospatial data. GeoTools includes support for OGC Filter expression language parsing, encoding and execution against a range of datastore. SQL Injection Vulnerabilities have been found when executing OGC Filters with JDBCDataStore implementations. Users are advised to upgrade to either version 27.4 or to 28.2 to resolve this issue. Users unable to upgrade may disable `encode functions` for PostGIS DataStores or enable `prepared statements` for JDBCDataStores as a partial mitigation.
https://github.com/geotools/geotools/security/advisories/GHSA-99c3-qc2q-p94m
2023-02-03T16:59:18.244Z
2023-02-21T20:57:47.754Z
2023-02-21T20:57:47.754Z
{'Vendor': 'geotools', 'Product': 'geotools', 'Versions': '>= 28.0, < 28.2, < 27.4'}
CVE-2023-25508
NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler, where an attacker with the appropriate level of authorization can upload and download arbitrary files under certain circumstances, which may lead to denial of service, escalation of privileges, information disclosure, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5458
2023-02-07T02:57:11.657Z
2023-04-22T02:32:04.737Z
2023-04-22T02:32:04.737Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 3.39.3'}
CVE-2023-25295
A Cross Site Scripting (XSS) vulnerability in evewa3ajax.php in GRUEN eVEWA3 Community 31 through 53 allows attackers to obtain escalated privileges via a crafted request to the login panel.
https://blog.munz4u.de/posts/2023/03/cve-2023-25295-ato-via-rxss-in-evewa3-community/
2023-02-06T00:00:00
2024-01-17T00:00:00
2024-01-24T14:47:24.429530
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25780
It is identified a vulnerability of insufficient authentication in an important specific function of Status PowerBPM. A LAN attacker with normal user privilege can exploit this vulnerability to modify substitute agent to arbitrary users, resulting in serious consequence.
https://www.twcert.org.tw/tw/cp-132-7152-d7f5b-1.html
2023-02-15T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Status Internet Co.,Ltd.', 'Product': 'PowerBPM', 'Versions': '2.0'}
CVE-2023-25153
containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.
https://github.com/containerd/containerd/security/advisories/GHSA-259w-8hf6-59c2
2023-02-03T16:59:18.242Z
2023-02-16T14:09:08.519Z
2023-02-16T14:09:08.519Z
{'Vendor': 'containerd', 'Product': 'containerd', 'Versions': '< 1.5.18, >= 1.6.0, < 1.6.18'}
CVE-2023-25016
Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposes Sensitive Information to an Unauthorized Actor.
https://forums.couchbase.com/tags/security
2023-02-02T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25915
Due to improper input validation, a remote attacker could execute arbitrary commands on the target system.
https://csirt.divd.nl/CVE-2023-25915
2023-02-16T14:22:41.966Z
2023-08-21T20:30:02.375Z
2023-08-21T20:30:02.375Z
{'Vendor': 'Danfoss', 'Product': 'AK-SM800A', 'Versions': '< 3.3'}
CVE-2023-25738
Members of the <code>DEVMODEW</code> struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25692
Improper Input Validation vulnerability in the Apache Airflow Google Provider. This issue affects Apache Airflow Google Provider versions before 8.10.0.
https://github.com/apache/airflow/pull/29499
2023-02-12T22:58:06.942Z
2023-02-24T11:48:00.202Z
2023-02-24T11:48:00.202Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow Google Provider', 'Versions': '0'}
CVE-2023-25368
Siglent SDS 1104X-E SDS1xx4X-E_V6.1.37R9.ADS is vulnerable to Incorrect Access Control. An unauthenticated attacker can overwrite firmnware.
https://github.com/BretMcDanel/CVE/blob/main/CVE-2023-25368.md
2023-02-06T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25104
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_ike_profile function with the username and the password variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.073Z
2023-07-06T14:53:25.382Z
2023-07-17T19:35:21.824Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25554
A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that allows a local privilege escalation on the appliance when a maliciously crafted Operating System command is entered on the device. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior)
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-02.pdf
2023-02-07T17:00:03.780Z
2023-04-18T20:34:40.438Z
2023-04-18T20:34:40.438Z
{'Vendor': 'Schneider Electric', 'Product': 'StruxureWare Data Center Expert', 'Versions': 'All'}
CVE-2023-25807
DataEase is an open source data visualization and analysis tool. When saving a dashboard on the DataEase platform saved data can be modified and store malicious code. This vulnerability can lead to the execution of malicious code stored by the attacker on the server side when the user accesses the dashboard. The vulnerability has been fixed in version 1.18.3.
https://github.com/dataease/dataease/security/advisories/GHSA-xj3h-3wmw-j5vf
2023-02-15T16:34:48.772Z
2023-02-28T15:05:33.087Z
2023-02-28T15:05:33.087Z
{'Vendor': 'dataease', 'Product': 'dataease', 'Versions': '< 1.18.3'}
CVE-2023-25942
Dell PowerScale OneFS versions 8.2.x-9.4.x contain an uncontrolled resource consumption vulnerability. A malicious network user with low privileges could potentially exploit this vulnerability in SMB, leading to a potential denial of service.
https://www.dell.com/support/kbdoc/en-us/000211539/dell-emc-powerscale-onefs-security
2023-02-17T06:15:08.304Z
2023-04-04T10:28:04.862Z
2023-04-04T10:28:04.862Z
{'Vendor': 'Dell', 'Product': 'PowerScale OneFS', 'Versions': '9.2.1.0 through 9.2.1.21 9.4.0.0 through 9.4.0.12 9.5.0.0, 9.1.0.0 through 9.1.0.28, Any other version'}
CVE-2023-25041
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cththemes Monolit theme <= 2.0.6 versions.
https://patchstack.com/database/vulnerability/monolit/wordpress-monolit-theme-theme-2-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-02T09:58:50.691Z
2023-04-07T11:17:04.191Z
2023-04-07T11:17:04.191Z
{'Vendor': 'Cththemes', 'Product': 'Monolit', 'Versions': 'n/a'}
CVE-2023-25411
Aten PE8108 2.4.232 is vulnerable to Cross Site Request Forgery (CSRF).
https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit/
2023-02-06T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25684
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 247597.
https://www.ibm.com/support/pages/node/6962729
2023-02-11T18:09:03.126Z
2023-03-21T16:13:23.239Z
2023-03-21T16:13:23.239Z
{'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'}
CVE-2023-25811
Uptime Kuma is a self-hosted monitoring tool. In versions prior to 1.20.0 the Uptime Kuma `name` parameter allows a persistent XSS attack. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/louislam/uptime-kuma/security/advisories/GHSA-553g-fcpf-m3wp
2023-02-15T16:34:48.773Z
2023-02-21T20:45:39.863Z
2023-02-21T20:45:39.863Z
{'Vendor': 'louislam', 'Product': 'uptime-kuma', 'Versions': '< 1.20.0'}
CVE-2023-25542
Dell Trusted Device Agent, versions prior to 5.3.0, contain(s) an improper installation permissions vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to escalated privileges.
https://www.dell.com/support/kbdoc/en-us/000209461/dsa-2023-074
2023-02-07T09:35:27.080Z
2023-04-06T06:17:11.024Z
2023-06-06T06:35:01.624Z
{'Vendor': 'Dell', 'Product': '\tDell Trusted Device Client', 'Versions': 'Versions prior to 5.3.0'}
CVE-2023-25112
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_l2tp function with the remote_subnet and the remote_mask variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.074Z
2023-07-06T14:53:26.072Z
2023-07-17T19:35:22.768Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25407
Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have read access to administrator credentials.
https://www.pentagrid.ch/en/blog/multiple-vulnerabilities-in-aten-PE8108-power-distribution-unit/
2023-02-06T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25057
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Libsyn Libsyn Publisher Hub.This issue affects Libsyn Publisher Hub: from n/a through 1.3.2.
https://patchstack.com/database/vulnerability/libsyn-podcasting/wordpress-libsyn-publisher-hub-plugin-1-3-2-sensitive-data-exposure-vulnerability?_s_id=cve
2023-02-02T09:58:51.822Z
2023-11-30T15:43:43.615Z
2023-11-30T15:43:43.615Z
{'Vendor': 'Libsyn', 'Product': 'Libsyn Publisher Hub', 'Versions': 'n/a'}
CVE-2023-25954
KYOCERA Mobile Print' v3.2.0.230119 and earlier, 'UTAX/TA MobilePrint' v3.2.0.230119 and earlier, and 'Olivetti Mobile Print' v3.2.0.230119 and earlier are vulnerable to improper intent handling. When a malicious app is installed on the victim user's Android device, the app may send an intent and direct the affected app to download malicious files or apps to the device without notification.
https://www.kyoceradocumentsolutions.com/en/our-business/security/information/2023-04-11.html
2023-03-15T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'Kyocera Document Solutions, TA Triumph-Adler GmbH, and Olivetti SpA', 'Product': 'KYOCERA Mobile Print, UTAX/TA MobilePrint, and Olivetti Mobile Print', 'Versions': "KYOCERA Mobile Print' v3.2.0.230119 and earlier, 'UTAX/TA MobilePrint' v3.2.0.230119 and earlier, and 'Olivetti Mobile Print' v3.2.0.230119 and earlier"}
CVE-2023-25283
A stack overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the reserveDHCP_HostName_1.1.1.0 parameter to lan.asp.
https://www.dlink.com/en/security-bulletin/
2023-02-06T00:00:00
2023-03-13T00:00:00
2023-03-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25796
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Include WP BaiDu Submit plugin <= 1.2.1 versions.
https://patchstack.com/database/vulnerability/wp-baidu-submit/wordpress-wp-baidu-submit-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-15T12:11:10.695Z
2023-05-03T11:08:14.427Z
2023-05-03T11:08:14.427Z
{'Vendor': 'Include', 'Product': 'WP BaiDu Submit', 'Versions': 'n/a'}
CVE-2023-25145
A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
https://success.trendmicro.com/solution/000292209
2023-02-03T15:46:02.643Z
2023-03-07T22:19:42.286Z
2023-03-10T20:05:13.704141Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'}
CVE-2023-25515
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where unexpected untrusted data is parsed, which may lead to code execution, denial of service, escalation of privileges, data tampering, or information disclosure.
https://https://nvidia.custhelp.com/app/answers/detail/a_id/5468
2023-02-07T02:57:17.083Z
2023-06-23T17:07:50.994Z
2023-07-03T23:26:15.468Z
{'Vendor': 'NVIDIA', 'Product': 'GPU Display Driver for Windows and Linux', 'Versions': 'All versions prior to and including 15.2, 13.7, and 11.12, and all versions prior to and including the May 2023 release'}
CVE-2023-25903
Adobe Dimension versions 3.4.7 (and earlier) is affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25000
HashiCorp Vault's implementation of Shamir's secret sharing used precomputed table lookups, and was vulnerable to cache-timing attacks. An attacker with access to, and the ability to observe a large number of unseal operations on the host through a side channel may reduce the search space of a brute force effort to recover the Shamir shares. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
https://discuss.hashicorp.com/t/hcsec-2023-10-vault-vulnerable-to-cache-timing-attacks-during-seal-and-unseal-operations/52078
2023-02-01T17:54:13.893Z
2023-03-30T00:17:46.230Z
2023-03-30T00:24:51.132Z
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.12.0, 1.11.0, 0'}
CVE-2023-25450
Cross-Site Request Forgery (CSRF) vulnerability in GiveWP GiveWP – Donation Plugin and Fundraising Platform plugin <= 2.25.1 versions.
https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-25-1-cross-site-request-forgery-csrf-via-give-cache-flush-vulnerability?_s_id=cve
2023-02-06T12:38:03.962Z
2023-06-15T12:21:35.740Z
2023-06-15T12:21:35.740Z
{'Vendor': 'GiveWP', 'Product': 'GiveWP – Donation Plugin and Fundraising Platform', 'Versions': 'n/a'}
CVE-2023-25647
There is a permission and access control vulnerability in some ZTE mobile phones. Due to improper access control, applications in mobile phone could monitor the touch event.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032264
2023-02-09T19:47:48.022Z
2023-08-17T02:13:19.932Z
2023-08-30T00:56:20.949Z
{'Vendor': 'ZTE', 'Product': 'Some ZTE Mobile Phones', 'Versions': 'NON_EEA_P870F21V1.0.0B01, GEN_ZTE_PQ82A01V1.0.0B01MR, GEN_ZTE_P870A01V3.0.0B01, GEN_ZTE_P898A01V2.0.0B01'}
CVE-2023-25217
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formWifiBasicSet function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/10/10.md
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25702
Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in Fullworks Quick Paypal Payments plugin <= 5.7.25 versions.
https://patchstack.com/database/vulnerability/quick-paypal-payments/wordpress-quick-paypal-payments-plugin-5-7-25-cross-site-scripting-xss?_s_id=cve
2023-02-13T04:13:47.557Z
2023-04-07T12:39:15.119Z
2023-04-07T12:39:15.119Z
{'Vendor': 'Fullworks', 'Product': 'Quick Paypal Payments', 'Versions': 'n/a'}
CVE-2023-25978
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Nate Reist Protected Posts Logout Button plugin <= 1.4.5 versions.
https://patchstack.com/database/vulnerability/protected-posts-logout-button/wordpress-protected-posts-logout-button-plugin-1-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:13.226Z
2023-06-13T15:09:31.271Z
2023-06-13T15:09:31.271Z
{'Vendor': 'Nate Reist', 'Product': 'Protected Posts Logout Button', 'Versions': 'n/a'}
CVE-2023-25094
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the into_class_node function with either the class_name or old_class_name variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.071Z
2023-07-06T14:53:24.484Z
2023-07-17T19:35:20.465Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25240
An improper SameSite Attribute vulnerability in pimCore v10.5.15 allows attackers to execute arbitrary code.
https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions
2023-02-06T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25305
PolyMC Launcher <= 1.4.3 is vulnerable to Directory Traversal. A mrpack file can be maliciously crafted to create arbitrary files outside of the installation directory.
https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/
2023-02-06T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25755
Screen Creator Advance 2 Ver.0.1.1.4 Build01A and earlier is vulnerable to improper restriction of operations within the bounds of a memory buffer (CWE-119) due to improper check of its data size when processing a project file. If a user of Screen Creator Advance 2 opens a specially crafted project file, information may be disclosed and/or arbitrary code may be executed.
https://www.electronics.jtekt.co.jp/en/topics/202303315311/
2023-03-15T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'JTEKT ELECTRONICS CORPORATION', 'Product': 'Screen Creator Advance 2', 'Versions': 'Ver.0.1.1.4 Build01A and earlier'}
CVE-2023-25186
An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. If/when CSP (as a BTS administrator) removes security hardenings from a Nokia Single RAN BTS baseband unit, a directory path traversal in the Nokia BTS baseband unit diagnostic tool AaShell (which is by default disabled) provides access to the BTS baseband unit internal filesystem from the mobile network solution internal BTS management network.
https://Nokia.com
2023-02-04T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25885
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25539
Dell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.
https://www.dell.com/support/kbdoc/en-us/000211267/dsa-2023-060-dell-networker-security-update-for-an-nsrcapinfo-vulnerability
2023-02-07T09:35:27.080Z
2023-05-31T04:50:27.879Z
2023-05-31T04:50:27.879Z
{'Vendor': 'Dell', 'Product': 'NetWorker NVE', 'Versions': 'NetWorker 19.6.1.2 Linux and prior releases, NetWorker 19.7.0.3 Linux and prior releases, 19.7.1 Linux'}
CVE-2023-25169
discourse-yearly-review is a discourse plugin which publishes an automated Year in Review topic. In affected versions a user present in a yearly review topic that is then anonymised will still have some data linked to its original account. This issue has been patched in commit `b3ab33bbf7` which is included in the latest version of the Discourse Yearly Review plugin. Users are advised to upgrade. Users unable to upgrade may disable the `yearly_review_enabled` setting to fully mitigate the issue. Also, it's possible to edit the anonymised user's old data in the yearly review topics manually.
https://github.com/discourse/discourse-yearly-review/security/advisories/GHSA-x2r8-v85c-x3x7
2023-02-03T16:59:18.246Z
2023-03-06T17:40:45.721Z
2023-03-06T17:40:45.721Z
{'Vendor': 'discourse', 'Product': 'discourse-yearly-review', 'Versions': '< 0.2'}
CVE-2023-25606
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-23] in FortiAnalyzer and FortiManager management interface 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4  all versions may allow a remote and authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.
https://fortiguard.com/psirt/FG-IR-22-471
2023-02-08T13:42:03.366Z
2023-07-11T16:52:51.034Z
2023-07-11T16:52:51.034Z
{'Vendor': 'Fortinet', 'Product': 'FortiManager', 'Versions': '7.2.0, 7.0.0, 6.4.0'}
CVE-2023-25743
A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome.<br>*This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 110 and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25313
OS injection vulnerability in World Wide Broadcast Network AVideo version before 12.4, allows attackers to execute arbitrary code via the video link field to the Embed a video link feature.
https://github.com/WWBN/AVideo/security/advisories/GHSA-pgvh-p3g4-86jw
2023-02-06T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25893
Adobe Dimension versions 3.4.7 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25485
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bernhard Kux JSON Content Importer plugin <= 1.3.15 versions.
https://patchstack.com/database/vulnerability/json-content-importer/wordpress-json-content-importer-plugin-1-3-15-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:09.645Z
2023-04-25T18:33:47.611Z
2023-04-25T18:33:47.611Z
{'Vendor': 'Bernhard Kux', 'Product': 'JSON Content Importer', 'Versions': 'n/a'}
CVE-2023-25201
Cross Site Request Forgery (CSRF) vulnerability in MultiTech Conduit AP MTCAP2-L4E1 MTCAP2-L4E1-868-042A v.6.0.0 allows a remote attacker to execute arbitrary code via a crafted script upload.
https://herolab.usd.de/security-advisories/
2023-02-06T00:00:00
2023-07-07T00:00:00
2023-07-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25651
There is a SQL injection vulnerability in some ZTE mobile internet products. Due to insufficient input validation of SMS interface parameter, an authenticated attacker could use the vulnerability to execute SQL injection and cause information leak.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032684
2023-02-09T19:47:48.023Z
2023-12-14T07:03:54.704Z
2023-12-14T08:17:53.412Z
{'Vendor': 'ZTE', 'Product': 'Mobile Internet Products', 'Versions': 'BD_MF833U1V1.0.0B01, CR_LVWRGBMF286RV1.0.0B04'}
CVE-2023-25344
An issue was discovered in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to execute arbitrary code via crafted Object.prototype anonymous function.
https://github.com/node-swig/swig-templates/issues/89
2023-02-06T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25597
A vulnerability in the web conferencing component of Mitel MiCollab through 9.6.2.9 could allow an unauthenticated attacker to download a shared file via a crafted request - including the exact path and filename - due to improper authentication control. A successful exploit could allow access to sensitive information.
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0002
2023-02-08T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25981
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ThemeKraft Post Form plugin <= 2.8.1 versions.
https://patchstack.com/database/vulnerability/buddyforms/wordpress-buddyforms-plugin-2-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:13.226Z
2023-08-25T09:54:38.822Z
2023-08-25T09:54:38.822Z
{'Vendor': 'ThemeKraft', 'Product': 'Post Form', 'Versions': 'n/a'}
CVE-2023-25082
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the old_ip and old_mac variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.068Z
2023-07-06T14:53:23.374Z
2023-07-17T19:35:19.018Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25578
Starlite is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to version 1.5.2, the request body parsing in `starlite` allows a potentially unauthenticated attacker to consume a large amount of CPU time and RAM. The multipart body parser processes an unlimited number of file parts and an unlimited number of field parts. This is a remote, potentially unauthenticated Denial of Service vulnerability. This vulnerability affects applications with a request handler that accepts a `Body(media_type=RequestEncodingType.MULTI_PART)`. The large amount of CPU time required for processing requests can block all available worker processes and significantly delay or slow down the processing of legitimate user requests. The large amount of RAM accumulated while processing requests can lead to Out-Of-Memory kills. Complete DoS is achievable by sending many concurrent multipart requests in a loop. Version 1.51.2 contains a patch for this issue.
https://github.com/starlite-api/starlite/security/advisories/GHSA-p24m-863f-fm6q
2023-02-07T17:10:00.743Z
2023-02-15T14:58:31.829Z
2023-02-15T14:58:31.829Z
{'Vendor': 'starlite-api', 'Product': 'starlite', 'Versions': '< 1.51.2'}
CVE-2023-25128
null
null
2023-02-02T00:00:00
null
2023-02-03T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25763
Jenkins Email Extension Plugin 2.93 and earlier does not escape various fields included in bundled email templates, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control affected fields.
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-2931
2023-02-14T00:00:00
2023-02-15T00:00:00
2023-10-24T12:48:56.193Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Email Extension Plugin', 'Versions': 'unspecified, 2.89.0.1'}
CVE-2023-25558
DataHub is an open-source metadata platform. When the DataHub frontend is configured to authenticate via SSO, it will leverage the pac4j library. The processing of the `id_token` is done in an unsafe manner which is not properly accounted for by the DataHub frontend. Specifically, if any of the id_token claims value start with the {#sb64} prefix, pac4j considers the value to be a serialized Java object and will deserialize it. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. Users are advised to upgrade. There are no known workarounds. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-086.
https://github.com/datahub-project/datahub/security/advisories/GHSA-hrwp-2q5c-86wv
2023-02-07T17:10:00.733Z
2023-02-10T22:03:07.330Z
null
{'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.9.5'}
CVE-2023-25108
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the remote_ip variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.073Z
2023-07-06T14:53:25.744Z
2023-07-17T19:35:22.289Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25734
After downloading a Windows <code>.url</code> shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}