CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-25221
Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function in motion.cc.
https://github.com/strukturag/libde265/issues/388
2023-02-06T00:00:00
2023-03-01T00:00:00
2023-03-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25671
TensorFlow is an open source platform for machine learning. There is out-of-bounds access due to mismatched integer type sizes. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j5w9-hmfh-4cr6
2023-02-09T20:58:21.858Z
2023-03-24T23:31:40.731Z
2023-03-24T23:31:40.731Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25958
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Justin Saad Simple Tooltips plugin <= 2.1.4 versions.
https://patchstack.com/database/vulnerability/simple-tooltips/wordpress-simple-tooltips-plugin-2-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:07.370Z
2023-05-12T15:15:56.004Z
2023-05-12T15:15:56.004Z
{'Vendor': 'Justin Saad', 'Product': 'Simple Tooltips', 'Versions': 'n/a'}
CVE-2023-25722
A credential-leak issue was discovered in related Veracode products before 2023-03-27. Veracode Scan Jenkins Plugin before 23.3.19.0, when configured for remote agent jobs, invokes the Veracode Java API Wrapper in a manner that allows local users (with OS-level access of the Jenkins remote) to discover Veracode API credentials by listing the process and its arguments. Veracode Scan Jenkins Plugin before 23.3.19.0, when configured for remote agent jobs and when the "Connect using proxy" option is enabled and configured with proxy credentials, allows local users of the Jenkins remote to discover proxy credentials by listing the process and its arguments. Veracode Azure DevOps Extension before 3.20.0 invokes the Veracode Java API Wrapper in a manner that allows local users (with OS-level access to the Azure DevOps Services cloud infrastructure or Azure DevOps Server) to discover Veracode API credentials by listing the process and its arguments. Veracode Azure DevOps Extension before 3.20.0, when configured with proxy credentials, allows users (with shell access to the Azure DevOps Services cloud infrastructure or Azure DevOps Server) to discover proxy credentials by listing the process and its arguments.
https://veracode.com
2023-02-13T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25688
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 247606.
https://www.ibm.com/support/pages/node/6962729
2023-02-11T18:09:03.127Z
2023-03-21T15:01:07.193Z
2023-03-22T04:39:15.803375Z
{'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'}
CVE-2023-25667
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, integer overflow occurs when `2^31 <= num_frames * height * width * channels < 2^32`, for example Full HD screencast of at least 346 frames. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68
2023-02-09T20:58:21.858Z
2023-03-24T23:40:20.893Z
2023-03-24T23:40:20.893Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25519
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges. 
https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479
2023-02-07T02:57:17.085Z
2023-09-12T00:49:21.411Z
2023-09-12T00:49:21.411Z
{'Vendor': 'NVIDIA', 'Product': 'BlueField 1', 'Versions': 'All versions after 18.24.1000'}
CVE-2023-25149
TimescaleDB, an open-source time-series SQL database, has a privilege escalation vulnerability in versions 2.8.0 through 2.9.2. During installation, TimescaleDB creates a telemetry job that is runs as the installation user. The queries run as part of the telemetry data collection were not run with a locked down `search_path`, allowing malicious users to create functions that would be executed by the telemetry job, leading to privilege escalation. In order to be able to take advantage of this vulnerability, a user would need to be able to create objects in a database and then get a superuser to install TimescaleDB into their database. When TimescaleDB is installed as trusted extension, non-superusers can install the extension without help from a superuser. Version 2.9.3 fixes this issue. As a mitigation, the `search_path` of the user running the telemetry job can be locked down to not include schemas writable by other users. The vulnerability is not exploitable on instances in Timescale Cloud and Managed Service for TimescaleDB due to additional security provisions in place on those platforms.
https://github.com/timescale/timescaledb/security/advisories/GHSA-44jh-j22r-33wq
2023-02-03T16:59:18.241Z
2023-02-14T13:44:37.713Z
2023-02-14T13:44:37.713Z
{'Vendor': 'timescale', 'Product': 'timescaledb', 'Versions': '>= 2.8.0, < 2.9.3'}
CVE-2023-25775
Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html
2023-02-24T04:00:02.082Z
2023-08-11T02:36:57.397Z
2023-08-11T02:36:57.397Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Ethernet Controller RDMA driver for linux', 'Versions': 'before version 1.9.30'}
CVE-2023-25260
Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion.
http://stimulsoft.com
2023-02-06T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25077
Cross-site scripting vulnerability in Authentication Key Settings of EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0 allows a remote authenticated attacker to inject an arbitrary script.
https://www.ec-cube.net/info/weakness/20230214/
2023-02-17T00:00:00
2023-03-05T00:00:00
2023-03-05T00:00:00
{'Vendor': 'EC-CUBE CO.,LTD.', 'Product': 'EC-CUBE 4 series', 'Versions': 'EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0'}
CVE-2023-25974
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in psicosi448 wp2syslog plugin <= 1.0.5 versions.
https://patchstack.com/database/vulnerability/wp2syslog/wordpress-wp2syslog-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:09.998Z
2023-06-16T11:09:29.892Z
2023-06-16T11:09:29.892Z
{'Vendor': 'psicosi448', 'Product': 'wp2syslog', 'Versions': 'n/a'}
CVE-2023-25831
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/
2023-02-15T17:59:31.096Z
2023-05-09T20:45:19.896Z
2023-05-10T01:05:47.931Z
{'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '10.9.1'}
CVE-2023-25098
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the source variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.072Z
2023-07-06T14:53:24.822Z
2023-07-17T19:35:20.960Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25562
DataHub is an open-source metadata platform. In versions of DataHub prior to 0.8.45 Session cookies are only cleared on new sign-in events and not on logout events. Any authentication checks using the `AuthUtils.hasValidSessionCookie()` method could be bypassed by using a cookie from a logged out session, as a result any logged out session cookie may be accepted as valid and therefore lead to an authentication bypass to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-083.
https://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj
2023-02-07T17:10:00.735Z
2023-02-10T22:03:00.889Z
null
{'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.8.45'}
CVE-2023-25132
Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.
https://zuso.ai/Advisory/
2023-02-02T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'CyberPower', 'Product': 'PowerPanel Business Local / Remote', 'Versions': 'unspecified'}
CVE-2023-25923
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 could allow an attacker to upload files that could be used in a denial of service attack due to incorrect authorization. IBM X-Force ID: 247629.
https://www.ibm.com/support/pages/node/6962729
2023-02-16T16:39:45.212Z
2023-03-21T15:07:53.940Z
2023-03-21T15:07:53.940Z
{'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'}
CVE-2023-25889
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25020
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1.1 versions.
https://patchstack.com/database/vulnerability/bft-autoresponder/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-1-1-cross-site-scripting-xss-2?_s_id=cve
2023-02-02T09:58:48.539Z
2023-04-07T11:08:01.901Z
2023-04-07T11:08:01.901Z
{'Vendor': 'Kiboko Labs', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': 'n/a'}
CVE-2023-25470
Cross-Site Request Forgery (CSRF) vulnerability in Anton Skorobogatov Rus-To-Lat plugin <= 0.3 versions.
https://patchstack.com/database/vulnerability/rustolat/wordpress-rus-to-lat-plugin-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:06.874Z
2023-05-26T13:51:17.880Z
2023-05-26T13:51:17.880Z
{'Vendor': 'Anton Skorobogatov', 'Product': 'Rus-To-Lat', 'Versions': 'n/a'}
CVE-2023-25165
Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. The issue has been fixed in Helm 3.11.1. Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.
https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8
2023-02-03T16:59:18.246Z
2023-02-08T19:07:14.089Z
null
{'Vendor': 'helm', 'Product': 'helm', 'Versions': '>= 3.0.0, < 3.11.1'}
CVE-2023-25866
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25759
OS Command Injection in TripleData Reporting Engine in Tripleplay Platform releases prior to Caveman 3.4.0 allows authenticated users to run unprivileged OS level commands via a crafted request payload.
https://tripleplay.tv
2023-02-13T00:00:00
2023-04-19T00:00:00
2023-04-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25309
Cross Site Scripting (XSS) Vulnerability in Fetlife rollout-ui version 0.5, allows attackers to execute arbitrary code via a crafted url to the delete a feature functionality.
http://fetlife.com
2023-02-06T00:00:00
2023-05-11T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25466
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Mahlamusa Who Hit The Page – Hit Counter plugin <= 1.4.14.3 versions.
https://patchstack.com/database/vulnerability/who-hit-the-page-hit-counter/wordpress-who-hit-the-page-hit-counter-plugin-1-4-14-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:06.874Z
2023-08-30T15:23:15.988Z
2023-08-30T15:23:15.988Z
{'Vendor': 'Mahlamusa', 'Product': 'Who Hit The Page – Hit Counter', 'Versions': 'n/a'}
CVE-2023-25036
Cross-Site Request Forgery (CSRF) vulnerability in akhlesh-nagar, a.Ankit Social Media Icons Widget plugin <= 1.6 versions.
https://patchstack.com/database/vulnerability/spoontalk-social-media-icons-widget/wordpress-social-media-icons-widget-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-02T09:58:49.594Z
2023-07-18T12:17:39.967Z
2023-07-18T12:17:39.967Z
{'Vendor': 'akhlesh-nagar, a.ankit', 'Product': 'Social Media Icons Widget', 'Versions': 'n/a'}
CVE-2023-25870
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25523
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in the nvdisasm binary file, where an attacker may cause a NULL pointer dereference by providing a user with a malformed ELF file. A successful exploit of this vulnerability may lead to a partial denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5469
2023-02-07T02:57:17.086Z
2023-07-03T23:27:59.201Z
2023-07-03T23:27:59.201Z
{'Vendor': 'NVIDIA', 'Product': 'CUDA Toolkit', 'Versions': 'All versions prior to CUDA Toolkit v12.2'}
CVE-2023-25489
Cross-Site Request Forgery (CSRF) vulnerability in Jeff Sherk Update Theme and Plugins from Zip File plugin <= 2.0.0 versions.
https://patchstack.com/database/vulnerability/update-theme-and-plugins-from-zip-file/wordpress-update-theme-and-plugins-from-zip-file-plugin-2-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:09.645Z
2023-10-04T10:35:25.647Z
2023-10-04T10:35:25.647Z
{'Vendor': 'Jeff Sherk', 'Product': 'Update Theme and Plugins from Zip File', 'Versions': 'n/a'}
CVE-2023-25173
containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well. This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.
https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p
2023-02-03T16:59:18.247Z
2023-02-16T14:09:12.073Z
2023-02-16T14:09:12.073Z
{'Vendor': 'containerd', 'Product': 'containerd', 'Versions': '< 1.5.18, >= 1.6.0, < 1.6.18'}
CVE-2023-25962
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Biplob Adhikari Accordion – Multiple Accordion or FAQs Builder plugin <= 2.3.0 versions.
https://patchstack.com/database/vulnerability/accordions-or-faqs/wordpress-accordions-multiple-accordions-or-faqs-builder-plugin-2-3-0-cross-site-scripting-xss?_s_id=cve
2023-02-17T13:47:07.370Z
2023-05-04T12:47:39.051Z
2023-05-04T12:47:39.051Z
{'Vendor': 'Biplob Adhikari', 'Product': 'Accordion – Multiple Accordion or FAQs Builder', 'Versions': 'n/a'}
CVE-2023-25061
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1.1 versions.
https://patchstack.com/database/vulnerability/bft-autoresponder/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-1-1-cross-site-scripting-xss?_s_id=cve
2023-02-02T09:58:52.946Z
2023-04-07T08:35:04.435Z
2023-04-07T08:35:04.435Z
{'Vendor': 'Kiboko Labs', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': 'n/a'}
CVE-2023-25431
An issue was discovered in Online Reviewer Management System v1.0. There is a XSS vulnerability via reviewer_0/admins/assessments/course/course-update.php.
https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md
2023-02-06T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25124
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.078Z
2023-07-06T14:53:27.093Z
2023-07-17T19:35:24.203Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25827
Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
https://www.synopsys.com/blogs/software-security/opentsdb/
2023-02-15T17:57:02.191Z
2023-05-03T18:36:14.126Z
2023-05-03T18:36:14.126Z
{'Vendor': 'OpenTSDB', 'Product': 'OpenTSDB', 'Versions': '0'}
CVE-2023-25718
In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: the vendor's position is that this purported vulnerability represents a "fundamental lack of understanding of Authenticode code signing behavior."
https://www.connectwise.com
2023-02-13T00:00:00
2023-02-13T00:00:00
2023-08-22T17:38:25.447673
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25348
ChurchCRM 4.5.3 was discovered to contain a CSV injection vulnerability via the Last Name and First Name input fields when creating a new person. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file.
https://github.com/ChurchCRM/CRM
2023-02-06T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25719
ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations).
https://www.connectwise.com
2023-02-13T00:00:00
2023-02-13T00:00:00
2023-03-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25963
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in JoomSky JS Job Manager plugin <= 2.0.0 versions.
https://patchstack.com/database/vulnerability/js-jobs/wordpress-js-job-manager-plugin-2-0-0-cross-site-scripting-xss?_s_id=cve
2023-02-17T13:47:07.371Z
2023-06-16T08:41:38.322Z
2023-06-16T08:41:38.322Z
{'Vendor': 'JoomSky', 'Product': 'JS Job Manager', 'Versions': 'n/a'}
CVE-2023-25125
null
null
2023-02-02T00:00:00
null
2023-02-03T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25575
API Platform Core is the server component of API Platform: hypermedia and GraphQL APIs. Resource properties secured with the `security` option of the `ApiPlatform\Metadata\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. This issue impacts the 2.7, 3.0 and 3.1 branches. Please upgrade to versions 2.7.10, 3.0.12 or 3.1.3. As a workaround, replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\Metadata\ApiProperty` attribute is used.
https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv
2023-02-07T17:10:00.742Z
2023-02-28T22:21:48.730Z
2023-02-28T22:21:48.730Z
{'Vendor': 'api-platform', 'Product': 'core', 'Versions': '>= 3.0.0, < 3.0.12, >= 3.1.0, < 3.1.3, >= 2.6.0, < 2.7.10'}
CVE-2023-25826
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
https://www.synopsys.com/blogs/software-security/opentsdb/
2023-02-15T17:57:02.191Z
2023-05-03T18:33:59.306Z
2023-05-03T18:33:59.306Z
{'Vendor': 'OpenTSDB', 'Product': 'OpenTSDB', 'Versions': '0'}
CVE-2023-25467
Cross-Site Request Forgery (CSRF) vulnerability in Daniel Mores, A. Huizinga Resize at Upload Plus plugin <= 1.3 versions.
https://patchstack.com/database/vulnerability/resize-at-upload-plus/wordpress-resize-at-upload-plus-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-06T12:38:06.874Z
2023-05-26T14:02:30.534Z
2023-05-26T14:02:30.534Z
{'Vendor': 'Daniel Mores, A. Huizinga', 'Product': 'Resize at Upload Plus', 'Versions': 'n/a'}
CVE-2023-25934
DELL ECS prior to 3.8.0.2 contains an improper verification of cryptographic signature vulnerability. A network attacker with an ability to intercept the request could potentially exploit this vulnerability to modify the body data of the request.
https://www.dell.com/support/kbdoc/en-us/000212970/dsa-2023-109-dell-ecs-security-update-for-multiple-vulnerabilities
2023-02-17T06:15:08.303Z
2023-05-04T06:58:21.714Z
2023-05-31T05:06:46.692Z
{'Vendor': 'Dell', 'Product': 'ECS', 'Versions': 'Version<= 3.8.0.1'}
CVE-2023-25871
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25522
NVIDIA DGX A100/A800 contains a vulnerability in SBIOS where an attacker may cause improper input validation by providing configuration information in an unexpected format. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5461
2023-02-07T02:57:17.086Z
2023-07-03T23:27:41.361Z
2023-07-03T23:27:41.361Z
{'Vendor': 'NVIDIA', 'Product': 'DGX A100/A800', 'Versions': 'All SBIOS versions prior to 1.21'}
CVE-2023-25488
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Duc Bui Quang WP Default Feature Image plugin <= 1.0.1.1 versions.
https://patchstack.com/database/vulnerability/wp-default-feature-image/wordpress-wp-default-feature-image-plugin-1-0-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:09.645Z
2023-09-01T10:54:52.277Z
2023-09-01T10:54:52.277Z
{'Vendor': 'Duc Bui Quang', 'Product': 'WP Default Feature Image', 'Versions': 'n/a'}
CVE-2023-25172
Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, a maliciously crafted URL can be included in a user's full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches. As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse.
https://github.com/discourse/discourse/security/advisories/GHSA-7pm2-prxw-wrvp
2023-02-03T16:59:18.247Z
2023-03-17T16:07:27.668Z
2023-03-17T16:07:27.668Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable < 3.0.1, beta < 3.1.0.beta2, tests-passed < 3.1.0.beta2'}
CVE-2023-25758
Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected."
https://github.com/OneKeyHQ/firmware
2023-02-13T00:00:00
2023-02-14T00:00:00
2023-02-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25888
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25021
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in FareHarbor FareHarbor for WordPress plugin <= 3.6.6 versions.
https://patchstack.com/database/vulnerability/fareharbor/wordpress-fareharbor-for-wordpress-plugin-3-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-02T09:58:48.539Z
2023-05-08T11:48:22.317Z
2023-05-08T11:48:22.317Z
{'Vendor': 'FareHarbor', 'Product': 'FareHarbor for WordPress', 'Versions': 'n/a'}
CVE-2023-25471
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Webcodin WCP OpenWeather plugin <= 2.5.0 versions.
https://patchstack.com/database/vulnerability/wcp-openweather/wordpress-wcp-openweather-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:06.874Z
2023-08-30T15:37:32.285Z
2023-08-30T15:37:32.285Z
{'Vendor': 'Webcodin', 'Product': 'WCP OpenWeather', 'Versions': 'n/a'}
CVE-2023-25164
Tinacms is a Git-backed headless content management system with support for visual editing. Sites being built with @tinacms/cli >= 1.0.0 && < 1.0.9 which store sensitive values in the process.env variable are impacted. These values will be added in plaintext to the index.js file. If you're on a version prior to 1.0.0 this vulnerability does not affect you. If you are affected and your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. This issue has been patched in @tinacms/[email protected]. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/tinacms/tinacms/security/advisories/GHSA-pc2q-jcxq-rjrr
2023-02-03T16:59:18.245Z
2023-02-08T19:26:18.956Z
null
{'Vendor': 'tinacms', 'Product': 'tinacms', 'Versions': '>= 1.0.0, < 1.0.9'}
CVE-2023-25534
NVIDIA DGX H100 BMC contains a vulnerability in IPMI, where an attacker may cause improper input validation. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5473
2023-02-07T02:57:25.085Z
2023-09-20T00:55:00.275Z
2023-09-20T00:55:00.275Z
{'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'}
CVE-2023-25867
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
2023-02-15T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'}
CVE-2023-25076
A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731
2023-03-06T21:52:02.534Z
2023-03-30T14:34:10.414Z
2023-04-20T18:36:35.932Z
{'Vendor': 'SNIProxy', 'Product': 'SNIProxy', 'Versions': '0.6.0-2, Master 822bb80df9b7b345cc9eba55df74a07b498819ba'}
CVE-2023-25975
Cross-Site Request Forgery (CSRF) vulnerability in Frédéric Sheedy Etsy Shop plugin <= 3.0.3 versions.
https://patchstack.com/database/vulnerability/etsy-shop/wordpress-etsy-shop-plugin-3-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-17T13:47:09.999Z
2023-11-09T17:43:26.107Z
2023-11-09T17:43:26.107Z
{'Vendor': 'Frédéric Sheedy', 'Product': 'Etsy Shop', 'Versions': 'n/a'}
CVE-2023-25830
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/
2023-02-15T17:59:31.096Z
2023-05-09T16:31:21.361Z
2023-05-09T16:31:21.361Z
{'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '10.9.1'}
CVE-2023-25099
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the dest variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.072Z
2023-07-06T14:53:24.900Z
2023-07-17T19:35:21.090Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25563
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, multiple out-of-bounds reads when decoding NTLM fields can trigger a denial of service. A 32-bit integer overflow condition can lead to incorrect checks of consistency of length of internal buffers. Although most applications will error out before accepting a singe input buffer of 4GB in length this could theoretically happen. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point if the application allows tokens greater than 4GB in length. This can lead to a large, up to 65KB, out-of-bounds read which could cause a denial-of-service if it reads from unmapped memory. Version 1.2.0 contains a patch for the out-of-bounds reads.
https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-jjjx-5qf7-9mgf
2023-02-07T17:10:00.735Z
2023-02-14T17:35:08.172Z
2023-02-14T17:35:08.172Z
{'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'}
CVE-2023-25133
Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.
https://zuso.ai/Advisory/
2023-02-02T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'CyberPower', 'Product': 'PowerPanel Business Local / Remote', 'Versions': 'unspecified'}
CVE-2023-25774
A denial-of-service vulnerability exists in the vpnserver ConnectionAccept() functionality of SoftEther VPN 5.02. A set of specially crafted network connections can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743
2023-04-14T16:48:36.218Z
2023-10-12T15:27:53.149Z
2023-10-12T17:00:06.743Z
{'Vendor': 'SoftEther VPN', 'Product': 'SoftEther VPN', 'Versions': '5.01.9674, 5.02'}
CVE-2023-25261
Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report.
http://stimulsoft.com
2023-02-06T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25518
NVIDIA Jetson contains a vulnerability in CBoot, where the PCIe controller is initialized without IOMMU, which may allow an attacker with physical access to the target device to read and write to arbitrary memory. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and loss of integrity.
https://https://nvidia.custhelp.com/app/answers/detail/a_id/5466
2023-02-07T02:57:17.084Z
2023-06-23T17:09:10.859Z
2023-06-23T17:09:10.859Z
{'Vendor': 'NVIDIA', 'Product': 'Jetson AGX Xavier series, Jetson Xavier NX', 'Versions': 'All versions prior to 32.7.4'}
CVE-2023-25148
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
https://success.trendmicro.com/solution/000292209
2023-02-03T15:46:02.643Z
2023-03-07T22:20:13.080Z
2023-03-10T20:05:13.704141Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'}
CVE-2023-25723
null
null
2023-02-13T00:00:00
null
2023-02-14T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25689
IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1 , and 4.1.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 247618.
https://www.ibm.com/support/pages/node/6962729
2023-02-11T18:09:03.127Z
2023-03-21T14:49:21.593Z
2023-03-21T14:49:21.593Z
{'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1 , 4.1.1'}
CVE-2023-25666
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a floating point exception in AudioSpectrogram. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2
2023-02-09T20:58:21.858Z
2023-03-24T23:39:55.696Z
2023-03-24T23:39:55.696Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25735
Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25220
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the add_white_node function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://www.dlink.com/en/security-bulletin/
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25670
TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w
2023-02-09T20:58:21.858Z
2023-03-24T23:32:12.780Z
2023-03-24T23:32:12.780Z
{'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'}
CVE-2023-25559
DataHub is an open-source metadata platform. When not using authentication for the metadata service, which is the default configuration, the Metadata service (GMS) will use the X-DataHub-Actor HTTP header to infer the user the frontend is sending the request on behalf of. When the backends retrieves the header, its name is retrieved in a case-insensitive way. This case differential can be abused by an attacker to smuggle an X-DataHub-Actor header with different casing (eg: X-DATAHUB-ACTOR). This issue may lead to an authorization bypass by allowing any user to impersonate the system user account and perform any actions on its behalf. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-079.
https://github.com/datahub-project/datahub/security/advisories/GHSA-qgp2-qr66-j8r8
2023-02-07T17:10:00.733Z
2023-02-10T22:03:05.646Z
null
{'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.8.45'}
CVE-2023-25109
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the local_ip variable.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.073Z
2023-07-06T14:53:25.830Z
2023-07-17T19:35:22.402Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25762
Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names.
https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019
2023-02-14T00:00:00
2023-02-15T00:00:00
2023-10-24T12:48:55.089Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Pipeline: Build Step Plugin', 'Versions': 'unspecified'}
CVE-2023-25596
A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt
2023-02-07T20:24:22.480Z
2023-03-14T14:57:27.104Z
2023-03-22T04:39:15.803375Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'}
CVE-2023-25980
Cross-Site Request Forgery (CSRF) vulnerability in CAGE Web Design | Rolf van Gelder Optimize Database after Deleting Revisions plugin <= 5.1 versions.
https://patchstack.com/database/vulnerability/rvg-optimize-database/wordpress-optimize-database-after-deleting-revisions-plugin-5-0-110-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-02-17T13:47:13.226Z
2023-10-04T10:25:13.124Z
2023-10-04T10:25:13.124Z
{'Vendor': 'CAGE Web Design | Rolf van Gelder', 'Product': 'Optimize Database after Deleting Revisions', 'Versions': 'n/a'}
CVE-2023-25083
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the ip and mac variables.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.069Z
2023-07-06T14:53:23.481Z
2023-07-17T19:35:19.132Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25579
Nextcloud server is a self hosted home cloud product. In affected versions the `OC\Files\Node\Folder::getFullPath()` function was validating and normalizing the string in the wrong order. The function is used in the `newFile()` and `newFolder()` items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v
2023-02-07T17:10:00.743Z
2023-02-22T18:21:10.573Z
2023-02-22T18:21:10.573Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 23.0.12, >= 24.0.0, < 24.0.8, >= 25.0.0, < 25.0.2'}
CVE-2023-25129
null
null
2023-02-02T00:00:00
null
2023-02-03T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-25650
There is an arbitrary file download vulnerability in ZXCLOUD iRAI. Since the backend does not escape special strings or restrict paths, an attacker with user permission could access the download interface by modifying the request parameter, causing arbitrary file downloads.
https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032904
2023-02-09T19:47:48.023Z
2023-12-14T06:52:23.199Z
2023-12-14T08:17:02.352Z
{'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to V7.23.23'}
CVE-2023-25345
Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags.
https://github.com/node-swig/swig-templates/issues/88
2023-02-06T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25715
Missing Authorization vulnerability in GamiPress GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress.This issue affects GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress: from n/a through 2.5.6.
https://patchstack.com/database/vulnerability/gamipress/wordpress-gamipress-plugin-2-5-6-missing-authorization-leading-to-points-manipulation-vulnerability?_s_id=cve
2023-02-13T04:14:01.866Z
2023-12-19T15:40:16.483Z
2023-12-19T15:40:16.483Z
{'Vendor': 'GamiPress', 'Product': 'GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress', 'Versions': 'n/a'}
CVE-2023-25938
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-02-17T06:15:08.303Z
2023-06-23T10:13:31.571Z
2023-06-23T10:13:31.571Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-25892
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25191
AMI MegaRAC SPX devices allow Password Disclosure through Redfish. The fixed versions are SPx_12-update-7.00 and SPx_13-update-5.00.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023002.pdf
2023-02-04T00:00:00
2023-02-15T00:00:00
2023-02-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25484
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Oliver Schlöbe Simple Yearly Archive plugin <= 2.1.8 versions.
https://patchstack.com/database/vulnerability/simple-yearly-archive/wordpress-simple-yearly-archive-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-06T12:38:09.644Z
2023-04-25T16:50:45.908Z
2023-04-25T16:51:27.722Z
{'Vendor': 'Oliver Schlöbe', 'Product': 'Simple Yearly Archive', 'Versions': 'n/a'}
CVE-2023-25607
An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC  7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function.
https://fortiguard.com/psirt/FG-IR-22-352
2023-02-08T13:42:03.366Z
2023-10-10T16:51:31.831Z
2023-10-10T16:51:31.831Z
{'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.2.0, 7.0.0, 6.4.0, 6.2.0, 6.0.0'}
CVE-2023-25742
When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
https://www.mozilla.org/security/advisories/mfsa2023-06/
2023-02-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-25187
An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. However, before the 21B release, BTS commissioning manuals did not provide instructions to change default SSH keys (to BTS operator-specific values). This leads to a possibility for malicious operations staff (inside a CSP network) to attempt MITM exploitation of BTS service user access, during the moments that SSH is enabled for Nokia service personnel to perform troubleshooting activities.
https://Nokia.com
2023-02-04T00:00:00
2023-06-16T00:00:00
2023-06-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25884
Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/dimension/apsb23-20.html
2023-02-15T00:00:00
2023-03-28T00:00:00
2023-03-28T00:00:00
{'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'}
CVE-2023-25492
A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.
https://support.lenovo.com/us/en/product_security/LEN-99936
2023-02-06T15:09:03.709Z
2023-05-01T14:11:48.551Z
2023-05-01T14:11:48.551Z
{'Vendor': 'Lenovo', 'Product': 'XClarity Controller', 'Versions': 'See product security advisory below'}
CVE-2023-25168
Wings is Pterodactyl's server control plane. This vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with `GHSA-p8r3-83r8-jwj5` to overwrite files on the host system. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. This vulnerability has been resolved in version `v1.11.4` of Wings, and has been back-ported to the 1.7 release series in `v1.7.4`. Anyone running `v1.11.x` should upgrade to `v1.11.4` and anyone running `v1.7.x` should upgrade to `v1.7.4`. There are no known workarounds for this issue.
https://github.com/pterodactyl/wings/security/advisories/GHSA-66p8-j459-rq63
2023-02-03T16:59:18.246Z
2023-02-08T23:43:29.094Z
null
{'Vendor': 'pterodactyl', 'Product': 'wings', 'Versions': '< 1.7.4, >= 1.11.0, < 1.11.4'}
CVE-2023-25241
bgERP v22.31 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/bgERP/2023/bgERP-v22.31-Cookie-Session-vulnerability%2BXSS-Reflected
2023-02-06T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25611
A improper neutralization of formula elements in a CSV file vulnerability in Fortinet FortiAnalyzer 6.4.0 - 6.4.9, 7.0.0 - 7.0.5, and 7.2.0 - 7.2.1 allows local attacker to execute unauthorized code or commands via inserting spreadsheet formulas in macro names.
https://fortiguard.com/psirt/FG-IR-22-488
2023-02-08T13:42:03.367Z
2023-03-07T16:04:36.606Z
2023-03-07T16:04:36.606Z
{'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.2.0, 7.0.0, 6.4.0'}
CVE-2023-25304
Prism Launcher <= 6.1 is vulnerable to Directory Traversal.
https://github.com/PrismLauncher/PrismLauncher/security/advisories/GHSA-wxgx-8v36-mj2m
2023-02-06T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25754
Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.6.0.
https://github.com/apache/airflow/pull/29506
2023-02-13T14:49:15.008Z
2023-05-08T11:57:45.144Z
2023-05-08T11:57:45.144Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-25979
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Video Gallery by Total-Soft Video Gallery plugin <= 1.7.6 versions.
https://patchstack.com/database/vulnerability/gallery-videos/wordpress-video-gallery-youtube-gallery-plugin-1-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-02-17T13:47:13.226Z
2023-05-03T13:37:42.117Z
2023-05-03T13:37:42.117Z
{'Vendor': 'Video Gallery by Total-Soft', 'Product': 'Video Gallery', 'Versions': 'n/a'}
CVE-2023-25095
Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716
2023-02-02T20:42:36.071Z
2023-07-06T14:53:24.568Z
2023-07-17T19:35:20.595Z
{'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'}
CVE-2023-25216
Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formSetFirewallCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
https://github.com/DrizzlingSun/Tenda/blob/main/AC5/9/9.md
2023-02-06T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-25144
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership.
https://success.trendmicro.com/solution/000292209
2023-02-03T15:46:02.643Z
2023-03-07T22:19:31.521Z
2023-03-10T20:05:13.704141Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'}