CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-25221 | Libde265 v1.0.10 was discovered to contain a heap-buffer-overflow vulnerability in the derive_spatial_luma_vector_prediction function in motion.cc. | https://github.com/strukturag/libde265/issues/388 | 2023-02-06T00:00:00 | 2023-03-01T00:00:00 | 2023-03-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25671 | TensorFlow is an open source platform for machine learning. There is out-of-bounds access due to mismatched integer type sizes. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j5w9-hmfh-4cr6 | 2023-02-09T20:58:21.858Z | 2023-03-24T23:31:40.731Z | 2023-03-24T23:31:40.731Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25958 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Justin Saad Simple Tooltips plugin <= 2.1.4 versions. | https://patchstack.com/database/vulnerability/simple-tooltips/wordpress-simple-tooltips-plugin-2-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:07.370Z | 2023-05-12T15:15:56.004Z | 2023-05-12T15:15:56.004Z | {'Vendor': 'Justin Saad', 'Product': 'Simple Tooltips', 'Versions': 'n/a'} |
CVE-2023-25722 | A credential-leak issue was discovered in related Veracode products before 2023-03-27. Veracode Scan Jenkins Plugin before 23.3.19.0, when configured for remote agent jobs, invokes the Veracode Java API Wrapper in a manner that allows local users (with OS-level access of the Jenkins remote) to discover Veracode API credentials by listing the process and its arguments. Veracode Scan Jenkins Plugin before 23.3.19.0, when configured for remote agent jobs and when the "Connect using proxy" option is enabled and configured with proxy credentials, allows local users of the Jenkins remote to discover proxy credentials by listing the process and its arguments. Veracode Azure DevOps Extension before 3.20.0 invokes the Veracode Java API Wrapper in a manner that allows local users (with OS-level access to the Azure DevOps Services cloud infrastructure or Azure DevOps Server) to discover Veracode API credentials by listing the process and its arguments. Veracode Azure DevOps Extension before 3.20.0, when configured with proxy credentials, allows users (with shell access to the Azure DevOps Services cloud infrastructure or Azure DevOps Server) to discover proxy credentials by listing the process and its arguments. | https://veracode.com | 2023-02-13T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25688 | IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 247606. | https://www.ibm.com/support/pages/node/6962729 | 2023-02-11T18:09:03.127Z | 2023-03-21T15:01:07.193Z | 2023-03-22T04:39:15.803375Z | {'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'} |
CVE-2023-25667 | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, integer overflow occurs when `2^31 <= num_frames * height * width * channels < 2^32`, for example Full HD screencast of at least 346 frames. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqm2-gh8w-gr68 | 2023-02-09T20:58:21.858Z | 2023-03-24T23:40:20.893Z | 2023-03-24T23:40:20.893Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25519 |
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.
| https://https://nvidia.custhelp.com/app/answers/detail/a_id/5479 | 2023-02-07T02:57:17.085Z | 2023-09-12T00:49:21.411Z | 2023-09-12T00:49:21.411Z | {'Vendor': 'NVIDIA', 'Product': 'BlueField 1', 'Versions': 'All versions after 18.24.1000'} |
CVE-2023-25149 | TimescaleDB, an open-source time-series SQL database, has a privilege escalation vulnerability in versions 2.8.0 through 2.9.2. During installation, TimescaleDB creates a telemetry job that is runs as the installation user. The queries run as part of the telemetry data collection were not run with a locked down `search_path`, allowing malicious users to create functions that would be executed by the telemetry job, leading to privilege escalation. In order to be able to take advantage of this vulnerability, a user would need to be able to create objects in a database and then get a superuser to install TimescaleDB into their database. When TimescaleDB is installed as trusted extension, non-superusers can install the extension without help from a superuser.
Version 2.9.3 fixes this issue. As a mitigation, the `search_path` of the user running the telemetry job can be locked down to not include schemas writable by other users. The vulnerability is not exploitable on instances in Timescale Cloud and Managed Service for TimescaleDB due to additional security provisions in place on those platforms. | https://github.com/timescale/timescaledb/security/advisories/GHSA-44jh-j22r-33wq | 2023-02-03T16:59:18.241Z | 2023-02-14T13:44:37.713Z | 2023-02-14T13:44:37.713Z | {'Vendor': 'timescale', 'Product': 'timescaledb', 'Versions': '>= 2.8.0, < 2.9.3'} |
CVE-2023-25775 | Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html | 2023-02-24T04:00:02.082Z | 2023-08-11T02:36:57.397Z | 2023-08-11T02:36:57.397Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Ethernet Controller RDMA driver for linux', 'Versions': 'before version 1.9.30'} |
CVE-2023-25260 | Stimulsoft Designer (Web) 2023.1.3 is vulnerable to Local File Inclusion. | http://stimulsoft.com | 2023-02-06T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25077 | Cross-site scripting vulnerability in Authentication Key Settings of EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0 allows a remote authenticated attacker to inject an arbitrary script. | https://www.ec-cube.net/info/weakness/20230214/ | 2023-02-17T00:00:00 | 2023-03-05T00:00:00 | 2023-03-05T00:00:00 | {'Vendor': 'EC-CUBE CO.,LTD.', 'Product': 'EC-CUBE 4 series', 'Versions': 'EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0'} |
CVE-2023-25974 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in psicosi448 wp2syslog plugin <= 1.0.5 versions. | https://patchstack.com/database/vulnerability/wp2syslog/wordpress-wp2syslog-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:09.998Z | 2023-06-16T11:09:29.892Z | 2023-06-16T11:09:29.892Z | {'Vendor': 'psicosi448', 'Product': 'wp2syslog', 'Versions': 'n/a'} |
CVE-2023-25831 | There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser.
| https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/ | 2023-02-15T17:59:31.096Z | 2023-05-09T20:45:19.896Z | 2023-05-10T01:05:47.931Z | {'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '10.9.1'} |
CVE-2023-25098 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the source variable. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.072Z | 2023-07-06T14:53:24.822Z | 2023-07-17T19:35:20.960Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25562 | DataHub is an open-source metadata platform. In versions of DataHub prior to 0.8.45 Session cookies are only cleared on new sign-in events and not on logout events. Any authentication checks using the `AuthUtils.hasValidSessionCookie()` method could be bypassed by using a cookie from a logged out session, as a result any logged out session cookie may be accepted as valid and therefore lead to an authentication bypass to the system. Users are advised to upgrade. There are no known workarounds for this issue. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-083. | https://github.com/datahub-project/datahub/security/advisories/GHSA-3974-hxjh-m3jj | 2023-02-07T17:10:00.735Z | 2023-02-10T22:03:00.889Z | null | {'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.8.45'} |
CVE-2023-25132 | Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors. | https://zuso.ai/Advisory/ | 2023-02-02T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'CyberPower', 'Product': 'PowerPanel Business Local / Remote', 'Versions': 'unspecified'} |
CVE-2023-25923 | IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 could allow an attacker to upload files that could be used in a denial of service attack due to incorrect authorization. IBM X-Force ID: 247629. | https://www.ibm.com/support/pages/node/6962729 | 2023-02-16T16:39:45.212Z | 2023-03-21T15:07:53.940Z | 2023-03-21T15:07:53.940Z | {'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1, 4.1.1'} |
CVE-2023-25889 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25020 | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1.1 versions. | https://patchstack.com/database/vulnerability/bft-autoresponder/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-1-1-cross-site-scripting-xss-2?_s_id=cve | 2023-02-02T09:58:48.539Z | 2023-04-07T11:08:01.901Z | 2023-04-07T11:08:01.901Z | {'Vendor': 'Kiboko Labs', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': 'n/a'} |
CVE-2023-25470 | Cross-Site Request Forgery (CSRF) vulnerability in Anton Skorobogatov Rus-To-Lat plugin <= 0.3 versions. | https://patchstack.com/database/vulnerability/rustolat/wordpress-rus-to-lat-plugin-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:06.874Z | 2023-05-26T13:51:17.880Z | 2023-05-26T13:51:17.880Z | {'Vendor': 'Anton Skorobogatov', 'Product': 'Rus-To-Lat', 'Versions': 'n/a'} |
CVE-2023-25165 | Helm is a tool that streamlines installing and managing Kubernetes applications.`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart. Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server. The issue has been fixed in Helm 3.11.1. Prior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers. | https://github.com/helm/helm/security/advisories/GHSA-pwcw-6f5g-gxf8 | 2023-02-03T16:59:18.246Z | 2023-02-08T19:07:14.089Z | null | {'Vendor': 'helm', 'Product': 'helm', 'Versions': '>= 3.0.0, < 3.11.1'} |
CVE-2023-25866 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25759 | OS Command Injection in TripleData Reporting Engine in Tripleplay Platform releases prior to Caveman 3.4.0 allows authenticated users to run unprivileged OS level commands via a crafted request payload. | https://tripleplay.tv | 2023-02-13T00:00:00 | 2023-04-19T00:00:00 | 2023-04-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25309 | Cross Site Scripting (XSS) Vulnerability in Fetlife rollout-ui version 0.5, allows attackers to execute arbitrary code via a crafted url to the delete a feature functionality. | http://fetlife.com | 2023-02-06T00:00:00 | 2023-05-11T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25466 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Mahlamusa Who Hit The Page – Hit Counter plugin <= 1.4.14.3 versions. | https://patchstack.com/database/vulnerability/who-hit-the-page-hit-counter/wordpress-who-hit-the-page-hit-counter-plugin-1-4-14-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:06.874Z | 2023-08-30T15:23:15.988Z | 2023-08-30T15:23:15.988Z | {'Vendor': 'Mahlamusa', 'Product': 'Who Hit The Page – Hit Counter', 'Versions': 'n/a'} |
CVE-2023-25036 | Cross-Site Request Forgery (CSRF) vulnerability in akhlesh-nagar, a.Ankit Social Media Icons Widget plugin <= 1.6 versions. | https://patchstack.com/database/vulnerability/spoontalk-social-media-icons-widget/wordpress-social-media-icons-widget-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-02T09:58:49.594Z | 2023-07-18T12:17:39.967Z | 2023-07-18T12:17:39.967Z | {'Vendor': 'akhlesh-nagar, a.ankit', 'Product': 'Social Media Icons Widget', 'Versions': 'n/a'} |
CVE-2023-25870 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25523 |
NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in the nvdisasm binary file, where an attacker may cause a NULL pointer dereference by providing a user with a malformed ELF file. A successful exploit of this vulnerability may lead to a partial denial of service.
| https://nvidia.custhelp.com/app/answers/detail/a_id/5469 | 2023-02-07T02:57:17.086Z | 2023-07-03T23:27:59.201Z | 2023-07-03T23:27:59.201Z | {'Vendor': 'NVIDIA', 'Product': 'CUDA Toolkit', 'Versions': 'All versions prior to CUDA Toolkit v12.2'} |
CVE-2023-25489 | Cross-Site Request Forgery (CSRF) vulnerability in Jeff Sherk Update Theme and Plugins from Zip File plugin <= 2.0.0 versions. | https://patchstack.com/database/vulnerability/update-theme-and-plugins-from-zip-file/wordpress-update-theme-and-plugins-from-zip-file-plugin-2-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:09.645Z | 2023-10-04T10:35:25.647Z | 2023-10-04T10:35:25.647Z | {'Vendor': 'Jeff Sherk', 'Product': 'Update Theme and Plugins from Zip File', 'Versions': 'n/a'} |
CVE-2023-25173 | containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well.
This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups. | https://github.com/containerd/containerd/security/advisories/GHSA-hmfx-3pcx-653p | 2023-02-03T16:59:18.247Z | 2023-02-16T14:09:12.073Z | 2023-02-16T14:09:12.073Z | {'Vendor': 'containerd', 'Product': 'containerd', 'Versions': '< 1.5.18, >= 1.6.0, < 1.6.18'} |
CVE-2023-25962 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Biplob Adhikari Accordion – Multiple Accordion or FAQs Builder plugin <= 2.3.0 versions. | https://patchstack.com/database/vulnerability/accordions-or-faqs/wordpress-accordions-multiple-accordions-or-faqs-builder-plugin-2-3-0-cross-site-scripting-xss?_s_id=cve | 2023-02-17T13:47:07.370Z | 2023-05-04T12:47:39.051Z | 2023-05-04T12:47:39.051Z | {'Vendor': 'Biplob Adhikari', 'Product': 'Accordion – Multiple Accordion or FAQs Builder', 'Versions': 'n/a'} |
CVE-2023-25061 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.1.1 versions. | https://patchstack.com/database/vulnerability/bft-autoresponder/wordpress-arigato-autoresponder-and-newsletter-plugin-2-7-1-1-cross-site-scripting-xss?_s_id=cve | 2023-02-02T09:58:52.946Z | 2023-04-07T08:35:04.435Z | 2023-04-07T08:35:04.435Z | {'Vendor': 'Kiboko Labs', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': 'n/a'} |
CVE-2023-25431 | An issue was discovered in Online Reviewer Management System v1.0. There is a XSS vulnerability via reviewer_0/admins/assessments/course/course-update.php. | https://github.com/hundanchen69/bug_report/blob/main/vendors/janobe/Online%20Reviewer%20Management%20System/XSS-1.md | 2023-02-06T00:00:00 | 2023-02-28T00:00:00 | 2023-02-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25124 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_openvpn_client function with the remote_subnet and the remote_mask variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.078Z | 2023-07-06T14:53:27.093Z | 2023-07-17T19:35:24.203Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25827 |
Due to insufficient validation of parameters reflected in error messages by the legacy HTTP query API and the logging endpoint, it is possible to inject and execute malicious JavaScript within the browser of a targeted OpenTSDB user. This issue shares the same root cause as CVE-2018-13003, a reflected XSS vulnerability with the suggestion endpoint.
| https://www.synopsys.com/blogs/software-security/opentsdb/ | 2023-02-15T17:57:02.191Z | 2023-05-03T18:36:14.126Z | 2023-05-03T18:36:14.126Z | {'Vendor': 'OpenTSDB', 'Product': 'OpenTSDB', 'Versions': '0'} |
CVE-2023-25718 | In ConnectWise Control through 22.9.10032 (formerly known as ScreenConnect), after an executable file is signed, additional instructions can be added without invalidating the signature, such as instructions that result in offering the end user a (different) attacker-controlled executable file. It is plausible that the end user may allow the download and execution of this file to proceed. There are ConnectWise Control configuration options that add mitigations. NOTE: this may overlap CVE-2023-25719. NOTE: the vendor's position is that this purported vulnerability represents a "fundamental lack of understanding of Authenticode code signing behavior." | https://www.connectwise.com | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | 2023-08-22T17:38:25.447673 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25348 | ChurchCRM 4.5.3 was discovered to contain a CSV injection vulnerability via the Last Name and First Name input fields when creating a new person. These vulnerabilities allow attackers to execute arbitrary code via a crafted excel file. | https://github.com/ChurchCRM/CRM | 2023-02-06T00:00:00 | 2023-04-25T00:00:00 | 2023-04-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25719 | ConnectWise Control before 22.9.10032 (formerly known as ScreenConnect) fails to validate user-supplied parameters such as the Bin/ConnectWiseControl.Client.exe h parameter. This results in reflected data and injection of malicious code into a downloaded executable. The executable can be used to execute malicious queries or as a denial-of-service vector. NOTE: this CVE Record is only about the parameters, such as the h parameter (this CVE Record is not about the separate issue of signed executable files that are supposed to have unique configurations across customers' installations). | https://www.connectwise.com | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | 2023-03-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25963 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in JoomSky JS Job Manager plugin <= 2.0.0 versions. | https://patchstack.com/database/vulnerability/js-jobs/wordpress-js-job-manager-plugin-2-0-0-cross-site-scripting-xss?_s_id=cve | 2023-02-17T13:47:07.371Z | 2023-06-16T08:41:38.322Z | 2023-06-16T08:41:38.322Z | {'Vendor': 'JoomSky', 'Product': 'JS Job Manager', 'Versions': 'n/a'} |
CVE-2023-25125 | null | null | 2023-02-02T00:00:00 | null | 2023-02-03T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-25575 | API Platform Core is the server component of API Platform: hypermedia and GraphQL APIs. Resource properties secured with the `security` option of the `ApiPlatform\Metadata\ApiProperty` attribute can be disclosed to unauthorized users. The problem affects most serialization formats, including raw JSON, which is enabled by default when installing API Platform. Custom serialization formats may also be impacted. Only collection endpoints are affected by the issue, item endpoints are not. The JSON-LD format is not affected by the issue. The result of the security rule is only executed for the first item of the collection. The result of the rule is then cached and reused for the next items. This bug can leak data to unauthorized users when the rule depends on the value of a property of the item. This bug can also hide properties that should be displayed to authorized users. This issue impacts the 2.7, 3.0 and 3.1 branches. Please upgrade to versions 2.7.10, 3.0.12 or 3.1.3. As a workaround, replace the `cache_key` of the context array of the Serializer inside a custom normalizer that works on objects if the security option of the `ApiPlatform\Metadata\ApiProperty` attribute is used. | https://github.com/api-platform/core/security/advisories/GHSA-vr2x-7687-h6qv | 2023-02-07T17:10:00.742Z | 2023-02-28T22:21:48.730Z | 2023-02-28T22:21:48.730Z | {'Vendor': 'api-platform', 'Product': 'core', 'Versions': '>= 3.0.0, < 3.0.12, >= 3.1.0, < 3.1.3, >= 2.6.0, < 2.7.10'} |
CVE-2023-25826 |
Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation.
| https://www.synopsys.com/blogs/software-security/opentsdb/ | 2023-02-15T17:57:02.191Z | 2023-05-03T18:33:59.306Z | 2023-05-03T18:33:59.306Z | {'Vendor': 'OpenTSDB', 'Product': 'OpenTSDB', 'Versions': '0'} |
CVE-2023-25467 | Cross-Site Request Forgery (CSRF) vulnerability in Daniel Mores, A. Huizinga Resize at Upload Plus plugin <= 1.3 versions. | https://patchstack.com/database/vulnerability/resize-at-upload-plus/wordpress-resize-at-upload-plus-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-06T12:38:06.874Z | 2023-05-26T14:02:30.534Z | 2023-05-26T14:02:30.534Z | {'Vendor': 'Daniel Mores, A. Huizinga', 'Product': 'Resize at Upload Plus', 'Versions': 'n/a'} |
CVE-2023-25934 |
DELL ECS prior to 3.8.0.2 contains an improper verification of cryptographic signature vulnerability. A network attacker with an ability to intercept the request could potentially exploit this vulnerability to modify the body data of the request.
| https://www.dell.com/support/kbdoc/en-us/000212970/dsa-2023-109-dell-ecs-security-update-for-multiple-vulnerabilities | 2023-02-17T06:15:08.303Z | 2023-05-04T06:58:21.714Z | 2023-05-31T05:06:46.692Z | {'Vendor': 'Dell', 'Product': 'ECS', 'Versions': 'Version<= 3.8.0.1'} |
CVE-2023-25871 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25522 |
NVIDIA DGX A100/A800 contains a vulnerability in SBIOS where an attacker may cause improper input validation by providing configuration information in an unexpected format. A successful exploit of this vulnerability may lead to denial of service, information disclosure, and data tampering.
| https://nvidia.custhelp.com/app/answers/detail/a_id/5461 | 2023-02-07T02:57:17.086Z | 2023-07-03T23:27:41.361Z | 2023-07-03T23:27:41.361Z | {'Vendor': 'NVIDIA', 'Product': 'DGX A100/A800', 'Versions': 'All SBIOS versions prior to 1.21'} |
CVE-2023-25488 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Duc Bui Quang WP Default Feature Image plugin <= 1.0.1.1 versions. | https://patchstack.com/database/vulnerability/wp-default-feature-image/wordpress-wp-default-feature-image-plugin-1-0-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:09.645Z | 2023-09-01T10:54:52.277Z | 2023-09-01T10:54:52.277Z | {'Vendor': 'Duc Bui Quang', 'Product': 'WP Default Feature Image', 'Versions': 'n/a'} |
CVE-2023-25172 | Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, a maliciously crafted URL can be included in a user's full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse's default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches. As a workaround, enable and/or restore your site's CSP to the default one provided with Discourse. | https://github.com/discourse/discourse/security/advisories/GHSA-7pm2-prxw-wrvp | 2023-02-03T16:59:18.247Z | 2023-03-17T16:07:27.668Z | 2023-03-17T16:07:27.668Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable < 3.0.1, beta < 3.1.0.beta2, tests-passed < 3.1.0.beta2'} |
CVE-2023-25758 | Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected." | https://github.com/OneKeyHQ/firmware | 2023-02-13T00:00:00 | 2023-02-14T00:00:00 | 2023-02-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25888 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25021 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in FareHarbor FareHarbor for WordPress plugin <= 3.6.6 versions. | https://patchstack.com/database/vulnerability/fareharbor/wordpress-fareharbor-for-wordpress-plugin-3-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-02T09:58:48.539Z | 2023-05-08T11:48:22.317Z | 2023-05-08T11:48:22.317Z | {'Vendor': 'FareHarbor', 'Product': 'FareHarbor for WordPress', 'Versions': 'n/a'} |
CVE-2023-25471 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Webcodin WCP OpenWeather plugin <= 2.5.0 versions. | https://patchstack.com/database/vulnerability/wcp-openweather/wordpress-wcp-openweather-plugin-2-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:06.874Z | 2023-08-30T15:37:32.285Z | 2023-08-30T15:37:32.285Z | {'Vendor': 'Webcodin', 'Product': 'WCP OpenWeather', 'Versions': 'n/a'} |
CVE-2023-25164 | Tinacms is a Git-backed headless content management system with support for visual editing. Sites being built with @tinacms/cli >= 1.0.0 && < 1.0.9 which store sensitive values in the process.env variable are impacted. These values will be added in plaintext to the index.js file. If you're on a version prior to 1.0.0 this vulnerability does not affect you. If you are affected and your Tina-enabled website has sensitive credentials stored as environment variables (eg. Algolia API keys) you should rotate those keys immediately. This issue has been patched in @tinacms/[email protected]. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/tinacms/tinacms/security/advisories/GHSA-pc2q-jcxq-rjrr | 2023-02-03T16:59:18.245Z | 2023-02-08T19:26:18.956Z | null | {'Vendor': 'tinacms', 'Product': 'tinacms', 'Versions': '>= 1.0.0, < 1.0.9'} |
CVE-2023-25534 | NVIDIA DGX H100 BMC contains a vulnerability in IPMI, where an attacker may cause improper input validation. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | https://nvidia.custhelp.com/app/answers/detail/a_id/5473 | 2023-02-07T02:57:25.085Z | 2023-09-20T00:55:00.275Z | 2023-09-20T00:55:00.275Z | {'Vendor': 'NVIDIA', 'Product': 'DGX H100 BMC', 'Versions': 'All versions prior to 23.08.07'} |
CVE-2023-25867 | Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html | 2023-02-15T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Substance3D - Stager', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25076 | A buffer overflow vulnerability exists in the handling of wildcard backend hosts of SNIProxy 0.6.0-2 and the master branch (commit: 822bb80df9b7b345cc9eba55df74a07b498819ba). A specially crafted HTTP or TLS packet can lead to arbitrary code execution. An attacker could send a malicious packet to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1731 | 2023-03-06T21:52:02.534Z | 2023-03-30T14:34:10.414Z | 2023-04-20T18:36:35.932Z | {'Vendor': 'SNIProxy', 'Product': 'SNIProxy', 'Versions': '0.6.0-2, Master 822bb80df9b7b345cc9eba55df74a07b498819ba'} |
CVE-2023-25975 | Cross-Site Request Forgery (CSRF) vulnerability in Frédéric Sheedy Etsy Shop plugin <= 3.0.3 versions. | https://patchstack.com/database/vulnerability/etsy-shop/wordpress-etsy-shop-plugin-3-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-17T13:47:09.999Z | 2023-11-09T17:43:26.107Z | 2023-11-09T17:43:26.107Z | {'Vendor': 'Frédéric Sheedy', 'Product': 'Etsy Shop', 'Versions': 'n/a'} |
CVE-2023-25830 | There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1, 10.8.1 and 10.7.1 which may allow a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim’s browser. | https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/ | 2023-02-15T17:59:31.096Z | 2023-05-09T16:31:21.361Z | 2023-05-09T16:31:21.361Z | {'Vendor': 'Esri', 'Product': 'Portal for ArcGIS', 'Versions': '10.9.1'} |
CVE-2023-25099 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the dest variable. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.072Z | 2023-07-06T14:53:24.900Z | 2023-07-17T19:35:21.090Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25563 | GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, multiple out-of-bounds reads when decoding NTLM fields can trigger a denial of service. A 32-bit integer overflow condition can lead to incorrect checks of consistency of length of internal buffers. Although most applications will error out before accepting a singe input buffer of 4GB in length this could theoretically happen. This vulnerability can be triggered via the main `gss_accept_sec_context` entry point if the application allows tokens greater than 4GB in length. This can lead to a large, up to 65KB, out-of-bounds read which could cause a denial-of-service if it reads from unmapped memory. Version 1.2.0 contains a patch for the out-of-bounds reads. | https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-jjjx-5qf7-9mgf | 2023-02-07T17:10:00.735Z | 2023-02-14T17:35:08.172Z | 2023-02-14T17:35:08.172Z | {'Vendor': 'gssapi', 'Product': 'gss-ntlmssp', 'Versions': '< 1.2.0'} |
CVE-2023-25133 | Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors. | https://zuso.ai/Advisory/ | 2023-02-02T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'CyberPower', 'Product': 'PowerPanel Business Local / Remote', 'Versions': 'unspecified'} |
CVE-2023-25774 | A denial-of-service vulnerability exists in the vpnserver ConnectionAccept() functionality of SoftEther VPN 5.02. A set of specially crafted network connections can lead to denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1743 | 2023-04-14T16:48:36.218Z | 2023-10-12T15:27:53.149Z | 2023-10-12T17:00:06.743Z | {'Vendor': 'SoftEther VPN', 'Product': 'SoftEther VPN', 'Versions': '5.01.9674, 5.02'} |
CVE-2023-25261 | Certain Stimulsoft GmbH products are affected by: Remote Code Execution. This affects Stimulsoft Designer (Desktop) 2023.1.4 and Stimulsoft Designer (Web) 2023.1.3 and Stimulsoft Viewer (Web) 2023.1.3. Access to the local file system is not prohibited in any way. Therefore, an attacker may include source code which reads or writes local directories and files. It is also possible for the attacker to prepare a report which has a variable that holds the gathered data and render it in the report. | http://stimulsoft.com | 2023-02-06T00:00:00 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25518 |
NVIDIA Jetson contains a vulnerability in CBoot, where the PCIe controller is initialized without IOMMU, which may allow an attacker with physical access to the target device to read and write to arbitrary memory. A successful exploit of this vulnerability may lead to code execution, denial of service, information disclosure, and loss of integrity.
| https://https://nvidia.custhelp.com/app/answers/detail/a_id/5466 | 2023-02-07T02:57:17.084Z | 2023-06-23T17:09:10.859Z | 2023-06-23T17:09:10.859Z | {'Vendor': 'NVIDIA', 'Product': 'Jetson AGX Xavier series, Jetson Xavier NX', 'Versions': 'All versions prior to 32.7.4'} |
CVE-2023-25148 | A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | https://success.trendmicro.com/solution/000292209 | 2023-02-03T15:46:02.643Z | 2023-03-07T22:20:13.080Z | 2023-03-10T20:05:13.704141Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'} |
CVE-2023-25723 | null | null | 2023-02-13T00:00:00 | null | 2023-02-14T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-25689 | IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1 , and 4.1.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 247618. | https://www.ibm.com/support/pages/node/6962729 | 2023-02-11T18:09:03.127Z | 2023-03-21T14:49:21.593Z | 2023-03-21T14:49:21.593Z | {'Vendor': 'IBM', 'Product': 'Security Key Lifecycle Manager', 'Versions': '3.0, 3.0.1, 4.0, 4.1 , 4.1.1'} |
CVE-2023-25666 | TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, there is a floating point exception in AudioSpectrogram. A fix is included in TensorFlow version 2.12.0 and version 2.11.1. | https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f637-vh3r-vfh2 | 2023-02-09T20:58:21.858Z | 2023-03-24T23:39:55.696Z | 2023-03-24T23:39:55.696Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25735 | Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. | https://www.mozilla.org/security/advisories/mfsa2023-06/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25220 | Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the add_white_node function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://www.dlink.com/en/security-bulletin/ | 2023-02-06T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25670 | TensorFlow is an open source platform for machine learning. Versions prior to 2.12.0 and 2.11.1 have a null point error in QuantizedMatMulWithBiasAndDequantize with MKL enabled. A fix is included in TensorFlow version 2.12.0 and version 2.11.1.
| https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rq-hwc3-x77w | 2023-02-09T20:58:21.858Z | 2023-03-24T23:32:12.780Z | 2023-03-24T23:32:12.780Z | {'Vendor': 'tensorflow', 'Product': 'tensorflow', 'Versions': '< 2.11.1'} |
CVE-2023-25559 | DataHub is an open-source metadata platform. When not using authentication for the metadata service, which is the default configuration, the Metadata service (GMS) will use the X-DataHub-Actor HTTP header to infer the user the frontend is sending the request on behalf of. When the backends retrieves the header, its name is retrieved in a case-insensitive way. This case differential can be abused by an attacker to smuggle an X-DataHub-Actor header with different casing (eg: X-DATAHUB-ACTOR). This issue may lead to an authorization bypass by allowing any user to impersonate the system user account and perform any actions on its behalf. This vulnerability was discovered and reported by the GitHub Security lab and is tracked as GHSL-2022-079. | https://github.com/datahub-project/datahub/security/advisories/GHSA-qgp2-qr66-j8r8 | 2023-02-07T17:10:00.733Z | 2023-02-10T22:03:05.646Z | null | {'Vendor': 'datahub-project', 'Product': 'datahub', 'Versions': '< 0.8.45'} |
CVE-2023-25109 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_gre function with the local_ip variable. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.073Z | 2023-07-06T14:53:25.830Z | 2023-07-17T19:35:22.402Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25762 | Jenkins Pipeline: Build Step Plugin 2.18 and earlier does not escape job names in a JavaScript expression used in the Pipeline Snippet Generator, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control job names. | https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3019 | 2023-02-14T00:00:00 | 2023-02-15T00:00:00 | 2023-10-24T12:48:55.089Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Pipeline: Build Step Plugin', 'Versions': 'unspecified'} |
CVE-2023-25596 | A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-003.txt | 2023-02-07T20:24:22.480Z | 2023-03-14T14:57:27.104Z | 2023-03-22T04:39:15.803375Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba ClearPass Policy Manager', 'Versions': '6.11.1 and below, 6.10.8 and below, 6.9.13 and below'} |
CVE-2023-25980 | Cross-Site Request Forgery (CSRF) vulnerability in CAGE Web Design | Rolf van Gelder Optimize Database after Deleting Revisions plugin <= 5.1 versions. | https://patchstack.com/database/vulnerability/rvg-optimize-database/wordpress-optimize-database-after-deleting-revisions-plugin-5-0-110-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-02-17T13:47:13.226Z | 2023-10-04T10:25:13.124Z | 2023-10-04T10:25:13.124Z | {'Vendor': 'CAGE Web Design | Rolf van Gelder', 'Product': 'Optimize Database after Deleting Revisions', 'Versions': 'n/a'} |
CVE-2023-25083 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the firewall_handler_set function with the ip and mac variables. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.069Z | 2023-07-06T14:53:23.481Z | 2023-07-17T19:35:19.132Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25579 | Nextcloud server is a self hosted home cloud product. In affected versions the `OC\Files\Node\Folder::getFullPath()` function was validating and normalizing the string in the wrong order. The function is used in the `newFile()` and `newFolder()` items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-273v-9h7x-p68v | 2023-02-07T17:10:00.743Z | 2023-02-22T18:21:10.573Z | 2023-02-22T18:21:10.573Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 23.0.12, >= 24.0.0, < 24.0.8, >= 25.0.0, < 25.0.2'} |
CVE-2023-25129 | null | null | 2023-02-02T00:00:00 | null | 2023-02-03T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-25650 |
There is an arbitrary file download vulnerability in ZXCLOUD iRAI. Since the backend does not escape special strings or restrict paths, an attacker with user permission could access the download interface by modifying the request parameter, causing arbitrary file downloads.
| https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1032904 | 2023-02-09T19:47:48.023Z | 2023-12-14T06:52:23.199Z | 2023-12-14T08:17:02.352Z | {'Vendor': 'ZTE', 'Product': 'ZXCLOUD iRAI', 'Versions': 'All versions up to V7.23.23'} |
CVE-2023-25345 | Directory traversal vulnerability in swig-templates thru 2.0.4 and swig thru 1.4.2, allows attackers to read arbitrary files via the include or extends tags. | https://github.com/node-swig/swig-templates/issues/88 | 2023-02-06T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25715 | Missing Authorization vulnerability in GamiPress GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress.This issue affects GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress: from n/a through 2.5.6.
| https://patchstack.com/database/vulnerability/gamipress/wordpress-gamipress-plugin-2-5-6-missing-authorization-leading-to-points-manipulation-vulnerability?_s_id=cve | 2023-02-13T04:14:01.866Z | 2023-12-19T15:40:16.483Z | 2023-12-19T15:40:16.483Z | {'Vendor': 'GamiPress', 'Product': 'GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress', 'Versions': 'n/a'} |
CVE-2023-25938 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-02-17T06:15:08.303Z | 2023-06-23T10:13:31.571Z | 2023-06-23T10:13:31.571Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-25892 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25191 | AMI MegaRAC SPX devices allow Password Disclosure through Redfish. The fixed versions are SPx_12-update-7.00 and SPx_13-update-5.00. | https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023002.pdf | 2023-02-04T00:00:00 | 2023-02-15T00:00:00 | 2023-02-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25484 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Oliver Schlöbe Simple Yearly Archive plugin <= 2.1.8 versions. | https://patchstack.com/database/vulnerability/simple-yearly-archive/wordpress-simple-yearly-archive-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-06T12:38:09.644Z | 2023-04-25T16:50:45.908Z | 2023-04-25T16:51:27.722Z | {'Vendor': 'Oliver Schlöbe', 'Product': 'Simple Yearly Archive', 'Versions': 'n/a'} |
CVE-2023-25607 | An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC 7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function. | https://fortiguard.com/psirt/FG-IR-22-352 | 2023-02-08T13:42:03.366Z | 2023-10-10T16:51:31.831Z | 2023-10-10T16:51:31.831Z | {'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.2.0, 7.0.0, 6.4.0, 6.2.0, 6.0.0'} |
CVE-2023-25742 | When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. | https://www.mozilla.org/security/advisories/mfsa2023-06/ | 2023-02-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-25187 | An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. However, before the 21B release, BTS commissioning manuals did not provide instructions to change default SSH keys (to BTS operator-specific values). This leads to a possibility for malicious operations staff (inside a CSP network) to attempt MITM exploitation of BTS service user access, during the moments that SSH is enabled for Nokia service personnel to perform troubleshooting activities. | https://Nokia.com | 2023-02-04T00:00:00 | 2023-06-16T00:00:00 | 2023-06-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25884 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-20.html | 2023-02-15T00:00:00 | 2023-03-28T00:00:00 | 2023-03-28T00:00:00 | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': 'unspecified, unspecified'} |
CVE-2023-25492 | A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API. | https://support.lenovo.com/us/en/product_security/LEN-99936 | 2023-02-06T15:09:03.709Z | 2023-05-01T14:11:48.551Z | 2023-05-01T14:11:48.551Z | {'Vendor': 'Lenovo', 'Product': 'XClarity Controller', 'Versions': 'See product security advisory below'} |
CVE-2023-25168 | Wings is Pterodactyl's server control plane. This vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with `GHSA-p8r3-83r8-jwj5` to overwrite files on the host system. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. This vulnerability has been resolved in version `v1.11.4` of Wings, and has been back-ported to the 1.7 release series in `v1.7.4`. Anyone running `v1.11.x` should upgrade to `v1.11.4` and anyone running `v1.7.x` should upgrade to `v1.7.4`. There are no known workarounds for this issue. | https://github.com/pterodactyl/wings/security/advisories/GHSA-66p8-j459-rq63 | 2023-02-03T16:59:18.246Z | 2023-02-08T23:43:29.094Z | null | {'Vendor': 'pterodactyl', 'Product': 'wings', 'Versions': '< 1.7.4, >= 1.11.0, < 1.11.4'} |
CVE-2023-25241 | bgERP v22.31 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/bgERP/2023/bgERP-v22.31-Cookie-Session-vulnerability%2BXSS-Reflected | 2023-02-06T00:00:00 | 2023-02-13T00:00:00 | 2023-02-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25611 | A improper neutralization of formula elements in a CSV file vulnerability in Fortinet FortiAnalyzer 6.4.0 - 6.4.9, 7.0.0 - 7.0.5, and 7.2.0 - 7.2.1 allows local attacker to execute unauthorized code or commands via inserting spreadsheet formulas in macro names. | https://fortiguard.com/psirt/FG-IR-22-488 | 2023-02-08T13:42:03.367Z | 2023-03-07T16:04:36.606Z | 2023-03-07T16:04:36.606Z | {'Vendor': 'Fortinet', 'Product': 'FortiAnalyzer', 'Versions': '7.2.0, 7.0.0, 6.4.0'} |
CVE-2023-25304 | Prism Launcher <= 6.1 is vulnerable to Directory Traversal. | https://github.com/PrismLauncher/PrismLauncher/security/advisories/GHSA-wxgx-8v36-mj2m | 2023-02-06T00:00:00 | 2023-03-06T00:00:00 | 2023-03-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25754 | Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.6.0.
| https://github.com/apache/airflow/pull/29506 | 2023-02-13T14:49:15.008Z | 2023-05-08T11:57:45.144Z | 2023-05-08T11:57:45.144Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'} |
CVE-2023-25979 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Video Gallery by Total-Soft Video Gallery plugin <= 1.7.6 versions. | https://patchstack.com/database/vulnerability/gallery-videos/wordpress-video-gallery-youtube-gallery-plugin-1-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-02-17T13:47:13.226Z | 2023-05-03T13:37:42.117Z | 2023-05-03T13:37:42.117Z | {'Vendor': 'Video Gallery by Total-Soft', 'Product': 'Video Gallery', 'Versions': 'n/a'} |
CVE-2023-25095 | Multiple buffer overflow vulnerabilities exist in the vtysh_ubus binary of Milesight UR32L v32.3.0.5 due to the use of an unsafe sprintf pattern. A specially crafted HTTP request can lead to arbitrary code execution. An attacker with high privileges can send HTTP requests to trigger these vulnerabilities.This buffer overflow occurs in the set_qos function with the rule_name variable with two possible format strings that represent negated commands. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1716 | 2023-02-02T20:42:36.071Z | 2023-07-06T14:53:24.568Z | 2023-07-17T19:35:20.595Z | {'Vendor': 'Milesight', 'Product': 'UR32L', 'Versions': 'v32.3.0.5'} |
CVE-2023-25216 | Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the formSetFirewallCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. | https://github.com/DrizzlingSun/Tenda/blob/main/AC5/9/9.md | 2023-02-06T00:00:00 | 2023-04-07T00:00:00 | 2023-04-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-25144 | An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership. | https://success.trendmicro.com/solution/000292209 | 2023-02-03T15:46:02.643Z | 2023-03-07T22:19:31.521Z | 2023-03-10T20:05:13.704141Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019 (14.0)'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.