CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-29299
|
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
|
2023-04-04T20:46:42.577Z
|
2023-08-10T13:17:48.014Z
|
2023-08-10T13:17:48.014Z
|
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
|
CVE-2023-29333
|
Microsoft Access Denial of Service Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29333
|
2023-04-04T22:34:18.379Z
|
2023-05-09T17:03:09.930Z
|
2023-12-14T19:06:19.539Z
|
{'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'}
|
CVE-2023-29626
|
Yoga Class Registration System 1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at /admin/login.php.
|
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Yoga-Class-Registration%20-1.0-2023%20-%20Multiple-SQLi
|
2023-04-07T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29276
|
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html
|
2023-04-04T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Painter', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-29919
|
SolarView Compact <= 6.0 is vulnerable to Insecure Permissions. Any file on the server can be read or modified because texteditor.php is not restricted.
|
https://www.solarview.io/
|
2023-04-07T00:00:00
|
2023-05-23T00:00:00
|
2023-05-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29364
|
Windows Authentication Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29364
|
2023-04-04T22:34:18.385Z
|
2023-06-13T23:26:06.772Z
|
2024-01-09T17:39:23.156Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
|
CVE-2023-29734
|
An issue found in edjing Mix v.7.09.01 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the database.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29734/CVE%20detail.md
|
2023-04-07T00:00:00
|
2023-05-30T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29108
|
The IP filter in ABAP Platform and SAP Web Dispatcher - versions WEBDISP 7.85, 7.89, KERNEL 7.85, 7.89, 7.91, may be vulnerable by erroneous IP netmask handling. This may enable access to backend applications from unwanted sources.
|
https://launchpad.support.sap.com/#/notes/3315312
|
2023-03-31T10:01:53.359Z
|
2023-04-11T02:56:58.666Z
|
2023-04-11T02:56:58.666Z
|
{'Vendor': 'SAP', 'Product': 'ABAP Platform and SAP Web Dispatcher', 'Versions': 'WEBDISP 7.85, WEBDISP 7.89, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91'}
|
CVE-2023-29380
|
Warpinator before 1.6.0 allows remote file deletion via directory traversal in top_dir_basenames.
|
https://github.com/linuxmint/warpinator/compare/1.4.5...1.6.0
|
2023-04-05T00:00:00
|
2023-05-28T00:00:00
|
2023-05-28T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29800
|
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the FileName parameter in the UploadFirmwareFile function.
|
https://sore-pail-31b.notion.site/Command-Injection-5-e88b72309a3c4e20b7469b3679c0c7d9
|
2023-04-07T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29103
|
A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC712 (All versions < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions < V2.1). The affected device uses a hard-coded password to protect the diagnostic files. This could allow an authenticated attacker to access protected data.
|
https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf
|
2023-03-31T08:06:09.775Z
|
2023-05-09T11:51:29.860Z
|
2023-05-09T11:51:29.860Z
|
{'Vendor': 'Siemens', 'Product': 'SIMATIC Cloud Connect 7 CC712', 'Versions': 'All versions >= V2.0 < V2.1'}
|
CVE-2023-29046
|
Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were logged. Some connections use user-controlled endpoints, which could be malicious and attempt to keep the connection open for an extended period of time. As a result users were able to trigger large amount of egress network connections, possibly exhausting network pool resources and lock up legitimate requests. A new mechanism has been introduced to cancel external connections that might access user-controlled endpoints. No publicly available exploits are known.
|
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6243_7.10.6_2023-08-01.pdf
|
2023-03-30T09:34:25.188Z
|
2023-11-02T13:01:39.521Z
|
2024-01-12T07:08:22.530Z
|
{'Vendor': 'OX Software GmbH', 'Product': 'OX App Suite', 'Versions': '0, 0'}
|
CVE-2023-29416
|
An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A bz3_decode_block out-of-bounds write can occur with a crafted archive because bzip3 does not follow the required procedure for interacting with libsais.
|
https://github.com/kspalaiologos/bzip3/compare/1.2.3...1.3.0
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29338
|
Visual Studio Code Spoofing Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29338
|
2023-04-04T22:34:18.380Z
|
2023-05-09T17:03:04.075Z
|
2023-12-14T19:06:13.882Z
|
{'Vendor': 'Microsoft', 'Product': 'Visual Studio Code', 'Versions': '1.0.0'}
|
CVE-2023-29292
|
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. An admin-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.
|
https://helpx.adobe.com/security/products/magento/apsb23-35.html
|
2023-04-04T00:00:00
|
2023-06-15T00:00:00
|
2023-06-15T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
|
CVE-2023-29504
|
Uncontrolled search path element in some Intel(R) RealSense(TM) Dynamic Calibration software before version 2.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00871.html
|
2023-04-13T03:00:03.801Z
|
2023-11-14T19:05:11.749Z
|
2023-11-14T19:05:11.749Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) RealSense(TM) Dynamic Calibration software', 'Versions': 'before version 2.13.1.0'}
|
CVE-2023-29154
|
SQL injection vulnerability exists in the CONPROSYS HMI System (CHS) versions prior to 3.5.3. A user who can access the affected product with an administrative privilege may execute an arbitrary SQL command via specially crafted input to the query setting page.
|
https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf
|
2023-05-11T00:00:00
|
2023-06-01T00:00:00
|
2023-06-01T00:00:00
|
{'Vendor': 'Contec Co., Ltd.', 'Product': 'CONPROSYS HMI System (CHS)', 'Versions': 'versions prior to 3.5.3'}
|
CVE-2023-29857
|
An issue in Teslamate v1.27.1 allows attackers to obtain sensitive information via directly accessing the teslamate link.
|
http://leegt.synology.me:4000/
|
2023-04-07T00:00:00
|
2023-05-18T00:00:00
|
2023-05-18T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29912
|
H3C Magic R200 R200V100R004 was discovered to contain a stack overflow via the DelvsList interface at /goform/aspForm.
|
https://hackmd.io/%400dayResearch/S1TusiR1n
|
2023-04-07T00:00:00
|
2023-04-21T00:00:00
|
2023-04-21T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29441
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Robert Heller WebLibrarian plugin <= 3.5.8.1 versions.
|
https://patchstack.com/database/vulnerability/weblibrarian/wordpress-weblibrarian-plugin-3-5-8-1-multiple-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-04-06T12:18:41.792Z
|
2023-09-06T07:58:12.441Z
|
2023-09-06T07:58:12.441Z
|
{'Vendor': 'Robert Heller', 'Product': 'WebLibrarian', 'Versions': 'n/a'}
|
CVE-2023-29011
|
Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\etc\connectrc`. Since `C:\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by other users on the same multi-user machine. The problem has been patched in Git for Windows v2.40.1. As a workaround, create the folder `etc` on all drives where Git commands are run, and remove read/write access from those folders. Alternatively, watch out for malicious `<drive>:\etc\connectrc` files on multi-user machines.
|
https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm
|
2023-03-29T17:39:16.143Z
|
2023-04-25T20:40:30.247Z
|
2023-04-25T20:40:30.247Z
|
{'Vendor': 'git-for-windows', 'Product': 'git', 'Versions': '< 2.40.1'}
|
CVE-2023-29284
|
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html
|
2023-04-04T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Painter', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-29791
|
kodbox <= 1.37 is vulnerable to Cross Site Scripting (XSS) via the debug information.
|
https://blog.mo60.cn/index.php/archives/kodbox-xss.html
|
2023-04-07T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29512
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the information loaded from attachments in `imported.vm`, `importinline.vm`, and `packagelist.vm`. This page is installed by default. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hg5x-3w3x-7g96
|
2023-04-07T18:56:54.626Z
|
2023-04-18T23:44:25.981Z
|
2023-04-18T23:44:25.981Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 13.10.11, >= 14.0.0, < 14.4.8, >= 14.5.0, < 14.10.1'}
|
CVE-2023-29007
|
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.
|
https://github.com/git/git/security/advisories/GHSA-v48j-4xgg-4844
|
2023-03-29T17:39:16.142Z
|
2023-04-25T20:09:52.182Z
|
2023-04-25T20:09:52.182Z
|
{'Vendor': 'git', 'Product': 'git', 'Versions': '< 2.30.9, >= 2.31.0, < 2.31.8, >= 2.32.0, < 2.32.7, >= 2.33.0, < 2.33.8, >= 2.34.0, < 2.34.8, >= 2.35.0, < 2.35.8, >= 2.36.0, < 2.36.6, >= 2.37.0, < 2.37.7, >= 2.38.0, < 2.38.5, >= 2.39.0, < 2.39.3, >= 2.40.0, < 2.40.1'}
|
CVE-2023-29457
|
Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
|
https://support.zabbix.com/browse/ZBX-22988
|
2023-04-06T18:04:44.892Z
|
2023-07-13T09:35:24.594Z
|
2023-07-13T09:35:24.594Z
|
{'Vendor': 'Zabbix', 'Product': 'Zabbix', 'Versions': '4.0.0, 5.0.0, 6.0.0'}
|
CVE-2023-29545
|
Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user.
*This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1823077
|
2023-04-07T19:49:37.878Z
|
2023-06-19T10:07:39.855Z
|
2023-06-19T10:08:27.735Z
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-29400
|
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
|
https://go.dev/issue/59722
|
2023-04-05T19:36:35.042Z
|
2023-05-11T15:29:24.874Z
|
2023-06-12T19:08:27.799Z
|
{'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'}
|
CVE-2023-29050
|
The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
|
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf
|
2023-03-30T09:34:25.189Z
|
2024-01-08T08:51:40.489Z
|
2024-01-12T07:07:02.708Z
|
{'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0, 0'}
|
CVE-2023-29247
|
Task instance details page in the UI is vulnerable to a stored XSS.This issue affects Apache Airflow: before 2.6.0.
|
https://github.com/apache/airflow/pull/30447
|
2023-04-04T17:08:46.277Z
|
2023-05-08T09:01:40.033Z
|
2023-05-08T09:01:40.033Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
|
CVE-2023-29302
|
Adobe Experience Manager versions 6.5.16.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-31.html
|
2023-04-04T00:00:00
|
2023-06-15T00:00:00
|
2023-06-15T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Experience Manager', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-29752
|
An issue found in Facemoji Emoji Keyboard v.2.9.1.2 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the component.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29752/CVE%20detailed.md
|
2023-04-07T00:00:00
|
2023-06-09T00:00:00
|
2023-06-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29494
|
Improper input validation in BIOS firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
|
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html
|
2023-05-05T03:00:03.707Z
|
2023-08-11T02:37:19.124Z
|
2023-08-11T02:37:19.124Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) NUCs', 'Versions': 'See references'}
|
CVE-2023-29210
|
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the notification preferences macros can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the user parameter of the macro that provide the notification filters. These macros are used in the user profiles and thus installed by default in XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x
|
2023-04-03T13:37:18.455Z
|
2023-04-15T16:20:29.342Z
|
2023-04-15T16:20:29.342Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 13.2-rc-1, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'}
|
CVE-2023-29355
|
DHCP Server Service Information Disclosure Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29355
|
2023-04-04T22:34:18.384Z
|
2023-06-13T23:26:02.297Z
|
2024-01-09T17:39:18.753Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
|
CVE-2023-29586
|
Code Sector TeraCopy 3.9.7 does not perform proper access validation on the source folder during a copy operation. This leads to Arbitrary File Read by allowing any user to copy any directory in the system to a directory they control.
|
https://packetstormsecurity.com/files/143984/TeraCopyService-3.1-Unquoted-Service-Path-Privilege-Escalation.html
|
2023-04-07T00:00:00
|
2023-04-19T00:00:00
|
2023-06-21T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29139
|
An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. When a user with checkuserlog permissions makes many CheckUserLog API requests in some configurations, denial of service can occur (RequestTimeoutException or upstream request timeout).
|
https://phabricator.wikimedia.org/T326293
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29569
|
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
|
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md
|
2023-04-07T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29093
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PI Websolution Conditional cart fee plugin <= 1.0.96 versions.
|
https://patchstack.com/database/vulnerability/conditional-extra-fees-for-woocommerce/wordpress-conditional-extra-fees-for-woocommerce-plugin-1-0-96-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-03-31T07:39:14.639Z
|
2023-06-26T05:33:47.271Z
|
2023-06-26T05:33:47.271Z
|
{'Vendor': 'PI Websolution', 'Product': 'Conditional cart fee', 'Versions': 'n/a'}
|
CVE-2023-29206
|
XWiki Commons are technical libraries common to several other top level XWiki projects. There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights. This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script rights.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cmvg-w72j-7phx
|
2023-04-03T13:37:18.455Z
|
2023-04-15T15:41:56.041Z
|
2023-04-15T15:41:56.041Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 3.0-milestone-1, < 14.9-rc-1'}
|
CVE-2023-29656
|
An improper authorization vulnerability in Darktrace mobile app (Android) prior to version 6.0.15 allows disabled and low-privilege users to control "antigena" actions(block/unblock traffic) from the mobile application. This vulnerability could create a "shutdown", blocking all ingress or egress traffic in the entire infrastructure where darktrace agents are deployed.
|
https://darktrace.com
|
2023-04-07T00:00:00
|
2023-07-06T00:00:00
|
2023-07-06T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29343
|
SysInternals Sysmon for Windows Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29343
|
2023-04-04T22:34:18.381Z
|
2023-05-09T17:03:05.703Z
|
2023-12-14T19:06:15.437Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows Sysmon', 'Versions': '1.0'}
|
CVE-2023-29713
|
Cross Site Scripting vulnerability found in Vade Secure Gateway allows a remote attacker to execute arbitrary code via a crafted payload to the GET request after the /css/ directory.
|
https://www.vadesecure.com/en/
|
2023-04-07T00:00:00
|
2023-06-09T00:00:00
|
2023-06-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29085
|
An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP status line.
|
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
|
2023-03-31T00:00:00
|
2023-04-14T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29986
|
spring-boot-actuator-logview 0.2.13 allows Directory Traversal to sibling directories via LogViewEndpoint.view.
|
https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33
|
2023-04-07T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29314
|
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/indesign/apsb23-38.html
|
2023-04-04T20:46:42.581Z
|
2023-07-12T15:56:54.814Z
|
2023-07-12T15:56:54.814Z
|
{'Vendor': 'Adobe', 'Product': 'InDesign', 'Versions': '0'}
|
CVE-2023-29197
|
guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.
|
https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
|
2023-04-03T13:37:18.453Z
|
2023-04-17T21:08:46.675Z
|
2023-04-17T21:08:46.675Z
|
{'Vendor': 'guzzle', 'Product': 'psr7', 'Versions': '< 1.9.1, >= 2.0.0, < 2.4.5'}
|
CVE-2023-29178
|
A access of uninitialized pointer vulnerability [CWE-824] in Fortinet FortiProxy version 7.2.0 through 7.2.3 and before 7.0.9 and FortiOS version 7.2.0 through 7.2.4 and before 7.0.11 allows an authenticated attacker to repetitively crash the httpsd process via crafted HTTP or HTTPS requests.
|
https://fortiguard.com/psirt/FG-IR-23-095
|
2023-04-03T08:47:30.452Z
|
2023-06-13T08:41:48.959Z
|
2023-06-13T08:41:48.959Z
|
{'Vendor': 'Fortinet', 'Product': 'FortiProxy', 'Versions': '7.2.0, 7.0.0, 2.0.0, 1.2.0, 1.1.0'}
|
CVE-2023-29528
|
XWiki Commons are technical libraries common to several other top level XWiki projects. The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1 and massively improved in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid HTML comments. As a consequence, any code relying on this "restricted" mode for security is vulnerable to JavaScript injection ("cross-site scripting"/XSS). When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. This problem has been patched in XWiki 14.10, HTML comments are now removed in restricted mode and a check has been introduced that ensures that comments don't start with `>`. There are no known workarounds apart from upgrading to a version including the fix.
|
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-x37v-36wv-6v6h
|
2023-04-07T18:56:54.630Z
|
2023-04-20T17:08:50.083Z
|
2023-04-20T17:08:50.083Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-commons', 'Versions': '>= 4.2-milestone-1, < 14.10'}
|
CVE-2023-29363
|
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363
|
2023-04-04T22:34:18.385Z
|
2023-06-13T23:26:06.241Z
|
2024-01-09T17:39:22.611Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
|
CVE-2023-29733
|
The Lock Master app 2.2.4 for Android allows unauthorized apps to modify the values in its SharedPreference files. These files hold data that affects many app functions. Malicious modifications by unauthorized apps can cause security issues, such as functionality manipulation, resulting in a severe escalation of privilege attack.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29733/CVE%20detail.md
|
2023-04-07T00:00:00
|
2023-05-30T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29158
|
SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-01
|
2023-05-25T16:04:56.578Z
|
2023-06-19T20:11:05.873Z
|
2023-06-19T20:11:05.873Z
|
{'Vendor': 'SUBNET Solutions Inc.', 'Product': 'PowerSYSTEM Center', 'Versions': '0'}
|
CVE-2023-29508
|
XWiki Commons are technical libraries common to several other top level XWiki projects. A user without script rights can introduce a stored XSS by using the Live Data macro, if the last author of the content of the page has script rights. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hmm7-6ph9-8jf2
|
2023-04-07T18:56:54.626Z
|
2023-04-16T07:00:43.391Z
|
2023-04-16T07:00:43.391Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 13.10.10, < 13.10.11, >= 14.4, < 14.4.7, >= 14.9, < 14.10'}
|
CVE-2023-29334
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29334
|
2023-04-04T22:34:18.379Z
|
2023-04-28T17:38:03.618Z
|
2023-12-14T19:00:03.689Z
|
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
|
CVE-2023-29621
|
Purchase Order Management v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
|
https://brightsec.com/blog/file-inclusion-vulnerabilities/
|
2023-04-07T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29908
|
H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the SetMobileAPInfoById interface at /goform/aspForm.
|
https://hackmd.io/%400dayResearch/Ski-S20J2
|
2023-04-07T00:00:00
|
2023-04-21T00:00:00
|
2023-04-21T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29322
|
Adobe Experience Manager versions 6.5.16.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-31.html
|
2023-04-04T00:00:00
|
2023-06-15T00:00:00
|
2023-06-15T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Experience Manager', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-29772
|
A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request.
|
https://gitlab.com/donnm/cves/-/blob/master/xss_rtac51u_syslog.md
|
2023-04-07T00:00:00
|
2023-05-02T00:00:00
|
2023-05-02T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29288
|
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A privileged attacker could leverage this vulnerability to modify a minor functionality of another user's data. Exploitation of this issue does not require user interaction.
|
https://helpx.adobe.com/security/products/magento/apsb23-35.html
|
2023-04-04T00:00:00
|
2023-06-15T00:00:00
|
2023-06-15T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
|
CVE-2023-29637
|
Cross Site Scripting (XSS) vulnerability in Qbian61 forum-java, allows attackers to inject arbitrary web script or HTML via editing the article content in the "article editor" page.
|
https://github.com/Qbian61/forum-java/issues/13
|
2023-04-07T00:00:00
|
2023-05-01T00:00:00
|
2023-05-01T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29549
|
Under certain circumstances, a call to the <code>bind</code> function may have resulted in the incorrect realm. This may have created a vulnerability relating to JavaScript-implemented sandboxes such as SES. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
|
https://www.mozilla.org/security/advisories/mfsa2023-13/
|
2023-04-07T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Firefox for Android', 'Versions': 'unspecified'}
|
CVE-2023-29725
|
The BT21 x BTS Wallpaper app 12 for Android allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack.
|
http://bungaakpstudio007.com
|
2023-04-07T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29375
|
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potentially dangerous file upload through the SharePoint connector.
|
https://www.progress.com/sitefinity-cms
|
2023-04-05T00:00:00
|
2023-04-10T00:00:00
|
2023-04-10T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29027
|
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product
that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
|
2023-03-29T20:07:06.686Z
|
2023-05-11T17:47:55.876Z
|
2023-05-11T17:50:27.572Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
|
CVE-2023-29924
|
PowerJob V4.3.1 is vulnerable to Incorrect Access Control that allows for remote code execution.
|
https://github.com/PowerJob/PowerJob/issues/588
|
2023-04-07T00:00:00
|
2023-04-21T00:00:00
|
2023-04-21T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29861
|
An issue found in FLIR-DVTEL version not specified allows a remote attacker to execute arbitrary code via a crafted request to the management page of the device.
|
https://woolly-espadrille-ed5.notion.site/The-FLIR-DVTEL-camera-device-has-a-logic-flaw-vulnerability-363a2158e372440b80a2be739271c6f3
|
2023-04-07T00:00:00
|
2023-05-15T00:00:00
|
2023-05-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29498
|
Improper restriction of XML external entity reference (XXE) vulnerability exists in FRENIC RHC Loader v1.1.0.3 and earlier. If a user opens a specially crafted project file, sensitive information on the system where the affected product is installed may be disclosed.
|
https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en
|
2023-05-11T00:00:00
|
2023-06-13T00:00:00
|
2023-06-13T00:00:00
|
{'Vendor': 'FUJI ELECTRIC CO., LTD.', 'Product': 'FRENIC RHC Loader', 'Versions': 'v1.1.0.3 and earlier'}
|
CVE-2023-29532
|
A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.
*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1806394
|
2023-04-07T19:49:37.876Z
|
2023-06-19T09:58:03.748Z
|
2023-06-19T09:59:42.627Z
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-29973
|
Pfsense CE version 2.6.0 is vulnerable to No rate limit which can lead to an attacker creating multiple malicious users in firewall.
|
https://www.esecforte.com/cve-2023-29973-no-rate-limit/
|
2023-04-07T00:00:00
|
2023-10-24T00:00:00
|
2023-10-24T22:13:18.640509
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29420
|
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is a crash caused by an invalid memmove in bz3_decode_block.
|
https://github.com/kspalaiologos/bzip3/issues/92
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29836
|
Cross Site Scripting vulnerability found in Exelysis Unified Communication Solutions (EUCS) v.1.0 allows a remote attacker to execute arbitrary code via the Username parameter of the eucsAdmin login form.
|
https://github.com/IthacaLabs/Exelysis
|
2023-04-07T00:00:00
|
2023-04-26T00:00:00
|
2023-04-26T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29359
|
GDI Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29359
|
2023-04-04T22:34:18.384Z
|
2023-06-13T23:26:03.938Z
|
2024-01-09T17:39:20.351Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
|
CVE-2023-29709
|
An issue was discovered in /cgi-bin/login_rj.cgi in Wildix WSG24POE version 103SP7D190822, allows attackers to bypass authentication.
|
https://holistic-height-e6d.notion.site/Wildix-WSG24POE-Logical-vulnerability-7780c24cc25b40dd9d2830f7b21f04a3
|
2023-04-07T00:00:00
|
2023-06-22T00:00:00
|
2023-06-22T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29066
|
The FACSChorus software does not properly assign data access privileges for operating system user accounts. A non-administrative OS account can modify information stored in the local application data folders.
|
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
|
2023-03-30T21:10:17.527Z
|
2023-11-28T20:36:13.494Z
|
2023-11-28T20:36:13.494Z
|
{'Vendor': 'Becton, Dickinson and Company (BD)', 'Product': 'FACSChorus', 'Versions': '5.0'}
|
CVE-2023-29436
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Flyn San IFrame Shortcode plugin <= 1.0.5 versions.
|
https://patchstack.com/database/vulnerability/flynsarmy-iframe-shortcode/wordpress-iframe-shortcode-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-04-06T09:42:53.269Z
|
2023-06-26T10:46:07.399Z
|
2023-06-26T10:46:07.399Z
|
{'Vendor': 'Flyn San', 'Product': 'IFrame Shortcode', 'Versions': 'n/a'}
|
CVE-2023-29820
|
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to access sensitive information via the EXE installer. NOTE: the vendor's perspective is that this is not a separate vulnerability relative to CVE-2023-29818 and CVE-2023-29819.
|
http://secureanywhere.com
|
2023-04-07T00:00:00
|
2023-05-12T00:00:00
|
2023-05-27T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29573
|
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component.
|
https://github.com/axiomatic-systems/Bento4/issues/840
|
2023-04-07T00:00:00
|
2023-04-13T00:00:00
|
2023-04-13T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29089
|
An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding SIP multipart messages.
|
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
|
2023-03-31T00:00:00
|
2023-04-14T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29932
|
llvm-project commit fdbc55a5 was discovered to contain a segmentation fault via the component mlir::IROperand<mlir::OpOperand.
|
https://github.com/llvm/llvm-project/issues/58745
|
2023-04-07T00:00:00
|
2023-05-05T00:00:00
|
2023-05-05T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29461
|
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap.
potentially resulting in a complete loss of confidentiality, integrity, and availability.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391
|
2023-04-06T18:42:59.008Z
|
2023-05-09T13:26:24.146Z
|
2023-05-09T13:26:24.146Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'Arena Simulation', 'Versions': '16.00'}
|
CVE-2023-29031
|
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
|
2023-03-29T20:07:06.687Z
|
2023-05-11T17:38:06.128Z
|
2023-10-24T11:49:01.492Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
|
CVE-2023-29524
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute anything with the right of the Scheduler Application sheet page. A user without script or programming rights, edit your user profile with the object editor and add a new object of type XWiki.SchedulerJobClass, In "Job Script", groovy code can be added and will be executed in the server context on viewing. This has been patched in XWiki 14.10.3 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this issue.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fc42-5w56-qw7h
|
2023-04-07T18:56:54.629Z
|
2023-04-18T23:04:48.087Z
|
2023-04-18T23:04:48.087Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.10.3'}
|
CVE-2023-29318
|
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/indesign/apsb23-38.html
|
2023-04-04T20:46:42.582Z
|
2023-07-12T15:56:52.301Z
|
2023-07-12T15:56:52.301Z
|
{'Vendor': 'Adobe', 'Product': 'InDesign', 'Versions': '0'}
|
CVE-2023-29748
|
Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service.
|
https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk
|
2023-04-07T00:00:00
|
2023-06-01T00:00:00
|
2023-06-01T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29319
|
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/indesign/apsb23-38.html
|
2023-04-04T20:46:42.583Z
|
2023-07-12T15:56:46.502Z
|
2023-07-12T15:56:46.502Z
|
{'Vendor': 'Adobe', 'Product': 'InDesign', 'Versions': '0'}
|
CVE-2023-29749
|
An issue found in Yandex Navigator v.6.60 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the SharedPreference files.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29749/CVE%20detailed.md
|
2023-04-07T00:00:00
|
2023-06-09T00:00:00
|
2023-06-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29933
|
llvm-project commit bd456297 was discovered to contain a segmentation fault via the component mlir::Block::getArgument.
|
https://github.com/llvm/llvm-project/issues/59442
|
2023-04-07T00:00:00
|
2023-05-05T00:00:00
|
2023-05-05T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29460
|
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow potentially resulting in a complete loss of confidentiality, integrity, and availability.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391
|
2023-04-06T18:42:59.008Z
|
2023-05-09T13:19:43.980Z
|
2023-05-09T13:19:43.980Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'Arena Simulation', 'Versions': '16.00'}
|
CVE-2023-29030
|
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
|
2023-03-29T20:07:06.686Z
|
2023-05-11T17:41:17.097Z
|
2023-10-24T11:48:37.420Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
|
CVE-2023-29525
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Affected versions of xwiki are subject to code injection in the `since` parameter of the `/xwiki/bin/view/XWiki/Notifications/Code/LegacyNotificationAdministration` endpoint. This provides an XWiki syntax injection attack via the since-parameter, allowing privilege escalation from view to programming rights and subsequent code execution privilege. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8 and 14.10.3. Users are advised to upgrade. Users unable to upgrade may modify the page `XWiki.Notifications.Code.LegacyNotificationAdministration` to add the missing escaping. For versions < 14.6-rc-1 a workaround is to modify the file `<xwikiwebapp>/templates/distribution/eventmigration.wiki` to add the missing escaping.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgg7-w2rj-58cj
|
2023-04-07T18:56:54.629Z
|
2023-04-18T23:01:46.239Z
|
2023-04-18T23:01:46.239Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.4.8, >= 14.5.0, < 14.10.3.'}
|
CVE-2023-29175
|
An improper certificate validation vulnerability [CWE-295] in FortiOS 6.2 all versions, 6.4 all versions, 7.0.0 through 7.0.10, 7.2.0 and FortiProxy 1.2 all versions, 2.0 all versions, 7.0.0 through 7.0.9, 7.2.0 through 7.2.3 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the vulnerable device and the remote FortiGuard's map server.
|
https://fortiguard.com/psirt/FG-IR-22-468
|
2023-04-03T08:47:30.451Z
|
2023-06-13T08:41:48.433Z
|
2023-06-13T08:41:48.433Z
|
{'Vendor': 'Fortinet', 'Product': 'FortiProxy', 'Versions': '7.2.0, 7.0.0, 2.0.0'}
|
CVE-2023-29067
|
A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0005
|
2023-03-30T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Autodesk AutoCAD', 'Versions': '2023'}
|
CVE-2023-29437
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Steven A. Zahm Connections Business Directory plugin <= 10.4.36 versions.
|
https://patchstack.com/database/vulnerability/connections/wordpress-connections-business-directory-plugin-10-4-36-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-04-06T12:18:41.791Z
|
2023-06-26T12:00:29.999Z
|
2023-06-26T12:00:29.999Z
|
{'Vendor': 'Steven A. Zahm', 'Product': 'Connections Business Directory', 'Versions': 'n/a'}
|
CVE-2023-29088
|
An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Session-Expires header.
|
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
|
2023-03-31T00:00:00
|
2023-04-14T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29358
|
Windows GDI Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29358
|
2023-04-04T22:34:18.384Z
|
2023-06-13T23:26:03.413Z
|
2024-01-09T17:39:19.839Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
|
CVE-2023-29708
|
An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload.
|
https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297
|
2023-04-07T00:00:00
|
2023-06-22T00:00:00
|
2023-06-22T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29421
|
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an out-of-bounds write in bz3_decode_block.
|
https://github.com/kspalaiologos/bzip3/compare/1.2.2...1.2.3
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29837
|
Cross Site Scripting vulnerability found in Exelysis Unified Communication Solution (EUCS) v.1.0 allows a remote attacker to gain privileges via the URL path of the eucsAdmin login web page.
|
https://github.com/IthacaLabs/Exelysis
|
2023-04-07T00:00:00
|
2023-05-17T00:00:00
|
2023-05-17T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29026
|
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product
that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
|
2023-03-29T20:07:06.686Z
|
2023-05-11T17:47:11.276Z
|
2023-05-11T17:48:32.552Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
|
CVE-2023-29860
|
An insecure permissions in /Taier/API/tenant/listTenant interface in DTStack Taier 1.3.0 allows attackers to view sensitive information via the getCookie method.
|
https://github.com/DTStack/Taier/issues/1003
|
2023-04-07T00:00:00
|
2023-06-23T00:00:00
|
2023-06-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.