CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-29299
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Untrusted Search Path vulnerability that could lead to Application denial-of-service. An attacker could leverage this vulnerability if the default PowerShell Set-ExecutionPolicy is set to Unrestricted, making the attack complexity high. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-04-04T20:46:42.577Z
2023-08-10T13:17:48.014Z
2023-08-10T13:17:48.014Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-29333
Microsoft Access Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29333
2023-04-04T22:34:18.379Z
2023-05-09T17:03:09.930Z
2023-12-14T19:06:19.539Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019', 'Versions': '19.0.0'}
CVE-2023-29626
Yoga Class Registration System 1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at /admin/login.php.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/2023/Yoga-Class-Registration%20-1.0-2023%20-%20Multiple-SQLi
2023-04-07T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29276
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html
2023-04-04T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Painter', 'Versions': 'unspecified, unspecified'}
CVE-2023-29919
SolarView Compact <= 6.0 is vulnerable to Insecure Permissions. Any file on the server can be read or modified because texteditor.php is not restricted.
https://www.solarview.io/
2023-04-07T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29364
Windows Authentication Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29364
2023-04-04T22:34:18.385Z
2023-06-13T23:26:06.772Z
2024-01-09T17:39:23.156Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-29734
An issue found in edjing Mix v.7.09.01 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the database.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29734/CVE%20detail.md
2023-04-07T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29108
The IP filter in ABAP Platform and SAP Web Dispatcher - versions WEBDISP 7.85, 7.89, KERNEL 7.85, 7.89, 7.91, may be vulnerable by erroneous IP netmask handling. This may enable access to backend applications from unwanted sources.
https://launchpad.support.sap.com/#/notes/3315312
2023-03-31T10:01:53.359Z
2023-04-11T02:56:58.666Z
2023-04-11T02:56:58.666Z
{'Vendor': 'SAP', 'Product': 'ABAP Platform and SAP Web Dispatcher', 'Versions': 'WEBDISP 7.85, WEBDISP 7.89, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91'}
CVE-2023-29380
Warpinator before 1.6.0 allows remote file deletion via directory traversal in top_dir_basenames.
https://github.com/linuxmint/warpinator/compare/1.4.5...1.6.0
2023-04-05T00:00:00
2023-05-28T00:00:00
2023-05-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29800
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the FileName parameter in the UploadFirmwareFile function.
https://sore-pail-31b.notion.site/Command-Injection-5-e88b72309a3c4e20b7469b3679c0c7d9
2023-04-07T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29103
A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC712 (All versions < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions < V2.1). The affected device uses a hard-coded password to protect the diagnostic files. This could allow an authenticated attacker to access protected data.
https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf
2023-03-31T08:06:09.775Z
2023-05-09T11:51:29.860Z
2023-05-09T11:51:29.860Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC Cloud Connect 7 CC712', 'Versions': 'All versions >= V2.0 < V2.1'}
CVE-2023-29046
Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were logged. Some connections use user-controlled endpoints, which could be malicious and attempt to keep the connection open for an extended period of time. As a result users were able to trigger large amount of egress network connections, possibly exhausting network pool resources and lock up legitimate requests. A new mechanism has been introduced to cancel external connections that might access user-controlled endpoints. No publicly available exploits are known.
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6243_7.10.6_2023-08-01.pdf
2023-03-30T09:34:25.188Z
2023-11-02T13:01:39.521Z
2024-01-12T07:08:22.530Z
{'Vendor': 'OX Software GmbH', 'Product': 'OX App Suite', 'Versions': '0, 0'}
CVE-2023-29416
An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A bz3_decode_block out-of-bounds write can occur with a crafted archive because bzip3 does not follow the required procedure for interacting with libsais.
https://github.com/kspalaiologos/bzip3/compare/1.2.3...1.3.0
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29338
Visual Studio Code Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29338
2023-04-04T22:34:18.380Z
2023-05-09T17:03:04.075Z
2023-12-14T19:06:13.882Z
{'Vendor': 'Microsoft', 'Product': 'Visual Studio Code', 'Versions': '1.0.0'}
CVE-2023-29292
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. An admin-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/magento/apsb23-35.html
2023-04-04T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
CVE-2023-29504
Uncontrolled search path element in some Intel(R) RealSense(TM) Dynamic Calibration software before version 2.13.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00871.html
2023-04-13T03:00:03.801Z
2023-11-14T19:05:11.749Z
2023-11-14T19:05:11.749Z
{'Vendor': 'n/a', 'Product': 'Intel(R) RealSense(TM) Dynamic Calibration software', 'Versions': 'before version 2.13.1.0'}
CVE-2023-29154
SQL injection vulnerability exists in the CONPROSYS HMI System (CHS) versions prior to 3.5.3. A user who can access the affected product with an administrative privilege may execute an arbitrary SQL command via specially crafted input to the query setting page.
https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf
2023-05-11T00:00:00
2023-06-01T00:00:00
2023-06-01T00:00:00
{'Vendor': 'Contec Co., Ltd.', 'Product': 'CONPROSYS HMI System (CHS)', 'Versions': 'versions prior to 3.5.3'}
CVE-2023-29857
An issue in Teslamate v1.27.1 allows attackers to obtain sensitive information via directly accessing the teslamate link.
http://leegt.synology.me:4000/
2023-04-07T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29912
H3C Magic R200 R200V100R004 was discovered to contain a stack overflow via the DelvsList interface at /goform/aspForm.
https://hackmd.io/%400dayResearch/S1TusiR1n
2023-04-07T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29441
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Robert Heller WebLibrarian plugin <= 3.5.8.1 versions.
https://patchstack.com/database/vulnerability/weblibrarian/wordpress-weblibrarian-plugin-3-5-8-1-multiple-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-06T12:18:41.792Z
2023-09-06T07:58:12.441Z
2023-09-06T07:58:12.441Z
{'Vendor': 'Robert Heller', 'Product': 'WebLibrarian', 'Versions': 'n/a'}
CVE-2023-29011
Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\etc\connectrc`. Since `C:\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by other users on the same multi-user machine. The problem has been patched in Git for Windows v2.40.1. As a workaround, create the folder `etc` on all drives where Git commands are run, and remove read/write access from those folders. Alternatively, watch out for malicious `<drive>:\etc\connectrc` files on multi-user machines.
https://github.com/git-for-windows/git/security/advisories/GHSA-g4fv-xjqw-q7jm
2023-03-29T17:39:16.143Z
2023-04-25T20:40:30.247Z
2023-04-25T20:40:30.247Z
{'Vendor': 'git-for-windows', 'Product': 'git', 'Versions': '< 2.40.1'}
CVE-2023-29284
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html
2023-04-04T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Painter', 'Versions': 'unspecified, unspecified'}
CVE-2023-29791
kodbox <= 1.37 is vulnerable to Cross Site Scripting (XSS) via the debug information.
https://blog.mo60.cn/index.php/archives/kodbox-xss.html
2023-04-07T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29512
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the information loaded from attachments in `imported.vm`, `importinline.vm`, and `packagelist.vm`. This page is installed by default. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hg5x-3w3x-7g96
2023-04-07T18:56:54.626Z
2023-04-18T23:44:25.981Z
2023-04-18T23:44:25.981Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 13.10.11, >= 14.0.0, < 14.4.8, >= 14.5.0, < 14.10.1'}
CVE-2023-29007
Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.
https://github.com/git/git/security/advisories/GHSA-v48j-4xgg-4844
2023-03-29T17:39:16.142Z
2023-04-25T20:09:52.182Z
2023-04-25T20:09:52.182Z
{'Vendor': 'git', 'Product': 'git', 'Versions': '< 2.30.9, >= 2.31.0, < 2.31.8, >= 2.32.0, < 2.32.7, >= 2.33.0, < 2.33.8, >= 2.34.0, < 2.34.8, >= 2.35.0, < 2.35.8, >= 2.36.0, < 2.36.6, >= 2.37.0, < 2.37.7, >= 2.38.0, < 2.38.5, >= 2.39.0, < 2.39.3, >= 2.40.0, < 2.40.1'}
CVE-2023-29457
Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
https://support.zabbix.com/browse/ZBX-22988
2023-04-06T18:04:44.892Z
2023-07-13T09:35:24.594Z
2023-07-13T09:35:24.594Z
{'Vendor': 'Zabbix', 'Product': 'Zabbix', 'Versions': '4.0.0, 5.0.0, 6.0.0'}
CVE-2023-29545
Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user. *This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
https://bugzilla.mozilla.org/show_bug.cgi?id=1823077
2023-04-07T19:49:37.878Z
2023-06-19T10:07:39.855Z
2023-06-19T10:08:27.735Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-29400
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
https://go.dev/issue/59722
2023-04-05T19:36:35.042Z
2023-05-11T15:29:24.874Z
2023-06-12T19:08:27.799Z
{'Vendor': 'Go standard library', 'Product': 'html/template', 'Versions': '0, 1.20.0-0'}
CVE-2023-29050
The optional "LDAP contacts provider" could be abused by privileged users to inject LDAP filter strings that allow to access content outside of the intended hierarchy. Unauthorized users could break confidentiality of information in the directory and potentially cause high load on the directory server, leading to denial of service. Encoding has been added for user-provided fragments that are used when constructing the LDAP query. No publicly available exploits are known.
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf
2023-03-30T09:34:25.189Z
2024-01-08T08:51:40.489Z
2024-01-12T07:07:02.708Z
{'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0, 0'}
CVE-2023-29247
Task instance details page in the UI is vulnerable to a stored XSS.This issue affects Apache Airflow: before 2.6.0.
https://github.com/apache/airflow/pull/30447
2023-04-04T17:08:46.277Z
2023-05-08T09:01:40.033Z
2023-05-08T09:01:40.033Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow', 'Versions': '0'}
CVE-2023-29302
Adobe Experience Manager versions 6.5.16.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-31.html
2023-04-04T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'Adobe', 'Product': 'Experience Manager', 'Versions': 'unspecified, unspecified'}
CVE-2023-29752
An issue found in Facemoji Emoji Keyboard v.2.9.1.2 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the component.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29752/CVE%20detailed.md
2023-04-07T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29494
Improper input validation in BIOS firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00892.html
2023-05-05T03:00:03.707Z
2023-08-11T02:37:19.124Z
2023-08-11T02:37:19.124Z
{'Vendor': 'n/a', 'Product': 'Intel(R) NUCs', 'Versions': 'See references'}
CVE-2023-29210
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the notification preferences macros can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the user parameter of the macro that provide the notification filters. These macros are used in the user profiles and thus installed by default in XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p9mj-v5mf-m82x
2023-04-03T13:37:18.455Z
2023-04-15T16:20:29.342Z
2023-04-15T16:20:29.342Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 13.2-rc-1, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'}
CVE-2023-29355
DHCP Server Service Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29355
2023-04-04T22:34:18.384Z
2023-06-13T23:26:02.297Z
2024-01-09T17:39:18.753Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-29586
Code Sector TeraCopy 3.9.7 does not perform proper access validation on the source folder during a copy operation. This leads to Arbitrary File Read by allowing any user to copy any directory in the system to a directory they control.
https://packetstormsecurity.com/files/143984/TeraCopyService-3.1-Unquoted-Service-Path-Privilege-Escalation.html
2023-04-07T00:00:00
2023-04-19T00:00:00
2023-06-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29139
An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. When a user with checkuserlog permissions makes many CheckUserLog API requests in some configurations, denial of service can occur (RequestTimeoutException or upstream request timeout).
https://phabricator.wikimedia.org/T326293
2023-03-31T00:00:00
2023-03-31T00:00:00
2023-03-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29569
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_ffi/readme.md
2023-04-07T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29093
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PI Websolution Conditional cart fee plugin <= 1.0.96 versions.
https://patchstack.com/database/vulnerability/conditional-extra-fees-for-woocommerce/wordpress-conditional-extra-fees-for-woocommerce-plugin-1-0-96-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-31T07:39:14.639Z
2023-06-26T05:33:47.271Z
2023-06-26T05:33:47.271Z
{'Vendor': 'PI Websolution', 'Product': 'Conditional cart fee', 'Versions': 'n/a'}
CVE-2023-29206
XWiki Commons are technical libraries common to several other top level XWiki projects. There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights. This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script rights.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cmvg-w72j-7phx
2023-04-03T13:37:18.455Z
2023-04-15T15:41:56.041Z
2023-04-15T15:41:56.041Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 3.0-milestone-1, < 14.9-rc-1'}
CVE-2023-29656
An improper authorization vulnerability in Darktrace mobile app (Android) prior to version 6.0.15 allows disabled and low-privilege users to control "antigena" actions(block/unblock traffic) from the mobile application. This vulnerability could create a "shutdown", blocking all ingress or egress traffic in the entire infrastructure where darktrace agents are deployed.
https://darktrace.com
2023-04-07T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29343
SysInternals Sysmon for Windows Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29343
2023-04-04T22:34:18.381Z
2023-05-09T17:03:05.703Z
2023-12-14T19:06:15.437Z
{'Vendor': 'Microsoft', 'Product': 'Windows Sysmon', 'Versions': '1.0'}
CVE-2023-29713
Cross Site Scripting vulnerability found in Vade Secure Gateway allows a remote attacker to execute arbitrary code via a crafted payload to the GET request after the /css/ directory.
https://www.vadesecure.com/en/
2023-04-07T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29085
An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP status line.
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
2023-03-31T00:00:00
2023-04-14T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29986
spring-boot-actuator-logview 0.2.13 allows Directory Traversal to sibling directories via LogViewEndpoint.view.
https://github.com/lukashinsch/spring-boot-actuator-logview/issues/33
2023-04-07T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29314
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-38.html
2023-04-04T20:46:42.581Z
2023-07-12T15:56:54.814Z
2023-07-12T15:56:54.814Z
{'Vendor': 'Adobe', 'Product': 'InDesign', 'Versions': '0'}
CVE-2023-29197
guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.
https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
2023-04-03T13:37:18.453Z
2023-04-17T21:08:46.675Z
2023-04-17T21:08:46.675Z
{'Vendor': 'guzzle', 'Product': 'psr7', 'Versions': '< 1.9.1, >= 2.0.0, < 2.4.5'}
CVE-2023-29178
A access of uninitialized pointer vulnerability [CWE-824] in Fortinet FortiProxy version 7.2.0 through 7.2.3 and before 7.0.9 and FortiOS version 7.2.0 through 7.2.4 and before 7.0.11 allows an authenticated attacker to repetitively crash the httpsd process via crafted HTTP or HTTPS requests.
https://fortiguard.com/psirt/FG-IR-23-095
2023-04-03T08:47:30.452Z
2023-06-13T08:41:48.959Z
2023-06-13T08:41:48.959Z
{'Vendor': 'Fortinet', 'Product': 'FortiProxy', 'Versions': '7.2.0, 7.0.0, 2.0.0, 1.2.0, 1.1.0'}
CVE-2023-29528
XWiki Commons are technical libraries common to several other top level XWiki projects. The "restricted" mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1 and massively improved in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid HTML comments. As a consequence, any code relying on this "restricted" mode for security is vulnerable to JavaScript injection ("cross-site scripting"/XSS). When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. This problem has been patched in XWiki 14.10, HTML comments are now removed in restricted mode and a check has been introduced that ensures that comments don't start with `>`. There are no known workarounds apart from upgrading to a version including the fix.
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-x37v-36wv-6v6h
2023-04-07T18:56:54.630Z
2023-04-20T17:08:50.083Z
2023-04-20T17:08:50.083Z
{'Vendor': 'xwiki', 'Product': 'xwiki-commons', 'Versions': '>= 4.2-milestone-1, < 14.10'}
CVE-2023-29363
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363
2023-04-04T22:34:18.385Z
2023-06-13T23:26:06.241Z
2024-01-09T17:39:22.611Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-29733
The Lock Master app 2.2.4 for Android allows unauthorized apps to modify the values in its SharedPreference files. These files hold data that affects many app functions. Malicious modifications by unauthorized apps can cause security issues, such as functionality manipulation, resulting in a severe escalation of privilege attack.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29733/CVE%20detail.md
2023-04-07T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29158
SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-01
2023-05-25T16:04:56.578Z
2023-06-19T20:11:05.873Z
2023-06-19T20:11:05.873Z
{'Vendor': 'SUBNET Solutions Inc.', 'Product': 'PowerSYSTEM Center', 'Versions': '0'}
CVE-2023-29508
XWiki Commons are technical libraries common to several other top level XWiki projects. A user without script rights can introduce a stored XSS by using the Live Data macro, if the last author of the content of the page has script rights. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-hmm7-6ph9-8jf2
2023-04-07T18:56:54.626Z
2023-04-16T07:00:43.391Z
2023-04-16T07:00:43.391Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 13.10.10, < 13.10.11, >= 14.4, < 14.4.7, >= 14.9, < 14.10'}
CVE-2023-29334
Microsoft Edge (Chromium-based) Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29334
2023-04-04T22:34:18.379Z
2023-04-28T17:38:03.618Z
2023-12-14T19:00:03.689Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-29621
Purchase Order Management v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server.
https://brightsec.com/blog/file-inclusion-vulnerabilities/
2023-04-07T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29908
H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the SetMobileAPInfoById interface at /goform/aspForm.
https://hackmd.io/%400dayResearch/Ski-S20J2
2023-04-07T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29322
Adobe Experience Manager versions 6.5.16.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-31.html
2023-04-04T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'Adobe', 'Product': 'Experience Manager', 'Versions': 'unspecified, unspecified'}
CVE-2023-29772
A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request.
https://gitlab.com/donnm/cves/-/blob/master/xss_rtac51u_syslog.md
2023-04-07T00:00:00
2023-05-02T00:00:00
2023-05-02T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29288
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A privileged attacker could leverage this vulnerability to modify a minor functionality of another user's data. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/magento/apsb23-35.html
2023-04-04T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
CVE-2023-29637
Cross Site Scripting (XSS) vulnerability in Qbian61 forum-java, allows attackers to inject arbitrary web script or HTML via editing the article content in the "article editor" page.
https://github.com/Qbian61/forum-java/issues/13
2023-04-07T00:00:00
2023-05-01T00:00:00
2023-05-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29549
Under certain circumstances, a call to the <code>bind</code> function may have resulted in the incorrect realm. This may have created a vulnerability relating to JavaScript-implemented sandboxes such as SES. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
https://www.mozilla.org/security/advisories/mfsa2023-13/
2023-04-07T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox for Android', 'Versions': 'unspecified'}
CVE-2023-29725
The BT21 x BTS Wallpaper app 12 for Android allows unauthorized applications to actively request permission to insert data into the database that records information about a user's personal preferences and will be loaded into memory to be read and used when the application is opened. By injecting data, the attacker can force the application to load malicious image URLs and display them in the UI. As the amount of data increases, it will eventually cause the application to trigger an OOM error and crash, resulting in a persistent denial of service attack.
http://bungaakpstudio007.com
2023-04-07T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29375
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potentially dangerous file upload through the SharePoint connector.
https://www.progress.com/sitefinity-cms
2023-04-05T00:00:00
2023-04-10T00:00:00
2023-04-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29027
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
2023-03-29T20:07:06.686Z
2023-05-11T17:47:55.876Z
2023-05-11T17:50:27.572Z
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
CVE-2023-29924
PowerJob V4.3.1 is vulnerable to Incorrect Access Control that allows for remote code execution.
https://github.com/PowerJob/PowerJob/issues/588
2023-04-07T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29861
An issue found in FLIR-DVTEL version not specified allows a remote attacker to execute arbitrary code via a crafted request to the management page of the device.
https://woolly-espadrille-ed5.notion.site/The-FLIR-DVTEL-camera-device-has-a-logic-flaw-vulnerability-363a2158e372440b80a2be739271c6f3
2023-04-07T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29498
Improper restriction of XML external entity reference (XXE) vulnerability exists in FRENIC RHC Loader v1.1.0.3 and earlier. If a user opens a specially crafted project file, sensitive information on the system where the affected product is installed may be disclosed.
https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en
2023-05-11T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'FUJI ELECTRIC CO., LTD.', 'Product': 'FRENIC RHC Loader', 'Versions': 'v1.1.0.3 and earlier'}
CVE-2023-29532
A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
https://bugzilla.mozilla.org/show_bug.cgi?id=1806394
2023-04-07T19:49:37.876Z
2023-06-19T09:58:03.748Z
2023-06-19T09:59:42.627Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-29973
Pfsense CE version 2.6.0 is vulnerable to No rate limit which can lead to an attacker creating multiple malicious users in firewall.
https://www.esecforte.com/cve-2023-29973-no-rate-limit/
2023-04-07T00:00:00
2023-10-24T00:00:00
2023-10-24T22:13:18.640509
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29420
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is a crash caused by an invalid memmove in bz3_decode_block.
https://github.com/kspalaiologos/bzip3/issues/92
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29836
Cross Site Scripting vulnerability found in Exelysis Unified Communication Solutions (EUCS) v.1.0 allows a remote attacker to execute arbitrary code via the Username parameter of the eucsAdmin login form.
https://github.com/IthacaLabs/Exelysis
2023-04-07T00:00:00
2023-04-26T00:00:00
2023-04-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29359
GDI Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29359
2023-04-04T22:34:18.384Z
2023-06-13T23:26:03.938Z
2024-01-09T17:39:20.351Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-29709
An issue was discovered in /cgi-bin/login_rj.cgi in Wildix WSG24POE version 103SP7D190822, allows attackers to bypass authentication.
https://holistic-height-e6d.notion.site/Wildix-WSG24POE-Logical-vulnerability-7780c24cc25b40dd9d2830f7b21f04a3
2023-04-07T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29066
The FACSChorus software does not properly assign data access privileges for operating system user accounts. A non-administrative OS account can modify information stored in the local application data folders.
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
2023-03-30T21:10:17.527Z
2023-11-28T20:36:13.494Z
2023-11-28T20:36:13.494Z
{'Vendor': 'Becton, Dickinson and Company (BD)', 'Product': 'FACSChorus', 'Versions': '5.0'}
CVE-2023-29436
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Flyn San IFrame Shortcode plugin <= 1.0.5 versions.
https://patchstack.com/database/vulnerability/flynsarmy-iframe-shortcode/wordpress-iframe-shortcode-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-06T09:42:53.269Z
2023-06-26T10:46:07.399Z
2023-06-26T10:46:07.399Z
{'Vendor': 'Flyn San', 'Product': 'IFrame Shortcode', 'Versions': 'n/a'}
CVE-2023-29820
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to access sensitive information via the EXE installer. NOTE: the vendor's perspective is that this is not a separate vulnerability relative to CVE-2023-29818 and CVE-2023-29819.
http://secureanywhere.com
2023-04-07T00:00:00
2023-05-12T00:00:00
2023-05-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29573
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component.
https://github.com/axiomatic-systems/Bento4/issues/840
2023-04-07T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29089
An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding SIP multipart messages.
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
2023-03-31T00:00:00
2023-04-14T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29932
llvm-project commit fdbc55a5 was discovered to contain a segmentation fault via the component mlir::IROperand<mlir::OpOperand.
https://github.com/llvm/llvm-project/issues/58745
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29461
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap. potentially resulting in a complete loss of confidentiality, integrity, and availability.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391
2023-04-06T18:42:59.008Z
2023-05-09T13:26:24.146Z
2023-05-09T13:26:24.146Z
{'Vendor': 'Rockwell Automation', 'Product': 'Arena Simulation', 'Versions': '16.00'}
CVE-2023-29031
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
2023-03-29T20:07:06.687Z
2023-05-11T17:38:06.128Z
2023-10-24T11:49:01.492Z
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
CVE-2023-29524
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute anything with the right of the Scheduler Application sheet page. A user without script or programming rights, edit your user profile with the object editor and add a new object of type XWiki.SchedulerJobClass, In "Job Script", groovy code can be added and will be executed in the server context on viewing. This has been patched in XWiki 14.10.3 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fc42-5w56-qw7h
2023-04-07T18:56:54.629Z
2023-04-18T23:04:48.087Z
2023-04-18T23:04:48.087Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.10.3'}
CVE-2023-29318
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-38.html
2023-04-04T20:46:42.582Z
2023-07-12T15:56:52.301Z
2023-07-12T15:56:52.301Z
{'Vendor': 'Adobe', 'Product': 'InDesign', 'Versions': '0'}
CVE-2023-29748
Story Saver for Instragram - Video Downloader 1.0.6 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service.
https://apksos.com/app/story.saver.downloader.photo.video.repost.byrk
2023-04-07T00:00:00
2023-06-01T00:00:00
2023-06-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29319
Adobe InDesign versions ID18.3 (and earlier) and ID17.4.1 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/indesign/apsb23-38.html
2023-04-04T20:46:42.583Z
2023-07-12T15:56:46.502Z
2023-07-12T15:56:46.502Z
{'Vendor': 'Adobe', 'Product': 'InDesign', 'Versions': '0'}
CVE-2023-29749
An issue found in Yandex Navigator v.6.60 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the SharedPreference files.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29749/CVE%20detailed.md
2023-04-07T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29933
llvm-project commit bd456297 was discovered to contain a segmentation fault via the component mlir::Block::getArgument.
https://github.com/llvm/llvm-project/issues/59442
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29460
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow potentially resulting in a complete loss of confidentiality, integrity, and availability.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391
2023-04-06T18:42:59.008Z
2023-05-09T13:19:43.980Z
2023-05-09T13:19:43.980Z
{'Vendor': 'Rockwell Automation', 'Product': 'Arena Simulation', 'Versions': '16.00'}
CVE-2023-29030
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
2023-03-29T20:07:06.686Z
2023-05-11T17:41:17.097Z
2023-10-24T11:48:37.420Z
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
CVE-2023-29525
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Affected versions of xwiki are subject to code injection in the `since` parameter of the `/xwiki/bin/view/XWiki/Notifications/Code/LegacyNotificationAdministration` endpoint. This provides an XWiki syntax injection attack via the since-parameter, allowing privilege escalation from view to programming rights and subsequent code execution privilege. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8 and 14.10.3. Users are advised to upgrade. Users unable to upgrade may modify the page `XWiki.Notifications.Code.LegacyNotificationAdministration` to add the missing escaping. For versions < 14.6-rc-1 a workaround is to modify the file `<xwikiwebapp>/templates/distribution/eventmigration.wiki` to add the missing escaping.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgg7-w2rj-58cj
2023-04-07T18:56:54.629Z
2023-04-18T23:01:46.239Z
2023-04-18T23:01:46.239Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '< 14.4.8, >= 14.5.0, < 14.10.3.'}
CVE-2023-29175
An improper certificate validation vulnerability [CWE-295] in FortiOS 6.2 all versions, 6.4 all versions, 7.0.0 through 7.0.10, 7.2.0 and FortiProxy 1.2 all versions, 2.0 all versions, 7.0.0 through 7.0.9, 7.2.0 through 7.2.3 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the vulnerable device and the remote FortiGuard's map server.
https://fortiguard.com/psirt/FG-IR-22-468
2023-04-03T08:47:30.451Z
2023-06-13T08:41:48.433Z
2023-06-13T08:41:48.433Z
{'Vendor': 'Fortinet', 'Product': 'FortiProxy', 'Versions': '7.2.0, 7.0.0, 2.0.0'}
CVE-2023-29067
A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0005
2023-03-30T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'Autodesk AutoCAD', 'Versions': '2023'}
CVE-2023-29437
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Steven A. Zahm Connections Business Directory plugin <= 10.4.36 versions.
https://patchstack.com/database/vulnerability/connections/wordpress-connections-business-directory-plugin-10-4-36-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-06T12:18:41.791Z
2023-06-26T12:00:29.999Z
2023-06-26T12:00:29.999Z
{'Vendor': 'Steven A. Zahm', 'Product': 'Connections Business Directory', 'Versions': 'n/a'}
CVE-2023-29088
An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Session-Expires header.
https://semiconductor.samsung.com/support/quality-support/product-security-updates/
2023-03-31T00:00:00
2023-04-14T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29358
Windows GDI Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29358
2023-04-04T22:34:18.384Z
2023-06-13T23:26:03.413Z
2024-01-09T17:39:19.839Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-29708
An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload.
https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297
2023-04-07T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29421
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an out-of-bounds write in bz3_decode_block.
https://github.com/kspalaiologos/bzip3/compare/1.2.2...1.2.3
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29837
Cross Site Scripting vulnerability found in Exelysis Unified Communication Solution (EUCS) v.1.0 allows a remote attacker to gain privileges via the URL path of the eucsAdmin login web page.
https://github.com/IthacaLabs/Exelysis
2023-04-07T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29026
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
2023-03-29T20:07:06.686Z
2023-05-11T17:47:11.276Z
2023-05-11T17:48:32.552Z
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
CVE-2023-29860
An insecure permissions in /Taier/API/tenant/listTenant interface in DTStack Taier 1.3.0 allows attackers to view sensitive information via the getCookie method.
https://github.com/DTStack/Taier/issues/1003
2023-04-07T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}