CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-29382
|
An issue in Zimbra Collaboration ZCS v.8.8.15 and v.9.0 allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component.
|
https://wiki.zimbra.com/wiki/Security_Center
|
2023-04-05T00:00:00
|
2023-07-06T00:00:00
|
2023-07-06T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29526
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
|
2023-04-07T18:56:54.629Z
|
2023-04-18T22:57:29.722Z
|
2023-04-18T22:57:29.722Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 10.11.1, < 13.10.11, >= 14.0.0, < 14.4.8, >= 14.5.0, < 14.10.3'}
|
CVE-2023-29463
|
The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140590
|
2023-04-06T18:42:59.008Z
|
2023-09-12T16:42:14.868Z
|
2023-09-12T16:42:14.868Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'Pavilion8', 'Versions': '<5.20'}
|
CVE-2023-29199
|
There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.
|
https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985
|
2023-04-03T13:37:18.454Z
|
2023-04-14T18:37:03.847Z
|
2023-04-14T18:37:03.847Z
|
{'Vendor': 'patriksimek', 'Product': 'vm2', 'Versions': '< 3.9.16'}
|
CVE-2023-29033
| null | null |
2023-03-30T00:00:00
| null |
2023-04-02T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-29930
|
An issue was found in Genesys CIC Polycom phone provisioning TFTP Server all version allows a remote attacker to execute arbitrary code via the login crednetials to the TFTP server configuration page.
|
https://github.com/YSaxon/TFTPlunder
|
2023-04-07T00:00:00
|
2023-05-10T00:00:00
|
2023-05-10T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29208
|
XWiki Commons are technical libraries common to several other top level XWiki projects. Rights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked. The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
|
2023-04-03T13:37:18.455Z
|
2023-04-15T15:52:47.431Z
|
2023-04-15T15:52:47.431Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 1.2-milestone-1, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'}
|
CVE-2023-29571
|
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
|
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md
|
2023-04-07T00:00:00
|
2023-04-12T00:00:00
|
2023-04-12T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29064
|
The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts.
|
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
|
2023-03-30T21:10:17.526Z
|
2023-11-28T20:35:30.214Z
|
2023-11-28T20:35:30.214Z
|
{'Vendor': 'Becton, Dickinson and Company (BD)', 'Product': 'FACSChorus', 'Versions': '5.0'}
|
CVE-2023-29434
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in FancyThemes Optin Forms – Simple List Building Plugin for WordPress plugin <= 1.3.1 versions.
|
https://patchstack.com/database/vulnerability/optin-forms/wordpress-optin-forms-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-04-06T09:42:53.268Z
|
2023-06-26T10:08:54.601Z
|
2023-06-26T10:08:54.601Z
|
{'Vendor': 'FancyThemes', 'Product': 'Optin Forms – Simple List Building Plugin for WordPress', 'Versions': 'n/a'}
|
CVE-2023-29137
|
An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. The UserImpactHandler for GrowthExperiments inadvertently returns the timezone preference for arbitrary users, which can be used to de-anonymize users.
|
https://phabricator.wikimedia.org/T328643
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29160
|
Stack-based buffer overflow vulnerability exists in FRENIC RHC Loader v1.1.0.3. If a user opens a specially crafted FNE file, sensitive information on the system where the affected product is installed may be disclosed or arbitrary code may be executed.
|
https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en
|
2023-05-11T00:00:00
|
2023-06-13T00:00:00
|
2023-06-13T00:00:00
|
{'Vendor': 'FUJI ELECTRIC CO., LTD.', 'Product': 'FRENIC RHC Loader', 'Versions': 'v1.1.0.3 and earlier'}
|
CVE-2023-29530
|
Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling `withHeader()`.
|
https://github.com/laminas/laminas-diactoros/security/advisories/GHSA-xv3h-4844-9h36
|
2023-04-07T18:56:54.630Z
|
2023-04-24T19:34:40.294Z
|
2023-04-24T19:34:40.294Z
|
{'Vendor': 'laminas', 'Product': 'laminas-diactoros', 'Versions': '< 2.18.1, = 2.19.0, = 2.20.0, = 2.21.0, = 2.22.0, = 2.23.0, = 2.24.0, = 2.25.0'}
|
CVE-2023-29863
|
Medical Systems Co. Medisys Weblab Products v19.4.03 was discovered to contain a SQL injection vulnerability via the tem:statement parameter in the WSDL files.
|
http://medical.com
|
2023-04-07T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29926
|
PowerJob V4.3.2 has unauthorized interface that causes remote code execution.
|
https://iotaa.cn/articles/63
|
2023-04-07T00:00:00
|
2023-04-20T00:00:00
|
2023-04-20T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29025
|
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product
that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
|
2023-03-29T20:07:06.686Z
|
2023-05-11T17:45:59.896Z
|
2023-10-24T11:44:56.735Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
|
CVE-2023-29475
|
inventory in Atos Unify OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1 before 10 R1.34.4 allows an unauthenticated attacker to run arbitrary commands on the platform operating system and achieve administrative access, aka OSFOURK-23543.
|
https://networks.unify.com/security/advisories/OBSO-2303-01.pdf
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29727
|
The Call Blocker application 6.6.3 for Android allows unauthorized applications to use exposed components to delete data stored in its database that is related to user privacy settings and affects the implementation of the normal functionality of the application. An attacker can use this to cause an escalation of privilege attack.
|
https://play.google.com/store/apps/details?id=com.cuiet.blockCalls
|
2023-04-07T00:00:00
|
2023-05-30T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29818
|
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to bypass protections via the default allowlist feature being stored as non-admin.
|
http://secureanywhere.com
|
2023-04-07T00:00:00
|
2023-05-12T00:00:00
|
2023-05-12T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29635
|
File upload vulnerability in Antabot White-Jotter v0.2.2, allows remote attackers to execute malicious code via the file parameter to function coversUpload.
|
https://github.com/Antabot/White-Jotter/issues/157
|
2023-04-07T00:00:00
|
2023-05-01T00:00:00
|
2023-05-01T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29320
|
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
|
2023-04-04T20:46:42.583Z
|
2023-08-10T13:17:48.806Z
|
2023-08-10T13:17:48.806Z
|
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
|
CVE-2023-29770
|
In Sentrifugo 3.5, the AssetsController::uploadsaveAction function allows an authenticated attacker to upload any file without extension filtering.
|
https://github.com/sapplica/sentrifugo/issues/384
|
2023-04-07T00:00:00
|
2023-11-27T00:00:00
|
2023-11-27T23:19:18.838081
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29459
|
The laola.redbull application through 5.1.9-R for Android exposes the exported activity at.redbullsalzburg.android.AppMode.Default.Splash.SplashActivity, which accepts a data: URI. The target of this URI is subsequently loaded into the application's webview, thus allowing the loading of arbitrary content into the context of the application. This can occur via the fcrbs schema or an explicit intent invocation.
|
https://play.google.com/store/apps/details?id=laola.redbull
|
2023-04-06T00:00:00
|
2023-06-26T00:00:00
|
2023-06-26T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29009
|
baserCMS is a website development framework with WebAPI that runs on PHP8 and CakePHP4. There is a XSS Vulnerability in Favorites Feature to baserCMS. This issue has been patched in version 4.8.0.
|
https://github.com/baserproject/basercms/security/advisories/GHSA-8vqx-prq4-rqrq
|
2023-03-29T17:39:16.143Z
|
2023-10-27T19:30:18.390Z
|
2023-10-27T19:30:18.390Z
|
{'Vendor': 'baserproject', 'Product': 'basercms', 'Versions': '< 4.8.0'}
|
CVE-2023-29623
|
Purchase Order Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the password parameter at /purchase_order/classes/login.php.
|
https://portswigger.net/web-security/cross-site-scripting/reflected
|
2023-04-07T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29273
|
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html
|
2023-04-04T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Substance3D - Painter', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-29766
|
An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause an escalation of Privileges via the database files.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md
|
2023-04-07T00:00:00
|
2023-06-09T00:00:00
|
2023-06-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29336
|
Win32k Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336
|
2023-04-04T22:34:18.380Z
|
2023-05-09T17:03:03.549Z
|
2023-12-14T19:06:13.364Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1507', 'Versions': '10.0.0'}
|
CVE-2023-29361
|
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29361
|
2023-04-04T22:34:18.384Z
|
2023-06-13T23:26:05.123Z
|
2024-01-09T17:39:21.478Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'}
|
CVE-2023-29731
|
SoLive 1.6.14 thru 1.6.20 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29731/CVE%20detail.md
|
2023-04-07T00:00:00
|
2023-05-30T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29418
|
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an xwrite out-of-bounds read.
|
https://github.com/kspalaiologos/bzip3/issues/92
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29048
|
A component for parsing OXMF templates could be abused to execute arbitrary system commands that would be executed as the non-privileged runtime user. Users and attackers could run system commands with limited privilege to gain unauthorized access to confidential information and potentially violate integrity by modifying resources. The template engine has been reconfigured to deny execution of harmful commands on a system level. No publicly available exploits are known.
|
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf
|
2023-03-30T09:34:25.189Z
|
2024-01-08T08:51:31.461Z
|
2024-01-12T07:06:36.093Z
|
{'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0'}
|
CVE-2023-29419
|
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is a bz3_decode_block out-of-bounds read.
|
https://github.com/kspalaiologos/bzip3/issues/92
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29049
|
The "upsell" widget at the portal page could be abused to inject arbitrary script code. Attackers that manage to lure users to a compromised account, or gain temporary access to a legitimate account, could inject script code to gain persistent code execution capabilities under a trusted domain. User input for this widget is now sanitized to avoid malicious content the be processed. No publicly available exploits are known.
|
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf
|
2023-03-30T09:34:25.189Z
|
2024-01-08T08:51:36.992Z
|
2024-01-12T07:06:48.514Z
|
{'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0'}
|
CVE-2023-29360
|
Microsoft Streaming Service Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360
|
2023-04-04T22:34:18.384Z
|
2023-06-13T23:26:04.551Z
|
2024-01-09T17:39:20.924Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
|
CVE-2023-29622
|
Purchase Order Management v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /purchase_order/admin/login.php.
|
https://portswigger.net/web-security/sql-injection
|
2023-04-07T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29767
|
An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause a persistent denial of service via the database files.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29767/CVE%20detailed.md
|
2023-04-07T00:00:00
|
2023-06-09T00:00:00
|
2023-06-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29337
|
NuGet Client Remote Code Execution Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337
|
2023-04-04T22:34:18.380Z
|
2023-06-14T14:52:20.370Z
|
2024-01-09T17:39:15.971Z
|
{'Vendor': 'Microsoft', 'Product': 'NuGet 6.2.3', 'Versions': '6.0.0'}
|
CVE-2023-29458
|
Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.
|
https://support.zabbix.com/browse/ZBX-22989
|
2023-04-06T18:04:44.892Z
|
2023-07-13T09:33:46.403Z
|
2023-07-13T09:33:46.403Z
|
{'Vendor': 'Zabbix', 'Product': 'Zabbix', 'Versions': '5,0,0, 6,0,0, 6.4.0, 7.0.0alpha1'}
|
CVE-2023-29008
|
The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a `+server.js` file, containing endpoint handlers for different HTTP methods.
SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to its users. The protection is implemented at `kit/src/runtime/server/respond.js`. While the implementation does a sufficient job of mitigating common CSRF attacks, the protection can be bypassed in versions prior to 1.15.2 by simply specifying an upper-cased `Content-Type` header value. The browser will not send uppercase characters, but this check does not block all expected CORS requests.
If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts. This may lead to all POST operations requiring authentication being allowed in the following cases: If the target site sets `SameSite=None` on its auth cookie and the user visits a malicious site in a Chromium-based browser; if the target site doesn't set the `SameSite` attribute explicitly and the user visits a malicious site with Firefox/Safari with tracking protections turned off; and/or if the user is visiting a malicious site with a very outdated browser.
SvelteKit 1.15.2 contains a patch for this issue. It is also recommended to explicitly set `SameSite` to a value other than `None` on authentication cookies especially if the upgrade cannot be done in a timely manner.
|
https://github.com/sveltejs/kit/security/advisories/GHSA-gv7g-x59x-wf8f
|
2023-03-29T17:39:16.143Z
|
2023-04-06T16:36:50.972Z
|
2023-04-06T16:36:50.972Z
|
{'Vendor': 'sveltejs', 'Product': 'kit', 'Versions': '< 1.15.2'}
|
CVE-2023-29321
|
Adobe Animate versions 22.0.9 (and earlier) and 23.0.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/animate/apsb23-36.html
|
2023-04-04T00:00:00
|
2023-06-15T00:00:00
|
2023-06-15T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Animate', 'Versions': 'unspecified, unspecified, unspecified'}
|
CVE-2023-29819
|
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to bypass protections via a crafted payload.
|
http://secureanywhere.com
|
2023-04-07T00:00:00
|
2023-05-12T00:00:00
|
2023-05-12T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29726
|
The Call Blocker application 6.6.3 for Android incorrectly opens a key component that an attacker can use to inject large amounts of dirty data into the application's database. When the application starts, it loads the data from the database into memory. Once the attacker injects too much data, the application triggers an OOM error and crashes, resulting in a persistent denial of service.
|
https://play.google.com/store/apps/details?id=com.cuiet.blockCalls
|
2023-04-07T00:00:00
|
2023-05-30T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29376
|
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potential XSS by privileged users in Sitefinity to media libraries.
|
https://www.progress.com/sitefinity-cms
|
2023-04-05T00:00:00
|
2023-04-10T00:00:00
|
2023-04-10T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29161
|
Uncontrolled search path in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
|
2023-05-05T03:00:03.730Z
|
2023-11-14T19:05:01.481Z
|
2023-11-14T19:05:01.481Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) OFU software', 'Versions': 'before version 14.1.31'}
|
CVE-2023-29531
|
An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash.
*This bug only affects Firefox and Thunderbird for macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1794292
|
2023-04-07T19:49:37.876Z
|
2023-06-19T09:48:59.394Z
|
2023-06-19T09:55:05.759Z
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-29862
|
An issue found in Agasio-Camera device version not specified allows a remote attacker to execute arbitrary code via the check and authLevel parameters.
|
https://woolly-espadrille-ed5.notion.site/Agasio-Camera-device-has-a-logic-flaw-vulnerability-d4514e7217c54dd7ac62582b6664aa66
|
2023-04-07T00:00:00
|
2023-05-15T00:00:00
|
2023-05-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29927
|
Versions of Sage 300 through 2022 implement role-based access controls that are only enforced client-side. Low-privileged Sage users, particularly those on a workstation setup in the "Windows Peer-to-Peer Network" or "Client Server Network" Sage 300 configurations, could recover the SQL connection strings being used by Sage 300 and interact directly with the underlying database(s) to create, update, and delete all company records, bypassing the program’s role-based access controls.
|
https://www.controlgap.com/blog/critical-vulnerability-disclosure-sage-300
|
2023-04-07T00:00:00
|
2023-05-16T00:00:00
|
2023-05-16T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29024
|
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product
A cross site scripting vulnerability was discovered that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
|
2023-03-29T20:07:06.686Z
|
2023-05-11T17:42:45.941Z
|
2023-10-24T11:45:16.563Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
|
CVE-2023-29474
|
inventory in Atos Unify OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1 before 10 R1.34.4 allows an unauthenticated attacker to run arbitrary commands on the platform operating system and achieve administrative access, aka OSFOURK-23552.
|
https://networks.unify.com/security/advisories/OBSO-2303-01.pdf
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29835
|
Insecure Permission vulnerability found in Wondershare Dr.Fone v.12.9.6 allows a remote attacker to escalate privileges via the service permission function.
|
https://github.com/IthacaLabs/Wondershare/tree/main/Dr.Fone
|
2023-04-07T00:00:00
|
2023-04-26T00:00:00
|
2023-04-26T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29566
|
huedawn-tesseract 0.3.3 and dawnsparks-node-tesseract 0.4.0 to 0.4.1 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
|
https://www.npmjs.com/package/dawnsparks-node-tesseract
|
2023-04-07T00:00:00
|
2023-04-24T00:00:00
|
2023-04-24T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29423
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PI Websolution Cancel order request / Return order / Repeat Order / Reorder for WooCommerce plugin <= 1.3.2 versions.
|
https://patchstack.com/database/vulnerability/cancel-order-request-woocommerce/wordpress-cancel-order-request-woocommerce-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-04-06T08:15:32.682Z
|
2023-06-26T07:13:11.884Z
|
2023-06-26T07:13:11.884Z
|
{'Vendor': 'PI Websolution', 'Product': 'Cancel order request / Return order / Repeat Order / Reorder for WooCommerce', 'Versions': 'n/a'}
|
CVE-2023-29073
|
A maliciously crafted MODEL file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause a Heap-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018
|
2023-03-30T21:27:50.091Z
|
2023-11-23T03:07:13.478Z
|
2023-11-23T03:07:13.478Z
|
{'Vendor': 'Autodesk', 'Product': 'AutoCAD, Advance Steel and Civil 3D', 'Versions': '2024, 2023'}
|
CVE-2023-29570
|
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
|
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md
|
2023-04-07T00:00:00
|
2023-04-24T00:00:00
|
2023-04-24T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29065
|
The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
|
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
|
2023-03-30T21:10:17.527Z
|
2023-11-28T20:35:59.061Z
|
2023-11-28T20:35:59.061Z
|
{'Vendor': 'Becton, Dickinson and Company (BD)', 'Product': 'FACSChorus', 'Versions': '5.0'}
|
CVE-2023-29435
|
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Zwaply Cryptocurrency All-in-One plugin <= 3.0.19 versions.
|
https://patchstack.com/database/vulnerability/cryptocurrency-prices/wordpress-cryptocurrency-all-in-one-plugin-3-0-19-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-04-06T09:42:53.269Z
|
2023-06-26T11:09:39.269Z
|
2023-06-26T11:09:39.269Z
|
{'Vendor': 'Zwaply', 'Product': 'Cryptocurrency All-in-One', 'Versions': 'n/a'}
|
CVE-2023-29659
|
A Segmentation fault caused by a floating point exception exists in libheif 1.15.1 using crafted heif images via the heif::Fraction::round() function in box.cc, which causes a denial of service.
|
https://github.com/strukturag/libheif/issues/794
|
2023-04-07T00:00:00
|
2023-05-05T00:00:00
|
2023-05-06T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29209
|
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the legacy notification activity macro. This macro is installed by default in XWiki. The vulnerability can be exploited via every wiki page that is editable including the user's profile, but also with just view rights using the HTMLConverter that is part of the CKEditor integration which is bundled with XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q
|
2023-04-03T13:37:18.455Z
|
2023-04-15T16:06:44.752Z
|
2023-04-15T16:06:44.752Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 10.9, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'}
|
CVE-2023-29527
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions a user without script or programming right may edit a user profile (or any other document) with the wiki editor and add groovy script content. Viewing the document after saving it will execute the groovy script in the server context which provides code execution. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3. Users are advised to upgrade. There are no known workarounds for this issue.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgrg-qvpp-9vwr
|
2023-04-07T18:56:54.629Z
|
2023-04-18T22:53:41.740Z
|
2023-04-18T22:53:41.740Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.4.4, < 14.10.3'}
|
CVE-2023-29177
|
Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.
|
https://fortiguard.com/psirt/FG-IR-23-064
|
2023-04-03T08:47:30.452Z
|
2023-11-14T18:07:59.407Z
|
2023-11-14T18:07:59.407Z
|
{'Vendor': 'Fortinet', 'Product': 'FortiDDoS-F', 'Versions': '6.5.0, 6.4.0, 6.3.0, 6.2.0, 6.1.0'}
|
CVE-2023-29462
|
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap.
potentially resulting in a complete loss of confidentiality, integrity, and availability.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391
|
2023-04-06T18:42:59.008Z
|
2023-05-09T13:27:57.411Z
|
2023-10-23T17:32:45.978Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'Arena Simulation', 'Versions': '16.00'}
|
CVE-2023-29198
|
Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps using `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. This issue is only exploitable if an API exposed to the main world via `contextBridge` can return an object or array that contains a javascript object which cannot be serialized, for instance, a canvas rendering context. This would normally result in an exception being thrown `Error: object could not be cloned`. The app side workaround is to ensure that such a case is not possible. Ensure all values returned from a function exposed over the context bridge are supported. This issue has been fixed in versions `25.0.0-alpha.2`, `24.0.1`, `23.2.3`, and `22.3.6`.
|
https://github.com/electron/electron/security/advisories/GHSA-p7v2-p9m8-qqg7
|
2023-04-03T13:37:18.454Z
|
2023-09-06T20:13:56.313Z
|
2023-09-06T20:13:56.313Z
|
{'Vendor': 'electron', 'Product': 'electron', 'Versions': '< 22.3.6, >= 23.0.0, < 23.2.3, >= 24.0.0, < 24.0.1, >= 25.0.0-alpha.1, < 25.0.0-alpha.2'}
|
CVE-2023-29032
|
An attacker that has gained access to certain private information can use this to act as other user.
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings from 3.1.3 before 7.1.0
|
https://lists.apache.org/thread/j2d6mg3rzcphfd8vvvk09d8p4o9lvnqp
|
2023-03-30T04:39:06.692Z
|
2023-05-12T07:43:30.483Z
|
2023-05-12T07:43:30.483Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache OpenMeetings', 'Versions': '3.1.3'}
|
CVE-2023-29931
|
laravel-s 3.7.35 is vulnerable to Local File Inclusion via /src/Illuminate/Laravel.php.
|
https://github.com/hhxsv5/laravel-s/issues/437
|
2023-04-07T00:00:00
|
2023-06-22T00:00:00
|
2023-06-22T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29383
|
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
|
https://github.com/shadow-maint/shadow/pull/687
|
2023-04-05T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29696
|
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function version_set.
|
https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md
|
2023-04-07T00:00:00
|
2023-05-08T00:00:00
|
2023-05-08T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29045
|
Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.
|
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6243_7.10.6_2023-08-01.pdf
|
2023-03-30T09:34:25.188Z
|
2023-11-02T13:01:35.652Z
|
2024-01-12T07:08:13.807Z
|
{'Vendor': 'OX Software GmbH', 'Product': 'OX App Suite', 'Versions': '0'}
|
CVE-2023-29415
|
An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A denial of service (process hang) can occur with a crafted archive because bzip3 does not follow the required procedure for interacting with libsais.
|
https://github.com/kspalaiologos/bzip3/issues/95
|
2023-04-06T00:00:00
|
2023-04-06T00:00:00
|
2023-04-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29100
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dream-Theme The7 plugin <= 11.6.0 versions.
|
https://patchstack.com/database/vulnerability/dt-the7/wordpress-the7-theme-11-6-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-03-31T07:39:14.640Z
|
2023-06-23T12:17:10.473Z
|
2023-06-23T12:17:10.473Z
|
{'Vendor': 'Dream-Theme', 'Product': 'The7', 'Versions': 'n/a'}
|
CVE-2023-29550
|
Memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.
|
https://www.mozilla.org/security/advisories/mfsa2023-15/
|
2023-04-07T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-29803
|
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the pid parameter in the disconnectVPN function.
|
https://sore-pail-31b.notion.site/Command-Inject-1-4a37b0679f69478285d1ba640e5f0897
|
2023-04-07T00:00:00
|
2023-04-14T00:00:00
|
2023-04-14T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29291
|
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. An admin-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.
|
https://helpx.adobe.com/security/products/magento/apsb23-35.html
|
2023-04-04T00:00:00
|
2023-06-15T00:00:00
|
2023-06-15T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
|
CVE-2023-29442
|
Zoho ManageEngine Applications Manager before 16400 allows proxy.html DOM XSS.
|
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2023-29442.html
|
2023-04-06T00:00:00
|
2023-04-26T00:00:00
|
2023-06-26T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29012
|
Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory.
|
https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g
|
2023-03-29T17:39:16.143Z
|
2023-04-25T20:44:05.329Z
|
2023-04-25T20:44:05.329Z
|
{'Vendor': 'git-for-windows', 'Product': 'git', 'Versions': '< 2.40.1'}
|
CVE-2023-29911
|
H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the AddMacList interface at /goform/aspForm.
|
https://hackmd.io/%400dayResearch/SyTaRoCJn
|
2023-04-07T00:00:00
|
2023-04-21T00:00:00
|
2023-04-21T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29854
|
DirCMS 6.0.0 has a Cross Site Scripting (XSS) vulnerability in the foreground.
|
https://github.com/secflag/Vulnerabilitys/blob/main/DirCMS_V6.0.0_XSS_vulnerability.md
|
2023-04-07T00:00:00
|
2023-04-18T00:00:00
|
2023-04-18T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29507
|
XWiki Commons are technical libraries common to several other top level XWiki projects. The Document script API returns directly a DocumentAuthors allowing to set any authors to the document, which in consequence can allow subsequent executions of scripts since this author is used for checking rights. The problem has been patched in XWiki 14.10 and 14.4.7 by returning a safe script API.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pwfv-3cvg-9m4c
|
2023-04-07T18:56:54.626Z
|
2023-04-16T06:52:19.020Z
|
2023-04-16T06:52:19.020Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 14.5, < 14.10, >= 14.4.1, < 14.4.7'}
|
CVE-2023-29157
|
Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
|
2023-05-05T03:00:03.817Z
|
2023-11-14T19:05:00.952Z
|
2023-11-14T19:05:00.952Z
|
{'Vendor': 'n/a', 'Product': 'Intel(R) OFU software', 'Versions': 'before version 14.1.31'}
|
CVE-2023-29638
|
Cross Site Scripting (XSS) vulnerability in WinterChenS my-site before commit 3f0423da6d5200c7a46e200da145c1f54ee18548, allows attackers to inject arbitrary web script or HTML via editing blog articles.
|
https://github.com/WinterChenS/my-site/issues/74
|
2023-04-07T00:00:00
|
2023-05-01T00:00:00
|
2023-05-01T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29268
|
The Splus Server component of TIBCO Software Inc.'s TIBCO Spotfire Statistics Services contains a vulnerability that allows an unauthenticated remote attacker to upload or modify arbitrary files within the web server directory on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Statistics Services: versions 11.4.10 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, and 12.0.2, versions 12.1.0 and 12.2.0.
|
https://www.tibco.com/services/support/advisories
|
2023-04-04T19:06:51.372Z
|
2023-04-26T17:24:18.689Z
|
2023-04-26T17:24:18.689Z
|
{'Vendor': 'TIBCO Software Inc.', 'Product': 'TIBCO Spotfire Statistics Services', 'Versions': '0, 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.1.0, 12.2.0'}
|
CVE-2023-29287
|
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Information Exposure vulnerability that could lead to a security feature bypass. An attacker could leverage this vulnerability to leak minor user data. Exploitation of this issue does not require user interaction..
|
https://helpx.adobe.com/security/products/magento/apsb23-35.html
|
2023-04-04T00:00:00
|
2023-06-15T00:00:00
|
2023-06-15T00:00:00
|
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
|
CVE-2023-29907
|
H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the Edit_BasicSSID_5G interface at /goform/aspForm.
|
https://hackmd.io/%400dayResearch/rk-6aRRyn
|
2023-04-07T00:00:00
|
2023-04-21T00:00:00
|
2023-04-21T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29004
|
hap-wi/roxy-wi is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A Path Traversal vulnerability was found in the current version of Roxy-WI (6.3.9.0 at the moment of writing this report). The vulnerability can be exploited via an HTTP request to /app/options.py and the config_file_name parameter. Successful exploitation of this vulnerability could allow an attacker with user level privileges to obtain the content of arbitrary files on the file server within the scope of what the server process has access to. The root-cause of the vulnerability lies in the get_config function of the /app/modules/config/config.py file, which only checks for relative path traversal, but still allows to read files from absolute locations passed via the config_file_name parameter.
|
https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-7qqj-xhvr-46fv
|
2023-03-29T17:39:16.142Z
|
2023-04-17T18:34:07.972Z
|
2023-04-17T18:34:07.972Z
|
{'Vendor': 'hap-wi', 'Product': 'roxy-wi', 'Versions': '<= 6.3.9.0'}
|
CVE-2023-29454
|
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
|
https://support.zabbix.com/browse/ZBX-22985
|
2023-04-06T18:04:44.892Z
|
2023-07-13T09:30:27.523Z
|
2023-07-13T09:30:27.523Z
|
{'Vendor': 'Zabbix', 'Product': 'Zabbix', 'Versions': '4.0.0, 5.0.0, 6.0.0'}
|
CVE-2023-29141
|
An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.
|
https://phabricator.wikimedia.org/T285159
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
2023-08-23T00:06:11.437465
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29511
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in `XWiki.AdminFieldsDisplaySheet`. This page is installed by default. The vulnerability has been patched in XWiki versions 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.
|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rfh6-mg6h-h668
|
2023-04-07T18:56:54.626Z
|
2023-04-16T07:07:53.556Z
|
2023-04-16T07:07:53.556Z
|
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 14.0-rc-1, < 14.4.8, >= 14.5, < 14.10.1, >= 1.5M2, < 13.10.11'}
|
CVE-2023-29842
|
ChurchCRM 4.5.4 endpoint /EditEventTypes.php is vulnerable to Blind SQL Injection (Time-based) via the EN_tyid POST parameter.
|
https://github.com/ChurchCRM/CRM
|
2023-04-07T00:00:00
|
2023-05-04T00:00:00
|
2023-10-16T17:06:13.818426
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29680
|
Cleartext Transmission in set-cookie:ecos_pw: Tenda N301 v6.0, Firmware v12.02.01.61_multi allows an authenticated attacker on the LAN or WLAN to intercept communications with the router and obtain the password.
|
https://www.youtube.com/watch?v=m7ZHfFcSKpU&ab_channel=0ta
|
2023-04-07T00:00:00
|
2023-05-01T00:00:00
|
2023-05-01T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29403
|
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.
|
https://go.dev/issue/60272
|
2023-04-05T19:36:35.042Z
|
2023-06-08T20:19:13.222Z
|
2023-06-12T19:08:37.846Z
|
{'Vendor': 'Go standard library', 'Product': 'runtime', 'Versions': '0, 1.20.0-0'}
|
CVE-2023-29053
|
A vulnerability has been identified in JT Open (All versions < V11.3.2.0), JT Utilities (All versions < V13.3.0.0). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
|
https://cert-portal.siemens.com/productcert/pdf/ssa-642810.pdf
|
2023-03-30T12:04:26.538Z
|
2023-04-11T09:03:07.730Z
|
2023-04-11T09:03:07.730Z
|
{'Vendor': 'Siemens', 'Product': 'JT Open', 'Versions': 'All versions < V11.3.2.0'}
|
CVE-2023-29950
|
swfrender v0.9.2 was discovered to contain a heap buffer overflow in the function enumerateUsedIDs_fillstyle at modules/swftools.c
|
https://github.com/matthiaskramm/swftools/issues/198
|
2023-04-07T00:00:00
|
2023-04-27T00:00:00
|
2023-04-27T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29815
|
mccms v2.6.3 is vulnerable to Cross Site Request Forgery (CSRF).
|
https://github.com/chshcms/mccms/issues/3
|
2023-04-07T00:00:00
|
2023-04-28T00:00:00
|
2023-04-28T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29546
|
When recording the screen while in Private Browsing on Firefox for Android the address bar and keyboard were not hidden, potentially leaking sensitive information.
*This bug only affects Firefox for Android. Other operating systems are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112.
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1780842
|
2023-04-07T19:49:37.878Z
|
2023-06-19T10:13:23.600Z
|
2023-06-19T10:13:54.409Z
|
{'Vendor': 'Mozilla', 'Product': 'Firefox for Android', 'Versions': 'unspecified'}
|
CVE-2023-29301
|
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by an Improper Restriction of Excessive Authentication Attempts vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the confidentiality of the user. Exploitation of this issue does not require user interaction.
|
https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html
|
2023-04-04T20:46:42.578Z
|
2023-07-12T15:46:07.887Z
|
2023-07-12T15:46:07.887Z
|
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
|
CVE-2023-29751
|
An issue found in Yandex Navigator v.6.60 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files.
|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29751/CVE%20detailed.md
|
2023-04-07T00:00:00
|
2023-06-09T00:00:00
|
2023-06-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29244
|
Incorrect default permissions in some Intel Integrated Sensor Hub (ISH) driver for Windows 10 for Intel NUC P14E Laptop Element software installers before version 5.4.1.4479 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00964.html
|
2023-04-07T03:00:04.494Z
|
2024-01-19T20:03:14.759Z
|
2024-01-19T20:03:14.759Z
|
{'Vendor': 'n/a', 'Product': 'Intel Integrated Sensor Hub (ISH) driver for Windows 10 for Intel NUC P14E Laptop Element software installers', 'Versions': 'before version 5.4.1.4479'}
|
CVE-2023-29497
|
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to access calendar data saved to a temporary directory.
|
https://support.apple.com/en-us/HT213940
|
2023-07-20T15:04:15.889Z
|
2023-09-26T20:14:53.241Z
|
2023-09-26T20:14:53.241Z
|
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
|
CVE-2023-29478
|
BiblioCraft before 2.4.6 does not sanitize path-traversal characters in filenames, allowing restricted write access to almost anywhere on the filesystem. This includes the Minecraft mods folder, which results in code execution.
|
https://github.com/Exopteron/BiblioRCE
|
2023-04-07T00:00:00
|
2023-04-07T00:00:00
|
2023-04-07T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-29182
|
A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiOS before 7.0.3 allows a privileged attacker to execute arbitrary code via specially crafted CLI commands, provided the attacker were able to evade FortiOS stack protections.
|
https://fortiguard.com/psirt/FG-IR-23-149
|
2023-04-03T08:47:30.452Z
|
2023-08-17T09:42:26.038Z
|
2023-08-17T09:42:26.038Z
|
{'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.0.0, 6.4.0, 6.2.0'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.