CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-29382
An issue in Zimbra Collaboration ZCS v.8.8.15 and v.9.0 allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component.
https://wiki.zimbra.com/wiki/Security_Center
2023-04-05T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29526
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it's possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gpq5-7p34-vqx5
2023-04-07T18:56:54.629Z
2023-04-18T22:57:29.722Z
2023-04-18T22:57:29.722Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 10.11.1, < 13.10.11, >= 14.0.0, < 14.4.8, >= 14.5.0, < 14.10.3'}
CVE-2023-29463
The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140590
2023-04-06T18:42:59.008Z
2023-09-12T16:42:14.868Z
2023-09-12T16:42:14.868Z
{'Vendor': 'Rockwell Automation', 'Product': 'Pavilion8', 'Versions': '<5.20'}
CVE-2023-29199
There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.
https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985
2023-04-03T13:37:18.454Z
2023-04-14T18:37:03.847Z
2023-04-14T18:37:03.847Z
{'Vendor': 'patriksimek', 'Product': 'vm2', 'Versions': '< 3.9.16'}
CVE-2023-29033
null
null
2023-03-30T00:00:00
null
2023-04-02T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-29930
An issue was found in Genesys CIC Polycom phone provisioning TFTP Server all version allows a remote attacker to execute arbitrary code via the login crednetials to the TFTP server configuration page.
https://github.com/YSaxon/TFTPlunder
2023-04-07T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29208
XWiki Commons are technical libraries common to several other top level XWiki projects. Rights added to a document are not taken into account for viewing it once it's deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked. The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4f8g-fq6x-jqrr
2023-04-03T13:37:18.455Z
2023-04-15T15:52:47.431Z
2023-04-15T15:52:47.431Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 1.2-milestone-1, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'}
CVE-2023-29571
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS).
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_gc/readme.md
2023-04-07T00:00:00
2023-04-12T00:00:00
2023-04-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29064
The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts.
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
2023-03-30T21:10:17.526Z
2023-11-28T20:35:30.214Z
2023-11-28T20:35:30.214Z
{'Vendor': 'Becton, Dickinson and Company (BD)', 'Product': 'FACSChorus', 'Versions': '5.0'}
CVE-2023-29434
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in FancyThemes Optin Forms – Simple List Building Plugin for WordPress plugin <= 1.3.1 versions.
https://patchstack.com/database/vulnerability/optin-forms/wordpress-optin-forms-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-06T09:42:53.268Z
2023-06-26T10:08:54.601Z
2023-06-26T10:08:54.601Z
{'Vendor': 'FancyThemes', 'Product': 'Optin Forms – Simple List Building Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-29137
An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. The UserImpactHandler for GrowthExperiments inadvertently returns the timezone preference for arbitrary users, which can be used to de-anonymize users.
https://phabricator.wikimedia.org/T328643
2023-03-31T00:00:00
2023-03-31T00:00:00
2023-03-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29160
Stack-based buffer overflow vulnerability exists in FRENIC RHC Loader v1.1.0.3. If a user opens a specially crafted FNE file, sensitive information on the system where the affected product is installed may be disclosed or arbitrary code may be executed.
https://felib.fujielectric.co.jp/download/details.htm?dataid=45829407&site=global&lang=en
2023-05-11T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'FUJI ELECTRIC CO., LTD.', 'Product': 'FRENIC RHC Loader', 'Versions': 'v1.1.0.3 and earlier'}
CVE-2023-29530
Laminas Diactoros provides PSR HTTP Message implementations. In versions 2.18.0 and prior, 2.19.0, 2.20.0, 2.21.0, 2.22.0, 2.23.0, 2.24.0, and 2.25.0, users who create HTTP requests or responses using laminas/laminas-diactoros, when providing a newline at the start or end of a header key or value, can cause an invalid message. This can lead to denial of service vectors or application errors. The problem has been patched in following versions 2.18.1, 2.19.1, 2.20.1, 2.21.1, 2.22.1, 2.23.1, 2.24.1, and 2.25.1. As a workaround, validate HTTP header keys and/or values, and if using user-supplied values, filter them to strip off leading or trailing newline characters before calling `withHeader()`.
https://github.com/laminas/laminas-diactoros/security/advisories/GHSA-xv3h-4844-9h36
2023-04-07T18:56:54.630Z
2023-04-24T19:34:40.294Z
2023-04-24T19:34:40.294Z
{'Vendor': 'laminas', 'Product': 'laminas-diactoros', 'Versions': '< 2.18.1, = 2.19.0, = 2.20.0, = 2.21.0, = 2.22.0, = 2.23.0, = 2.24.0, = 2.25.0'}
CVE-2023-29863
Medical Systems Co. Medisys Weblab Products v19.4.03 was discovered to contain a SQL injection vulnerability via the tem:statement parameter in the WSDL files.
http://medical.com
2023-04-07T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29926
PowerJob V4.3.2 has unauthorized interface that causes remote code execution.
https://iotaa.cn/articles/63
2023-04-07T00:00:00
2023-04-20T00:00:00
2023-04-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29025
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
2023-03-29T20:07:06.686Z
2023-05-11T17:45:59.896Z
2023-10-24T11:44:56.735Z
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
CVE-2023-29475
inventory in Atos Unify OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1 before 10 R1.34.4 allows an unauthenticated attacker to run arbitrary commands on the platform operating system and achieve administrative access, aka OSFOURK-23543.
https://networks.unify.com/security/advisories/OBSO-2303-01.pdf
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29727
The Call Blocker application 6.6.3 for Android allows unauthorized applications to use exposed components to delete data stored in its database that is related to user privacy settings and affects the implementation of the normal functionality of the application. An attacker can use this to cause an escalation of privilege attack.
https://play.google.com/store/apps/details?id=com.cuiet.blockCalls
2023-04-07T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29818
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to bypass protections via the default allowlist feature being stored as non-admin.
http://secureanywhere.com
2023-04-07T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29635
File upload vulnerability in Antabot White-Jotter v0.2.2, allows remote attackers to execute malicious code via the file parameter to function coversUpload.
https://github.com/Antabot/White-Jotter/issues/157
2023-04-07T00:00:00
2023-05-01T00:00:00
2023-05-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29320
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Violation of Secure Design Principles vulnerability that could result in arbitrary code execution in the context of the current user by bypassing the API blacklisting feature. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-04-04T20:46:42.583Z
2023-08-10T13:17:48.806Z
2023-08-10T13:17:48.806Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-29770
In Sentrifugo 3.5, the AssetsController::uploadsaveAction function allows an authenticated attacker to upload any file without extension filtering.
https://github.com/sapplica/sentrifugo/issues/384
2023-04-07T00:00:00
2023-11-27T00:00:00
2023-11-27T23:19:18.838081
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29459
The laola.redbull application through 5.1.9-R for Android exposes the exported activity at.redbullsalzburg.android.AppMode.Default.Splash.SplashActivity, which accepts a data: URI. The target of this URI is subsequently loaded into the application's webview, thus allowing the loading of arbitrary content into the context of the application. This can occur via the fcrbs schema or an explicit intent invocation.
https://play.google.com/store/apps/details?id=laola.redbull
2023-04-06T00:00:00
2023-06-26T00:00:00
2023-06-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29009
baserCMS is a website development framework with WebAPI that runs on PHP8 and CakePHP4. There is a XSS Vulnerability in Favorites Feature to baserCMS. This issue has been patched in version 4.8.0.
https://github.com/baserproject/basercms/security/advisories/GHSA-8vqx-prq4-rqrq
2023-03-29T17:39:16.143Z
2023-10-27T19:30:18.390Z
2023-10-27T19:30:18.390Z
{'Vendor': 'baserproject', 'Product': 'basercms', 'Versions': '< 4.8.0'}
CVE-2023-29623
Purchase Order Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the password parameter at /purchase_order/classes/login.php.
https://portswigger.net/web-security/cross-site-scripting/reflected
2023-04-07T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29273
Adobe Substance 3D Painter versions 8.3.0 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/substance3d_painter/apsb23-29.html
2023-04-04T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'Adobe', 'Product': 'Substance3D - Painter', 'Versions': 'unspecified, unspecified'}
CVE-2023-29766
An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause an escalation of Privileges via the database files.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md
2023-04-07T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29336
Win32k Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29336
2023-04-04T22:34:18.380Z
2023-05-09T17:03:03.549Z
2023-12-14T19:06:13.364Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1507', 'Versions': '10.0.0'}
CVE-2023-29361
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29361
2023-04-04T22:34:18.384Z
2023-06-13T23:26:05.123Z
2024-01-09T17:39:21.478Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'}
CVE-2023-29731
SoLive 1.6.14 thru 1.6.20 for Android has an exposed component that provides a method to modify the SharedPreference file. An attacker can leverage this method to inject a large amount of data into any SharedPreference file, which will be loaded into memory when the application is opened. When an attacker injects too much data, the application will trigger an OOM error and crash at startup, resulting in a persistent denial of service.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29731/CVE%20detail.md
2023-04-07T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29418
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is an xwrite out-of-bounds read.
https://github.com/kspalaiologos/bzip3/issues/92
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29048
A component for parsing OXMF templates could be abused to execute arbitrary system commands that would be executed as the non-privileged runtime user. Users and attackers could run system commands with limited privilege to gain unauthorized access to confidential information and potentially violate integrity by modifying resources. The template engine has been reconfigured to deny execution of harmful commands on a system level. No publicly available exploits are known.
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf
2023-03-30T09:34:25.189Z
2024-01-08T08:51:31.461Z
2024-01-12T07:06:36.093Z
{'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0'}
CVE-2023-29419
An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is a bz3_decode_block out-of-bounds read.
https://github.com/kspalaiologos/bzip3/issues/92
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29049
The "upsell" widget at the portal page could be abused to inject arbitrary script code. Attackers that manage to lure users to a compromised account, or gain temporary access to a legitimate account, could inject script code to gain persistent code execution capabilities under a trusted domain. User input for this widget is now sanitized to avoid malicious content the be processed. No publicly available exploits are known.
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6248_7.10.6_2023-09-19.pdf
2023-03-30T09:34:25.189Z
2024-01-08T08:51:36.992Z
2024-01-12T07:06:48.514Z
{'Vendor': 'Open-Xchange GmbH', 'Product': 'OX App Suite', 'Versions': '0'}
CVE-2023-29360
Microsoft Streaming Service Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360
2023-04-04T22:34:18.384Z
2023-06-13T23:26:04.551Z
2024-01-09T17:39:20.924Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-29622
Purchase Order Management v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /purchase_order/admin/login.php.
https://portswigger.net/web-security/sql-injection
2023-04-07T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29767
An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause a persistent denial of service via the database files.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29767/CVE%20detailed.md
2023-04-07T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29337
NuGet Client Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337
2023-04-04T22:34:18.380Z
2023-06-14T14:52:20.370Z
2024-01-09T17:39:15.971Z
{'Vendor': 'Microsoft', 'Product': 'NuGet 6.2.3', 'Versions': '6.0.0'}
CVE-2023-29458
Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.
https://support.zabbix.com/browse/ZBX-22989
2023-04-06T18:04:44.892Z
2023-07-13T09:33:46.403Z
2023-07-13T09:33:46.403Z
{'Vendor': 'Zabbix', 'Product': 'Zabbix', 'Versions': '5,0,0, 6,0,0, 6.4.0, 7.0.0alpha1'}
CVE-2023-29008
The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a `+server.js` file, containing endpoint handlers for different HTTP methods. SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to its users. The protection is implemented at `kit/src/runtime/server/respond.js`. While the implementation does a sufficient job of mitigating common CSRF attacks, the protection can be bypassed in versions prior to 1.15.2 by simply specifying an upper-cased `Content-Type` header value. The browser will not send uppercase characters, but this check does not block all expected CORS requests. If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts. This may lead to all POST operations requiring authentication being allowed in the following cases: If the target site sets `SameSite=None` on its auth cookie and the user visits a malicious site in a Chromium-based browser; if the target site doesn't set the `SameSite` attribute explicitly and the user visits a malicious site with Firefox/Safari with tracking protections turned off; and/or if the user is visiting a malicious site with a very outdated browser. SvelteKit 1.15.2 contains a patch for this issue. It is also recommended to explicitly set `SameSite` to a value other than `None` on authentication cookies especially if the upgrade cannot be done in a timely manner.
https://github.com/sveltejs/kit/security/advisories/GHSA-gv7g-x59x-wf8f
2023-03-29T17:39:16.143Z
2023-04-06T16:36:50.972Z
2023-04-06T16:36:50.972Z
{'Vendor': 'sveltejs', 'Product': 'kit', 'Versions': '< 1.15.2'}
CVE-2023-29321
Adobe Animate versions 22.0.9 (and earlier) and 23.0.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/animate/apsb23-36.html
2023-04-04T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'Adobe', 'Product': 'Animate', 'Versions': 'unspecified, unspecified, unspecified'}
CVE-2023-29819
An issue found in Webroot SecureAnywhere Endpoint Protection CE 23.1 v.9.0.33.39 and before allows a local attacker to bypass protections via a crafted payload.
http://secureanywhere.com
2023-04-07T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29726
The Call Blocker application 6.6.3 for Android incorrectly opens a key component that an attacker can use to inject large amounts of dirty data into the application's database. When the application starts, it loads the data from the database into memory. Once the attacker injects too much data, the application triggers an OOM error and crashes, resulting in a persistent denial of service.
https://play.google.com/store/apps/details?id=com.cuiet.blockCalls
2023-04-07T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29376
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potential XSS by privileged users in Sitefinity to media libraries.
https://www.progress.com/sitefinity-cms
2023-04-05T00:00:00
2023-04-10T00:00:00
2023-04-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29161
Uncontrolled search path in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
2023-05-05T03:00:03.730Z
2023-11-14T19:05:01.481Z
2023-11-14T19:05:01.481Z
{'Vendor': 'n/a', 'Product': 'Intel(R) OFU software', 'Versions': 'before version 14.1.31'}
CVE-2023-29531
An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash. *This bug only affects Firefox and Thunderbird for macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.
https://bugzilla.mozilla.org/show_bug.cgi?id=1794292
2023-04-07T19:49:37.876Z
2023-06-19T09:48:59.394Z
2023-06-19T09:55:05.759Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-29862
An issue found in Agasio-Camera device version not specified allows a remote attacker to execute arbitrary code via the check and authLevel parameters.
https://woolly-espadrille-ed5.notion.site/Agasio-Camera-device-has-a-logic-flaw-vulnerability-d4514e7217c54dd7ac62582b6664aa66
2023-04-07T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29927
Versions of Sage 300 through 2022 implement role-based access controls that are only enforced client-side. Low-privileged Sage users, particularly those on a workstation setup in the "Windows Peer-to-Peer Network" or "Client Server Network" Sage 300 configurations, could recover the SQL connection strings being used by Sage 300 and interact directly with the underlying database(s) to create, update, and delete all company records, bypassing the program’s role-based access controls.
https://www.controlgap.com/blog/critical-vulnerability-disclosure-sage-300
2023-04-07T00:00:00
2023-05-16T00:00:00
2023-05-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29024
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product A cross site scripting vulnerability was discovered that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139438
2023-03-29T20:07:06.686Z
2023-05-11T17:42:45.941Z
2023-10-24T11:45:16.563Z
{'Vendor': 'Rockwell Automation', 'Product': 'ArmorStart ST', 'Versions': 'All '}
CVE-2023-29474
inventory in Atos Unify OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1 before 10 R1.34.4 allows an unauthenticated attacker to run arbitrary commands on the platform operating system and achieve administrative access, aka OSFOURK-23552.
https://networks.unify.com/security/advisories/OBSO-2303-01.pdf
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29835
Insecure Permission vulnerability found in Wondershare Dr.Fone v.12.9.6 allows a remote attacker to escalate privileges via the service permission function.
https://github.com/IthacaLabs/Wondershare/tree/main/Dr.Fone
2023-04-07T00:00:00
2023-04-26T00:00:00
2023-04-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29566
huedawn-tesseract 0.3.3 and dawnsparks-node-tesseract 0.4.0 to 0.4.1 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
https://www.npmjs.com/package/dawnsparks-node-tesseract
2023-04-07T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29423
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PI Websolution Cancel order request / Return order / Repeat Order / Reorder for WooCommerce plugin <= 1.3.2 versions.
https://patchstack.com/database/vulnerability/cancel-order-request-woocommerce/wordpress-cancel-order-request-woocommerce-plugin-1-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-06T08:15:32.682Z
2023-06-26T07:13:11.884Z
2023-06-26T07:13:11.884Z
{'Vendor': 'PI Websolution', 'Product': 'Cancel order request / Return order / Repeat Order / Reorder for WooCommerce', 'Versions': 'n/a'}
CVE-2023-29073
A maliciously crafted MODEL file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to cause a Heap-Based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
https://www.autodesk.com/trust/security-advisories/adsk-sa-2023-0018
2023-03-30T21:27:50.091Z
2023-11-23T03:07:13.478Z
2023-11-23T03:07:13.478Z
{'Vendor': 'Autodesk', 'Product': 'AutoCAD, Advance Steel and Civil 3D', 'Versions': '2024, 2023'}
CVE-2023-29570
Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_ffi_cb_free at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS).
https://github.com/z1r00/fuzz_vuln/blob/main/mjs/SEGV/mjs_fii2/readme.md
2023-04-07T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29065
The FACSChorus software database can be accessed directly with the privileges of the currently logged-in user. A threat actor with physical access could potentially gain credentials, which could be used to alter or destroy data stored in the database.
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-facschorus-software
2023-03-30T21:10:17.527Z
2023-11-28T20:35:59.061Z
2023-11-28T20:35:59.061Z
{'Vendor': 'Becton, Dickinson and Company (BD)', 'Product': 'FACSChorus', 'Versions': '5.0'}
CVE-2023-29435
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Zwaply Cryptocurrency All-in-One plugin <= 3.0.19 versions.
https://patchstack.com/database/vulnerability/cryptocurrency-prices/wordpress-cryptocurrency-all-in-one-plugin-3-0-19-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-06T09:42:53.269Z
2023-06-26T11:09:39.269Z
2023-06-26T11:09:39.269Z
{'Vendor': 'Zwaply', 'Product': 'Cryptocurrency All-in-One', 'Versions': 'n/a'}
CVE-2023-29659
A Segmentation fault caused by a floating point exception exists in libheif 1.15.1 using crafted heif images via the heif::Fraction::round() function in box.cc, which causes a denial of service.
https://github.com/strukturag/libheif/issues/794
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29209
XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the legacy notification activity macro. This macro is installed by default in XWiki. The vulnerability can be exploited via every wiki page that is editable including the user's profile, but also with just view rights using the HTMLConverter that is part of the CKEditor integration which is bundled with XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9pc2-x9qf-7j2q
2023-04-03T13:37:18.455Z
2023-04-15T16:06:44.752Z
2023-04-15T16:06:44.752Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 10.9, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'}
CVE-2023-29527
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions a user without script or programming right may edit a user profile (or any other document) with the wiki editor and add groovy script content. Viewing the document after saving it will execute the groovy script in the server context which provides code execution. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgrg-qvpp-9vwr
2023-04-07T18:56:54.629Z
2023-04-18T22:53:41.740Z
2023-04-18T22:53:41.740Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 7.4.4, < 14.10.3'}
CVE-2023-29177
Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.
https://fortiguard.com/psirt/FG-IR-23-064
2023-04-03T08:47:30.452Z
2023-11-14T18:07:59.407Z
2023-11-14T18:07:59.407Z
{'Vendor': 'Fortinet', 'Product': 'FortiDDoS-F', 'Versions': '6.5.0, 6.4.0, 6.3.0, 6.2.0, 6.1.0'}
CVE-2023-29462
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap. potentially resulting in a complete loss of confidentiality, integrity, and availability.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139391
2023-04-06T18:42:59.008Z
2023-05-09T13:27:57.411Z
2023-10-23T17:32:45.978Z
{'Vendor': 'Rockwell Automation', 'Product': 'Arena Simulation', 'Versions': '16.00'}
CVE-2023-29198
Electron is a framework which lets you write cross-platform desktop applications using JavaScript, HTML and CSS. Electron apps using `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. This issue is only exploitable if an API exposed to the main world via `contextBridge` can return an object or array that contains a javascript object which cannot be serialized, for instance, a canvas rendering context. This would normally result in an exception being thrown `Error: object could not be cloned`. The app side workaround is to ensure that such a case is not possible. Ensure all values returned from a function exposed over the context bridge are supported. This issue has been fixed in versions `25.0.0-alpha.2`, `24.0.1`, `23.2.3`, and `22.3.6`.
https://github.com/electron/electron/security/advisories/GHSA-p7v2-p9m8-qqg7
2023-04-03T13:37:18.454Z
2023-09-06T20:13:56.313Z
2023-09-06T20:13:56.313Z
{'Vendor': 'electron', 'Product': 'electron', 'Versions': '< 22.3.6, >= 23.0.0, < 23.2.3, >= 24.0.0, < 24.0.1, >= 25.0.0-alpha.1, < 25.0.0-alpha.2'}
CVE-2023-29032
An attacker that has gained access to certain private information can use this to act as other user. Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 3.1.3 before 7.1.0
https://lists.apache.org/thread/j2d6mg3rzcphfd8vvvk09d8p4o9lvnqp
2023-03-30T04:39:06.692Z
2023-05-12T07:43:30.483Z
2023-05-12T07:43:30.483Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache OpenMeetings', 'Versions': '3.1.3'}
CVE-2023-29931
laravel-s 3.7.35 is vulnerable to Local File Inclusion via /src/Illuminate/Laravel.php.
https://github.com/hhxsv5/laravel-s/issues/437
2023-04-07T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29383
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
https://github.com/shadow-maint/shadow/pull/687
2023-04-05T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29696
H3C GR-1200W MiniGRW1A0V100R006 was discovered to contain a stack overflow via the function version_set.
https://github.com/Stevenbaga/fengsha/blob/main/H3C/GR-1200W/aVersionSet.md
2023-04-07T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29045
Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.
https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6243_7.10.6_2023-08-01.pdf
2023-03-30T09:34:25.188Z
2023-11-02T13:01:35.652Z
2024-01-12T07:08:13.807Z
{'Vendor': 'OX Software GmbH', 'Product': 'OX App Suite', 'Versions': '0'}
CVE-2023-29415
An issue was discovered in libbzip3.a in bzip3 before 1.3.0. A denial of service (process hang) can occur with a crafted archive because bzip3 does not follow the required procedure for interacting with libsais.
https://github.com/kspalaiologos/bzip3/issues/95
2023-04-06T00:00:00
2023-04-06T00:00:00
2023-04-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29100
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Dream-Theme The7 plugin <= 11.6.0 versions.
https://patchstack.com/database/vulnerability/dt-the7/wordpress-the7-theme-11-6-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-31T07:39:14.640Z
2023-06-23T12:17:10.473Z
2023-06-23T12:17:10.473Z
{'Vendor': 'Dream-Theme', 'Product': 'The7', 'Versions': 'n/a'}
CVE-2023-29550
Memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10.
https://www.mozilla.org/security/advisories/mfsa2023-15/
2023-04-07T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-29803
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the pid parameter in the disconnectVPN function.
https://sore-pail-31b.notion.site/Command-Inject-1-4a37b0679f69478285d1ba640e5f0897
2023-04-07T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29291
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. An admin-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/magento/apsb23-35.html
2023-04-04T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
CVE-2023-29442
Zoho ManageEngine Applications Manager before 16400 allows proxy.html DOM XSS.
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2023-29442.html
2023-04-06T00:00:00
2023-04-26T00:00:00
2023-06-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29012
Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory.
https://github.com/git-for-windows/git/security/advisories/GHSA-gq5x-v87v-8f7g
2023-03-29T17:39:16.143Z
2023-04-25T20:44:05.329Z
2023-04-25T20:44:05.329Z
{'Vendor': 'git-for-windows', 'Product': 'git', 'Versions': '< 2.40.1'}
CVE-2023-29911
H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the AddMacList interface at /goform/aspForm.
https://hackmd.io/%400dayResearch/SyTaRoCJn
2023-04-07T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29854
DirCMS 6.0.0 has a Cross Site Scripting (XSS) vulnerability in the foreground.
https://github.com/secflag/Vulnerabilitys/blob/main/DirCMS_V6.0.0_XSS_vulnerability.md
2023-04-07T00:00:00
2023-04-18T00:00:00
2023-04-18T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29507
XWiki Commons are technical libraries common to several other top level XWiki projects. The Document script API returns directly a DocumentAuthors allowing to set any authors to the document, which in consequence can allow subsequent executions of scripts since this author is used for checking rights. The problem has been patched in XWiki 14.10 and 14.4.7 by returning a safe script API.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pwfv-3cvg-9m4c
2023-04-07T18:56:54.626Z
2023-04-16T06:52:19.020Z
2023-04-16T06:52:19.020Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 14.5, < 14.10, >= 14.4.1, < 14.4.7'}
CVE-2023-29157
Improper access control in some Intel(R) OFU software before version 14.1.31 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00900.html
2023-05-05T03:00:03.817Z
2023-11-14T19:05:00.952Z
2023-11-14T19:05:00.952Z
{'Vendor': 'n/a', 'Product': 'Intel(R) OFU software', 'Versions': 'before version 14.1.31'}
CVE-2023-29638
Cross Site Scripting (XSS) vulnerability in WinterChenS my-site before commit 3f0423da6d5200c7a46e200da145c1f54ee18548, allows attackers to inject arbitrary web script or HTML via editing blog articles.
https://github.com/WinterChenS/my-site/issues/74
2023-04-07T00:00:00
2023-05-01T00:00:00
2023-05-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29268
The Splus Server component of TIBCO Software Inc.'s TIBCO Spotfire Statistics Services contains a vulnerability that allows an unauthenticated remote attacker to upload or modify arbitrary files within the web server directory on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Statistics Services: versions 11.4.10 and below, versions 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, and 12.0.2, versions 12.1.0 and 12.2.0.
https://www.tibco.com/services/support/advisories
2023-04-04T19:06:51.372Z
2023-04-26T17:24:18.689Z
2023-04-26T17:24:18.689Z
{'Vendor': 'TIBCO Software Inc.', 'Product': 'TIBCO Spotfire Statistics Services', 'Versions': '0, 11.5.0, 11.6.0, 11.6.1, 11.6.2, 11.7.0, 11.8.0, 11.8.1, 12.0.0, 12.0.1, 12.0.2, 12.1.0, 12.2.0'}
CVE-2023-29287
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Information Exposure vulnerability that could lead to a security feature bypass. An attacker could leverage this vulnerability to leak minor user data. Exploitation of this issue does not require user interaction..
https://helpx.adobe.com/security/products/magento/apsb23-35.html
2023-04-04T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'Adobe', 'Product': 'Magento Commerce', 'Versions': 'unspecified, unspecified, unspecified, unspecified'}
CVE-2023-29907
H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the Edit_BasicSSID_5G interface at /goform/aspForm.
https://hackmd.io/%400dayResearch/rk-6aRRyn
2023-04-07T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29004
hap-wi/roxy-wi is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A Path Traversal vulnerability was found in the current version of Roxy-WI (6.3.9.0 at the moment of writing this report). The vulnerability can be exploited via an HTTP request to /app/options.py and the config_file_name parameter. Successful exploitation of this vulnerability could allow an attacker with user level privileges to obtain the content of arbitrary files on the file server within the scope of what the server process has access to. The root-cause of the vulnerability lies in the get_config function of the /app/modules/config/config.py file, which only checks for relative path traversal, but still allows to read files from absolute locations passed via the config_file_name parameter.
https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-7qqj-xhvr-46fv
2023-03-29T17:39:16.142Z
2023-04-17T18:34:07.972Z
2023-04-17T18:34:07.972Z
{'Vendor': 'hap-wi', 'Product': 'roxy-wi', 'Versions': '<= 6.3.9.0'}
CVE-2023-29454
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
https://support.zabbix.com/browse/ZBX-22985
2023-04-06T18:04:44.892Z
2023-07-13T09:30:27.523Z
2023-07-13T09:30:27.523Z
{'Vendor': 'Zabbix', 'Product': 'Zabbix', 'Versions': '4.0.0, 5.0.0, 6.0.0'}
CVE-2023-29141
An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.
https://phabricator.wikimedia.org/T285159
2023-03-31T00:00:00
2023-03-31T00:00:00
2023-08-23T00:06:11.437465
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29511
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it's own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in `XWiki.AdminFieldsDisplaySheet`. This page is installed by default. The vulnerability has been patched in XWiki versions 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rfh6-mg6h-h668
2023-04-07T18:56:54.626Z
2023-04-16T07:07:53.556Z
2023-04-16T07:07:53.556Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 14.0-rc-1, < 14.4.8, >= 14.5, < 14.10.1, >= 1.5M2, < 13.10.11'}
CVE-2023-29842
ChurchCRM 4.5.4 endpoint /EditEventTypes.php is vulnerable to Blind SQL Injection (Time-based) via the EN_tyid POST parameter.
https://github.com/ChurchCRM/CRM
2023-04-07T00:00:00
2023-05-04T00:00:00
2023-10-16T17:06:13.818426
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29680
Cleartext Transmission in set-cookie:ecos_pw: Tenda N301 v6.0, Firmware v12.02.01.61_multi allows an authenticated attacker on the LAN or WLAN to intercept communications with the router and obtain the password.
https://www.youtube.com/watch?v=m7ZHfFcSKpU&ab_channel=0ta
2023-04-07T00:00:00
2023-05-01T00:00:00
2023-05-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29403
On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.
https://go.dev/issue/60272
2023-04-05T19:36:35.042Z
2023-06-08T20:19:13.222Z
2023-06-12T19:08:37.846Z
{'Vendor': 'Go standard library', 'Product': 'runtime', 'Versions': '0, 1.20.0-0'}
CVE-2023-29053
A vulnerability has been identified in JT Open (All versions < V11.3.2.0), JT Utilities (All versions < V13.3.0.0). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-642810.pdf
2023-03-30T12:04:26.538Z
2023-04-11T09:03:07.730Z
2023-04-11T09:03:07.730Z
{'Vendor': 'Siemens', 'Product': 'JT Open', 'Versions': 'All versions < V11.3.2.0'}
CVE-2023-29950
swfrender v0.9.2 was discovered to contain a heap buffer overflow in the function enumerateUsedIDs_fillstyle at modules/swftools.c
https://github.com/matthiaskramm/swftools/issues/198
2023-04-07T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29815
mccms v2.6.3 is vulnerable to Cross Site Request Forgery (CSRF).
https://github.com/chshcms/mccms/issues/3
2023-04-07T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29546
When recording the screen while in Private Browsing on Firefox for Android the address bar and keyboard were not hidden, potentially leaking sensitive information. *This bug only affects Firefox for Android. Other operating systems are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112.
https://bugzilla.mozilla.org/show_bug.cgi?id=1780842
2023-04-07T19:49:37.878Z
2023-06-19T10:13:23.600Z
2023-06-19T10:13:54.409Z
{'Vendor': 'Mozilla', 'Product': 'Firefox for Android', 'Versions': 'unspecified'}
CVE-2023-29301
Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by an Improper Restriction of Excessive Authentication Attempts vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the confidentiality of the user. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/coldfusion/apsb23-40.html
2023-04-04T20:46:42.578Z
2023-07-12T15:46:07.887Z
2023-07-12T15:46:07.887Z
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
CVE-2023-29751
An issue found in Yandex Navigator v.6.60 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files.
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29751/CVE%20detailed.md
2023-04-07T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29244
Incorrect default permissions in some Intel Integrated Sensor Hub (ISH) driver for Windows 10 for Intel NUC P14E Laptop Element software installers before version 5.4.1.4479 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00964.html
2023-04-07T03:00:04.494Z
2024-01-19T20:03:14.759Z
2024-01-19T20:03:14.759Z
{'Vendor': 'n/a', 'Product': 'Intel Integrated Sensor Hub (ISH) driver for Windows 10 for Intel NUC P14E Laptop Element software installers', 'Versions': 'before version 5.4.1.4479'}
CVE-2023-29497
A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14. An app may be able to access calendar data saved to a temporary directory.
https://support.apple.com/en-us/HT213940
2023-07-20T15:04:15.889Z
2023-09-26T20:14:53.241Z
2023-09-26T20:14:53.241Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-29478
BiblioCraft before 2.4.6 does not sanitize path-traversal characters in filenames, allowing restricted write access to almost anywhere on the filesystem. This includes the Minecraft mods folder, which results in code execution.
https://github.com/Exopteron/BiblioRCE
2023-04-07T00:00:00
2023-04-07T00:00:00
2023-04-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-29182
A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiOS before 7.0.3 allows a privileged attacker to execute arbitrary code via specially crafted CLI commands, provided the attacker were able to evade FortiOS stack protections.
https://fortiguard.com/psirt/FG-IR-23-149
2023-04-03T08:47:30.452Z
2023-08-17T09:42:26.038Z
2023-08-17T09:42:26.038Z
{'Vendor': 'Fortinet', 'Product': 'FortiOS', 'Versions': '7.0.0, 6.4.0, 6.2.0'}