CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-38734
|
IBM Robotic Process Automation 21.0.0 through 21.0.7.1 and 23.0.0 through 23.0.1 is vulnerable to incorrect privilege assignment when importing users from an LDAP directory. IBM X-Force ID: 262481.
|
https://www.ibm.com/support/pages/node/7028227
|
2023-07-25T00:01:17.449Z
|
2023-08-22T21:18:08.392Z
|
2023-08-22T21:18:08.392Z
|
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'}
|
CVE-2023-38364
|
IBM CICS TX Advanced 10.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 260821.
|
https://www.ibm.com/support/pages/node/7066429
|
2023-07-16T00:53:13.214Z
|
2023-11-13T01:47:44.043Z
|
2023-11-13T01:47:44.043Z
|
{'Vendor': 'IBM', 'Product': 'CICS TX Advanced', 'Versions': '10.1'}
|
CVE-2023-38558
|
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems.
|
https://cert-portal.siemens.com/productcert/pdf/ssa-646240.pdf
|
2023-07-20T08:17:26.143Z
|
2023-09-14T10:39:29.769Z
|
2023-09-14T10:39:29.769Z
|
{'Vendor': 'Siemens', 'Product': 'SIMATIC PCS neo (Administration Console) V4.0', 'Versions': 'All versions'}
|
CVE-2023-38276
|
IBM Cognos Dashboards on Cloud Pak for Data 4.7.0 exposes sensitive information in environment variables which could aid in further attacks against the system. IBM X-Force ID: 260736.
|
https://www.ibm.com/support/pages/node/7031207
|
2023-07-14T00:46:27.164Z
|
2023-10-22T01:02:41.722Z
|
2023-10-22T01:02:41.722Z
|
{'Vendor': 'IBM', 'Product': 'Cognos Dashboards on Cloud Pak for Data', 'Versions': '4.7.0'}
|
CVE-2023-38626
|
A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-38625.
|
https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US
|
2023-07-20T19:46:15.611Z
|
2024-01-23T20:34:41.067Z
|
2024-01-23T20:34:41.067Z
|
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex Central', 'Versions': '2019'}
|
CVE-2023-38333
|
Zoho ManageEngine Applications Manager through 16530 allows reflected XSS while logged in.
|
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2023-38333.html
|
2023-07-14T00:00:00
|
2023-08-10T00:00:00
|
2023-08-10T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38763
|
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the FundRaiserID parameter within the /FundRaiserEditor.php endpoint.
|
https://churchcrm.io/
|
2023-07-25T00:00:00
|
2023-08-08T00:00:00
|
2023-08-08T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38128
|
An out-of-bounds write vulnerability exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause a type confusion, which can lead to memory corruption and eventually arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809
|
2023-07-17T22:09:40.438Z
|
2023-10-19T17:00:42.797Z
|
2023-10-19T17:00:42.797Z
|
{'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'}
|
CVE-2023-38597
|
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution.
|
https://support.apple.com/en-us/HT213847
|
2023-07-20T15:04:44.407Z
|
2023-07-26T23:55:02.370Z
|
2023-07-27T03:45:22.171Z
|
{'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'}
|
CVE-2023-38344
|
An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.
|
https://www.ivanti.com/releases
|
2023-07-15T00:00:00
|
2023-09-21T00:00:00
|
2023-09-21T21:00:04.415196
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38651
|
Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
|
2023-07-21T18:46:04.513Z
|
2024-01-08T14:47:46.837Z
|
2024-01-08T18:00:20.629Z
|
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
|
CVE-2023-38201
|
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.
|
https://access.redhat.com/errata/RHSA-2023:5080
|
2023-07-13T13:12:48.728Z
|
2023-08-25T16:15:39.449Z
|
2024-01-23T02:47:01.905Z
|
{'Vendor': 'n/a', 'Product': 'keylime', 'Versions': '7.5.0'}
|
CVE-2023-38485
|
Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise.
|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt
|
2023-07-18T14:34:27.165Z
|
2023-09-06T17:47:29.963Z
|
2023-09-06T17:47:29.963Z
|
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': '9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways', 'Versions': 'ArubaOS 10.4.x.x, ArubaOS 8.11.x.x, ArubaOS 8.10.x.x, ArubaOS 8.6.x.x'}
|
CVE-2023-38939
|
Tenda F1202 V1.2.0.9 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the mit_ssid parameter in the formWrlsafeset function.
|
https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/formWrlsafeset
|
2023-07-25T00:00:00
|
2023-08-07T00:00:00
|
2023-08-07T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38190
|
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter.
|
https://herolab.usd.de/security-advisories/
|
2023-07-13T00:00:00
|
2023-10-21T00:00:00
|
2023-10-21T00:11:19.074426
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38313
|
An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set.
|
https://github.com/openNDS/openNDS/releases/tag/v10.1.2
|
2023-07-14T00:00:00
|
2023-11-17T00:00:00
|
2023-11-17T05:35:02.544321
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38743
|
Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.
|
https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-38743.html
|
2023-07-25T00:00:00
|
2023-09-11T00:00:00
|
2023-09-11T18:50:15.623362
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38256
|
Dover Fueling Solutions MAGLINK LX Web Console Configuration versions 2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, and 3.3
vulnerable to a path traversal attack, which could allow an attacker to access files stored on the system.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-01
|
2023-09-01T20:57:37.393Z
|
2023-09-11T19:34:11.246Z
|
2023-09-11T19:34:11.246Z
|
{'Vendor': 'Dover Fueling Solutions', 'Product': 'MAGLINK LX Web Console Configuration', 'Versions': '2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, 3.3'}
|
CVE-2023-38606
|
This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
|
https://support.apple.com/en-us/HT213846
|
2023-07-20T15:04:44.408Z
|
2023-07-26T23:55:05.346Z
|
2023-07-27T03:45:25.227Z
|
{'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'}
|
CVE-2023-38493
|
Armeria is a microservice framework Spring supports Matrix variables. When Spring integration is used, Armeria calls Spring controllers via `TomcatService` or `JettyService` with the path that may contain matrix variables. Prior to version 1.24.3, the Armeria decorators might not invoked because of the matrix variables. If an attacker sends a specially crafted request, the request may bypass the authorizer. Version 1.24.3 contains a patch for this issue.
|
https://github.com/line/armeria/security/advisories/GHSA-wvp2-9ppw-337j
|
2023-07-18T16:28:12.076Z
|
2023-07-25T20:51:11.170Z
|
2023-07-25T20:51:11.170Z
|
{'Vendor': 'line', 'Product': 'armeria', 'Versions': '< 1.24.3'}
|
CVE-2023-38169
|
Microsoft SQL OLE DB Remote Code Execution Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169
|
2023-07-12T23:41:45.863Z
|
2023-08-08T17:08:44.529Z
|
2023-12-14T20:03:16.725Z
|
{'Vendor': 'Microsoft', 'Product': 'Microsoft OLE DB Driver 19 for SQL Server', 'Versions': '19.0.0'}
|
CVE-2023-38186
|
Windows Mobile Device Management Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38186
|
2023-07-12T23:41:45.869Z
|
2023-08-08T17:08:41.118Z
|
2023-12-14T20:03:13.722Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'}
|
CVE-2023-38885
|
OpenSIS Classic Community Edition version 9.0 lacks cross-site request forgery (CSRF) protection throughout the whole app. This may allow an attacker to trick an authenticated user into performing any kind of state changing request.
|
https://github.com/OS4ED/openSIS-Classic
|
2023-07-25T00:00:00
|
2023-11-20T00:00:00
|
2023-11-20T18:47:38.064135
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38305
|
An issue was discovered in Webmin 2.021. The download functionality allows an attacker to exploit a Cross-Site Scripting (XSS) vulnerability. By providing a crafted download path containing a malicious payload, an attacker can inject arbitrary code, which is then executed within the context of the victim's browser when the download link is accessed.
|
https://webmin.com/tags/webmin-changelog/
|
2023-07-14T00:00:00
|
2023-07-31T00:00:00
|
2023-07-31T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38610
|
A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. An app may be able to cause unexpected system termination or write kernel memory.
|
https://support.apple.com/en-us/HT213938
|
2023-07-20T15:04:44.409Z
|
2024-01-10T22:03:11.487Z
|
2024-01-10T22:03:11.487Z
|
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
|
CVE-2023-38240
|
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
|
2023-07-13T16:21:52.616Z
|
2023-08-10T13:17:28.966Z
|
2023-08-10T13:17:28.966Z
|
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
|
CVE-2023-38997
|
A directory traversal vulnerability in the Captive Portal templates of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary system commands as root via a crafted ZIP archive.
|
https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2
|
2023-07-25T00:00:00
|
2023-08-09T00:00:00
|
2023-10-10T22:21:54.373450
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38352
|
MiniTool Partition Wizard 12.8 contains an insecure update mechanism that allows attackers to achieve remote code execution through a man in the middle attack.
|
https://0dr3f.github.io/cve/
|
2023-07-15T00:00:00
|
2023-09-19T00:00:00
|
2023-09-19T15:36:47.328624
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38702
|
Knowage is an open source analytics and business intelligence suite. Starting in the 6.x.x branch and prior to version 8.1.8, the endpoint `/knowage/restful-services/dossier/importTemplateFile` allows authenticated users to upload `template file` on the server, but does not need any authorization to be reached. When the JSP file is uploaded, the attacker just needs to connect to `/knowageqbeengine/foo.jsp` to gain code execution on the server. By exploiting this vulnerability, an attacker with low privileges can upload a JSP file to the `knowageqbeengine` directory and gain code execution capability on the server. This issue has been patched in Knowage version 8.1.8.
|
https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc
|
2023-07-24T16:19:28.365Z
|
2023-08-04T18:10:28.899Z
|
2023-08-04T18:10:28.899Z
|
{'Vendor': 'KnowageLabs', 'Product': 'Knowage-Server', 'Versions': '>= 6.0.0, < 8.1.8'}
|
CVE-2023-38217
|
Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by an Out-of-bounds Read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/bridge/apsb23-49.html
|
2023-07-13T16:21:52.613Z
|
2023-10-11T11:40:56.484Z
|
2023-10-11T11:40:56.484Z
|
{'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'}
|
CVE-2023-38647
|
An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. This unbounded deserialization can likely lead to remote code execution. The code can be run in Helix REST start and Workflow creation.
Affect all the versions lower and include 1.2.0.
Affected products: helix-core, helix-rest
Mitigation: Short term, stop using any YAML based configuration and workflow creation.
Long term, all Helix version bumping up to 1.3.0
|
https://lists.apache.org/thread/zyqxhv0lc2z9w3tgr8ttrdy2zfh5jvc4
|
2023-07-21T17:22:07.744Z
|
2023-07-26T07:52:29.741Z
|
2023-07-26T07:52:29.741Z
|
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Helix', 'Versions': '0'}
|
CVE-2023-38450
|
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
|
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
|
2023-07-18T07:24:19.586Z
|
2023-09-04T01:16:05.855Z
|
2023-09-04T01:16:05.855Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
|
CVE-2023-38000
|
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
|
https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve
|
2023-07-11T12:50:13.630Z
|
2023-10-13T09:55:54.690Z
|
2023-10-13T10:34:00.870Z
|
{'Vendor': 'WordPress.org', 'Product': 'WordPress', 'Versions': '6.3, 6.2, 6.1, 6.0, 5.9'}
|
CVE-2023-38515
|
Server-Side Request Forgery (SSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 3.7.56.
|
https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-3-7-56-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
|
2023-07-18T17:33:34.154Z
|
2023-11-13T02:32:33.748Z
|
2023-11-13T02:32:33.748Z
|
{'Vendor': 'Andy Moyle', 'Product': 'Church Admin', 'Versions': 'n/a'}
|
CVE-2023-38846
|
An issue in Marbre Lapin Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.
|
https://liff.line.me/1657925980-KmmGkje5
|
2023-07-25T00:00:00
|
2023-10-25T00:00:00
|
2023-10-25T21:40:19.508658
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38283
|
In OpenBGPD before 8.1, incorrect handling of BGP update data (length of path attributes) set by a potentially distant remote actor may cause the system to incorrectly reset a session. This is fixed in OpenBSD 7.3 errata 006.
|
https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/006_bgpd.patch.sig
|
2023-07-14T00:00:00
|
2023-08-29T00:00:00
|
2023-08-29T15:24:54.279568
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38057
|
An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.
This issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.
|
https://otrs.com/release-notes/otrs-security-advisory-2023-06/
|
2023-07-12T08:05:38.780Z
|
2023-07-24T08:27:55.315Z
|
2023-07-24T08:27:55.315Z
|
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}
|
CVE-2023-38407
|
bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.
|
https://github.com/FRRouting/frr/pull/12951
|
2023-07-17T00:00:00
|
2023-11-06T00:00:00
|
2023-11-06T05:04:18.947838
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38954
|
ZKTeco BioAccess IVS v3.3.1 was discovered to contain a SQL injection vulnerability.
|
http://zkteco.com
|
2023-07-25T00:00:00
|
2023-08-03T00:00:00
|
2023-08-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38391
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themesgrove Onepage Builder allows SQL Injection.This issue affects Onepage Builder: from n/a through 2.4.1.
|
https://patchstack.com/database/vulnerability/tx-onepager/wordpress-onepage-builder-easiest-landing-page-builder-for-wordpress-plugin-2-4-1-sql-injection?_s_id=cve
|
2023-07-17T15:22:13.926Z
|
2023-11-03T23:07:33.642Z
|
2023-11-03T23:07:33.642Z
|
{'Vendor': 'Themesgrove', 'Product': 'Onepage Builder', 'Versions': 'n/a'}
|
CVE-2023-38684
|
Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, in multiple controller actions, Discourse accepts limit params but does not impose any upper bound on the values being accepted. Without an upper bound, the software may allow arbitrary users to generate DB queries which may end up exhausting the resources on the server. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability.
|
https://github.com/discourse/discourse/security/advisories/GHSA-ff7g-xv79-hgmf
|
2023-07-24T16:19:28.363Z
|
2023-07-28T15:25:41.132Z
|
2023-07-28T15:25:41.132Z
|
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '>= 3.1.0.beta1, < 3.1.0.beta7, < 3.0.6'}
|
CVE-2023-38942
|
Dango-Translator v4.5.5 was discovered to contain a remote command execution (RCE) vulnerability via the component app/config/cloud_config.json.
|
https://github.com/PantsuDango/Dango-Translator
|
2023-07-25T00:00:00
|
2023-08-03T00:00:00
|
2023-08-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38411
|
Improper access control in the Intel Smart Campus android application before version 9.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00863.html
|
2023-08-02T03:00:04.706Z
|
2023-11-14T19:05:02.227Z
|
2023-11-14T19:05:02.227Z
|
{'Vendor': 'n/a', 'Product': 'Intel Smart Campus android application', 'Versions': 'before version 9.4'}
|
CVE-2023-38041
|
A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
|
https://forums.ivanti.com/s/article/CVE-2023-38041-New-client-side-release-to-address-a-privilege-escalation-on-Windows-user-machines?language=en_US
|
2023-07-12T01:00:11.881Z
|
2023-10-25T00:24:34.090Z
|
2023-10-25T00:24:34.090Z
|
{'Vendor': 'Ivanti', 'Product': 'Secure Access Client', 'Versions': '22.6R1'}
|
CVE-2023-38554
|
In wcn bsp driver, there is a possible out of bounds write due to a missing bounds check.This could lead to local denial of service with no additional execution privileges
|
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
|
2023-07-20T03:26:16.996Z
|
2023-09-04T01:16:11.483Z
|
2023-09-04T01:16:11.483Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
|
CVE-2023-38387
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Elastic Email Sender plugin <= 1.2.6 versions.
|
https://patchstack.com/database/vulnerability/elastic-email-sender/wordpress-elastic-email-sender-plugin-1-2-6-cross-site-scripting-xss?_s_id=cve
|
2023-07-17T15:21:38.731Z
|
2023-09-03T11:13:14.710Z
|
2023-09-03T11:13:14.710Z
|
{'Vendor': 'Elastic Email Sender', 'Product': 'Elastic Email Sender', 'Versions': 'n/a'}
|
CVE-2023-38692
|
CloudExplorer Lite is an open source, lightweight cloud management platform. Versions prior to 1.3.1 contain a command injection vulnerability in the installation function in module management. The vulnerability has been fixed in v1.3.1. There are no known workarounds aside from upgrading.
|
https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-7wrc-f42m-9v5w
|
2023-07-24T16:19:28.364Z
|
2023-08-04T17:22:39.567Z
|
2023-08-04T17:22:39.567Z
|
{'Vendor': 'CloudExplorer-Dev', 'Product': 'CloudExplorer-Lite', 'Versions': '< 1.3.1'}
|
CVE-2023-38738
|
IBM OpenPages with Watson 8.3 and 9.0 could provide weaker than expected security in a OpenPages environment using Native authentication. If OpenPages is using Native authentication an attacker with access to the OpenPages database could through a series of specially crafted steps could exploit this weakness and gain unauthorized access to other OpenPages accounts. IBM X-Force ID: 262594.
|
https://www.ibm.com/support/pages/node/7107775
|
2023-07-25T00:01:17.449Z
|
2024-01-19T00:41:22.409Z
|
2024-01-19T01:02:53.626Z
|
{'Vendor': 'IBM', 'Product': 'OpenPages with Watson', 'Versions': '8.3, 9.0'}
|
CVE-2023-38446
|
In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges
|
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
|
2023-07-18T07:24:19.586Z
|
2023-09-04T01:16:04.688Z
|
2023-09-04T01:16:04.688Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
|
CVE-2023-38915
|
File Upload vulnerability in Wolf-leo EasyAdmin8 v.1.0 allows a remote attacker to execute arbtirary code via the upload type function.
|
https://github.com/wolf-leo/EasyAdmin8/issues/1
|
2023-07-25T00:00:00
|
2023-08-15T00:00:00
|
2023-08-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38850
|
Buffer Overflow vulnerability in Michaelrsweet codedoc v.3.7 allows an attacker to cause a denial of service via the codedoc.c:1742 comppnent.
|
https://github.com/michaelrsweet/codedoc/issues/15
|
2023-07-25T00:00:00
|
2023-08-15T00:00:00
|
2023-08-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38503
|
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.3.0 and prior to version 10.5.0, the permission filters (i.e. `user_created IS $CURRENT_USER`) are not properly checked when using GraphQL subscription resulting in unauthorized users getting event on their subscription which they should not be receiving according to the permissions. This can be any collection but out-of-the box the `directus_users` collection is configured with such a permissions filter allowing you to get updates for other users when changes happen. Version 10.5.0 contains a patch. As a workaround, disable GraphQL subscriptions.
|
https://github.com/directus/directus/security/advisories/GHSA-gggm-66rh-pp98
|
2023-07-18T16:28:12.077Z
|
2023-07-25T22:06:00.476Z
|
2023-07-25T22:06:00.476Z
|
{'Vendor': 'directus', 'Product': 'directus', 'Versions': '>= 10.3.0, < 10.5.0'}
|
CVE-2023-38447
|
In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges
|
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
|
2023-07-18T07:24:19.586Z
|
2023-09-04T01:16:04.962Z
|
2023-09-04T01:16:04.962Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
|
CVE-2023-38914
| null | null |
2023-07-25T00:00:00
| null |
2023-11-24T12:50:49.526350
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-38851
|
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the xls_parseWorkBook function in xls.c:1018.
|
https://github.com/libxls/libxls/issues/124
|
2023-07-25T00:00:00
|
2023-08-15T00:00:00
|
2023-08-15T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38152
|
DHCP Server Service Information Disclosure Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38152
|
2023-07-12T23:41:45.860Z
|
2023-09-12T16:58:19.162Z
|
2023-12-14T20:11:35.104Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
|
CVE-2023-38502
|
TDengine is an open source, time-series database optimized for Internet of Things devices. Prior to version 3.0.7.1, TDengine DataBase crashes on UDF nested query. This issue affects TDengine Databases which let users connect and run arbitrary queries. Version 3.0.7.1 has a patch for this issue.
|
https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf
|
2023-07-18T16:28:12.077Z
|
2023-07-25T21:14:22.087Z
|
2023-07-25T21:14:22.087Z
|
{'Vendor': 'taosdata', 'Product': 'TDengine', 'Versions': '< 3.0.7.1'}
|
CVE-2023-38943
|
ShuiZe_0x727 v1.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /iniFile/config.ini.
|
https://github.com/0x727/ShuiZe_0x727
|
2023-07-25T00:00:00
|
2023-08-05T00:00:00
|
2023-08-05T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38410
|
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A user may be able to elevate privileges.
|
https://support.apple.com/en-us/HT213841
|
2023-07-20T15:04:15.867Z
|
2023-07-26T23:55:10.127Z
|
2023-07-27T03:45:29.915Z
|
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
|
CVE-2023-38040
|
A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions..
|
https://hackerone.com/reports/1694171
|
2023-07-12T01:00:11.881Z
|
2023-09-17T04:41:38.080Z
|
2023-09-17T04:41:38.080Z
|
{'Vendor': 'Revive', 'Product': 'Revive Adserver', 'Versions': '5.4.1'}
|
CVE-2023-38555
|
Authentication bypass vulnerability in Fujitsu network devices Si-R series and SR-M series allows a network-adjacent unauthenticated attacker to obtain, change, and/or reset configuration settings of the affected products. Affected products and versions are as follows: Si-R 30B all versions, Si-R 130B all versions, Si-R 90brin all versions, Si-R570B all versions, Si-R370B all versions, Si-R220D all versions, Si-R G100 V02.54 and earlier, Si-R G200 V02.54 and earlier, Si-R G100B V04.12 and earlier, Si-R G110B V04.12 and earlier, Si-R G200B V04.12 and earlier, Si-R G210 V20.52 and earlier, Si-R G211 V20.52 and earlier, Si-R G120 V20.52 and earlier, Si-R G121 V20.52 and earlier, and SR-M 50AP1 all versions.
|
https://www.fujitsu.com/jp/products/network/support/2023/fjlan-01/
|
2023-07-20T04:38:59.286Z
|
2023-07-26T07:43:21.819Z
|
2023-07-26T07:43:21.819Z
|
{'Vendor': 'Fujitsu Limited', 'Product': 'Si-R 30B', 'Versions': 'All versions '}
|
CVE-2023-38390
|
Cross-Site Request Forgery (CSRF) vulnerability in Anshul Labs Mobile Address Bar Changer plugin <= 3.0 versions.
|
https://patchstack.com/database/vulnerability/mobile-address-bar-changer/wordpress-mobile-address-bar-changer-plugin-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-07-17T15:21:38.732Z
|
2023-10-03T10:24:56.418Z
|
2023-10-03T10:24:56.418Z
|
{'Vendor': 'Anshul Labs', 'Product': 'Mobile Address Bar Changer', 'Versions': 'n/a'}
|
CVE-2023-38685
|
Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, information about restricted-visibility topic tags could be obtained by unauthorized users. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches.
|
https://github.com/discourse/discourse/security/advisories/GHSA-wx6x-q4gp-mgv5
|
2023-07-24T16:19:28.363Z
|
2023-07-28T15:27:19.780Z
|
2023-07-28T15:27:19.780Z
|
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '>= 3.1.0.beta1, < 3.1.0.beta7, < 3.0.6'}
|
CVE-2023-38056
|
Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
|
https://otrs.com/release-notes/otrs-security-advisory-2023-05/
|
2023-07-12T08:05:38.780Z
|
2023-07-24T08:27:13.127Z
|
2023-07-24T08:27:26.270Z
|
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}
|
CVE-2023-38406
|
bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a "flowspec overflow."
|
https://github.com/FRRouting/frr/pull/12884
|
2023-07-17T00:00:00
|
2023-11-06T00:00:00
|
2023-11-06T05:04:35.699535
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38955
|
ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to obtain sensitive information about all managed devices, including their IP addresses and device names.
|
http://zkteco.com
|
2023-07-25T00:00:00
|
2023-08-03T00:00:00
|
2023-08-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38543
|
A vulnerability exists on all versions of the Ivanti Secure Access Client below 22.6R1.1, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to a denial of service (DoS) condition on the user machine.
|
https://forums.ivanti.com/s/article/Security-fixes-included-in-the-latest-Ivanti-Secure-Access-Client-Release
|
2023-07-20T01:00:12.443Z
|
2023-11-14T23:18:08.348Z
|
2023-11-22T23:28:30.776Z
|
{'Vendor': 'Ivanti', 'Product': 'Secure Access Client Windows', 'Versions': '22.6R1.1'}
|
CVE-2023-38328
|
An issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password.
|
https://www.gruppotim.it/it/footer/red-team.html
|
2023-07-14T00:00:00
|
2023-10-26T00:00:00
|
2023-10-26T21:31:46.581910
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38902
|
A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field.
|
https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37
|
2023-07-25T00:00:00
|
2023-08-17T00:00:00
|
2023-08-18T18:19:51.741966
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38451
|
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
|
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
|
2023-07-18T07:24:19.586Z
|
2023-09-04T01:16:06.158Z
|
2023-09-04T01:16:06.158Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
|
CVE-2023-38144
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38144
|
2023-07-12T23:41:45.859Z
|
2023-09-12T16:58:22.313Z
|
2023-12-14T20:11:38.167Z
|
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
|
CVE-2023-38847
|
An issue in CHRISTINA JAPAN Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.
|
https://liff.line.me/1657631315-oX5J26Ak
|
2023-07-25T00:00:00
|
2023-10-25T00:00:00
|
2023-10-25T21:44:14.492413
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38353
|
MiniTool Power Data Recovery version 11.6 and before contains an insecure in-app payment system that allows attackers to steal highly sensitive information through a man in the middle attack.
|
https://0dr3f.github.io/cve/
|
2023-07-15T00:00:00
|
2023-09-19T00:00:00
|
2023-09-25T21:39:35.486789
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38703
|
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
|
https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
|
2023-07-24T16:19:28.365Z
|
2023-10-06T13:46:54.238Z
|
2023-10-06T13:46:54.238Z
|
{'Vendor': 'pjsip', 'Product': 'pjproject', 'Versions': '<= 2.13.1'}
|
CVE-2023-38216
|
Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/bridge/apsb23-49.html
|
2023-07-13T16:21:52.613Z
|
2023-10-11T11:40:55.056Z
|
2023-10-11T11:40:55.056Z
|
{'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'}
|
CVE-2023-38646
|
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
|
https://www.metabase.com/blog/security-advisory
|
2023-07-21T00:00:00
|
2023-07-21T00:00:00
|
2023-08-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38996
|
An issue in all versions of Douran DSGate allows a local authenticated privileged attacker to execute arbitrary code via the debug command.
|
https://douran.com/en-US/Dourtal/4797/page/DSGate
|
2023-07-25T00:00:00
|
2023-08-22T00:00:00
|
2023-08-22T16:57:06.099787
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38580
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges.
|
https://support.apple.com/en-us/HT213841
|
2023-07-20T15:04:25.791Z
|
2023-07-27T00:22:11.442Z
|
2023-07-27T03:45:33.078Z
|
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
|
CVE-2023-38304
|
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality, allowing an attacker to store a malicious payload in the Group Name field when creating a new group.
|
https://webmin.com/tags/webmin-changelog/
|
2023-07-14T00:00:00
|
2023-07-31T00:00:00
|
2023-07-31T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38611
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
|
https://support.apple.com/en-us/HT213847
|
2023-07-20T15:04:44.409Z
|
2023-07-27T00:22:12.030Z
|
2023-07-27T03:45:33.654Z
|
{'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'}
|
CVE-2023-38241
|
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
|
2023-07-13T16:21:52.616Z
|
2023-08-10T13:17:26.555Z
|
2023-08-10T13:17:26.555Z
|
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
|
CVE-2023-38492
|
Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities.
Kirby's authentication endpoint did not limit the password length. This allowed attackers to provide a password with a length up to the server's maximum request body length. Validating that password against the user's actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This could be abused by an attacker to cause the website to become unresponsive or unavailable. Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour.
The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have added password length limits in the affected code so that passwords longer than 1000 bytes are immediately blocked, both when setting a password and when logging in.
|
https://github.com/getkirby/kirby/security/advisories/GHSA-3v6j-v3qc-cxff
|
2023-07-18T16:28:12.075Z
|
2023-07-27T15:43:55.533Z
|
2023-07-27T15:43:55.533Z
|
{'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'}
|
CVE-2023-38538
|
A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.
|
https://www.whatsapp.com/security/advisories/2023/
|
2023-07-19T20:34:49.827Z
|
2023-10-04T19:10:49.627Z
|
2023-10-04T19:10:49.627Z
|
{'Vendor': 'Facebook', 'Product': 'WhatsApp Desktop for Mac', 'Versions': '0'}
|
CVE-2023-38187
|
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38187
|
2023-07-12T23:41:45.869Z
|
2023-07-21T17:51:58.498Z
|
2023-12-14T19:53:27.429Z
|
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
|
CVE-2023-38884
|
An Insecure Direct Object Reference (IDOR) vulnerability in the Community Edition version 9.0 of openSIS Classic allows an unauthenticated remote attacker to access any student's files by visiting '/assets/studentfiles/<studentId>-<filename>'
|
https://github.com/OS4ED/openSIS-Classic
|
2023-07-25T00:00:00
|
2023-11-20T00:00:00
|
2023-11-20T18:47:44.520903
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38312
|
A directory traversal vulnerability in Valve Counter-Strike 8684 allows a client (with remote control access to a game server) to read arbitrary files from the underlying server via the motdfile console variable.
|
https://github.com/MikeIsAStar/Counter-Strike-Arbitrary-File-Read
|
2023-07-14T00:00:00
|
2023-10-15T00:00:00
|
2023-10-15T18:43:08.032540
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38257
|
Iagona ScrutisWeb versions 2.1.37 and prior are vulnerable to an insecure direct object reference vulnerability that could allow an unauthenticated user to view profile information, including user login names and encrypted passwords.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-03
|
2023-07-13T17:28:15.854Z
|
2023-07-18T17:17:29.939Z
|
2023-07-18T17:17:29.939Z
|
{'Vendor': 'iagona', 'Product': 'ScrutisWeb', 'Versions': '0'}
|
CVE-2023-38607
|
The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14. An app may be able to modify Printer settings.
|
https://support.apple.com/en-us/HT213940
|
2023-07-20T15:04:44.408Z
|
2024-01-10T22:03:17.061Z
|
2024-01-10T22:03:17.061Z
|
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
|
CVE-2023-38484
|
Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise.
|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt
|
2023-07-18T14:34:27.164Z
|
2023-09-06T17:47:18.689Z
|
2023-09-06T17:47:18.689Z
|
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': '9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways', 'Versions': 'ArubaOS 10.4.x.x, ArubaOS 8.11.x.x, ArubaOS 8.10.x.x, ArubaOS 8.6.x.x'}
|
CVE-2023-38938
|
Tenda F1202 V1.2.0.9, PA202 V1.1.2.5, PW201A V1.1.2.5 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the page parameter at /L7Im.
|
https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/frmL7ImForm
|
2023-07-25T00:00:00
|
2023-08-07T00:00:00
|
2023-08-07T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38191
|
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spamtest_external.php XSS via a crafted filename.
|
https://herolab.usd.de/security-advisories/
|
2023-07-13T00:00:00
|
2023-10-20T00:00:00
|
2023-10-20T21:27:03.478360
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38650
|
Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
|
2023-07-21T18:46:04.513Z
|
2024-01-08T14:47:46.758Z
|
2024-01-08T18:00:20.487Z
|
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
|
CVE-2023-38200
|
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
|
https://access.redhat.com/errata/RHSA-2023:5080
|
2023-07-13T13:12:48.727Z
|
2023-07-24T15:19:19.291Z
|
2024-01-23T02:46:55.213Z
|
{'Vendor': 'n/a', 'Product': 'keylime', 'Versions': '7.5.0'}
|
CVE-2023-38596
|
The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may fail to enforce App Transport Security.
|
https://support.apple.com/en-us/HT213938
|
2023-07-20T15:04:44.407Z
|
2023-09-26T20:12:07.189Z
|
2023-09-26T20:12:07.189Z
|
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
|
CVE-2023-38627
|
A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-38626.
|
https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US
|
2023-07-20T19:46:15.611Z
|
2024-01-23T20:34:54.008Z
|
2024-01-23T20:34:54.008Z
|
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex Central', 'Versions': '2019'}
|
CVE-2023-38332
|
Zoho ManageEngine ADManager Plus through 7201 allow authenticated users to take over another user's account via sensitive information disclosure.
|
https://manageengine.com
|
2023-07-14T00:00:00
|
2023-08-04T00:00:00
|
2023-08-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38762
|
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the friendmonths parameter within the /QueryView.php.
|
https://churchcrm.io/
|
2023-07-25T00:00:00
|
2023-08-08T00:00:00
|
2023-08-08T00:00:00
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-38559
|
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
|
https://access.redhat.com/errata/RHSA-2023:6544
|
2023-07-20T14:53:37.543Z
|
2023-08-01T16:49:47.537Z
|
2024-01-23T02:53:14.423Z
|
{'Vendor': 'n/a', 'Product': 'ghostscript', 'Versions': ''}
|
CVE-2023-38670
|
Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service.
|
https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md
|
2023-07-24T07:55:02.090Z
|
2023-07-26T10:50:12.245Z
|
2023-07-26T10:50:12.245Z
|
{'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'}
|
CVE-2023-38220
|
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Improper Authorization vulnerability that could lead in a security feature bypass in a way that an attacker could access unauthorised data. Exploitation of this issue does not require user interaction.
|
https://helpx.adobe.com/security/products/magento/apsb23-50.html
|
2023-07-13T16:21:52.614Z
|
2023-10-13T06:15:13.275Z
|
2023-10-13T06:15:13.275Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Commerce', 'Versions': '0'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.