CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-38734
IBM Robotic Process Automation 21.0.0 through 21.0.7.1 and 23.0.0 through 23.0.1 is vulnerable to incorrect privilege assignment when importing users from an LDAP directory. IBM X-Force ID: 262481.
https://www.ibm.com/support/pages/node/7028227
2023-07-25T00:01:17.449Z
2023-08-22T21:18:08.392Z
2023-08-22T21:18:08.392Z
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'}
CVE-2023-38364
IBM CICS TX Advanced 10.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 260821.
https://www.ibm.com/support/pages/node/7066429
2023-07-16T00:53:13.214Z
2023-11-13T01:47:44.043Z
2023-11-13T01:47:44.043Z
{'Vendor': 'IBM', 'Product': 'CICS TX Advanced', 'Versions': '10.1'}
CVE-2023-38558
A vulnerability has been identified in SIMATIC PCS neo (Administration Console) V4.0 (All versions), SIMATIC PCS neo (Administration Console) V4.0 Update 1 (All versions). The affected application leaks Windows admin credentials. An attacker with local access to the Administration Console could get the credentials, and impersonate the admin user, thereby gaining admin access to other Windows systems.
https://cert-portal.siemens.com/productcert/pdf/ssa-646240.pdf
2023-07-20T08:17:26.143Z
2023-09-14T10:39:29.769Z
2023-09-14T10:39:29.769Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC PCS neo (Administration Console) V4.0', 'Versions': 'All versions'}
CVE-2023-38276
IBM Cognos Dashboards on Cloud Pak for Data 4.7.0 exposes sensitive information in environment variables which could aid in further attacks against the system. IBM X-Force ID: 260736.
https://www.ibm.com/support/pages/node/7031207
2023-07-14T00:46:27.164Z
2023-10-22T01:02:41.722Z
2023-10-22T01:02:41.722Z
{'Vendor': 'IBM', 'Product': 'Cognos Dashboards on Cloud Pak for Data', 'Versions': '4.7.0'}
CVE-2023-38626
A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-38625.
https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US
2023-07-20T19:46:15.611Z
2024-01-23T20:34:41.067Z
2024-01-23T20:34:41.067Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex Central', 'Versions': '2019'}
CVE-2023-38333
Zoho ManageEngine Applications Manager through 16530 allows reflected XSS while logged in.
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2023-38333.html
2023-07-14T00:00:00
2023-08-10T00:00:00
2023-08-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38763
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the FundRaiserID parameter within the /FundRaiserEditor.php endpoint.
https://churchcrm.io/
2023-07-25T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38128
An out-of-bounds write vulnerability exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause a type confusion, which can lead to memory corruption and eventually arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809
2023-07-17T22:09:40.438Z
2023-10-19T17:00:42.797Z
2023-10-19T17:00:42.797Z
{'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'}
CVE-2023-38597
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213847
2023-07-20T15:04:44.407Z
2023-07-26T23:55:02.370Z
2023-07-27T03:45:22.171Z
{'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'}
CVE-2023-38344
An issue was discovered in Ivanti Endpoint Manager before 2022 SU4. A file disclosure vulnerability exists in the GetFileContents SOAP action exposed via /landesk/managementsuite/core/core.secure/OsdScript.asmx. The application does not sufficiently restrict user-supplied paths, allowing for an authenticated attacker to read arbitrary files from a remote system, including the private key used to authenticate to agents for remote access.
https://www.ivanti.com/releases
2023-07-15T00:00:00
2023-09-21T00:00:00
2023-09-21T21:00:04.415196
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38651
Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
2023-07-21T18:46:04.513Z
2024-01-08T14:47:46.837Z
2024-01-08T18:00:20.629Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-38201
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.
https://access.redhat.com/errata/RHSA-2023:5080
2023-07-13T13:12:48.728Z
2023-08-25T16:15:39.449Z
2024-01-23T02:47:01.905Z
{'Vendor': 'n/a', 'Product': 'keylime', 'Versions': '7.5.0'}
CVE-2023-38485
Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt
2023-07-18T14:34:27.165Z
2023-09-06T17:47:29.963Z
2023-09-06T17:47:29.963Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': '9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways', 'Versions': 'ArubaOS 10.4.x.x, ArubaOS 8.11.x.x, ArubaOS 8.10.x.x, ArubaOS 8.6.x.x'}
CVE-2023-38939
Tenda F1202 V1.2.0.9 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the mit_ssid parameter in the formWrlsafeset function.
https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/formWrlsafeset
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38190
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter.
https://herolab.usd.de/security-advisories/
2023-07-13T00:00:00
2023-10-21T00:00:00
2023-10-21T00:11:19.074426
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38313
An issue was discovered in OpenNDS Captive Portal before 10.1.2. it has a do_binauth NULL pointer dereference that can be triggered with a crafted GET HTTP request with a missing client redirect query string parameter. Triggering this issue results in crashing openNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set.
https://github.com/openNDS/openNDS/releases/tag/v10.1.2
2023-07-14T00:00:00
2023-11-17T00:00:00
2023-11-17T05:35:02.544321
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38743
Zoho ManageEngine ADManager Plus before Build 7200 allows admin users to execute commands on the host machine.
https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-38743.html
2023-07-25T00:00:00
2023-09-11T00:00:00
2023-09-11T18:50:15.623362
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38256
Dover Fueling Solutions MAGLINK LX Web Console Configuration versions 2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, and 3.3 vulnerable to a path traversal attack, which could allow an attacker to access files stored on the system.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-01
2023-09-01T20:57:37.393Z
2023-09-11T19:34:11.246Z
2023-09-11T19:34:11.246Z
{'Vendor': 'Dover Fueling Solutions', 'Product': 'MAGLINK LX Web Console Configuration', 'Versions': '2.5.1, 2.5.2, 2.5.3, 2.6.1, 2.11, 3.0, 3.2, 3.3'}
CVE-2023-38606
This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.
https://support.apple.com/en-us/HT213846
2023-07-20T15:04:44.408Z
2023-07-26T23:55:05.346Z
2023-07-27T03:45:25.227Z
{'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'}
CVE-2023-38493
Armeria is a microservice framework Spring supports Matrix variables. When Spring integration is used, Armeria calls Spring controllers via `TomcatService` or `JettyService` with the path that may contain matrix variables. Prior to version 1.24.3, the Armeria decorators might not invoked because of the matrix variables. If an attacker sends a specially crafted request, the request may bypass the authorizer. Version 1.24.3 contains a patch for this issue.
https://github.com/line/armeria/security/advisories/GHSA-wvp2-9ppw-337j
2023-07-18T16:28:12.076Z
2023-07-25T20:51:11.170Z
2023-07-25T20:51:11.170Z
{'Vendor': 'line', 'Product': 'armeria', 'Versions': '< 1.24.3'}
CVE-2023-38169
Microsoft SQL OLE DB Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38169
2023-07-12T23:41:45.863Z
2023-08-08T17:08:44.529Z
2023-12-14T20:03:16.725Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft OLE DB Driver 19 for SQL Server', 'Versions': '19.0.0'}
CVE-2023-38186
Windows Mobile Device Management Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38186
2023-07-12T23:41:45.869Z
2023-08-08T17:08:41.118Z
2023-12-14T20:03:13.722Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0, 10.0.0'}
CVE-2023-38885
OpenSIS Classic Community Edition version 9.0 lacks cross-site request forgery (CSRF) protection throughout the whole app. This may allow an attacker to trick an authenticated user into performing any kind of state changing request.
https://github.com/OS4ED/openSIS-Classic
2023-07-25T00:00:00
2023-11-20T00:00:00
2023-11-20T18:47:38.064135
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38305
An issue was discovered in Webmin 2.021. The download functionality allows an attacker to exploit a Cross-Site Scripting (XSS) vulnerability. By providing a crafted download path containing a malicious payload, an attacker can inject arbitrary code, which is then executed within the context of the victim's browser when the download link is accessed.
https://webmin.com/tags/webmin-changelog/
2023-07-14T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38610
A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in macOS Sonoma 14, iOS 17 and iPadOS 17. An app may be able to cause unexpected system termination or write kernel memory.
https://support.apple.com/en-us/HT213938
2023-07-20T15:04:44.409Z
2024-01-10T22:03:11.487Z
2024-01-10T22:03:11.487Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-38240
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.616Z
2023-08-10T13:17:28.966Z
2023-08-10T13:17:28.966Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38997
A directory traversal vulnerability in the Captive Portal templates of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to execute arbitrary system commands as root via a crafted ZIP archive.
https://github.com/opnsense/core/commit/448762d440b51574f1906c0ec2f5ea6dc4f16eb2
2023-07-25T00:00:00
2023-08-09T00:00:00
2023-10-10T22:21:54.373450
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38352
MiniTool Partition Wizard 12.8 contains an insecure update mechanism that allows attackers to achieve remote code execution through a man in the middle attack.
https://0dr3f.github.io/cve/
2023-07-15T00:00:00
2023-09-19T00:00:00
2023-09-19T15:36:47.328624
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38702
Knowage is an open source analytics and business intelligence suite. Starting in the 6.x.x branch and prior to version 8.1.8, the endpoint `/knowage/restful-services/dossier/importTemplateFile` allows authenticated users to upload `template file` on the server, but does not need any authorization to be reached. When the JSP file is uploaded, the attacker just needs to connect to `/knowageqbeengine/foo.jsp` to gain code execution on the server. By exploiting this vulnerability, an attacker with low privileges can upload a JSP file to the `knowageqbeengine` directory and gain code execution capability on the server. This issue has been patched in Knowage version 8.1.8.
https://github.com/KnowageLabs/Knowage-Server/security/advisories/GHSA-7mjh-73q3-c3fc
2023-07-24T16:19:28.365Z
2023-08-04T18:10:28.899Z
2023-08-04T18:10:28.899Z
{'Vendor': 'KnowageLabs', 'Product': 'Knowage-Server', 'Versions': '>= 6.0.0, < 8.1.8'}
CVE-2023-38217
Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by an Out-of-bounds Read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/bridge/apsb23-49.html
2023-07-13T16:21:52.613Z
2023-10-11T11:40:56.484Z
2023-10-11T11:40:56.484Z
{'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'}
CVE-2023-38647
An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. This unbounded deserialization can likely lead to remote code execution. The code can be run in Helix REST start and Workflow creation. Affect all the versions lower and include 1.2.0. Affected products: helix-core, helix-rest Mitigation: Short term, stop using any YAML based configuration and workflow creation.                   Long term, all Helix version bumping up to 1.3.0 
https://lists.apache.org/thread/zyqxhv0lc2z9w3tgr8ttrdy2zfh5jvc4
2023-07-21T17:22:07.744Z
2023-07-26T07:52:29.741Z
2023-07-26T07:52:29.741Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Helix', 'Versions': '0'}
CVE-2023-38450
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.586Z
2023-09-04T01:16:05.855Z
2023-09-04T01:16:05.855Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38000
Auth. Stored (contributor+) Cross-Site Scripting (XSS) vulnerability in WordPress core 6.3 through 6.3.1, from 6.2 through 6.2.2, from 6.1 through 6.1.3, from 6.0 through 6.0.5, from 5.9 through 5.9.7 and Gutenberg plugin <= 16.8.0 versions.
https://patchstack.com/articles/wordpress-core-6-3-2-security-update-technical-advisory?_s_id=cve
2023-07-11T12:50:13.630Z
2023-10-13T09:55:54.690Z
2023-10-13T10:34:00.870Z
{'Vendor': 'WordPress.org', 'Product': 'WordPress', 'Versions': '6.3, 6.2, 6.1, 6.0, 5.9'}
CVE-2023-38515
Server-Side Request Forgery (SSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 3.7.56.
https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-3-7-56-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
2023-07-18T17:33:34.154Z
2023-11-13T02:32:33.748Z
2023-11-13T02:32:33.748Z
{'Vendor': 'Andy Moyle', 'Product': 'Church Admin', 'Versions': 'n/a'}
CVE-2023-38846
An issue in Marbre Lapin Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.
https://liff.line.me/1657925980-KmmGkje5
2023-07-25T00:00:00
2023-10-25T00:00:00
2023-10-25T21:40:19.508658
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38283
In OpenBGPD before 8.1, incorrect handling of BGP update data (length of path attributes) set by a potentially distant remote actor may cause the system to incorrectly reset a session. This is fixed in OpenBSD 7.3 errata 006.
https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/006_bgpd.patch.sig
2023-07-14T00:00:00
2023-08-29T00:00:00
2023-08-29T15:24:54.279568
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38057
An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent. This issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.
https://otrs.com/release-notes/otrs-security-advisory-2023-06/
2023-07-12T08:05:38.780Z
2023-07-24T08:27:55.315Z
2023-07-24T08:27:55.315Z
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}
CVE-2023-38407
bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.
https://github.com/FRRouting/frr/pull/12951
2023-07-17T00:00:00
2023-11-06T00:00:00
2023-11-06T05:04:18.947838
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38954
ZKTeco BioAccess IVS v3.3.1 was discovered to contain a SQL injection vulnerability.
http://zkteco.com
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38391
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themesgrove Onepage Builder allows SQL Injection.This issue affects Onepage Builder: from n/a through 2.4.1.
https://patchstack.com/database/vulnerability/tx-onepager/wordpress-onepage-builder-easiest-landing-page-builder-for-wordpress-plugin-2-4-1-sql-injection?_s_id=cve
2023-07-17T15:22:13.926Z
2023-11-03T23:07:33.642Z
2023-11-03T23:07:33.642Z
{'Vendor': 'Themesgrove', 'Product': 'Onepage Builder', 'Versions': 'n/a'}
CVE-2023-38684
Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, in multiple controller actions, Discourse accepts limit params but does not impose any upper bound on the values being accepted. Without an upper bound, the software may allow arbitrary users to generate DB queries which may end up exhausting the resources on the server. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability.
https://github.com/discourse/discourse/security/advisories/GHSA-ff7g-xv79-hgmf
2023-07-24T16:19:28.363Z
2023-07-28T15:25:41.132Z
2023-07-28T15:25:41.132Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '>= 3.1.0.beta1, < 3.1.0.beta7, < 3.0.6'}
CVE-2023-38942
Dango-Translator v4.5.5 was discovered to contain a remote command execution (RCE) vulnerability via the component app/config/cloud_config.json.
https://github.com/PantsuDango/Dango-Translator
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38411
Improper access control in the Intel Smart Campus android application before version 9.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00863.html
2023-08-02T03:00:04.706Z
2023-11-14T19:05:02.227Z
2023-11-14T19:05:02.227Z
{'Vendor': 'n/a', 'Product': 'Intel Smart Campus android application', 'Versions': 'before version 9.4'}
CVE-2023-38041
A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
https://forums.ivanti.com/s/article/CVE-2023-38041-New-client-side-release-to-address-a-privilege-escalation-on-Windows-user-machines?language=en_US
2023-07-12T01:00:11.881Z
2023-10-25T00:24:34.090Z
2023-10-25T00:24:34.090Z
{'Vendor': 'Ivanti', 'Product': 'Secure Access Client', 'Versions': '22.6R1'}
CVE-2023-38554
In wcn bsp driver, there is a possible out of bounds write due to a missing bounds check.This could lead to local denial of service with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-20T03:26:16.996Z
2023-09-04T01:16:11.483Z
2023-09-04T01:16:11.483Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
CVE-2023-38387
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Elastic Email Sender plugin <= 1.2.6 versions.
https://patchstack.com/database/vulnerability/elastic-email-sender/wordpress-elastic-email-sender-plugin-1-2-6-cross-site-scripting-xss?_s_id=cve
2023-07-17T15:21:38.731Z
2023-09-03T11:13:14.710Z
2023-09-03T11:13:14.710Z
{'Vendor': 'Elastic Email Sender', 'Product': 'Elastic Email Sender', 'Versions': 'n/a'}
CVE-2023-38692
CloudExplorer Lite is an open source, lightweight cloud management platform. Versions prior to 1.3.1 contain a command injection vulnerability in the installation function in module management. The vulnerability has been fixed in v1.3.1. There are no known workarounds aside from upgrading.
https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/security/advisories/GHSA-7wrc-f42m-9v5w
2023-07-24T16:19:28.364Z
2023-08-04T17:22:39.567Z
2023-08-04T17:22:39.567Z
{'Vendor': 'CloudExplorer-Dev', 'Product': 'CloudExplorer-Lite', 'Versions': '< 1.3.1'}
CVE-2023-38738
IBM OpenPages with Watson 8.3 and 9.0 could provide weaker than expected security in a OpenPages environment using Native authentication. If OpenPages is using Native authentication an attacker with access to the OpenPages database could through a series of specially crafted steps could exploit this weakness and gain unauthorized access to other OpenPages accounts. IBM X-Force ID: 262594.
https://www.ibm.com/support/pages/node/7107775
2023-07-25T00:01:17.449Z
2024-01-19T00:41:22.409Z
2024-01-19T01:02:53.626Z
{'Vendor': 'IBM', 'Product': 'OpenPages with Watson', 'Versions': '8.3, 9.0'}
CVE-2023-38446
In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.586Z
2023-09-04T01:16:04.688Z
2023-09-04T01:16:04.688Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38915
File Upload vulnerability in Wolf-leo EasyAdmin8 v.1.0 allows a remote attacker to execute arbtirary code via the upload type function.
https://github.com/wolf-leo/EasyAdmin8/issues/1
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38850
Buffer Overflow vulnerability in Michaelrsweet codedoc v.3.7 allows an attacker to cause a denial of service via the codedoc.c:1742 comppnent.
https://github.com/michaelrsweet/codedoc/issues/15
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38503
Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.3.0 and prior to version 10.5.0, the permission filters (i.e. `user_created IS $CURRENT_USER`) are not properly checked when using GraphQL subscription resulting in unauthorized users getting event on their subscription which they should not be receiving according to the permissions. This can be any collection but out-of-the box the `directus_users` collection is configured with such a permissions filter allowing you to get updates for other users when changes happen. Version 10.5.0 contains a patch. As a workaround, disable GraphQL subscriptions.
https://github.com/directus/directus/security/advisories/GHSA-gggm-66rh-pp98
2023-07-18T16:28:12.077Z
2023-07-25T22:06:00.476Z
2023-07-25T22:06:00.476Z
{'Vendor': 'directus', 'Product': 'directus', 'Versions': '>= 10.3.0, < 10.5.0'}
CVE-2023-38447
In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.586Z
2023-09-04T01:16:04.962Z
2023-09-04T01:16:04.962Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38914
null
null
2023-07-25T00:00:00
null
2023-11-24T12:50:49.526350
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-38851
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the xls_parseWorkBook function in xls.c:1018.
https://github.com/libxls/libxls/issues/124
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38152
DHCP Server Service Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38152
2023-07-12T23:41:45.860Z
2023-09-12T16:58:19.162Z
2023-12-14T20:11:35.104Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-38502
TDengine is an open source, time-series database optimized for Internet of Things devices. Prior to version 3.0.7.1, TDengine DataBase crashes on UDF nested query. This issue affects TDengine Databases which let users connect and run arbitrary queries. Version 3.0.7.1 has a patch for this issue.
https://github.com/taosdata/TDengine/security/advisories/GHSA-w23f-r2fm-27hf
2023-07-18T16:28:12.077Z
2023-07-25T21:14:22.087Z
2023-07-25T21:14:22.087Z
{'Vendor': 'taosdata', 'Product': 'TDengine', 'Versions': '< 3.0.7.1'}
CVE-2023-38943
ShuiZe_0x727 v1.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /iniFile/config.ini.
https://github.com/0x727/ShuiZe_0x727
2023-07-25T00:00:00
2023-08-05T00:00:00
2023-08-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38410
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A user may be able to elevate privileges.
https://support.apple.com/en-us/HT213841
2023-07-20T15:04:15.867Z
2023-07-26T23:55:10.127Z
2023-07-27T03:45:29.915Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-38040
A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions..
https://hackerone.com/reports/1694171
2023-07-12T01:00:11.881Z
2023-09-17T04:41:38.080Z
2023-09-17T04:41:38.080Z
{'Vendor': 'Revive', 'Product': 'Revive Adserver', 'Versions': '5.4.1'}
CVE-2023-38555
Authentication bypass vulnerability in Fujitsu network devices Si-R series and SR-M series allows a network-adjacent unauthenticated attacker to obtain, change, and/or reset configuration settings of the affected products. Affected products and versions are as follows: Si-R 30B all versions, Si-R 130B all versions, Si-R 90brin all versions, Si-R570B all versions, Si-R370B all versions, Si-R220D all versions, Si-R G100 V02.54 and earlier, Si-R G200 V02.54 and earlier, Si-R G100B V04.12 and earlier, Si-R G110B V04.12 and earlier, Si-R G200B V04.12 and earlier, Si-R G210 V20.52 and earlier, Si-R G211 V20.52 and earlier, Si-R G120 V20.52 and earlier, Si-R G121 V20.52 and earlier, and SR-M 50AP1 all versions.
https://www.fujitsu.com/jp/products/network/support/2023/fjlan-01/
2023-07-20T04:38:59.286Z
2023-07-26T07:43:21.819Z
2023-07-26T07:43:21.819Z
{'Vendor': 'Fujitsu Limited', 'Product': 'Si-R 30B', 'Versions': 'All versions '}
CVE-2023-38390
Cross-Site Request Forgery (CSRF) vulnerability in Anshul Labs Mobile Address Bar Changer plugin <= 3.0 versions.
https://patchstack.com/database/vulnerability/mobile-address-bar-changer/wordpress-mobile-address-bar-changer-plugin-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-07-17T15:21:38.732Z
2023-10-03T10:24:56.418Z
2023-10-03T10:24:56.418Z
{'Vendor': 'Anshul Labs', 'Product': 'Mobile Address Bar Changer', 'Versions': 'n/a'}
CVE-2023-38685
Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, information about restricted-visibility topic tags could be obtained by unauthorized users. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches.
https://github.com/discourse/discourse/security/advisories/GHSA-wx6x-q4gp-mgv5
2023-07-24T16:19:28.363Z
2023-07-28T15:27:19.780Z
2023-07-28T15:27:19.780Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '>= 3.1.0.beta1, < 3.1.0.beta7, < 3.0.6'}
CVE-2023-38056
Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
https://otrs.com/release-notes/otrs-security-advisory-2023-05/
2023-07-12T08:05:38.780Z
2023-07-24T08:27:13.127Z
2023-07-24T08:27:26.270Z
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}
CVE-2023-38406
bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a "flowspec overflow."
https://github.com/FRRouting/frr/pull/12884
2023-07-17T00:00:00
2023-11-06T00:00:00
2023-11-06T05:04:35.699535
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38955
ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to obtain sensitive information about all managed devices, including their IP addresses and device names.
http://zkteco.com
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38543
A vulnerability exists on all versions of the Ivanti Secure Access Client below 22.6R1.1, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to a denial of service (DoS) condition on the user machine.
https://forums.ivanti.com/s/article/Security-fixes-included-in-the-latest-Ivanti-Secure-Access-Client-Release
2023-07-20T01:00:12.443Z
2023-11-14T23:18:08.348Z
2023-11-22T23:28:30.776Z
{'Vendor': 'Ivanti', 'Product': 'Secure Access Client Windows', 'Versions': '22.6R1.1'}
CVE-2023-38328
An issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password.
https://www.gruppotim.it/it/footer/red-team.html
2023-07-14T00:00:00
2023-10-26T00:00:00
2023-10-26T21:31:46.581910
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38902
A command injection vulnerability in RG-EW series home routers and repeaters v.EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches v.SWITCH_3.0(1)B11P219, RG-EG series business VPN routers v.EG_3.0(1)B11P219, EAP and RAP series wireless access points v.AP_3.0(1)B11P219, and NBC series wireless controllers v.AC_3.0(1)B11P219 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /cgi-bin/luci/api/cmd via the remoteIp field.
https://gist.github.com/ZIKH26/18693c67ee7d2f8d2c60231b19194c37
2023-07-25T00:00:00
2023-08-17T00:00:00
2023-08-18T18:19:51.741966
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38451
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.586Z
2023-09-04T01:16:06.158Z
2023-09-04T01:16:06.158Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38144
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38144
2023-07-12T23:41:45.859Z
2023-09-12T16:58:22.313Z
2023-12-14T20:11:38.167Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38847
An issue in CHRISTINA JAPAN Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.
https://liff.line.me/1657631315-oX5J26Ak
2023-07-25T00:00:00
2023-10-25T00:00:00
2023-10-25T21:44:14.492413
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38353
MiniTool Power Data Recovery version 11.6 and before contains an insecure in-app payment system that allows attackers to steal highly sensitive information through a man in the middle attack.
https://0dr3f.github.io/cve/
2023-07-15T00:00:00
2023-09-19T00:00:00
2023-09-25T21:39:35.486789
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38703
PJSIP is a free and open source multimedia communication library written in C with high level API in C, C++, Java, C#, and Python languages. SRTP is a higher level media transport which is stacked upon a lower level media transport such as UDP and ICE. Currently a higher level transport is not synchronized with its lower level transport that may introduce use-after-free issue. This vulnerability affects applications that have SRTP capability (`PJMEDIA_HAS_SRTP` is set) and use underlying media transport other than UDP. This vulnerability’s impact may range from unexpected application termination to control flow hijack/memory corruption. The patch is available as a commit in the master branch.
https://github.com/pjsip/pjproject/security/advisories/GHSA-f76w-fh7c-pc66
2023-07-24T16:19:28.365Z
2023-10-06T13:46:54.238Z
2023-10-06T13:46:54.238Z
{'Vendor': 'pjsip', 'Product': 'pjproject', 'Versions': '<= 2.13.1'}
CVE-2023-38216
Adobe Bridge versions 12.0.4 (and earlier) and 13.0.3 (and earlier) are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/bridge/apsb23-49.html
2023-07-13T16:21:52.613Z
2023-10-11T11:40:55.056Z
2023-10-11T11:40:55.056Z
{'Vendor': 'Adobe', 'Product': 'Bridge', 'Versions': '0'}
CVE-2023-38646
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
https://www.metabase.com/blog/security-advisory
2023-07-21T00:00:00
2023-07-21T00:00:00
2023-08-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38996
An issue in all versions of Douran DSGate allows a local authenticated privileged attacker to execute arbitrary code via the debug command.
https://douran.com/en-US/Dourtal/4797/page/DSGate
2023-07-25T00:00:00
2023-08-22T00:00:00
2023-08-22T16:57:06.099787
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38580
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, watchOS 9.6. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213841
2023-07-20T15:04:25.791Z
2023-07-27T00:22:11.442Z
2023-07-27T03:45:33.078Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-38304
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality, allowing an attacker to store a malicious payload in the Group Name field when creating a new group.
https://webmin.com/tags/webmin-changelog/
2023-07-14T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38611
The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213847
2023-07-20T15:04:44.409Z
2023-07-27T00:22:12.030Z
2023-07-27T03:45:33.654Z
{'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'}
CVE-2023-38241
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.616Z
2023-08-10T13:17:26.555Z
2023-08-10T13:17:26.555Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38492
Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). The real-world impact of this vulnerability is limited, however we still recommend to update to one of the patch releases because they also fix more severe vulnerabilities. Kirby's authentication endpoint did not limit the password length. This allowed attackers to provide a password with a length up to the server's maximum request body length. Validating that password against the user's actual password requires hashing the provided password, which requires more CPU and memory resources (and therefore processing time) the longer the provided password gets. This could be abused by an attacker to cause the website to become unresponsive or unavailable. Because Kirby comes with a built-in brute force protection, the impact of this vulnerability is limited to 10 failed logins from each IP address and 10 failed logins for each existing user per hour. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have added password length limits in the affected code so that passwords longer than 1000 bytes are immediately blocked, both when setting a password and when logging in.
https://github.com/getkirby/kirby/security/advisories/GHSA-3v6j-v3qc-cxff
2023-07-18T16:28:12.075Z
2023-07-27T15:43:55.533Z
2023-07-27T15:43:55.533Z
{'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'}
CVE-2023-38538
A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.
https://www.whatsapp.com/security/advisories/2023/
2023-07-19T20:34:49.827Z
2023-10-04T19:10:49.627Z
2023-10-04T19:10:49.627Z
{'Vendor': 'Facebook', 'Product': 'WhatsApp Desktop for Mac', 'Versions': '0'}
CVE-2023-38187
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38187
2023-07-12T23:41:45.869Z
2023-07-21T17:51:58.498Z
2023-12-14T19:53:27.429Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-38884
An Insecure Direct Object Reference (IDOR) vulnerability in the Community Edition version 9.0 of openSIS Classic allows an unauthenticated remote attacker to access any student's files by visiting '/assets/studentfiles/<studentId>-<filename>'
https://github.com/OS4ED/openSIS-Classic
2023-07-25T00:00:00
2023-11-20T00:00:00
2023-11-20T18:47:44.520903
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38312
A directory traversal vulnerability in Valve Counter-Strike 8684 allows a client (with remote control access to a game server) to read arbitrary files from the underlying server via the motdfile console variable.
https://github.com/MikeIsAStar/Counter-Strike-Arbitrary-File-Read
2023-07-14T00:00:00
2023-10-15T00:00:00
2023-10-15T18:43:08.032540
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38257
Iagona ScrutisWeb versions 2.1.37 and prior are vulnerable to an insecure direct object reference vulnerability that could allow an unauthenticated user to view profile information, including user login names and encrypted passwords.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-03
2023-07-13T17:28:15.854Z
2023-07-18T17:17:29.939Z
2023-07-18T17:17:29.939Z
{'Vendor': 'iagona', 'Product': 'ScrutisWeb', 'Versions': '0'}
CVE-2023-38607
The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14. An app may be able to modify Printer settings.
https://support.apple.com/en-us/HT213940
2023-07-20T15:04:44.408Z
2024-01-10T22:03:17.061Z
2024-01-10T22:03:17.061Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-38484
Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt
2023-07-18T14:34:27.164Z
2023-09-06T17:47:18.689Z
2023-09-06T17:47:18.689Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': '9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways', 'Versions': 'ArubaOS 10.4.x.x, ArubaOS 8.11.x.x, ArubaOS 8.10.x.x, ArubaOS 8.6.x.x'}
CVE-2023-38938
Tenda F1202 V1.2.0.9, PA202 V1.1.2.5, PW201A V1.1.2.5 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the page parameter at /L7Im.
https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/frmL7ImForm
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38191
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spamtest_external.php XSS via a crafted filename.
https://herolab.usd.de/security-advisories/
2023-07-13T00:00:00
2023-10-20T00:00:00
2023-10-20T21:27:03.478360
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38650
Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode times parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
2023-07-21T18:46:04.513Z
2024-01-08T14:47:46.758Z
2024-01-08T18:00:20.487Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-38200
A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
https://access.redhat.com/errata/RHSA-2023:5080
2023-07-13T13:12:48.727Z
2023-07-24T15:19:19.291Z
2024-01-23T02:46:55.213Z
{'Vendor': 'n/a', 'Product': 'keylime', 'Versions': '7.5.0'}
CVE-2023-38596
The issue was addressed with improved handling of protocols. This issue is fixed in tvOS 17, iOS 17 and iPadOS 17, watchOS 10, macOS Sonoma 14. An app may fail to enforce App Transport Security.
https://support.apple.com/en-us/HT213938
2023-07-20T15:04:44.407Z
2023-09-26T20:12:07.189Z
2023-09-26T20:12:07.189Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-38627
A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-38626.
https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US
2023-07-20T19:46:15.611Z
2024-01-23T20:34:54.008Z
2024-01-23T20:34:54.008Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex Central', 'Versions': '2019'}
CVE-2023-38332
Zoho ManageEngine ADManager Plus through 7201 allow authenticated users to take over another user's account via sensitive information disclosure.
https://manageengine.com
2023-07-14T00:00:00
2023-08-04T00:00:00
2023-08-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38762
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the friendmonths parameter within the /QueryView.php.
https://churchcrm.io/
2023-07-25T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38559
A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
https://access.redhat.com/errata/RHSA-2023:6544
2023-07-20T14:53:37.543Z
2023-08-01T16:49:47.537Z
2024-01-23T02:53:14.423Z
{'Vendor': 'n/a', 'Product': 'ghostscript', 'Versions': ''}
CVE-2023-38670
Null pointer dereference in paddle.flip in PaddlePaddle before 2.5.0. This resulted in a runtime crash and denial of service.
https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-002.md
2023-07-24T07:55:02.090Z
2023-07-26T10:50:12.245Z
2023-07-26T10:50:12.245Z
{'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'}
CVE-2023-38220
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by an Improper Authorization vulnerability that could lead in a security feature bypass in a way that an attacker could access unauthorised data. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/magento/apsb23-50.html
2023-07-13T16:21:52.614Z
2023-10-13T06:15:13.275Z
2023-10-13T06:15:13.275Z
{'Vendor': 'Adobe', 'Product': 'Adobe Commerce', 'Versions': '0'}