CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-38773 | SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp1 and volopp2 parameters within the /QueryView.php. | https://churchcrm.io/ | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38323 | An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands. | https://openwrt.org/docs/guide-user/services/captive-portal/opennds | 2023-07-14T00:00:00 | 2024-01-26T00:00:00 | 2024-01-26T04:51:21.065647 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38909 | An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function. | https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | 2023-07-25T00:00:00 | 2023-08-22T00:00:00 | 2024-01-19T19:43:11.341261 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38231 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.615Z | 2023-08-10T13:17:45.594Z | 2023-08-10T13:17:45.594Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38548 | A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. | https://www.veeam.com/kb4508 | 2023-07-20T01:00:12.444Z | 2023-11-07T06:17:31.637Z | 2023-11-07T06:17:31.637Z | {'Vendor': 'Veeam', 'Product': 'One', 'Versions': '12'} |
CVE-2023-38677 | FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md | 2023-07-24T07:55:02.091Z | 2024-01-03T08:11:39.268Z | 2024-01-03T08:11:39.268Z | {'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'} |
CVE-2023-38227 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.615Z | 2023-08-10T13:17:40.133Z | 2023-08-10T13:17:40.133Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38732 |
IBM Robotic Process Automation 21.0.0 through 21.0.7 server could allow an authenticated user to view sensitive information from application logs. IBM X-Force ID: 262289.
| https://www.ibm.com/support/pages/node/7028221 | 2023-07-25T00:01:06.101Z | 2023-08-22T13:13:42.214Z | 2023-08-22T13:13:42.214Z | {'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0'} |
CVE-2023-38698 | Ethereum Name Service (ENS) is a distributed, open, and extensible naming system based on the Ethereum blockchain. According to the documentation, controllers are allowed to register new domains and extend the expiry of existing domains, but they cannot change the ownership or reduce the expiration time of existing domains. However, a preliminary analysis suggests that an attacker-controlled controller may be able to reduce the expiration time of existing domains due to an integer overflow in the renew function. The vulnerability resides `@ensdomains/ens-contracts` prior to version 0.0.22.
If successfully exploited, this vulnerability would enable attackers to force the expiration of any ENS record, ultimately allowing them to claim the affected domains for themselves. Currently, it would require a malicious DAO to exploit it. Nevertheless, any vulnerability present in the controllers could potentially render this issue exploitable in the future. An additional concern is the possibility of renewal discounts. Should ENS decide to implement a system that offers unlimited .eth domains for a fixed fee in the future, the vulnerability could become exploitable by any user due to the reduced attack cost.
Version 0.0.22 contains a patch for this issue. As long as registration cost remains linear or superlinear based on registration duration, or limited to a reasonable maximum (eg, 1 million years), this vulnerability could only be exploited by a malicious DAO. The interim workaround is thus to take no action.
| https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3 | 2023-07-24T16:19:28.364Z | 2023-08-04T17:41:14.426Z | 2023-08-04T17:41:14.426Z | {'Vendor': 'ensdomains', 'Product': 'ens-contracts', 'Versions': '<= 0.0.21'} |
CVE-2023-38948 | An arbitrary file download vulnerability in the /c/PluginsController.php component of jizhi CMS 1.9.5 allows attackers to execute arbitrary code via downloading a crafted plugin. | https://gitee.com/CTF-hacker/pwn/issues/I7LI4E | 2023-07-25T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38620 | Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `lsb` array. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812 | 2023-07-20T19:05:43.914Z | 2024-01-08T14:47:48.155Z | 2024-01-08T18:00:19.364Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-38335 | Omnis Studio 10.22.00 has incorrect access control. It advertises a feature for making Omnis libraries "always private" - this is supposed to be an irreversible operation. However, due to implementation issues, "always private" Omnis libraries can be opened by the Omnis Studio browser by bypassing specific checks. This violates the expected behavior of an "irreversible operation". | https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt | 2023-07-14T00:00:00 | 2023-07-20T00:00:00 | 2023-07-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38765 | SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the membermonth parameter within the /QueryView.php. | https://churchcrm.io/ | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38509 | XWiki Platform is a generic wiki platform. In org.xwiki.platform:xwiki-platform-livetable-ui starting with version 3.5-milestone-1 and prior to versions 14.10.9 and 15.3-rc-1, the mail obfuscation configuration was not fully taken into account and is was still possible by obfuscated emails. This has been patched in XWiki 14.10.9 and XWiki 15.3-rc-1. A workaround is to modify the page `XWiki.LiveTableResultsMacros` following the patch. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g9w4-prf3-m25g | 2023-07-18T16:28:12.078Z | 2023-07-27T18:53:31.259Z | 2023-07-27T18:53:31.259Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 3.5-milestone-1, < 14.10.9, >= 15.0, < 15.3-rc-1'} |
CVE-2023-38159 | Windows Graphics Component Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38159 | 2023-07-12T23:41:45.861Z | 2023-10-10T17:08:08.854Z | 2023-12-14T01:15:43.615Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38508 | Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue. | https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992 | 2023-07-18T16:28:12.078Z | 2023-08-24T22:33:35.676Z | 2023-08-24T22:33:35.676Z | {'Vendor': 'Enalean', 'Product': 'tuleap', 'Versions': 'Tuleap Community Edition < 14.11.99.28, Tuleap Enterprise Edition < 14.10-6, Tuleap Enterprise Edition >= 14.11, < 14.11-3'} |
CVE-2023-38158 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38158 | 2023-07-12T23:41:45.861Z | 2023-08-21T19:04:16.901Z | 2023-12-14T20:03:17.693Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'} |
CVE-2023-38621 | Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `flags` array. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812 | 2023-07-20T19:05:43.914Z | 2024-01-08T14:47:48.282Z | 2024-01-08T18:00:19.489Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-38334 | Omnis Studio 10.22.00 has incorrect access control. It advertises an irreversible feature for locking classes within Omnis libraries: it should be no longer possible to delete, view, change, copy, rename, duplicate, or print a locked class. Due to implementation issues, locked classes in Omnis libraries can be unlocked, and thus further analyzed and modified by Omnis Studio. This allows for further analyzing and also deleting, viewing, changing, copying, renaming, duplicating, or printing previously locked Omnis classes. This violates the expected behavior of an "irreversible operation." | https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt | 2023-07-14T00:00:00 | 2023-07-20T00:00:00 | 2023-07-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38764 | SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the birthmonth and percls parameters within the /QueryView.php. | https://churchcrm.io/ | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38949 | An issue in a hidden API in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to arbitrarily reset the Administrator password via a crafted web request. | http://zkteco.com | 2023-07-25T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38676 | Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md | 2023-07-24T07:55:02.091Z | 2024-01-03T08:11:05.336Z | 2024-01-03T08:11:05.336Z | {'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'} |
CVE-2023-38226 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.615Z | 2023-08-10T13:17:47.227Z | 2023-08-10T13:17:47.227Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38733 |
IBM Robotic Process Automation 21.0.0 through 21.0.7.1 and 23.0.0 through 23.0.1 server could allow an authenticated user to view sensitive information from installation logs. IBM X-Force Id: 262293.
| https://www.ibm.com/support/pages/node/7028223 | 2023-07-25T00:01:17.449Z | 2023-08-22T21:54:14.033Z | 2023-08-22T21:54:14.033Z | {'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'} |
CVE-2023-38699 | MindsDB's AI Virtual Database allows developers to connect any AI/ML model to any datasource. Prior to version 23.7.4.0, a call to requests with `verify=False` disables SSL certificate checks. This rule enforces always verifying SSL certificates for methods in the Requests library. In version 23.7.4.0, certificates are validated by default, which is the desired behavior. | https://github.com/mindsdb/mindsdb/security/advisories/GHSA-8hx6-qv6f-xgcw | 2023-07-24T16:19:28.365Z | 2023-08-04T17:53:30.604Z | 2023-08-04T17:53:30.604Z | {'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.7.4.0'} |
CVE-2023-38363 |
IBM CICS TX Advanced 10.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 260818.
| https://www.ibm.com/support/pages/node/7067987 | 2023-07-16T00:53:13.214Z | 2023-11-13T01:24:46.619Z | 2023-11-13T16:56:14.461Z | {'Vendor': 'IBM', 'Product': 'CICS TX Advanced', 'Versions': '10.1'} |
CVE-2023-38549 | A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role. | https://www.veeam.com/kb4508 | 2023-07-20T01:00:12.444Z | 2023-11-07T06:17:31.636Z | 2023-11-07T06:17:31.636Z | {'Vendor': 'Veeam', 'Product': 'One', 'Versions': '11, 11a, 12'} |
CVE-2023-38230 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.615Z | 2023-08-10T13:17:27.345Z | 2023-08-10T13:17:27.345Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38908 | An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function. | https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | 2023-07-25T00:00:00 | 2023-08-22T00:00:00 | 2024-01-19T19:43:08.454247 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38267 | IBM Security Access Manager Appliance (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to obtain sensitive configuration information. IBM X-Force ID: 260584. | https://www.ibm.com/support/pages/node/7106586 | 2023-07-14T00:46:14.890Z | 2024-01-11T02:48:49.237Z | 2024-01-11T02:48:49.237Z | {'Vendor': 'IBM', 'Product': 'Security Verify Access Appliance', 'Versions': '10.0.0.0'} |
CVE-2023-38288 | null | null | 2023-07-14T11:42:17.255Z | null | 2023-08-24T08:10:46.498Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-38322 | An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set. | https://github.com/openNDS/openNDS/releases/tag/v10.1.2 | 2023-07-14T00:00:00 | 2023-11-17T00:00:00 | 2023-11-17T05:48:08.996737 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38565 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.6.8, iOS 16.6 and iPadOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to gain root privileges. | https://support.apple.com/en-us/HT213841 | 2023-07-20T15:04:25.824Z | 2023-07-27T00:30:39.809Z | 2023-07-27T03:45:56.424Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-38836 | File Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code by adding a GIF header to bypass MIME type checks. | http://boidcms.com | 2023-07-25T00:00:00 | 2023-08-21T00:00:00 | 2023-10-10T16:06:14.354071 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38973 | A stored cross-site scripting (XSS) vulnerability in the Add Tag function of Badaso v2.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter. | https://github.com/anh91/uasoft-indonesia--badaso/blob/main/xss5.md | 2023-07-25T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T00:23:17.426343 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38070 | A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20818) | https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf | 2023-07-12T13:18:53.822Z | 2023-09-12T09:32:13.603Z | 2023-11-14T11:03:21.001Z | {'Vendor': 'Siemens', 'Product': 'JT2Go', 'Versions': 'All versions < V14.3.0.1'} |
CVE-2023-38861 | An issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi. | https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38532 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected application contains a stack exhaustion vulnerability while parsing a specially crafted X_T file. This could allow an attacker to cause denial of service condition. | https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf | 2023-07-19T09:55:44.211Z | 2023-08-08T09:20:41.916Z | 2023-11-14T11:03:39.437Z | {'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'} |
CVE-2023-38498 | Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a malicious user can prevent the defer queue from proceeding promptly on sites hosted in the same multisite installation. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability. Users of multisite configurations should upgrade. | https://github.com/discourse/discourse/security/advisories/GHSA-wv29-rm3f-4g2j | 2023-07-18T16:28:12.076Z | 2023-07-28T15:18:18.903Z | 2023-07-28T15:18:18.903Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '>= 3.1.0.beta1, < 3.1.0.beta7, < 3.0.6'} |
CVE-2023-38162 | DHCP Server Service Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38162 | 2023-07-12T23:41:45.862Z | 2023-09-12T16:58:17.503Z | 2023-12-14T20:11:33.533Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-38027 |
SpotCam Co., Ltd. SpotCam Sense’s hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injection attack to perform arbitrary system commands or disrupt service.
| https://www.twcert.org.tw/tw/cp-132-7334-351fb-1.html | 2023-07-12T00:37:03.717Z | 2023-08-28T03:37:19.941Z | 2023-08-28T03:37:19.941Z | {'Vendor': 'SPOTCAM CO., LTD.', 'Product': 'SpotCam Sense', 'Versions': '2.2044'} |
CVE-2023-38924 | Netgear DGN3500 1.1.00.37 was discovered to contain a buffer overflow via the http_password parameter at setup.cgi. | https://www.netgear.com/about/security/ | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38174 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38174 | 2023-07-12T23:41:45.863Z | 2023-12-07T20:45:52.230Z | 2023-12-15T21:02:47.080Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'} |
CVE-2023-38524 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected applications contain null pointer dereference while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf | 2023-07-19T09:55:44.209Z | 2023-08-08T09:20:32.849Z | 2023-11-14T11:03:30.183Z | {'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'} |
CVE-2023-38877 | A host header injection vulnerability exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This allows an attacker to reset other users' passwords. | https://www.economizzer.org | 2023-07-25T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T03:23:53.578854 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38932 | Tenda F1202 V1.2.0.9, PA202 V1.1.2.5, PW201A V1.1.2.5 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the page parameter in the SafeEmailFilter function. | https://www.netgear.com/about/security/ | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38898 | An issue in Python cpython v.3.7 allows an attacker to obtain sensitive information via the _asyncio._swap_current_task component. NOTE: this is disputed by the vendor because (1) neither 3.7 nor any other release is affected (it is a bug in some 3.12 pre-releases); (2) there are no common scenarios in which an adversary can call _asyncio._swap_current_task but does not already have the ability to call arbitrary functions; and (3) there are no common scenarios in which sensitive information, which is not already accessible to an adversary, becomes accessible through this bug. | https://github.com/python/cpython/issues/105987 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-25T00:36:15.188431 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38031 |
ASUS RT-AC86U Adaptive QoS - Web History function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.
| https://www.twcert.org.tw/tw/cp-132-7348-56989-1.html | 2023-07-12T00:37:03.717Z | 2023-09-07T03:24:38.199Z | 2023-09-07T03:24:38.199Z | {'Vendor': 'ASUS', 'Product': ' RT-AC86U', 'Versions': '3.0.0.4.386.51529'} |
CVE-2023-38461 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.588Z | 2023-09-04T01:16:08.997Z | 2023-09-04T01:16:08.997Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38748 | Use after free vulnerability exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. | https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf | 2023-07-25T03:13:53.096Z | 2023-08-03T05:09:16.186Z | 2023-08-03T05:09:16.186Z | {'Vendor': 'OMRON Corporation', 'Product': 'CX-Programmer', 'Versions': 'Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier'} |
CVE-2023-38318 | An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the gateway FQDN entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands. | https://openwrt.org/docs/guide-user/services/captive-portal/opennds | 2023-07-14T00:00:00 | 2024-01-26T00:00:00 | 2024-01-26T04:48:00.170014 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38573 | A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839 | 2023-09-08T16:47:44.441Z | 2023-11-27T15:25:08.575Z | 2023-11-27T18:00:08.599Z | {'Vendor': 'Foxit', 'Product': 'Foxit Reader', 'Versions': '12.1.3.15356'} |
CVE-2023-38436 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.584Z | 2023-09-04T01:16:01.826Z | 2023-09-04T01:16:01.826Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38066 | In JetBrains TeamCity before 2023.05.1 reflected XSS via the Referer header was possible during artifact downloads | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-07-12T12:43:57.298Z | 2023-07-12T12:48:21.874Z | 2023-07-12T12:48:21.874Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-38965 | Lost and Found Information System 1.0 allows account takeover via username and password to a /classes/Users.php?f=save URI. | https://github.com/Or4ngm4n/vulnreability-code-review-php/blob/main/Lost%20and%20Found%20Information%20System%20v1.0.txt | 2023-07-25T00:00:00 | 2023-11-03T00:00:00 | 2023-11-03T04:08:48.245759 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38768 | SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the PropertyID parameter within the /QueryView.php. | https://churchcrm.io/ | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38912 | SQL injection vulnerability in Super Store Finder PHP Script v.3.6 allows a remote attacker to execute arbitrary code via a crafted payload to the username parameter. | https://packetstormsecurity.com/files/173302/Super-Store-Finder-PHP-Script-3.6-SQL-Injection.html | 2023-07-25T00:00:00 | 2023-09-14T00:00:00 | 2023-09-18T19:37:23.976368 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38441 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.585Z | 2023-09-04T01:16:03.270Z | 2023-09-04T01:16:03.270Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38154 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154 | 2023-07-12T23:41:45.860Z | 2023-08-08T17:08:58.162Z | 2023-12-14T20:03:29.703Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38504 | Sails is a realtime MVC Framework for Node.js. In Sails apps prior to version 1.5.7,, an attacker can send a virtual request that will cause the node process to crash. This behavior was fixed in Sails v1.5.7. As a workaround, disable the sockets hook and remove the `sails.io.js` client. | https://github.com/balderdashy/sails/security/advisories/GHSA-gpw9-fwm8-7rx7 | 2023-07-18T16:28:12.077Z | 2023-07-27T18:12:05.419Z | 2023-07-27T18:12:05.419Z | {'Vendor': 'balderdashy', 'Product': 'sails', 'Versions': '< 1.5.7'} |
CVE-2023-38857 | Buffer Overflow vulnerability infaad2 v.2.10.1 allows a remote attacker to execute arbitrary code and cause a denial of service via the stcoin function in mp4read.c. | https://github.com/knik0/faad2/issues/171 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2024-01-10T13:06:23.115644 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38380 | A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1543-1 (All versions), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS NET CP 1543-1 (All versions). The webserver implementation of the affected products does not correctly release allocated memory after it has been used.
An attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product. | https://cert-portal.siemens.com/productcert/pdf/ssa-693975.pdf | 2023-07-17T13:06:36.758Z | 2023-12-12T11:26:36.173Z | 2023-12-12T11:26:36.173Z | {'Vendor': 'Siemens', 'Product': 'SIMATIC CP 1242-7 V2 (incl. SIPLUS variants)', 'Versions': 'All versions'} |
CVE-2023-38695 | cypress-image-snapshot shows visual regressions in Cypress with jest-image-snapshot. Prior to version 8.0.2, it's possible for a user to pass a relative file path for the snapshot name and reach outside of the project directory into the machine running the test. This issue has been patched in version 8.0.2.
| https://github.com/simonsmith/cypress-image-snapshot/security/advisories/GHSA-vxjg-hchx-cc4g | 2023-07-24T16:19:28.364Z | 2023-08-04T17:25:18.810Z | 2023-08-04T17:25:18.810Z | {'Vendor': 'simonsmith', 'Product': 'cypress-image-snapshot', 'Versions': '<= 8.0.1'} |
CVE-2023-38046 | A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated administrator with the privilege to commit a specifically created configuration to read local files and resources from the system. | https://security.paloaltonetworks.com/CVE-2023-38046 | 2023-07-12T05:16:41.577Z | 2023-07-12T16:20:06.175Z | 2023-11-09T05:21:39.901Z | {'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '11.0, 10.2, 10.1, 10.0, 9.1, 9.0, 8.1'} |
CVE-2023-38553 | In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-20T03:26:16.996Z | 2023-09-04T01:16:11.214Z | 2023-09-04T01:16:11.214Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11'} |
CVE-2023-38396 | Cross-Site Request Forgery (CSRF) vulnerability in Alain Gonzalez plugin <= 3.1.2 versions. | https://patchstack.com/database/vulnerability/google-map-shortcode/wordpress-google-map-shortcode-plugin-3-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-07-17T15:22:13.926Z | 2023-10-03T10:22:15.484Z | 2023-10-03T10:22:15.484Z | {'Vendor': 'Alain Gonzalez', 'Product': 'google-map-shortcode', 'Versions': 'n/a'} |
CVE-2023-38683 | A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Teamcenter Visualization V13.2 (All versions < V13.2.0.14), Teamcenter Visualization V14.1 (All versions < V14.1.0.10), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted TIFF file. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-131450.pdf | 2023-07-24T13:55:32.997Z | 2023-08-08T09:20:48.395Z | 2023-08-08T09:20:48.395Z | {'Vendor': 'Siemens', 'Product': 'JT2Go', 'Versions': 'All versions < V14.2.0.5'} |
CVE-2023-38379 | The web interface on the RIGOL MSO5000 digital oscilloscope with firmware 00.01.03.00.03 allows remote attackers to change the admin password via a zero-length pass0 to the webcontrol changepwd.cgi application, i.e., the entered password only needs to match the first zero characters of the saved password. | https://tortel.li/post/insecure-scope/ | 2023-07-16T00:00:00 | 2023-07-16T00:00:00 | 2023-07-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38400 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kriesi Enfold - Responsive Multi-Purpose Theme allows Reflected XSS.This issue affects Enfold - Responsive Multi-Purpose Theme: from n/a through 5.6.4.
| https://patchstack.com/database/vulnerability/enfold/wordpress-enfold-theme-5-6-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-07-17T15:22:13.927Z | 2023-11-30T16:57:16.768Z | 2023-11-30T16:57:16.768Z | {'Vendor': 'Kriesi', 'Product': 'Enfold - Responsive Multi-Purpose Theme', 'Versions': 'n/a'} |
CVE-2023-38545 | This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
| https://curl.se/docs/CVE-2023-38545.html | 2023-07-20T01:00:12.444Z | 2023-10-18T03:52:00.816Z | 2023-10-18T03:52:00.816Z | {'Vendor': 'curl', 'Product': 'curl', 'Versions': '8.4.0, 7.69.0'} |
CVE-2023-38457 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.587Z | 2023-09-04T01:16:07.884Z | 2023-09-04T01:16:07.884Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38904 | A Cross Site Scripting (XSS) vulnerability in Netlify CMS v.2.10.192 allows a remote attacker to execute arbitrary code via a crafted payload to the body parameter of the new post function. | https://www.exploit-db.com/exploits/51576 | 2023-07-25T00:00:00 | 2023-08-16T00:00:00 | 2023-08-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38512 | Cross-Site Request Forgery (CSRF) vulnerability in Wpstream WpStream – Live Streaming, Video on Demand, Pay Per View plugin <= 4.5.4 versions. | https://patchstack.com/database/vulnerability/wpstream/wordpress-wpstream-live-streaming-video-on-demand-pay-per-view-plugin-4-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-07-18T17:33:34.154Z | 2023-07-27T13:26:05.166Z | 2023-07-27T13:26:05.166Z | {'Vendor': 'Wpstream', 'Product': 'WpStream – Live Streaming, Video on Demand, Pay Per View', 'Versions': 'n/a'} |
CVE-2023-38142 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38142 | 2023-07-12T23:41:45.859Z | 2023-09-12T16:58:23.361Z | 2023-12-14T20:11:39.193Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38355 | MiniTool Movie Maker 7.0 contains an insecure installation process that allows attackers to achieve remote code execution through a man in the middle attack. | https://0dr3f.github.io/cve/ | 2023-07-15T00:00:00 | 2023-09-19T00:00:00 | 2023-10-03T18:21:24.902666 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38210 | Adobe XMP Toolkit versions 2022.06 is affected by a Uncontrolled Resource Consumption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/xmpcore/apsb23-45.html | 2023-07-13T16:21:52.612Z | 2023-08-10T13:40:32.056Z | 2023-08-10T13:40:32.056Z | {'Vendor': 'Adobe', 'Product': 'XMP Toolkit', 'Versions': '0'} |
CVE-2023-38640 | A vulnerability has been identified in SICAM PAS/PQS (All versions >= V8.00 < V8.22). The affected application is installed with specific files and folders with insecure permissions. This could allow an authenticated local attacker to read and modify configuration data in the context of the application process. | https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf | 2023-07-21T10:49:35.681Z | 2023-10-10T10:21:25.048Z | 2023-10-10T10:21:25.048Z | {'Vendor': 'Siemens', 'Product': 'SICAM PAS/PQS', 'Versions': 'All versions >= V8.00 < V8.22'} |
CVE-2023-38990 | An issue in the delete function in the MenuController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete menus created by the Administrator. | https://github.com/thinkgem/jeesite/issues/519 | 2023-07-25T00:00:00 | 2023-08-01T00:00:00 | 2023-08-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38569 | Stored cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product. | https://www.ss-proj.org/support/954.html | 2023-08-09T02:20:28.470Z | 2023-09-05T09:10:17.838Z | 2023-09-05T09:10:17.838Z | {'Vendor': 'SHIRASAGI Project ', 'Product': 'SHIRASAGI ', 'Versions': 'prior to v1.18.0 '} |
CVE-2023-38139 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38139 | 2023-07-12T23:41:45.858Z | 2023-09-12T16:58:24.910Z | 2023-12-14T20:11:40.688Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38586 | An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions. | https://support.apple.com/en-us/HT213940 | 2023-09-14T19:03:36.088Z | 2023-09-26T20:14:41.083Z | 2023-09-26T20:14:41.083Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38752 | Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the attribute information of the poster that is set as"non-disclosure" in the system settings. | https://www.jpcert.or.jp/press/2023/PR20230807_notice.html | 2023-07-25T03:35:17.588Z | 2023-08-09T03:29:51.888Z | 2023-08-09T03:29:51.888Z | {'Vendor': 'Japan Computer Emergency Response Team Coordination Center (JPCERT/CC)', 'Product': 'Special Interest Group Network for Analysis and Liaison ', 'Versions': 'versions 4.4.0 to 4.7.7 '} |
CVE-2023-38617 | Office Suite Premium Version v10.9.1.42602 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the filter parameter at /api?path=files. | https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html | 2023-07-20T00:00:00 | 2023-07-20T00:00:00 | 2023-07-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38247 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.617Z | 2023-08-10T13:17:31.362Z | 2023-08-10T13:17:31.362Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38494 | MeterSphere is an open-source continuous testing platform. Prior to version 2.10.4 LTS, some interfaces of the Cloud version of MeterSphere do not have configuration permissions, and are sensitively leaked by attackers. Version 2.10.4 LTS contains a patch for this issue. | https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253 | 2023-07-18T16:28:12.076Z | 2023-08-04T15:44:44.645Z | 2023-08-04T15:44:44.645Z | {'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.4-LTS'} |
CVE-2023-38928 | Netgear R7100LG 1.0.0.78 was discovered to contain a command injection vulnerability via the password parameter at usb_remote_invite.cgi. | https://www.netgear.com/about/security/ | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38882 | A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'include' parameter in 'ForExport.php' | https://github.com/OS4ED/openSIS-Classic | 2023-07-25T00:00:00 | 2023-11-20T00:00:00 | 2023-11-20T18:47:53.446644 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38181 | Microsoft Exchange Server Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38181 | 2023-07-12T23:41:45.867Z | 2023-08-08T17:08:55.897Z | 2023-12-14T20:03:27.692Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 12', 'Versions': '15.02.0'} |
CVE-2023-38314 | An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a NULL pointer dereference in preauthenticated() that can be triggered with a crafted GET HTTP request with a missing redirect query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). | https://github.com/openNDS/openNDS/releases/tag/v10.1.2 | 2023-07-14T00:00:00 | 2023-11-17T00:00:00 | 2023-11-17T05:41:42.474457 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38744 | Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier. | https://www.ia.omron.com/product/vulnerability/OMSR-2023-006_en.pdf | 2023-07-25T03:05:55.191Z | 2023-08-03T04:55:52.423Z | 2023-08-03T04:55:52.423Z | {'Vendor': 'OMRON Corporation', 'Product': 'CJ2M CPU Unit', 'Versions': 'CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier'} |
CVE-2023-38251 | Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a Uncontrolled Resource Consumption vulnerability that could lead in minor application denial-of-service. Exploitation of this issue does not require user interaction. | https://helpx.adobe.com/security/products/magento/apsb23-50.html | 2023-07-13T16:21:52.618Z | 2023-10-13T06:15:20.637Z | 2023-10-13T06:15:20.637Z | {'Vendor': 'Adobe', 'Product': 'Adobe Commerce', 'Versions': '0'} |
CVE-2023-38601 | This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to modify protected parts of the file system. | https://support.apple.com/en-us/HT213843 | 2023-07-20T15:04:44.408Z | 2023-07-28T04:30:40.061Z | 2023-07-28T04:30:40.061Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38528 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.197), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted X_T file. This could allow an attacker to execute code in the context of the current process. | https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf | 2023-07-19T09:55:44.210Z | 2023-08-08T09:20:37.393Z | 2023-11-14T11:03:34.803Z | {'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'} |
CVE-2023-38482 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in QualityUnit Post Affiliate Pro plugin <= 1.25.0 versions. | https://patchstack.com/database/vulnerability/postaffiliatepro/wordpress-post-affiliate-pro-plugin-1-24-9-cross-site-scripting-xss?_s_id=cve | 2023-07-18T12:33:31.061Z | 2023-09-03T11:38:11.941Z | 2023-09-03T11:38:11.941Z | {'Vendor': 'QualityUnit', 'Product': 'Post Affiliate Pro', 'Versions': 'n/a'} |
CVE-2023-38178 | .NET Core and Visual Studio Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178 | 2023-07-12T23:41:45.865Z | 2023-08-08T17:08:57.014Z | 2023-12-14T20:03:28.720Z | {'Vendor': 'Microsoft', 'Product': '.NET 6.0', 'Versions': '6.0.0'} |
CVE-2023-38197 | An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion. | https://codereview.qt-project.org/c/qt/qtbase/+/488960 | 2023-07-13T00:00:00 | 2023-07-13T00:00:00 | 2023-08-23T00:06:22.616014 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38894 | A Prototype Pollution issue in Cronvel Tree-kit v.0.7.4 and before allows a remote attacker to execute arbitrary code via the extend function. | http://tree-kit.com | 2023-07-25T00:00:00 | 2023-08-16T00:00:00 | 2023-08-17T21:05:05.446760 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38343 | An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4. External entity references are enabled in the XML parser configuration. Exploitation of this vulnerability can lead to file disclosure or Server Side Request Forgery. | https://www.ivanti.com/releases | 2023-07-15T00:00:00 | 2023-09-21T00:00:00 | 2023-09-21T20:57:44.212704 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38206 | Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints resulting in a low-confidentiality impact. Exploitation of this issue does not require user interaction. | https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html | 2023-07-13T16:21:52.612Z | 2023-09-14T07:40:06.729Z | 2023-09-14T07:40:06.729Z | {'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'} |
CVE-2023-38969 | Cross Site Scripting vulnerabiltiy in Badaso v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the title parameter in the new book and edit book function. | https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS2.md | 2023-07-25T00:00:00 | 2023-08-28T00:00:00 | 2023-08-28T20:52:38.591858 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.