CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-38773
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the volopp1 and volopp2 parameters within the /QueryView.php.
https://churchcrm.io/
2023-07-25T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38323
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the status path script entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
https://openwrt.org/docs/guide-user/services/captive-portal/opennds
2023-07-14T00:00:00
2024-01-26T00:00:00
2024-01-26T04:51:21.065647
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38909
An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function.
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1
2023-07-25T00:00:00
2023-08-22T00:00:00
2024-01-19T19:43:11.341261
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38231
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.615Z
2023-08-10T13:17:45.594Z
2023-08-10T13:17:45.594Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38548
A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service.
https://www.veeam.com/kb4508
2023-07-20T01:00:12.444Z
2023-11-07T06:17:31.637Z
2023-11-07T06:17:31.637Z
{'Vendor': 'Veeam', 'Product': 'One', 'Versions': '12'}
CVE-2023-38677
FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md
2023-07-24T07:55:02.091Z
2024-01-03T08:11:39.268Z
2024-01-03T08:11:39.268Z
{'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'}
CVE-2023-38227
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.615Z
2023-08-10T13:17:40.133Z
2023-08-10T13:17:40.133Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38732
IBM Robotic Process Automation 21.0.0 through 21.0.7 server could allow an authenticated user to view sensitive information from application logs. IBM X-Force ID: 262289.
https://www.ibm.com/support/pages/node/7028221
2023-07-25T00:01:06.101Z
2023-08-22T13:13:42.214Z
2023-08-22T13:13:42.214Z
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0'}
CVE-2023-38698
Ethereum Name Service (ENS) is a distributed, open, and extensible naming system based on the Ethereum blockchain. According to the documentation, controllers are allowed to register new domains and extend the expiry of existing domains, but they cannot change the ownership or reduce the expiration time of existing domains. However, a preliminary analysis suggests that an attacker-controlled controller may be able to reduce the expiration time of existing domains due to an integer overflow in the renew function. The vulnerability resides `@ensdomains/ens-contracts` prior to version 0.0.22. If successfully exploited, this vulnerability would enable attackers to force the expiration of any ENS record, ultimately allowing them to claim the affected domains for themselves. Currently, it would require a malicious DAO to exploit it. Nevertheless, any vulnerability present in the controllers could potentially render this issue exploitable in the future. An additional concern is the possibility of renewal discounts. Should ENS decide to implement a system that offers unlimited .eth domains for a fixed fee in the future, the vulnerability could become exploitable by any user due to the reduced attack cost. Version 0.0.22 contains a patch for this issue. As long as registration cost remains linear or superlinear based on registration duration, or limited to a reasonable maximum (eg, 1 million years), this vulnerability could only be exploited by a malicious DAO. The interim workaround is thus to take no action.
https://github.com/ensdomains/ens-contracts/security/advisories/GHSA-rrxv-q8m4-wch3
2023-07-24T16:19:28.364Z
2023-08-04T17:41:14.426Z
2023-08-04T17:41:14.426Z
{'Vendor': 'ensdomains', 'Product': 'ens-contracts', 'Versions': '<= 0.0.21'}
CVE-2023-38948
An arbitrary file download vulnerability in the /c/PluginsController.php component of jizhi CMS 1.9.5 allows attackers to execute arbitrary code via downloading a crafted plugin.
https://gitee.com/CTF-hacker/pwn/issues/I7LI4E
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38620
Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `lsb` array.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
2023-07-20T19:05:43.914Z
2024-01-08T14:47:48.155Z
2024-01-08T18:00:19.364Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-38335
Omnis Studio 10.22.00 has incorrect access control. It advertises a feature for making Omnis libraries "always private" - this is supposed to be an irreversible operation. However, due to implementation issues, "always private" Omnis libraries can be opened by the Omnis Studio browser by bypassing specific checks. This violates the expected behavior of an "irreversible operation".
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-005.txt
2023-07-14T00:00:00
2023-07-20T00:00:00
2023-07-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38765
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the membermonth parameter within the /QueryView.php.
https://churchcrm.io/
2023-07-25T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38509
XWiki Platform is a generic wiki platform. In org.xwiki.platform:xwiki-platform-livetable-ui starting with version 3.5-milestone-1 and prior to versions 14.10.9 and 15.3-rc-1, the mail obfuscation configuration was not fully taken into account and is was still possible by obfuscated emails. This has been patched in XWiki 14.10.9 and XWiki 15.3-rc-1. A workaround is to modify the page `XWiki.LiveTableResultsMacros` following the patch.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g9w4-prf3-m25g
2023-07-18T16:28:12.078Z
2023-07-27T18:53:31.259Z
2023-07-27T18:53:31.259Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 3.5-milestone-1, < 14.10.9, >= 15.0, < 15.3-rc-1'}
CVE-2023-38159
Windows Graphics Component Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38159
2023-07-12T23:41:45.861Z
2023-10-10T17:08:08.854Z
2023-12-14T01:15:43.615Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38508
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992
2023-07-18T16:28:12.078Z
2023-08-24T22:33:35.676Z
2023-08-24T22:33:35.676Z
{'Vendor': 'Enalean', 'Product': 'tuleap', 'Versions': 'Tuleap Community Edition < 14.11.99.28, Tuleap Enterprise Edition < 14.10-6, Tuleap Enterprise Edition >= 14.11, < 14.11-3'}
CVE-2023-38158
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38158
2023-07-12T23:41:45.861Z
2023-08-21T19:04:16.901Z
2023-12-14T20:03:17.693Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-38621
Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `flags` array.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
2023-07-20T19:05:43.914Z
2024-01-08T14:47:48.282Z
2024-01-08T18:00:19.489Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-38334
Omnis Studio 10.22.00 has incorrect access control. It advertises an irreversible feature for locking classes within Omnis libraries: it should be no longer possible to delete, view, change, copy, rename, duplicate, or print a locked class. Due to implementation issues, locked classes in Omnis libraries can be unlocked, and thus further analyzed and modified by Omnis Studio. This allows for further analyzing and also deleting, viewing, changing, copying, renaming, duplicating, or printing previously locked Omnis classes. This violates the expected behavior of an "irreversible operation."
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-006.txt
2023-07-14T00:00:00
2023-07-20T00:00:00
2023-07-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38764
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the birthmonth and percls parameters within the /QueryView.php.
https://churchcrm.io/
2023-07-25T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38949
An issue in a hidden API in ZKTeco BioTime v8.5.5 allows unauthenticated attackers to arbitrarily reset the Administrator password via a crafted web request.
http://zkteco.com
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38676
Nullptr in paddle.dot in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md
2023-07-24T07:55:02.091Z
2024-01-03T08:11:05.336Z
2024-01-03T08:11:05.336Z
{'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'}
CVE-2023-38226
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.615Z
2023-08-10T13:17:47.227Z
2023-08-10T13:17:47.227Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38733
IBM Robotic Process Automation 21.0.0 through 21.0.7.1 and 23.0.0 through 23.0.1 server could allow an authenticated user to view sensitive information from installation logs. IBM X-Force Id: 262293.
https://www.ibm.com/support/pages/node/7028223
2023-07-25T00:01:17.449Z
2023-08-22T21:54:14.033Z
2023-08-22T21:54:14.033Z
{'Vendor': 'IBM', 'Product': 'Robotic Process Automation', 'Versions': '21.0.0, 23.0.0'}
CVE-2023-38699
MindsDB's AI Virtual Database allows developers to connect any AI/ML model to any datasource. Prior to version 23.7.4.0, a call to requests with `verify=False` disables SSL certificate checks. This rule enforces always verifying SSL certificates for methods in the Requests library. In version 23.7.4.0, certificates are validated by default, which is the desired behavior.
https://github.com/mindsdb/mindsdb/security/advisories/GHSA-8hx6-qv6f-xgcw
2023-07-24T16:19:28.365Z
2023-08-04T17:53:30.604Z
2023-08-04T17:53:30.604Z
{'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.7.4.0'}
CVE-2023-38363
IBM CICS TX Advanced 10.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 260818.
https://www.ibm.com/support/pages/node/7067987
2023-07-16T00:53:13.214Z
2023-11-13T01:24:46.619Z
2023-11-13T16:56:14.461Z
{'Vendor': 'IBM', 'Product': 'CICS TX Advanced', 'Versions': '10.1'}
CVE-2023-38549
A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service. Note: The criticality of this vulnerability is reduced as it requires interaction by a user with the Veeam ONE Administrator role.
https://www.veeam.com/kb4508
2023-07-20T01:00:12.444Z
2023-11-07T06:17:31.636Z
2023-11-07T06:17:31.636Z
{'Vendor': 'Veeam', 'Product': 'One', 'Versions': '11, 11a, 12'}
CVE-2023-38230
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.615Z
2023-08-10T13:17:27.345Z
2023-08-10T13:17:27.345Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38908
An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function.
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1
2023-07-25T00:00:00
2023-08-22T00:00:00
2024-01-19T19:43:08.454247
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38267
IBM Security Access Manager Appliance (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) could allow a local user to obtain sensitive configuration information. IBM X-Force ID: 260584.
https://www.ibm.com/support/pages/node/7106586
2023-07-14T00:46:14.890Z
2024-01-11T02:48:49.237Z
2024-01-11T02:48:49.237Z
{'Vendor': 'IBM', 'Product': 'Security Verify Access Appliance', 'Versions': '10.0.0.0'}
CVE-2023-38288
null
null
2023-07-14T11:42:17.255Z
null
2023-08-24T08:10:46.498Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-38322
An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a do_binauth NULL pointer dereference that be triggered with a crafted GET HTTP request with a missing User-Agent HTTP header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). The issue occurs when the client is about to be authenticated, and can be triggered only when the BinAuth option is set.
https://github.com/openNDS/openNDS/releases/tag/v10.1.2
2023-07-14T00:00:00
2023-11-17T00:00:00
2023-11-17T05:48:08.996737
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38565
A path handling issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.6.8, iOS 16.6 and iPadOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to gain root privileges.
https://support.apple.com/en-us/HT213841
2023-07-20T15:04:25.824Z
2023-07-27T00:30:39.809Z
2023-07-27T03:45:56.424Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-38836
File Upload vulnerability in BoidCMS v.2.0.0 allows a remote attacker to execute arbitrary code by adding a GIF header to bypass MIME type checks.
http://boidcms.com
2023-07-25T00:00:00
2023-08-21T00:00:00
2023-10-10T16:06:14.354071
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38973
A stored cross-site scripting (XSS) vulnerability in the Add Tag function of Badaso v2.9.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter.
https://github.com/anh91/uasoft-indonesia--badaso/blob/main/xss5.md
2023-07-25T00:00:00
2023-08-25T00:00:00
2023-08-25T00:23:17.426343
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38070
A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application is vulnerable to stack-based buffer overflow while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20818)
https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf
2023-07-12T13:18:53.822Z
2023-09-12T09:32:13.603Z
2023-11-14T11:03:21.001Z
{'Vendor': 'Siemens', 'Product': 'JT2Go', 'Versions': 'All versions < V14.3.0.1'}
CVE-2023-38861
An issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi.
https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38532
A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected application contains a stack exhaustion vulnerability while parsing a specially crafted X_T file. This could allow an attacker to cause denial of service condition.
https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf
2023-07-19T09:55:44.211Z
2023-08-08T09:20:41.916Z
2023-11-14T11:03:39.437Z
{'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'}
CVE-2023-38498
Discourse is an open source discussion platform. Prior to version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a malicious user can prevent the defer queue from proceeding promptly on sites hosted in the same multisite installation. The issue is patched in version 3.0.6 of the `stable` branch and version 3.1.0.beta7 of the `beta` and `tests-passed` branches. There are no known workarounds for this vulnerability. Users of multisite configurations should upgrade.
https://github.com/discourse/discourse/security/advisories/GHSA-wv29-rm3f-4g2j
2023-07-18T16:28:12.076Z
2023-07-28T15:18:18.903Z
2023-07-28T15:18:18.903Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': '>= 3.1.0.beta1, < 3.1.0.beta7, < 3.0.6'}
CVE-2023-38162
DHCP Server Service Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38162
2023-07-12T23:41:45.862Z
2023-09-12T16:58:17.503Z
2023-12-14T20:11:33.533Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-38027
SpotCam Co., Ltd. SpotCam Sense’s hidden Telnet function has a vulnerability of OS command injection. An remote unauthenticated attacker can exploit this vulnerability to execute command injection attack to perform arbitrary system commands or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7334-351fb-1.html
2023-07-12T00:37:03.717Z
2023-08-28T03:37:19.941Z
2023-08-28T03:37:19.941Z
{'Vendor': 'SPOTCAM CO., LTD.', 'Product': 'SpotCam Sense', 'Versions': '2.2044'}
CVE-2023-38924
Netgear DGN3500 1.1.00.37 was discovered to contain a buffer overflow via the http_password parameter at setup.cgi.
https://www.netgear.com/about/security/
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38174
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38174
2023-07-12T23:41:45.863Z
2023-12-07T20:45:52.230Z
2023-12-15T21:02:47.080Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'}
CVE-2023-38524
A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.171), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected applications contain null pointer dereference while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf
2023-07-19T09:55:44.209Z
2023-08-08T09:20:32.849Z
2023-11-14T11:03:30.183Z
{'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'}
CVE-2023-38877
A host header injection vulnerability exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This allows an attacker to reset other users' passwords.
https://www.economizzer.org
2023-07-25T00:00:00
2023-09-28T00:00:00
2023-09-28T03:23:53.578854
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38932
Tenda F1202 V1.2.0.9, PA202 V1.1.2.5, PW201A V1.1.2.5 and FH1202 V1.2.0.9 were discovered to contain a stack overflow via the page parameter in the SafeEmailFilter function.
https://www.netgear.com/about/security/
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38898
An issue in Python cpython v.3.7 allows an attacker to obtain sensitive information via the _asyncio._swap_current_task component. NOTE: this is disputed by the vendor because (1) neither 3.7 nor any other release is affected (it is a bug in some 3.12 pre-releases); (2) there are no common scenarios in which an adversary can call _asyncio._swap_current_task but does not already have the ability to call arbitrary functions; and (3) there are no common scenarios in which sensitive information, which is not already accessible to an adversary, becomes accessible through this bug.
https://github.com/python/cpython/issues/105987
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-25T00:36:15.188431
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38031
ASUS RT-AC86U Adaptive QoS - Web History function has insufficient filtering of special character. A remote attacker with regular user privilege can exploit this vulnerability to perform command injection attack to execute arbitrary commands, disrupt system or terminate services.
https://www.twcert.org.tw/tw/cp-132-7348-56989-1.html
2023-07-12T00:37:03.717Z
2023-09-07T03:24:38.199Z
2023-09-07T03:24:38.199Z
{'Vendor': 'ASUS', 'Product': ' RT-AC86U', 'Versions': '3.0.0.4.386.51529'}
CVE-2023-38461
In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.588Z
2023-09-04T01:16:08.997Z
2023-09-04T01:16:08.997Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38748
Use after free vulnerability exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur.
https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf
2023-07-25T03:13:53.096Z
2023-08-03T05:09:16.186Z
2023-08-03T05:09:16.186Z
{'Vendor': 'OMRON Corporation', 'Product': 'CX-Programmer', 'Versions': 'Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier'}
CVE-2023-38318
An issue was discovered in OpenNDS before 10.1.3. It fails to sanitize the gateway FQDN entry in the configuration file, allowing attackers that have direct or indirect access to this file to execute arbitrary OS commands.
https://openwrt.org/docs/guide-user/services/captive-portal/opennds
2023-07-14T00:00:00
2024-01-26T00:00:00
2024-01-26T04:48:00.170014
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38573
A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839
2023-09-08T16:47:44.441Z
2023-11-27T15:25:08.575Z
2023-11-27T18:00:08.599Z
{'Vendor': 'Foxit', 'Product': 'Foxit Reader', 'Versions': '12.1.3.15356'}
CVE-2023-38436
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.584Z
2023-09-04T01:16:01.826Z
2023-09-04T01:16:01.826Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38066
In JetBrains TeamCity before 2023.05.1 reflected XSS via the Referer header was possible during artifact downloads
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-07-12T12:43:57.298Z
2023-07-12T12:48:21.874Z
2023-07-12T12:48:21.874Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-38965
Lost and Found Information System 1.0 allows account takeover via username and password to a /classes/Users.php?f=save URI.
https://github.com/Or4ngm4n/vulnreability-code-review-php/blob/main/Lost%20and%20Found%20Information%20System%20v1.0.txt
2023-07-25T00:00:00
2023-11-03T00:00:00
2023-11-03T04:08:48.245759
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38768
SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the PropertyID parameter within the /QueryView.php.
https://churchcrm.io/
2023-07-25T00:00:00
2023-08-08T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38912
SQL injection vulnerability in Super Store Finder PHP Script v.3.6 allows a remote attacker to execute arbitrary code via a crafted payload to the username parameter.
https://packetstormsecurity.com/files/173302/Super-Store-Finder-PHP-Script-3.6-SQL-Injection.html
2023-07-25T00:00:00
2023-09-14T00:00:00
2023-09-18T19:37:23.976368
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38441
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.585Z
2023-09-04T01:16:03.270Z
2023-09-04T01:16:03.270Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38154
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38154
2023-07-12T23:41:45.860Z
2023-08-08T17:08:58.162Z
2023-12-14T20:03:29.703Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38504
Sails is a realtime MVC Framework for Node.js. In Sails apps prior to version 1.5.7,, an attacker can send a virtual request that will cause the node process to crash. This behavior was fixed in Sails v1.5.7. As a workaround, disable the sockets hook and remove the `sails.io.js` client.
https://github.com/balderdashy/sails/security/advisories/GHSA-gpw9-fwm8-7rx7
2023-07-18T16:28:12.077Z
2023-07-27T18:12:05.419Z
2023-07-27T18:12:05.419Z
{'Vendor': 'balderdashy', 'Product': 'sails', 'Versions': '< 1.5.7'}
CVE-2023-38857
Buffer Overflow vulnerability infaad2 v.2.10.1 allows a remote attacker to execute arbitrary code and cause a denial of service via the stcoin function in mp4read.c.
https://github.com/knik0/faad2/issues/171
2023-07-25T00:00:00
2023-08-15T00:00:00
2024-01-10T13:06:23.115644
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38380
A vulnerability has been identified in SIMATIC CP 1242-7 V2 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1543-1 (All versions), SINAMICS S210 (6SL5...) (All versions >= V6.1 < V6.1 HF2), SIPLUS NET CP 1543-1 (All versions). The webserver implementation of the affected products does not correctly release allocated memory after it has been used. An attacker with network access could use this vulnerability to cause a denial-of-service condition in the webserver of the affected product.
https://cert-portal.siemens.com/productcert/pdf/ssa-693975.pdf
2023-07-17T13:06:36.758Z
2023-12-12T11:26:36.173Z
2023-12-12T11:26:36.173Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC CP 1242-7 V2 (incl. SIPLUS variants)', 'Versions': 'All versions'}
CVE-2023-38695
cypress-image-snapshot shows visual regressions in Cypress with jest-image-snapshot. Prior to version 8.0.2, it's possible for a user to pass a relative file path for the snapshot name and reach outside of the project directory into the machine running the test. This issue has been patched in version 8.0.2.
https://github.com/simonsmith/cypress-image-snapshot/security/advisories/GHSA-vxjg-hchx-cc4g
2023-07-24T16:19:28.364Z
2023-08-04T17:25:18.810Z
2023-08-04T17:25:18.810Z
{'Vendor': 'simonsmith', 'Product': 'cypress-image-snapshot', 'Versions': '<= 8.0.1'}
CVE-2023-38046
A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated administrator with the privilege to commit a specifically created configuration to read local files and resources from the system.
https://security.paloaltonetworks.com/CVE-2023-38046
2023-07-12T05:16:41.577Z
2023-07-12T16:20:06.175Z
2023-11-09T05:21:39.901Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '11.0, 10.2, 10.1, 10.0, 9.1, 9.0, 8.1'}
CVE-2023-38553
In gnss service, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-20T03:26:16.996Z
2023-09-04T01:16:11.214Z
2023-09-04T01:16:11.214Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11'}
CVE-2023-38396
Cross-Site Request Forgery (CSRF) vulnerability in Alain Gonzalez plugin <= 3.1.2 versions.
https://patchstack.com/database/vulnerability/google-map-shortcode/wordpress-google-map-shortcode-plugin-3-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-07-17T15:22:13.926Z
2023-10-03T10:22:15.484Z
2023-10-03T10:22:15.484Z
{'Vendor': 'Alain Gonzalez', 'Product': 'google-map-shortcode', 'Versions': 'n/a'}
CVE-2023-38683
A vulnerability has been identified in JT2Go (All versions < V14.2.0.5), Teamcenter Visualization V13.2 (All versions < V13.2.0.14), Teamcenter Visualization V14.1 (All versions < V14.1.0.10), Teamcenter Visualization V14.2 (All versions < V14.2.0.5). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted TIFF file. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-131450.pdf
2023-07-24T13:55:32.997Z
2023-08-08T09:20:48.395Z
2023-08-08T09:20:48.395Z
{'Vendor': 'Siemens', 'Product': 'JT2Go', 'Versions': 'All versions < V14.2.0.5'}
CVE-2023-38379
The web interface on the RIGOL MSO5000 digital oscilloscope with firmware 00.01.03.00.03 allows remote attackers to change the admin password via a zero-length pass0 to the webcontrol changepwd.cgi application, i.e., the entered password only needs to match the first zero characters of the saved password.
https://tortel.li/post/insecure-scope/
2023-07-16T00:00:00
2023-07-16T00:00:00
2023-07-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38400
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kriesi Enfold - Responsive Multi-Purpose Theme allows Reflected XSS.This issue affects Enfold - Responsive Multi-Purpose Theme: from n/a through 5.6.4.
https://patchstack.com/database/vulnerability/enfold/wordpress-enfold-theme-5-6-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-07-17T15:22:13.927Z
2023-11-30T16:57:16.768Z
2023-11-30T16:57:16.768Z
{'Vendor': 'Kriesi', 'Product': 'Enfold - Responsive Multi-Purpose Theme', 'Versions': 'n/a'}
CVE-2023-38545
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.
https://curl.se/docs/CVE-2023-38545.html
2023-07-20T01:00:12.444Z
2023-10-18T03:52:00.816Z
2023-10-18T03:52:00.816Z
{'Vendor': 'curl', 'Product': 'curl', 'Versions': '8.4.0, 7.69.0'}
CVE-2023-38457
In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.587Z
2023-09-04T01:16:07.884Z
2023-09-04T01:16:07.884Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38904
A Cross Site Scripting (XSS) vulnerability in Netlify CMS v.2.10.192 allows a remote attacker to execute arbitrary code via a crafted payload to the body parameter of the new post function.
https://www.exploit-db.com/exploits/51576
2023-07-25T00:00:00
2023-08-16T00:00:00
2023-08-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38512
Cross-Site Request Forgery (CSRF) vulnerability in Wpstream WpStream – Live Streaming, Video on Demand, Pay Per View plugin <= 4.5.4 versions.
https://patchstack.com/database/vulnerability/wpstream/wordpress-wpstream-live-streaming-video-on-demand-pay-per-view-plugin-4-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-07-18T17:33:34.154Z
2023-07-27T13:26:05.166Z
2023-07-27T13:26:05.166Z
{'Vendor': 'Wpstream', 'Product': 'WpStream – Live Streaming, Video on Demand, Pay Per View', 'Versions': 'n/a'}
CVE-2023-38142
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38142
2023-07-12T23:41:45.859Z
2023-09-12T16:58:23.361Z
2023-12-14T20:11:39.193Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38355
MiniTool Movie Maker 7.0 contains an insecure installation process that allows attackers to achieve remote code execution through a man in the middle attack.
https://0dr3f.github.io/cve/
2023-07-15T00:00:00
2023-09-19T00:00:00
2023-10-03T18:21:24.902666
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38210
Adobe XMP Toolkit versions 2022.06 is affected by a Uncontrolled Resource Consumption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/xmpcore/apsb23-45.html
2023-07-13T16:21:52.612Z
2023-08-10T13:40:32.056Z
2023-08-10T13:40:32.056Z
{'Vendor': 'Adobe', 'Product': 'XMP Toolkit', 'Versions': '0'}
CVE-2023-38640
A vulnerability has been identified in SICAM PAS/PQS (All versions >= V8.00 < V8.22). The affected application is installed with specific files and folders with insecure permissions. This could allow an authenticated local attacker to read and modify configuration data in the context of the application process.
https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf
2023-07-21T10:49:35.681Z
2023-10-10T10:21:25.048Z
2023-10-10T10:21:25.048Z
{'Vendor': 'Siemens', 'Product': 'SICAM PAS/PQS', 'Versions': 'All versions >= V8.00 < V8.22'}
CVE-2023-38990
An issue in the delete function in the MenuController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete menus created by the Administrator.
https://github.com/thinkgem/jeesite/issues/519
2023-07-25T00:00:00
2023-08-01T00:00:00
2023-08-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38569
Stored cross-site scripting vulnerability in SHIRASAGI prior to v1.18.0 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product.
https://www.ss-proj.org/support/954.html
2023-08-09T02:20:28.470Z
2023-09-05T09:10:17.838Z
2023-09-05T09:10:17.838Z
{'Vendor': 'SHIRASAGI Project ', 'Product': 'SHIRASAGI ', 'Versions': 'prior to v1.18.0 '}
CVE-2023-38139
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38139
2023-07-12T23:41:45.858Z
2023-09-12T16:58:24.910Z
2023-12-14T20:11:40.688Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38586
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions.
https://support.apple.com/en-us/HT213940
2023-09-14T19:03:36.088Z
2023-09-26T20:14:41.083Z
2023-09-26T20:14:41.083Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-38752
Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the attribute information of the poster that is set as"non-disclosure" in the system settings.
https://www.jpcert.or.jp/press/2023/PR20230807_notice.html
2023-07-25T03:35:17.588Z
2023-08-09T03:29:51.888Z
2023-08-09T03:29:51.888Z
{'Vendor': 'Japan Computer Emergency Response Team Coordination Center (JPCERT/CC)', 'Product': 'Special Interest Group Network for Analysis and Liaison ', 'Versions': 'versions 4.4.0 to 4.7.7 '}
CVE-2023-38617
Office Suite Premium Version v10.9.1.42602 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the filter parameter at /api?path=files.
https://packetstormsecurity.com/files/173143/Office-Suite-Premium-10.9.1.42602-Cross-Site-Scripting.html
2023-07-20T00:00:00
2023-07-20T00:00:00
2023-07-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38247
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.617Z
2023-08-10T13:17:31.362Z
2023-08-10T13:17:31.362Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38494
MeterSphere is an open-source continuous testing platform. Prior to version 2.10.4 LTS, some interfaces of the Cloud version of MeterSphere do not have configuration permissions, and are sensitively leaked by attackers. Version 2.10.4 LTS contains a patch for this issue.
https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253
2023-07-18T16:28:12.076Z
2023-08-04T15:44:44.645Z
2023-08-04T15:44:44.645Z
{'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.10.4-LTS'}
CVE-2023-38928
Netgear R7100LG 1.0.0.78 was discovered to contain a command injection vulnerability via the password parameter at usb_remote_invite.cgi.
https://www.netgear.com/about/security/
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38882
A reflected cross-site scripting (XSS) vulnerability in the Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'include' parameter in 'ForExport.php'
https://github.com/OS4ED/openSIS-Classic
2023-07-25T00:00:00
2023-11-20T00:00:00
2023-11-20T18:47:53.446644
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38181
Microsoft Exchange Server Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38181
2023-07-12T23:41:45.867Z
2023-08-08T17:08:55.897Z
2023-12-14T20:03:27.692Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 12', 'Versions': '15.02.0'}
CVE-2023-38314
An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a NULL pointer dereference in preauthenticated() that can be triggered with a crafted GET HTTP request with a missing redirect query string parameter. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition).
https://github.com/openNDS/openNDS/releases/tag/v10.1.2
2023-07-14T00:00:00
2023-11-17T00:00:00
2023-11-17T05:41:42.474457
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38744
Denial-of-service (DoS) vulnerability due to improper validation of specified type of input issue exists in the built-in EtherNet/IP port of the CJ Series CJ2 CPU unit and the communication function of the CS/CJ Series EtherNet/IP unit. If an affected product receives a packet which is specially crafted by a remote unauthenticated attacker, the unit of the affected product may fall into a denial-of-service (DoS) condition. Affected products/versions are as follows: CJ2M CPU Unit CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier, CJ2H CPU Unit CJ2H-CPU6[]-EIP Unit version of the built-in EtherNet/IP section Ver. 3.04 and earlier, CS/CJ Series EtherNet/IP Unit CS1W-EIP21 V3.04 and earlier, and CS/CJ Series EtherNet/IP Unit CJ1W-EIP21 V3.04 and earlier.
https://www.ia.omron.com/product/vulnerability/OMSR-2023-006_en.pdf
2023-07-25T03:05:55.191Z
2023-08-03T04:55:52.423Z
2023-08-03T04:55:52.423Z
{'Vendor': 'OMRON Corporation', 'Product': 'CJ2M CPU Unit', 'Versions': 'CJ2M-CPU3[] Unit version of the built-in EtherNet/IP section Ver. 2.18 and earlier'}
CVE-2023-38251
Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a Uncontrolled Resource Consumption vulnerability that could lead in minor application denial-of-service. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/magento/apsb23-50.html
2023-07-13T16:21:52.618Z
2023-10-13T06:15:20.637Z
2023-10-13T06:15:20.637Z
{'Vendor': 'Adobe', 'Product': 'Adobe Commerce', 'Versions': '0'}
CVE-2023-38601
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to modify protected parts of the file system.
https://support.apple.com/en-us/HT213843
2023-07-20T15:04:44.408Z
2023-07-28T04:30:40.061Z
2023-07-28T04:30:40.061Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-38528
A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Parasolid V35.0 (All versions < V35.0.254), Parasolid V35.1 (All versions < V35.1.197), Parasolid V35.1 (All versions < V35.1.184), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted X_T file. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-407785.pdf
2023-07-19T09:55:44.210Z
2023-08-08T09:20:37.393Z
2023-11-14T11:03:34.803Z
{'Vendor': 'Siemens', 'Product': 'Parasolid V34.1', 'Versions': 'All versions < V34.1.258'}
CVE-2023-38482
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in QualityUnit Post Affiliate Pro plugin <= 1.25.0 versions.
https://patchstack.com/database/vulnerability/postaffiliatepro/wordpress-post-affiliate-pro-plugin-1-24-9-cross-site-scripting-xss?_s_id=cve
2023-07-18T12:33:31.061Z
2023-09-03T11:38:11.941Z
2023-09-03T11:38:11.941Z
{'Vendor': 'QualityUnit', 'Product': 'Post Affiliate Pro', 'Versions': 'n/a'}
CVE-2023-38178
.NET Core and Visual Studio Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
2023-07-12T23:41:45.865Z
2023-08-08T17:08:57.014Z
2023-12-14T20:03:28.720Z
{'Vendor': 'Microsoft', 'Product': '.NET 6.0', 'Versions': '6.0.0'}
CVE-2023-38197
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion.
https://codereview.qt-project.org/c/qt/qtbase/+/488960
2023-07-13T00:00:00
2023-07-13T00:00:00
2023-08-23T00:06:22.616014
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38894
A Prototype Pollution issue in Cronvel Tree-kit v.0.7.4 and before allows a remote attacker to execute arbitrary code via the extend function.
http://tree-kit.com
2023-07-25T00:00:00
2023-08-16T00:00:00
2023-08-17T21:05:05.446760
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38343
An XXE (XML external entity injection) vulnerability exists in the CSEP component of Ivanti Endpoint Manager before 2022 SU4. External entity references are enabled in the XML parser configuration. Exploitation of this vulnerability can lead to file disclosure or Server Side Request Forgery.
https://www.ivanti.com/releases
2023-07-15T00:00:00
2023-09-21T00:00:00
2023-09-21T20:57:44.212704
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38206
Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints resulting in a low-confidentiality impact. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html
2023-07-13T16:21:52.612Z
2023-09-14T07:40:06.729Z
2023-09-14T07:40:06.729Z
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
CVE-2023-38969
Cross Site Scripting vulnerabiltiy in Badaso v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the title parameter in the new book and edit book function.
https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS2.md
2023-07-25T00:00:00
2023-08-28T00:00:00
2023-08-28T20:52:38.591858
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}