CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-38422 | Walchem Intuition 9 firmware versions prior to v4.21 are missing authentication for some of the API routes of the management web server. This could allow an attacker to download and export sensitive data.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-229-04 | 2023-07-18T21:44:31.730Z | 2023-08-23T21:21:07.642Z | 2023-08-23T21:21:07.642Z | {'Vendor': 'Walchem', 'Product': 'Intuition 9', 'Versions': '0'} |
CVE-2023-38971 | Cross Site Scripting vulnerabiltiy in Badaso v.0.0.1 thru v.2.9.7 allows a remote attacker to execute arbitrary code via a crafted payload to the rack number parameter in the add new rack function. | https://github.com/anh91/uasoft-indonesia--badaso/blob/main/XSS3.md | 2023-07-25T00:00:00 | 2023-08-29T00:00:00 | 2023-08-29T21:44:53.501984 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38770 | SQL injection vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to obtain sensitive information via the group parameter within the /QueryView.php. | https://churchcrm.io/ | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38320 | An issue was discovered in OpenNDS Captive Portal before version 10.1.2. It has a show_preauthpage NULL pointer dereference that can be triggered with a crafted GET HTTP with a missing User-Agent header. Triggering this issue results in crashing OpenNDS (a Denial-of-Service condition). | https://github.com/openNDS/openNDS/releases/tag/v10.1.2 | 2023-07-14T00:00:00 | 2023-11-17T00:00:00 | 2023-11-17T05:47:11.124276 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38459 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.587Z | 2023-09-04T01:16:08.448Z | 2023-09-04T01:16:08.448Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38727 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted SQL statement. IBM X-Force ID: 262257. | https://www.ibm.com/support/pages/node/7087143 | 2023-07-25T00:01:06.101Z | 2023-12-04T01:08:48.495Z | 2023-12-04T01:08:48.495Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1, 11.5'} |
CVE-2023-38232 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.615Z | 2023-08-10T13:17:34.237Z | 2023-08-10T13:17:34.237Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38398 | Cross-Site Request Forgery (CSRF) vulnerability in Taboola plugin <= 2.0.1 versions. | https://patchstack.com/database/vulnerability/taboola/wordpress-taboola-plugin-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-07-17T15:22:13.927Z | 2023-10-03T10:16:12.120Z | 2023-10-03T10:16:12.120Z | {'Vendor': 'Taboola', 'Product': 'Taboola', 'Versions': 'n/a'} |
CVE-2023-38361 | IBM CICS TX Advanced 10.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 260770. | https://www.ibm.com/support/pages/node/7066431 | 2023-07-16T00:53:13.213Z | 2023-11-18T17:24:26.075Z | 2023-11-18T17:24:26.075Z | {'Vendor': 'IBM', 'Product': 'CICS TX Advanced', 'Versions': '10.1'} |
CVE-2023-38674 | FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md | 2023-07-24T07:55:02.091Z | 2024-01-03T08:10:10.276Z | 2024-01-03T08:10:10.276Z | {'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'} |
CVE-2023-38224 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.614Z | 2023-08-10T13:17:25.780Z | 2023-08-10T13:17:25.780Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38418 |
The BIG-IP Edge Client Installer on macOS does not follow best practices for elevating privileges during the installation process. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | https://my.f5.com/manage/s/article/K000134746 | 2023-07-17T22:41:24.603Z | 2023-08-02T15:55:17.276Z | 2023-08-02T15:55:17.276Z | {'Vendor': 'F5', 'Product': 'BIG-IP Edge Client', 'Versions': '7.2.3'} |
CVE-2023-38336 | netkit-rcp in rsh-client 0.17-24 allows command injection via filenames because /bin/sh is used by susystem, a related issue to CVE-2006-0225, CVE-2019-7283, and CVE-2020-15778. | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039689 | 2023-07-14T00:00:00 | 2023-07-14T00:00:00 | 2023-07-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38766 | Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the PersonView.php component. | https://churchcrm.io/ | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38623 | Multiple integer overflow vulnerabilities exist in the VZT facgeometry parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when allocating the `vindex_offset` array. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812 | 2023-07-20T19:05:43.914Z | 2024-01-08T14:47:48.463Z | 2024-01-08T18:00:19.741Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-38592 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213846 | 2023-07-20T15:04:44.407Z | 2023-07-28T04:30:42.372Z | 2023-07-28T04:30:42.372Z | {'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'} |
CVE-2023-38068 | In JetBrains YouTrack before 2023.1.16597 captcha was not properly validated for Helpdesk forms | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-07-12T12:43:58.071Z | 2023-07-12T12:48:22.777Z | 2023-07-12T12:48:22.777Z | {'Vendor': 'JetBrains', 'Product': 'YouTrack', 'Versions': '0'} |
CVE-2023-38438 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.585Z | 2023-09-04T01:16:02.381Z | 2023-09-04T01:16:02.381Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38204 | Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. | https://helpx.adobe.com/security/products/coldfusion/apsb23-47.html | 2023-07-13T16:21:52.612Z | 2023-09-14T07:40:13.695Z | 2023-09-14T07:40:13.695Z | {'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'} |
CVE-2023-38711 | An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4.6. | https://github.com/libreswan/libreswan/tags | 2023-07-24T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T20:30:07.355397 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38896 | An issue in Harrison Chase langchain v.0.0.194 and before allows a remote attacker to execute arbitrary code via the from_math_prompt and from_colored_object_prompt functions. | https://github.com/hwchase17/langchain/issues/5872 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38195 | Datalust Seq before 2023.2.9489 allows insertion of sensitive information into an externally accessible file or directory. This is exploitable only when external (SQL Server or PostgreSQL) metadata storage is used. Exploitation can only occur from a high-privileged user account. | https://github.com/datalust/seq-tickets/issues/1886 | 2023-07-13T00:00:00 | 2023-07-22T00:00:00 | 2023-07-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38879 | The Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to read arbitrary files via a directory traversal vulnerability in the 'filename' parameter of 'DownloadWindow.php'. | https://github.com/OS4ED/openSIS-Classic | 2023-07-25T00:00:00 | 2023-11-20T00:00:00 | 2023-11-20T18:48:09.528052 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38253 | An out-of-bounds read flaw was found in w3m, in the growbuf_to_Str function in indep.c. This issue may allow an attacker to cause a denial of service through a crafted HTML file. | https://access.redhat.com/security/cve/CVE-2023-38253 | 2023-07-13T16:29:56.475Z | 2023-07-14T17:07:01.468Z | 2024-01-23T02:48:34.108Z | {'Vendor': 'n/a', 'Product': 'w3m', 'Versions': ''} |
CVE-2023-38603 | The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A remote user may be able to cause a denial-of-service. | https://support.apple.com/en-us/HT213841 | 2023-07-20T15:04:44.408Z | 2023-07-27T00:31:09.910Z | 2023-07-27T03:46:22.565Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-38316 | An issue was discovered in OpenNDS Captive Portal before version 10.1.2. When the custom unescape callback is enabled, attackers can execute arbitrary OS commands by inserting them into the URL portion of HTTP GET requests. | https://github.com/openNDS/openNDS/releases/tag/v10.1.2 | 2023-07-14T00:00:00 | 2023-11-17T00:00:00 | 2023-11-17T05:45:25.510667 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38746 | Out-of-bounds read vulnerability/issue exists in CX-Programmer Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier. By having a user open a specially crafted CXP file, information disclosure and/or arbitrary code execution may occur. | https://www.ia.omron.com/product/vulnerability/OMSR-2023-005_en.pdf | 2023-07-25T03:13:53.096Z | 2023-08-03T04:58:30.228Z | 2023-08-03T04:58:30.228Z | {'Vendor': 'OMRON Corporation', 'Product': 'CX-Programmer', 'Versions': 'Included in CX-One CXONE-AL[][]D-V4 V9.80 and earlier'} |
CVE-2023-38029 |
Saho’s attendance devices ADM100 and ADM-100FP has insufficient filtering for special characters and file type within their file uploading function. A unauthenticate remote attacker authenticated can upload and execute arbitrary files to perform arbitrary system commands or disrupt service.
| https://www.twcert.org.tw/tw/cp-132-7336-35a94-1.html | 2023-07-12T00:37:03.717Z | 2023-08-28T05:59:47.039Z | 2023-08-28T05:59:47.039Z | {'Vendor': 'Saho', 'Product': 'ADM100', 'Versions': '0.0.4.0, 0.0.4.3, 0.0.4.6, 0.0.4.8, Q20100602, T17041702, T18051803, T190'} |
CVE-2023-38880 | The Community Edition version 9.0 of OS4ED's openSIS Classic has a broken access control vulnerability in the database backup functionality. Whenever an admin generates a database backup, the backup is stored in the web root while the file name has a format of "opensisBackup<date>.sql" (e.g. "opensisBackup07-20-2023.sql"), i.e. can easily be guessed. This file can be accessed by any unauthenticated actor and contains a dump of the whole database including password hashes. | https://github.com/OS4ED/openSIS-Classic | 2023-07-25T00:00:00 | 2023-11-20T00:00:00 | 2023-11-29T22:48:58.783202 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38496 | Apptainer is an open source container platform. Version 1.2.0-rc.2 introduced an ineffective privilege drop when requesting container network setup, therefore subsequent functions are called with root privileges, the attack surface is rather limited for users but an attacker could possibly craft a starter config to delete any directory on the host filesystems. A security fix has been included in Apptainer 1.2.1. There is no known workaround outside of upgrading to Apptainer 1.2.1. | https://github.com/apptainer/apptainer/security/advisories/GHSA-mmx5-32m4-wxvx | 2023-07-18T16:28:12.076Z | 2023-07-25T21:02:12.018Z | 2023-07-25T21:02:12.018Z | {'Vendor': 'apptainer', 'Product': 'apptainer', 'Versions': '>= 1.2.0-rc.2, < 1.2.1'} |
CVE-2023-38615 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213940 | 2023-07-20T15:04:44.409Z | 2023-09-26T20:14:50.622Z | 2023-09-26T20:14:50.622Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38245 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.617Z | 2023-08-10T13:17:37.919Z | 2023-08-10T13:17:37.919Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38750 | In Zimbra Collaboration (ZCS) 8 before 8.8.15 Patch 41, 9 before 9.0.0 Patch 34, and 10 before 10.0.2, internal JSP and XML files can be exposed. | https://wiki.zimbra.com/wiki/Security_Center | 2023-07-25T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38584 |
In Weintek's cMT3000 HMI Web CGI device, the cgi-bin command_wb.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-285-12 | 2023-09-20T14:26:47.021Z | 2023-10-19T19:20:20.059Z | 2023-10-19T19:20:20.059Z | {'Vendor': 'Weintek', 'Product': 'cMT-FHD', 'Versions': '0'} |
CVE-2023-38992 | jeecg-boot v3.5.1 was discovered to contain a SQL injection vulnerability via the title parameter at /sys/dict/loadTreeData. | https://github.com/jeecgboot/jeecg-boot/issues/5173 | 2023-07-25T00:00:00 | 2023-07-28T00:00:00 | 2023-07-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38838 | SQL injection vulnerability in Kidus Minimati v.1.0.0 allows a remote attacker to obtain sensitive information via the edit.php component. | http://kidus.com | 2023-07-25T00:00:00 | 2023-08-17T00:00:00 | 2023-08-17T11:46:32.281532 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38212 | Adobe Dimension version 3.4.9 is affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/dimension/apsb23-44.html | 2023-07-13T16:21:52.612Z | 2023-08-09T08:23:36.555Z | 2023-08-09T08:23:36.555Z | {'Vendor': 'Adobe', 'Product': 'Dimension', 'Versions': '0'} |
CVE-2023-38357 | Session tokens in RWS WorldServer 11.7.3 and earlier have a low entropy and can be enumerated, leading to unauthorized access to user sessions. | http://seclists.org/fulldisclosure/2023/Jul/30 | 2023-07-15T00:00:00 | 2023-08-01T00:00:00 | 2023-08-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38707 | null | null | 2023-07-24T16:19:28.366Z | null | 2023-08-04T18:37:42.810Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-38510 | Tolgee is an open-source localization platform. Starting in version 3.14.0 and prior to version 3.23.1, when a request is made using an API key, the backend fails to verify the permission scopes associated with the key, effectively bypassing permission checks entirely for some endpoints. It's important to note that this vulnerability only affects projects that have inadvertently exposed their API keys on the internet. Projects that have kept their API keys secure are not impacted. This issue is fixed in version 3.23.1. | https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-4f9j-4vh4-p85v | 2023-07-18T16:28:12.078Z | 2023-07-27T18:57:28.197Z | 2023-07-27T18:57:28.197Z | {'Vendor': 'tolgee', 'Product': 'tolgee-platform', 'Versions': '>= 3.14.0, < 3.23.1'} |
CVE-2023-38140 | Windows Kernel Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38140 | 2023-07-12T23:41:45.859Z | 2023-09-12T16:58:24.397Z | 2023-12-14T20:11:40.196Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38843 | An issue in Atlos v.1.0 allows an authenticated attacker to execute arbitrary code via a crafted payload into the description field in the incident function. | https://gist.github.com/senzee1984/ff30f0914db39d2741ab17332f0fc6e1 | 2023-07-25T00:00:00 | 2023-08-17T00:00:00 | 2023-08-17T18:30:49.386977 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38906 | An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message. | https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | 2023-07-25T00:00:00 | 2023-08-21T00:00:00 | 2024-01-19T19:43:03.519567 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38455 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.587Z | 2023-09-04T01:16:07.334Z | 2023-09-04T01:16:07.334Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38286 | Thymeleaf through 3.1.1.RELEASE, as used in spring-boot-admin (aka Spring Boot Admin) through 3.1.1 and other products, allows sandbox bypass via crafted HTML. This may be relevant for SSTI (Server Side Template Injection) and code execution in spring-boot-admin if MailNotifier is enabled and there is write access to environment variables via the UI. | https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI | 2023-07-14T00:00:00 | 2023-07-14T00:00:00 | 2023-07-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38814 | null | null | 2023-07-25T00:00:00 | null | 2023-08-08T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-38547 | A vulnerability in Veeam ONE allows an unauthenticated user to gain information about the SQL server connection Veeam ONE uses to access its configuration database. This may lead to remote code execution on the SQL server hosting the Veeam ONE configuration database. | https://www.veeam.com/kb4508 | 2023-07-20T01:00:12.444Z | 2023-11-07T06:17:31.617Z | 2023-11-07T06:17:31.617Z | {'Vendor': 'Veeam', 'Product': 'One', 'Versions': '11, 11a, 12'} |
CVE-2023-38402 | A vulnerability in the HPE Aruba Networking Virtual Intranet Access (VIA) client could allow malicious users to overwrite arbitrary files as NT AUTHORITY\SYSTEM. A successful exploit could allow these malicious users to create a Denial-of-Service (DoS) condition affecting the Microsoft Windows operating System boot process. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-011.txt | 2023-07-17T15:44:25.991Z | 2023-08-15T18:47:59.783Z | 2023-08-15T18:47:59.783Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE Aruba Networking Virtual Intranet Access (VIA)', 'Versions': 'HPE Aruba Networking Virtual Intranet Access (VIA) client for Microsoft Windows'} |
CVE-2023-38951 | A path traversal vulnerability in ZKTeco BioTime v8.5.5 allows attackers to write arbitrary files via using a malicious SFTP configuration. | http://zkteco.com | 2023-07-25T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38681 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted IGS file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21270) | https://cert-portal.siemens.com/productcert/pdf/ssa-764801.pdf | 2023-07-24T09:52:57.446Z | 2023-08-08T09:20:46.256Z | 2023-09-12T09:32:23.381Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0008'} |
CVE-2023-38802 | FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation). | https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling | 2023-07-25T00:00:00 | 2023-08-29T00:00:00 | 2023-11-15T05:07:02.171314 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38947 | An arbitrary file upload vulnerability in the /languages/install.php component of WBCE CMS v1.6.1 allows attackers to execute arbitrary code via a crafted PHP file. | https://gitee.com/CTF-hacker/pwn/issues/I7LH2N | 2023-07-25T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38044 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection. | https://www.hikashop.com/support/documentation/56-hikashop-changelog.html | 2023-07-12T04:32:07.094Z | 2023-08-07T16:51:06.984Z | 2023-08-07T16:51:06.984Z | {'Vendor': 'hikashop.com', 'Product': 'HikaShop component for Joomla', 'Versions': '4.0.0-4.7.2'} |
CVE-2023-38697 | protocol-http1 provides a low-level implementation of the HTTP/1 protocol. RFC 9112 Section 7.1 defined the format of chunk size, chunk data and chunk extension. The value of Content-Length header should be a string of 0-9 digits, the chunk size should be a string of hex digits and should split from chunk data using CRLF, and the chunk extension shouldn't contain any invisible character. However, Falcon has following behaviors while disobey the corresponding RFCs: accepting Content-Length header values that have `+` prefix, accepting Content-Length header values that written in hexadecimal with `0x` prefix, accepting `0x` and `+` prefixed chunk size, and accepting LF in chunk extension. This behavior can lead to desync when forwarding through multiple HTTP parsers, potentially results in HTTP request smuggling and firewall bypassing. This issue is fixed in `protocol-http1` v0.15.1. There are no known workarounds. | https://github.com/socketry/protocol-http1/security/advisories/GHSA-6jwc-qr2q-7xwj | 2023-07-24T16:19:28.364Z | 2023-08-04T17:32:51.164Z | 2023-08-04T17:32:51.164Z | {'Vendor': 'socketry', 'Product': 'protocol-http1', 'Versions': '< 0.15.1'} |
CVE-2023-38228 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.615Z | 2023-08-10T13:17:46.431Z | 2023-08-10T13:17:46.431Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38382 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daniel Söderström / Sidney van de Stouwe Subscribe to Category allows SQL Injection.This issue affects Subscribe to Category: from n/a through 2.7.4.
| https://patchstack.com/database/vulnerability/subscribe-to-category/wordpress-subscribe-to-category-plugin-2-7-4-sql-injection-vulnerability?_s_id=cve | 2023-07-17T15:21:38.729Z | 2023-11-06T08:02:44.002Z | 2023-11-06T08:02:44.002Z | {'Vendor': 'Daniel Söderström / Sidney van de Stouwe', 'Product': 'Subscribe to Category', 'Versions': 'n/a'} |
CVE-2023-38678 | OOB access in paddle.mode in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.
| https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md | 2023-07-24T07:55:02.092Z | 2024-01-03T08:11:55.859Z | 2024-01-03T08:11:55.859Z | {'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'} |
CVE-2023-38855 | Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the get_string function in xlstool.c:395. | https://github.com/libxls/libxls/issues/124 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38156 | Azure HDInsight Apache Ambari JDBC Injection Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38156 | 2023-07-12T23:41:45.861Z | 2023-09-12T16:58:18.626Z | 2023-12-14T20:11:34.599Z | {'Vendor': 'Microsoft', 'Product': 'Azure HDInsight', 'Versions': '1.0'} |
CVE-2023-38443 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.585Z | 2023-09-04T01:16:03.873Z | 2023-09-04T01:16:03.873Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38910 | CSZ CMS 1.3.0 is vulnerable to cross-site scripting (XSS), which allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered in the 'Carousel Wiget' section and choosing our carousel widget created above, in 'Photo URL' and 'YouTube URL' plugin. | https://github.com/desencrypt/CVE/blob/main/CVE-2023-38910/Readme.md | 2023-07-25T00:00:00 | 2023-08-18T00:00:00 | 2023-08-22T21:45:45.879950 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38448 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.586Z | 2023-09-04T01:16:05.233Z | 2023-09-04T01:16:05.233Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38331 | Zoho ManageEngine Support Center Plus 14001 and below is vulnerable to stored XSS in the products module. | https://manageengine.com | 2023-07-14T00:00:00 | 2023-07-28T00:00:00 | 2023-07-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38761 | Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the systemSettings.php component. | https://churchcrm.io/ | 2023-07-25T00:00:00 | 2023-08-08T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38624 | A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-38625 through CVE-2023-38627. | https://success.trendmicro.com/dcx/s/solution/000294176?language=en_US | 2023-07-20T19:46:15.610Z | 2024-01-23T20:34:05.300Z | 2024-01-23T20:34:05.300Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex Central', 'Versions': '2019'} |
CVE-2023-38736 | IBM QRadar WinCollect Agent 10.0 through 10.1.6, when installed to run as ADMIN or SYSTEM, is vulnerable to a local escalation of privilege attack that a normal user could utilize to gain SYSTEM permissions. IBM X-Force ID: 262542. | https://www.ibm.com/support/pages/node/7030703 | 2023-07-25T00:01:17.449Z | 2023-09-08T18:49:24.176Z | 2023-09-08T18:49:24.176Z | {'Vendor': 'IBM', 'Product': 'QRadar WinCollect Agent', 'Versions': '10.0'} |
CVE-2023-38673 | PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in the ability to execute arbitrary commands on the operating system.
| https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md | 2023-07-24T07:55:02.091Z | 2023-07-26T11:10:34.410Z | 2023-07-26T11:10:34.410Z | {'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'} |
CVE-2023-38223 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an Access of Uninitialized Pointer that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.614Z | 2023-08-10T13:17:38.719Z | 2023-08-10T13:17:38.719Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38409 | An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info). | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38059 | The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
| https://otrs.com/release-notes/otrs-security-advisory-2023-08/ | 2023-07-12T08:05:38.780Z | 2023-10-16T08:10:44.014Z | 2023-10-16T08:10:44.014Z | {'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'} |
CVE-2023-38720 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 and 11.5 is vulnerable to denial of service with a specially crafted ALTER TABLE statement. IBM X-Force ID: 261616. | https://www.ibm.com/support/pages/node/7047489 | 2023-07-25T00:00:53.164Z | 2023-10-16T20:52:54.759Z | 2023-10-16T20:52:54.759Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.1 ,11.5'} |
CVE-2023-38235 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.616Z | 2023-08-10T13:17:35.014Z | 2023-09-14T12:30:59.866Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38665 | Null pointer dereference in ieee_write_file in nasm 2.16rc0 allows attackers to cause a denial of service (crash). | https://bugzilla.nasm.us/show_bug.cgi?id=3392818 | 2023-07-23T00:00:00 | 2023-08-22T00:00:00 | 2023-08-22T15:44:37.053299 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38848 | An issue in rmc R Beauty CLINIC Line v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request. | https://liff.line.me/1657640647-Wk2xYj38 | 2023-07-25T00:00:00 | 2023-10-25T00:00:00 | 2023-10-25T21:35:21.966558 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38632 | async-sockets-cpp through 0.3.1 has a stack-based buffer overflow in tcpsocket.hpp when processing malformed TCP packets. | https://github.com/eminfedar/async-sockets-cpp/issues/31 | 2023-07-21T00:00:00 | 2023-07-21T00:00:00 | 2023-07-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38976 | An issue in weaviate v.1.20.0 allows a remote attacker to cause a denial of service via the handleUnbatchedGraphQLRequest function. | https://github.com/weaviate/weaviate/issues/3258 | 2023-07-25T00:00:00 | 2023-08-21T00:00:00 | 2023-08-29T21:41:16.871928 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38075 | A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application contains a use-after-free vulnerability that could be triggered while parsing specially crafted WRL files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-20842) | https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf | 2023-07-12T13:18:53.823Z | 2023-09-12T09:32:19.039Z | 2023-11-14T11:03:27.558Z | {'Vendor': 'Siemens', 'Product': 'JT2Go', 'Versions': 'All versions < V14.3.0.1'} |
CVE-2023-38425 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213841 | 2023-07-20T15:03:50.172Z | 2023-07-27T00:31:19.027Z | 2023-07-27T03:47:25.026Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-38130 | Cross-site request forgery (CSRF) vulnerability in CubeCart prior to 6.5.3 allows a remote unauthenticated attacker to delete data in the system. | https://forums.cubecart.com/topic/58736-cubecart-653-released-security-update/ | 2023-11-13T02:59:04.704Z | 2023-11-17T04:37:02.535Z | 2023-11-17T04:37:02.535Z | {'Vendor': 'CubeCart Limited', 'Product': 'CubeCart', 'Versions': 'prior to 6.5.3'} |
CVE-2023-38560 | An integer overflow flaw was found in pcl/pl/plfont.c:418 in pl_glyph_name in ghostscript. This issue may allow a local attacker to cause a denial of service via transforming a crafted PCL file to PDF format. | https://access.redhat.com/security/cve/CVE-2023-38560 | 2023-07-20T14:53:37.544Z | 2023-08-01T16:49:48.327Z | 2024-01-23T02:53:39.394Z | {'Vendor': 'n/a', 'Product': 'ghostscript', 'Versions': ''} |
CVE-2023-38999 | A Cross-Site Request Forgery (CSRF) in the System Halt API (/system/halt) of OPNsense Community Edition before 23.7 and Business Edition before 23.4.2 allows attackers to cause a Denial of Service (DoS) via a crafted GET request. | https://github.com/opnsense/core/commit/5d68f43d1f254144831881fc87d885eed120cf3c | 2023-07-25T00:00:00 | 2023-08-09T00:00:00 | 2023-10-10T22:22:02.614840 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38649 | Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_get_facname decompression functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the string copy loop. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1813 | 2023-07-21T18:33:50.464Z | 2024-01-08T14:47:47.471Z | 2024-01-08T18:00:20.176Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-38219 | Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. Payload is stored in an admin area, resulting in high confidentiality and integrity impact. | https://helpx.adobe.com/security/products/magento/apsb23-50.html | 2023-07-13T16:21:52.614Z | 2023-10-13T06:15:14.650Z | 2023-10-13T06:15:14.650Z | {'Vendor': 'Adobe', 'Product': 'Adobe Commerce', 'Versions': '0'} |
CVE-2023-38188 | Azure Apache Hadoop Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38188 | 2023-07-12T23:41:45.869Z | 2023-08-08T17:08:40.569Z | 2023-12-14T20:03:13.233Z | {'Vendor': 'Microsoft', 'Product': 'Azure HDInsight', 'Versions': '1.0'} |
CVE-2023-38472 | A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function. | https://access.redhat.com/security/cve/CVE-2023-38472 | 2023-07-18T09:48:04.753Z | 2023-11-02T14:59:24.996Z | 2023-11-02T14:59:24.996Z | {'Vendor': 'n/a', 'Product': 'avahi', 'Versions': ''} |
CVE-2023-38022 | An issue was discovered in Fortanix EnclaveOS Confidential Computing Manager (CCM) Platform before 3.29 for Intel SGX. Insufficient pointer validation allows a local attacker to access unauthorized information. This relates to strlen and sgx_is_within_user. | https://jovanbulck.github.io/files/ccs19-tale.pdf | 2023-07-11T00:00:00 | 2023-12-30T00:00:00 | 2023-12-30T02:13:35.147409 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38921 | Netgear WG302v2 v5.2.9 and WAG302v2 v5.1.19 were discovered to contain multiple command injection vulnerabilities in the upgrade_handler function via the firmwareRestore and firmwareServerip parameters. | https://www.netgear.com/about/security/ | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38864 | An issue in COMFAST CF-XR11 v.2.7.2 allows an attacker to execute arbitrary code via the protal_delete_picname parameter in the sub_41171C function at bin/webmgnt. | https://github.com/TTY-flag/my_iot_vul/tree/main/COMFAST/CF-XR11/Command_Inject3 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38537 | A race condition in a network transport subsystem led to a heap use-after-free issue in established or unsilenced incoming audio/video calls that could have resulted in app termination or unexpected control flow with very low probability. | https://www.whatsapp.com/security/advisories/2023/ | 2023-07-19T20:34:49.827Z | 2023-10-04T19:09:58.086Z | 2023-10-04T19:09:58.086Z | {'Vendor': 'Facebook', 'Product': 'WhatsApp Desktop for Mac', 'Versions': '0'} |
CVE-2023-38167 | Microsoft Dynamics Business Central Elevation Of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38167 | 2023-07-12T23:41:45.862Z | 2023-08-08T17:08:45.147Z | 2023-12-14T20:03:17.208Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 Business Central 2023 Release Wave 1', 'Versions': '22.0.0'} |
CVE-2023-38937 | Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC8 v4 V16.03.34.06, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, AC5 V1.0 V15.03.06.28, AC9 V3.0 V15.03.06.42_multi and AC10 v4.0 V16.03.10.13 were discovered to contain a stack overflow via the list parameter in the formSetVirtualSer function. | https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetVirtualSer/README.md | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38034 | A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.53 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update UniFi Switches to Version 6.5.59 or later. | https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | 2023-07-12T01:00:11.880Z | 2023-08-10T18:58:07.647Z | 2023-08-10T18:58:07.647Z | {'Vendor': 'Ubiquiti Inc', 'Product': 'UniFi Access Points', 'Versions': '6.5.53'} |
CVE-2023-38464 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.588Z | 2023-09-04T01:16:09.835Z | 2023-09-04T01:16:09.835Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38171 | Microsoft QUIC Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38171 | 2023-07-12T23:41:45.863Z | 2023-10-10T17:07:23.843Z | 2023-12-14T01:14:57.383Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2022 version 17.2', 'Versions': '17.2.0'} |
CVE-2023-38521 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Exifography plugin <= 1.3.1 versions. | https://patchstack.com/database/vulnerability/thesography/wordpress-exifography-plugin-1-3-1-cross-site-scripting-xss?_s_id=cve | 2023-07-18T17:33:34.155Z | 2023-09-03T11:08:25.135Z | 2023-09-03T11:08:25.135Z | {'Vendor': 'Exifography', 'Product': 'Exifography', 'Versions': 'n/a'} |
CVE-2023-38872 | An Insecure Direct Object Reference (IDOR) vulnerability in gugoan Economizzer commit 3730880 (April 2023) and v.0.9-beta1 allows any unauthenticated attacker to access cash book entry attachments of any other user, if they know the Id of the attachment. | https://github.com/gugoan/economizzer | 2023-07-25T00:00:00 | 2023-09-28T00:00:00 | 2023-09-28T03:23:35.456911 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38608 | The issue was addressed with additional permissions checks. This issue is fixed in macOS Ventura 13.5. An app may be able to access user-sensitive data. | https://support.apple.com/en-us/HT213843 | 2023-07-20T15:04:44.408Z | 2023-07-27T00:31:21.187Z | 2023-07-27T03:47:27.112Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38258 | The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5, macOS Monterey 12.6.8. Processing a 3D model may result in disclosure of process memory. | https://support.apple.com/en-us/HT213843 | 2023-07-20T15:04:15.897Z | 2023-07-27T00:31:21.811Z | 2023-07-27T03:47:27.636Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38433 | Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007. | https://www.fujitsu.com/global/products/computing/peripheral/video/download/ | 2023-07-18T00:32:29.582Z | 2023-07-26T07:44:04.302Z | 2023-07-26T07:44:04.302Z | {'Vendor': 'Fujitsu Limited ', 'Product': 'IP-HE950E', 'Versions': 'firmware versions V01L001 to V01L053'} |
CVE-2023-38599 | A logic issue was addressed with improved state management. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A website may be able to track sensitive user information. | https://support.apple.com/en-us/HT213847 | 2023-07-20T15:04:44.407Z | 2023-07-28T04:30:43.299Z | 2023-07-28T04:30:43.299Z | {'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.