CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-38063 | In JetBrains TeamCity before 2023.05.1 stored XSS while running custom builds was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-07-12T12:43:56.399Z | 2023-07-12T12:48:20.416Z | 2023-07-12T12:48:20.416Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-38576 | Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an authenticated user to execute arbitrary OS commands on a certain management console. | https://www.elecom.co.jp/news/security/20230810-01/ | 2023-08-09T11:54:54.852Z | 2023-08-18T09:39:29.926Z | 2023-08-18T09:39:29.926Z | {'Vendor': 'LOGITEC CORPORATION', 'Product': 'LAN-WH300N/RE', 'Versions': 'all versions'} |
CVE-2023-38126 | Softing edgeAggregator Restore Configuration Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability.
The specific flaw exists within the processing of backup zip files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this to execute code in the context of root. Was ZDI-CAN-20543. | https://www.zerodayinitiative.com/advisories/ZDI-23-1058/ | 2023-07-12T15:22:20.623Z | 2023-12-19T21:50:37.477Z | 2023-12-19T21:50:37.477Z | {'Vendor': 'Softing', 'Product': 'edgeAggregator', 'Versions': '3.40'} |
CVE-2023-38151 | Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38151 | 2023-07-12T23:41:45.860Z | 2023-11-14T17:57:03.867Z | 2024-01-09T17:04:59.803Z | {'Vendor': 'Microsoft', 'Product': 'Host Integration Server 2020', 'Versions': '7.0'} |
CVE-2023-38501 | copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue. | https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh | 2023-07-18T16:28:12.077Z | 2023-07-25T21:06:18.006Z | 2023-07-25T21:06:18.006Z | {'Vendor': '9001', 'Product': 'copyparty', 'Versions': '< 1.8.7'} |
CVE-2023-38852 | Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the unicode_decode_wcstombs function in xlstool.c:266. | https://github.com/libxls/libxls/issues/124 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38444 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.585Z | 2023-09-04T01:16:04.144Z | 2023-09-04T01:16:04.144Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38690 | matrix-appservice-irc is a Node.js IRC bridge for Matrix. Prior to version 1.0.1, it is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. Versions 1.0.1 and above are patched. There are no robust workarounds to the bug. One may disable dynamic channels in the config to disable the most common execution method but others may exist. | https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-3pmj-jqqp-2mj3 | 2023-07-24T16:19:28.363Z | 2023-08-04T16:31:41.840Z | 2023-08-04T16:31:41.840Z | {'Vendor': 'matrix-org', 'Product': 'matrix-appservice-irc', 'Versions': '< 1.0.1'} |
CVE-2023-38556 | Improper input validation vulnerability in SEIKO EPSON printer Web Config allows a remote attacker to turned off the printer.
[Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers via a web browser. Web Config is pre-installed in some printers provided by SEIKO EPSON CORPORATION. For the details of the affected product names/model numbers, refer to the information provided by the vendor. | https://www.epson.jp/support/misc_t/230802_oshirase.htm | 2023-07-20T05:02:21.624Z | 2023-08-02T07:19:26.549Z | 2023-08-02T07:19:26.549Z | {'Vendor': 'SEIKO EPSON CORPORATION', 'Product': 'SEIKO EPSON printer Web Config', 'Versions': 'unspecified'} |
CVE-2023-38043 | A vulnerability exists on all versions of the Ivanti Secure Access Client below 22.6R1.1, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to a denial of service (DoS) condition on the user machine and, in some cases, resulting in a full compromise of the system. | https://forums.ivanti.com/s/article/Security-fixes-included-in-the-latest-Ivanti-Secure-Access-Client-Release | 2023-07-12T01:00:11.881Z | 2023-11-14T23:18:08.378Z | 2023-11-22T23:28:30.779Z | {'Vendor': 'Ivanti', 'Product': 'Secure Access Client Windows', 'Versions': '22.6R1.1'} |
CVE-2023-38940 | Tenda F1203 V2.0.1.6, FH1203 V2.0.1.6 and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function. | https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/form_fast_setting_wifi_set | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38686 | Sydent is an identity server for the Matrix communications protocol. Prior to version 2.5.6, if configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a man-in-the-middle (MITM) attack. Attackers with privileged access to the network can intercept room invitations and address confirmation emails. This is patched in Sydent 2.5.6. When patching, make sure that Sydent trusts the certificate of the server it is connecting to. This should happen automatically when using properly issued certificates. Those who use self-signed certificates should make sure to copy their Certification Authority certificate, or their self signed certificate if using only one, to the trust store of your operating system. As a workaround, one can ensure Sydent's emails fail to send by setting the configured SMTP server to a loopback or non-routable address under one's control which does not have a listening SMTP server. | https://github.com/matrix-org/sydent/security/advisories/GHSA-p6hw-wm59-3g5g | 2023-07-24T16:19:28.363Z | 2023-08-04T15:57:15.760Z | 2023-08-04T15:57:15.760Z | {'Vendor': 'matrix-org', 'Product': 'sydent', 'Versions': '< 2.5.6'} |
CVE-2023-38669 | Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potentially exploitable condition.
| https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md | 2023-07-24T07:55:02.090Z | 2023-07-26T09:29:39.869Z | 2023-07-26T09:29:39.869Z | {'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'} |
CVE-2023-38239 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.616Z | 2023-08-10T13:17:28.116Z | 2023-08-10T13:17:28.116Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38956 | A path traversal vulnerability in ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload. | http://zkteco.com | 2023-07-25T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38405 | On Crestron 3-Series Control Systems before 1.8001.0187, crafting and sending a specific BACnet packet can cause a crash. | https://www.crestron.com/release_notes/cp3n_1.8001.0187_release_notes.pdf | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38517 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Realwebcare WRC Pricing Tables plugin <= 2.3.7 versions. | https://patchstack.com/database/vulnerability/wrc-pricing-tables/wordpress-wrc-pricing-tables-plugin-2-3-4-cross-site-scripting-xss?_s_id=cve | 2023-07-18T17:33:34.155Z | 2023-09-03T11:20:55.964Z | 2023-09-03T11:20:55.964Z | {'Vendor': 'Realwebcare', 'Product': 'WRC Pricing Tables', 'Versions': 'n/a'} |
CVE-2023-38147 | Windows Miracast Wireless Display Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38147 | 2023-07-12T23:41:45.860Z | 2023-09-12T16:58:21.260Z | 2023-12-14T20:11:37.183Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38452 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.587Z | 2023-09-04T01:16:06.450Z | 2023-09-04T01:16:06.450Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38215 | Adobe Experience Manager versions 6.5.17 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | https://helpx.adobe.com/security/products/experience-manager/apsb23-43.html | 2023-07-13T16:21:52.613Z | 2023-09-13T13:01:34.163Z | 2023-09-13T13:01:34.163Z | {'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'} |
CVE-2023-38350 | PNP4Nagios through 81ebfc5 has stored XSS in the AJAX controller via the basket API and filters. This affects 0.6.26. | https://github.com/pnp4nagios/pnp4nagios/pull/16 | 2023-07-15T00:00:00 | 2023-07-15T00:00:00 | 2023-07-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38700 | matrix-appservice-irc is a Node.js IRC bridge for Matrix. Prior to version 1.0.1, it was possible to craft an event such that it would leak part of a targeted message event from another bridged room. This required knowing an event ID to target. Version 1.0.1n fixes this issue. As a workaround, set the `matrixHandler.eventCacheSize` config value to `0`. This workaround may impact performance. | https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-c7hh-3v6c-fj4q | 2023-07-24T16:19:28.365Z | 2023-08-04T18:05:43.187Z | 2023-08-04T18:05:43.187Z | {'Vendor': 'matrix-org', 'Product': 'matrix-appservice-irc', 'Versions': '< 1.0.1'} |
CVE-2023-38429 | An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38583 | A stack-based buffer overflow vulnerability exists in the LXT2 lxt2_rd_expand_integer_to_bits function of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1827 | 2023-08-02T15:30:11.396Z | 2024-01-08T14:47:39.869Z | 2024-01-08T18:00:21.456Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-38612 | The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, iOS 17 and iPadOS 17, macOS Sonoma 14, macOS Ventura 13.6. An app may be able to access protected user data. | https://support.apple.com/en-us/HT213938 | 2023-07-20T15:04:44.409Z | 2024-01-10T22:03:45.130Z | 2024-01-10T22:03:45.130Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-38242 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.616Z | 2023-08-10T13:17:29.730Z | 2023-08-10T13:17:29.730Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38307 | An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name. | https://webmin.com/tags/webmin-changelog/ | 2023-07-14T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38887 | File Upload vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to execute arbitrary code and obtain sensitive information via the extension filtering and renaming functions. | http://dolibarr.com | 2023-07-25T00:00:00 | 2023-09-20T00:00:00 | 2023-09-20T00:05:14.062227 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38184 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184 | 2023-07-12T23:41:45.869Z | 2023-08-08T17:08:42.283Z | 2023-12-14T20:03:14.698Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38491 | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to upload an arbitrary file to the content folder. Kirby sites are not affected if they don't allow file uploads for untrusted users or visitors or if the file extensions of uploaded files are limited to a fixed safe list. The attack requires user interaction by another user or visitor and cannot be automated.
An editor with write access to the Kirby Panel could upload a file with an unknown file extension like `.xyz` that contains HTML code including harmful content like `<script>` tags. The direct link to that file could be sent to other users or visitors of the site. If the victim opened that link in a browser where they are logged in to Kirby and the file had not been opened by anyone since the upload, Kirby would not be able to send the correct MIME content type, instead falling back to `text/html`. The browser would then run the script, which could for example trigger requests to Kirby's API with the permissions of the victim.
The issue was caused by the underlying `Kirby\Http\Response::file()` method, which didn't have an explicit fallback if the MIME type could not be determined from the file extension. If you use this method in site or plugin code, these uses may be affected by the same vulnerability.
The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have fixed the affected method to use a fallback MIME type of `text/plain` and set the `X-Content-Type-Options: nosniff` header if the MIME type of the file is unknown. | https://github.com/getkirby/kirby/security/advisories/GHSA-8fv7-wq38-f5c9 | 2023-07-18T16:28:12.075Z | 2023-07-27T15:30:49.404Z | 2023-07-27T15:44:17.158Z | {'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'} |
CVE-2023-38254 | Microsoft Message Queuing Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254 | 2023-07-13T16:33:28.143Z | 2023-08-08T17:08:31.932Z | 2023-12-14T20:03:05.704Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-38604 | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in watchOS 9.6, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213846 | 2023-07-20T15:04:44.408Z | 2023-07-28T04:30:43.764Z | 2023-07-28T04:30:43.764Z | {'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'} |
CVE-2023-38311 | An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the System Logs Viewer functionality. The vulnerability allows an attacker to store a malicious payload in the configuration field, triggering the execution of the payload when saving the configuration or when accessing the System Logs Viewer page. | https://webmin.com/tags/webmin-changelog/ | 2023-07-14T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38741 |
IBM TXSeries for Multiplatforms 8.1, 8.2, and 9.1 is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting a slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 262905.
| https://www.ibm.com/support/pages/node/7025476 | 2023-07-25T00:01:17.450Z | 2023-08-14T17:19:00.370Z | 2023-08-14T17:19:00.370Z | {'Vendor': 'IBM', 'Product': 'TXSeries for Multiplatforms', 'Versions': '8.1, 8.2, 9.1'} |
CVE-2023-38192 | An issue was discovered in SuperWebMailer 9.00.0.01710. It allows superadmincreate.php XSS via crafted incorrect passwords. | https://herolab.usd.de/security-advisories/ | 2023-07-13T00:00:00 | 2023-10-21T00:00:00 | 2023-10-21T00:04:23.170996 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38468 | In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.589Z | 2023-09-04T01:16:10.949Z | 2023-09-04T01:16:10.949Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-38891 | SQL injection vulnerability in Vtiger CRM v.7.5.0 allows a remote authenticated attacker to escalate privileges via the getQueryColumnsList function in ReportRun.php. | https://code.vtiger.com/vtiger/vtigercrm/-/blob/master/modules/Reports/ReportRun.php#L395 | 2023-07-25T00:00:00 | 2023-09-14T00:00:00 | 2023-09-14T22:24:03.562280 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38487 | HedgeDoc is software for creating real-time collaborative markdown notes. Prior to version 1.9.9, the API of HedgeDoc 1 can be used to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one.
When the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note by making a POST request to the `/new/<ALIAS>` API endpoint. The `<ALIAS>` parameter can be set to the ID of an existing note. HedgeDoc did not verify whether the provided `<ALIAS>` value corresponds to a valid ID of an existing note and always allowed creation of the new note. When a visitor tried to access the existing note, HedgeDoc will first search for a note with a matching alias before it searches using the ID, therefore only the new note can be accessed.
Depending on the permission settings of the HedgeDoc instance, the issue can be exploited only by logged-in users or by all (including non-logged-in) users. The exploit requires knowledge of the ID of the target note. Attackers could use this issue to present a manipulated copy of the original note to the user, e.g. by replacing the links with malicious ones. Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database.
This issue was fixed in version 1.9.9. As a workaround, disabling freeURL mode prevents the exploitation of this issue. The impact can be limited by restricting freeURL note creation to trusted, logged-in users by enabling `requireFreeURLAuthentication`/`CMD_REQUIRE_FREEURL_AUTHENTICATION`. | https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg | 2023-07-18T16:28:12.074Z | 2023-08-04T15:40:16.370Z | 2023-08-04T15:40:16.370Z | {'Vendor': 'hedgedoc', 'Product': 'hedgedoc', 'Versions': '< 1.9.9'} |
CVE-2023-38653 | Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815 | 2023-07-21T18:51:56.223Z | 2024-01-08T14:47:46.271Z | 2024-01-08T18:00:21.156Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-38203 | Adobe ColdFusion versions 2018u17 (and earlier), 2021u7 (and earlier) and 2023u1 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction. | https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html | 2023-07-13T16:21:52.611Z | 2023-07-20T15:41:10.683Z | 2023-07-20T15:41:10.683Z | {'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'} |
CVE-2023-38346 | An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior. | https://support2.windriver.com/index.php?page=security-notices | 2023-07-15T00:00:00 | 2023-09-22T00:00:00 | 2023-09-22T18:22:19.692072 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38595 | The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213847 | 2023-07-20T15:04:44.407Z | 2023-07-27T00:31:30.328Z | 2023-07-27T03:47:35.857Z | {'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'} |
CVE-2023-38829 | An issue in NETIS SYSTEMS WF2409E v.3.6.42541 allows a remote attacker to execute arbitrary code via the ping and traceroute functions of the diagnostic tools component in the admin management interface. | https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E | 2023-07-25T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T18:51:55.687234 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38594 | The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213847 | 2023-07-20T15:04:44.407Z | 2023-07-26T23:46:22.932Z | 2023-07-27T03:47:36.325Z | {'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'} |
CVE-2023-38652 | Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815 | 2023-07-21T18:51:56.223Z | 2024-01-08T14:47:46.181Z | 2024-01-08T18:00:21.002Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-38347 | An issue was discovered in LWsystems Benno MailArchiv 2.10.1. Attackers can cause XSS via JavaScript content to a mailbox. | https://wiki.benno-mailarchiv.de/doku.php | 2023-07-15T00:00:00 | 2023-08-09T00:00:00 | 2023-08-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38193 | An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Remote Code Execution via a crafted sendmail command line. | https://herolab.usd.de/security-advisories/ | 2023-07-13T00:00:00 | 2023-10-21T00:00:00 | 2023-10-21T00:08:36.274932 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38469 | A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record. | https://access.redhat.com/security/cve/CVE-2023-38469 | 2023-07-18T09:48:04.752Z | 2023-11-02T14:49:26.283Z | 2023-11-02T14:49:26.283Z | {'Vendor': 'n/a', 'Product': 'avahi', 'Versions': ''} |
CVE-2023-38039 | When curl retrieves an HTTP response, it stores the incoming headers so that
they can be accessed later via the libcurl headers API.
However, curl did not have a limit in how many or how large headers it would
accept in a response, allowing a malicious server to stream an endless series
of headers and eventually cause curl to run out of heap memory. | https://hackerone.com/reports/2072338 | 2023-07-12T01:00:11.881Z | 2023-09-15T03:21:54.348Z | 2023-09-15T03:21:54.348Z | {'Vendor': 'curl', 'Product': 'curl', 'Versions': '8.3.0, 7.84.0'} |
CVE-2023-38890 | Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks. | https://github.com/akshadjoshi/CVE-2023-38890 | 2023-07-25T00:00:00 | 2023-08-18T00:00:00 | 2023-08-18T18:18:17.157485 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38486 | A vulnerability in the secure boot implementation on affected Aruba 9200 and 9000 Series Controllers and Gateways allows an attacker to bypass security controls which would normally prohibit unsigned kernel images from executing. An attacker can use this vulnerability to execute arbitrary runtime operating systems, including unverified and unsigned OS images. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt | 2023-07-18T14:34:27.165Z | 2023-09-06T17:48:38.025Z | 2023-09-06T17:48:38.025Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': '9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways', 'Versions': 'ArubaOS 10.4.x.x, ArubaOS 8.11.x.x, ArubaOS 8.10.x.x, ArubaOS 8.6.x.x'} |
CVE-2023-38255 |
A potential attacker with or without (cookie theft) access to the device would be able to include malicious code (XSS) when uploading new device configuration that could affect the intended function of the device.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | 2023-09-06T15:41:16.539Z | 2023-09-18T20:08:05.295Z | 2023-09-18T20:08:05.295Z | {'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'} |
CVE-2023-38605 | This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.5. An app may be able to determine a user’s current location. | https://support.apple.com/en-us/HT213843 | 2023-07-20T15:04:44.408Z | 2023-09-06T20:48:09.737Z | 2023-09-06T20:48:09.737Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38310 | An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the configuration settings of the system logs functionality. The vulnerability allows an attacker to store an XSS payload in the configuration settings of specific log files. This results in the execution of that payload whenever the affected log files are accessed. | https://webmin.com/tags/webmin-changelog/ | 2023-07-14T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38740 | IBM Db2 for Linux, UNIX, and Windows (includes Db2 Connect Server) 11.5 is vulnerable to a denial of service with a specially crafted SQL statement. IBM X-Force ID: 262613. | https://www.ibm.com/support/pages/node/7047489 | 2023-07-25T00:01:17.450Z | 2023-10-16T21:24:15.155Z | 2023-10-16T21:24:15.155Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'} |
CVE-2023-38886 | An issue in Dolibarr ERP CRM v.17.0.1 and before allows a remote privileged attacker to execute arbitrary code via a crafted command/script. | http://dolibarr.com | 2023-07-25T00:00:00 | 2023-09-20T00:00:00 | 2023-09-20T00:07:16.247117 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38185 | Microsoft Exchange Server Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38185 | 2023-07-12T23:41:45.869Z | 2023-08-08T17:08:41.686Z | 2023-12-14T20:03:14.211Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 13', 'Versions': '15.02.0'} |
CVE-2023-38490 | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 only affects Kirby sites that use the `Xml` data handler (e.g. `Data::decode($string, 'xml')`) or the `Xml::parse()` method in site or plugin code. The Kirby core does not use any of the affected methods.
XML External Entities (XXE) is a little used feature in the XML markup language that allows to include data from external files in an XML structure. If the name of the external file can be controlled by an attacker, this becomes a vulnerability that can be abused for various system impacts like the disclosure of internal or confidential data that is stored on the server (arbitrary file disclosure) or to perform network requests on behalf of the server (server-side request forgery, SSRF).
Kirby's `Xml::parse()` method used PHP's `LIBXML_NOENT` constant, which enabled the processing of XML external entities during the parsing operation. The `Xml::parse()` method is used in the `Xml` data handler (e.g. `Data::decode($string, 'xml')`). Both the vulnerable method and the data handler are not used in the Kirby core. However they may be used in site or plugin code, e.g. to parse RSS feeds or other XML files. If those files are of an external origin (e.g. uploaded by a user or retrieved from an external URL), attackers may be able to include an external entity in the XML file that will then be processed in the parsing process. Kirby sites that don't use XML parsing in site or plugin code are *not* affected.
The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have removed the `LIBXML_NOENT` constant as processing of external entities is out of scope of the parsing logic. This protects all uses of the method against the described vulnerability. | https://github.com/getkirby/kirby/security/advisories/GHSA-q386-w6fg-gmgp | 2023-07-18T16:28:12.075Z | 2023-07-27T14:46:49.403Z | 2023-07-27T15:44:49.436Z | {'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'} |
CVE-2023-38243 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.616Z | 2023-08-10T13:17:23.685Z | 2023-08-10T13:17:23.685Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38306 | An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code. | https://webmin.com/tags/webmin-changelog/ | 2023-07-14T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38428 | An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read. | https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-08-31T18:06:22.718217 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38582 |
Persistent cross-site scripting (XSS) in the web application of MOD3GP-SY-120K allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the field MAIL_RCV. When a legitimate user attempts to access to the vulnerable page of the web application, the XSS payload will be executed.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03 | 2023-09-06T15:41:16.557Z | 2023-09-18T20:04:48.193Z | 2023-09-18T20:04:48.193Z | {'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'} |
CVE-2023-38994 | The 'check_univention_joinstatus' prometheus monitoring script (and other scripts) in UCS 5.0-5 revealed the LDAP plaintext password of the machine account in the process list allowing attackers with local ssh access to gain higher privileges and perform followup attacks. By default, the configuration of UCS does not allow local ssh access for regular users. | https://forge.univention.org/bugzilla/show_bug.cgi?id=56324 | 2023-07-25T00:00:00 | 2023-10-31T00:00:00 | 2023-11-08T22:00:00.892720 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38214 | Adobe Experience Manager versions 6.5.17 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | https://helpx.adobe.com/security/products/experience-manager/apsb23-43.html | 2023-07-13T16:21:52.613Z | 2023-09-13T13:01:33.386Z | 2023-09-13T13:01:33.386Z | {'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'} |
CVE-2023-38351 | MiniTool Partition Wizard 12.8 contains an insecure installation mechanism that allows attackers to achieve remote code execution through a man in the middle attack. | https://0dr3f.github.io/cve/ | 2023-07-15T00:00:00 | 2023-09-19T00:00:00 | 2023-09-19T15:36:35.393483 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38701 | Hydra is the layer-two scalability solution for Cardano. Users of the Hydra head protocol send the UTxOs they wish to commit into the Hydra head first to the `commit` validator, where they remain until they are either collected into the `head` validator or the protocol initialisation is aborted and the value in the committed UTxOs is returned to the users who committed them. Prior to version 0.12.0, the `commit` validator contains a flawed check when the `ViaAbort` redeemer is used, which allows any user to spend any UTxO which is at the validator arbitrarily, meaning an attacker can steal the funds that users are trying to commit into the head validator. The intended behavior is that the funds must be returned to the user which committed the funds and can only be performed by a participant of the head. The `initial` validator also is similarly affected as the same flawed check is performed for the `ViaAbort` redeemer. Due to this issue, an attacker can steal any funds that user's try to commit into a Hydra head. Also, an attacker can prevent any Hydra head from being successfully opened. It does not allow an attacker to take funds which have been successfully collected into and currently reside in the `head` validator. Version 0.12.0 contains a fix for this issue. | https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6 | 2023-07-24T16:19:28.365Z | 2023-10-04T18:48:52.709Z | 2023-10-04T18:48:52.709Z | {'Vendor': 'input-output-hk', 'Product': 'hydra', 'Versions': '< 0.12.0'} |
CVE-2023-38845 | An issue in Anglaise Company Anglaise.Company v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request. | https://liff.line.me/1657030660-8nDEQNbe | 2023-07-25T00:00:00 | 2023-10-25T00:00:00 | 2023-10-25T21:47:32.106011 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38516 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP OnlineSupport, Essential Plugin Audio Player with Playlist Ultimate plugin <= 1.2.2 versions. | https://patchstack.com/database/vulnerability/audio-player-with-playlist-ultimate/wordpress-audio-player-with-playlist-ultimate-plugin-1-2-2-cross-site-scripting-xss?_s_id=cve | 2023-07-18T17:33:34.154Z | 2023-09-03T11:25:55.971Z | 2023-09-03T11:28:49.896Z | {'Vendor': 'WP OnlineSupport, Essential Plugin', 'Product': 'Audio Player with Playlist Ultimate', 'Versions': 'n/a'} |
CVE-2023-38146 | Windows Themes Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38146 | 2023-07-12T23:41:45.859Z | 2023-09-12T16:58:21.795Z | 2023-09-15T21:43:00.409Z | {'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'} |
CVE-2023-38453 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.587Z | 2023-09-04T01:16:06.759Z | 2023-09-04T01:16:06.759Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38003 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a user with DATAACCESS privileges to execute routines that they should not have access to. IBM X-Force ID: 260214. | https://www.ibm.com/support/pages/node/7078681 | 2023-07-11T17:33:11.275Z | 2023-12-04T00:12:37.484Z | 2023-12-04T00:13:27.709Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1 ,11.5'} |
CVE-2023-38280 | IBM HMC (Hardware Management Console) 10.1.1010.0 and 10.2.1030.0 could allow a local user to escalate their privileges to root access on a restricted shell. IBM X-Force ID: 260740. | https://www.ibm.com/support/pages/node/7047713 | 2023-07-14T00:46:27.165Z | 2023-10-16T01:03:27.915Z | 2023-10-16T01:03:27.915Z | {'Vendor': 'IBM', 'Product': 'Power HMC', 'Versions': '10.1.1010.0, 10.2.1030.0'} |
CVE-2023-38541 | Insecure inherited permissions in some Intel HID Event Filter drivers for Windows 10 for some Intel NUC laptop software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00964.html | 2023-08-23T03:00:02.533Z | 2024-01-19T20:03:14.049Z | 2024-01-19T20:03:14.049Z | {'Vendor': 'n/a', 'Product': 'Intel HID Event Filter drivers for Windows 10 for some Intel NUC laptop software installers', 'Versions': 'before version 2.2.2.1'} |
CVE-2023-38812 | null | null | 2023-07-25T00:00:00 | null | 2023-08-03T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-38404 | The XPRTLD web application in Veritas InfoScale Operations Manager (VIOM) before 8.0.0.410 allows an authenticated attacker to upload all types of files to the server. An authenticated attacker can then execute the malicious file to perform command execution on the remote server. | https://www.veritas.com/content/support/en_US/security/VTS23-009 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38687 | Svelecte is a flexible autocomplete/select component written in Svelte. Svelecte item names are rendered as raw HTML with no escaping. This allows the injection of arbitrary HTML into the Svelecte dropdown. This can be exploited to execute arbitrary JavaScript whenever a Svelecte dropdown is opened. Item names given to Svelecte appear to be directly rendered as HTML by the default item renderer. This means that any HTML tags in the name are rendered as HTML elements not as text. Note that the custom item renderer shown in https://mskocik.github.io/svelecte/#item-rendering is also vulnerable to the same exploit. Any site that uses Svelecte with dynamically created items either from an external source or from user-created content could be vulnerable to an XSS attack (execution of untrusted JavaScript), clickjacking or any other attack that can be performed with arbitrary HTML injection. The actual impact of this vulnerability for a specific application depends on how trustworthy the sources that provide Svelecte items are and the steps that the application has taken to mitigate XSS attacks. XSS attacks using this vulnerability are mostly mitigated by a Content Security Policy that blocks inline JavaScript. This issue has been addressed in version 3.16.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq | 2023-07-24T16:19:28.363Z | 2023-08-14T20:21:17.694Z | 2023-08-14T20:21:17.694Z | {'Vendor': 'mskocik', 'Product': 'svelecte', 'Versions': '< 3.16.3'} |
CVE-2023-38392 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Hiroaki Miyashita Custom Field Template plugin <= 2.5.9 versions. | https://patchstack.com/database/vulnerability/custom-field-template/wordpress-custom-field-template-plugin-2-5-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-07-17T15:22:13.926Z | 2023-08-07T12:45:24.226Z | 2023-08-07T12:45:24.226Z | {'Vendor': 'Hiroaki Miyashita', 'Product': 'Custom Field Template', 'Versions': 'n/a'} |
CVE-2023-38668 | Stack-based buffer over-read in disasm in nasm 2.16 allows attackers to cause a denial of service (crash). | https://bugzilla.nasm.us/show_bug.cgi?id=3392811 | 2023-07-23T00:00:00 | 2023-08-22T00:00:00 | 2023-08-22T15:44:39.384377 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38238 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | https://helpx.adobe.com/security/products/acrobat/apsb23-30.html | 2023-07-13T16:21:52.616Z | 2023-08-10T13:17:37.123Z | 2023-08-10T13:17:37.123Z | {'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'} |
CVE-2023-38557 | A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q3). The affected product assigns improper access rights to the update script. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges. | https://cert-portal.siemens.com/productcert/pdf/ssa-357182.pdf | 2023-07-20T08:17:26.143Z | 2023-09-14T10:39:28.689Z | 2023-09-14T10:39:28.689Z | {'Vendor': 'Siemens', 'Product': 'Spectrum Power 7', 'Versions': 'All versions < V23Q3'} |
CVE-2023-38412 | Netgear R6900P v1.3.3.154 was discovered to contain multiple buffer overflows via the wla_ssid and wlg_ssid parameters at ia_ap_setting.cgi. | https://www.netgear.com/about/security/ | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38941 | django-sspanel v2022.2.2 was discovered to contain a remote command execution (RCE) vulnerability via the component sspanel/admin_view.py -> GoodsCreateView._post. | https://github.com/Ehco1996/django-sspanel | 2023-07-25T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38691 | matrix-appservice-bridge provides an API for setting up bridges. Starting in version 4.0.0 and prior to versions 8.1.2 and 9.0.1, a malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing a bad actor to impersonate users when using the provisioning API. The library does not check that the servername part of the `sub` parameter (containing the user's *claimed* MXID) is the the same as the servername we are talking to. A malicious actor could spin up a server on any given domain, respond with a `sub` parameter according to the user they want to act as and use the resulting token to perform provisioning requests. Versions 8.1.2 and 9.0.1 contain a patch. As a workaround, disable the provisioning API. | https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-vc7j-h8xg-fv5x | 2023-07-24T16:19:28.364Z | 2023-08-04T16:34:54.312Z | 2023-08-04T16:34:54.312Z | {'Vendor': 'matrix-org', 'Product': 'matrix-appservice-bridge', 'Versions': '>= 4.0.0, < 8.1.2, = 9.0.0'} |
CVE-2023-38384 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Syntactics, Inc. EaSYNC plugin <= 1.3.7 versions. | https://patchstack.com/database/vulnerability/easync-booking/wordpress-easync-plugin-1-3-6-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve | 2023-07-17T15:21:38.730Z | 2023-08-08T12:30:55.096Z | 2023-08-08T12:30:55.096Z | {'Vendor': 'Syntactics, Inc.', 'Product': 'eaSYNC', 'Versions': 'n/a'} |
CVE-2023-38150 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38150 | 2023-07-12T23:41:45.860Z | 2023-09-12T16:58:19.686Z | 2023-12-14T20:11:35.620Z | {'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'} |
CVE-2023-38500 | TYPO3 HTML Sanitizer is an HTML sanitizer, written in PHP, aiming to provide cross-site-scripting-safe markup based on explicitly allowed tags, attributes and values. Starting in version 1.0.0 and prior to versions 1.5.1 and 2.1.2, due to an encoding issue in the serialization layer, malicious markup nested in a `noscript` element was not encoded correctly. `noscript` is disabled in the default configuration, but might have been enabled in custom scenarios. This allows bypassing the cross-site scripting mechanism of TYPO3 HTML Sanitizer. Versions 1.5.1 and 2.1.2 fix the problem. | https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g | 2023-07-18T16:28:12.077Z | 2023-07-25T20:59:53.135Z | 2023-07-25T20:59:53.135Z | {'Vendor': 'TYPO3', 'Product': 'html-sanitizer', 'Versions': '>= 1.0.0, < 1.5.1, >= 2.0.0, < 2.1.2'} |
CVE-2023-38853 | Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the xls_parseWorkBook function in xls.c:1015. | https://github.com/libxls/libxls/issues/124 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38916 | SQL Injection vulnerability in eVotingSystem-PHP v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the user input fields. | https://github.com/Mohammad-Ajazuddin/eVotingSytem-PHP/issues/1 | 2023-07-25T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38445 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.586Z | 2023-09-04T01:16:04.417Z | 2023-09-04T01:16:04.417Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'} |
CVE-2023-38432 | An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | 2023-08-31T18:06:18.007865 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38598 | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.6, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213846 | 2023-07-20T15:04:44.407Z | 2023-07-28T04:30:44.741Z | 2023-07-28T04:30:44.741Z | {'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'} |
CVE-2023-38062 | In JetBrains TeamCity before 2023.05.1 parameters of the "password" type could be shown in the UI in certain composite build configurations | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-07-12T12:43:55.856Z | 2023-07-12T12:48:19.714Z | 2023-07-12T12:48:19.714Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-38961 | Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0.0 allows a remote attacker to execute arbitrary code via the scanner_is_context_needed component in js-scanner-until.c. | https://github.com/jerryscript-project/jerryscript/issues/5092 | 2023-07-25T00:00:00 | 2023-08-21T00:00:00 | 2023-08-21T14:16:03.913677 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38127 | An integer overflow exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause the parser to make an under-sized allocation, which can later allow for memory corruption, potentially resulting in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808 | 2023-07-17T21:54:43.843Z | 2023-10-19T17:00:43.288Z | 2023-10-20T17:00:06.976Z | {'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'} |
CVE-2023-38609 | An injection issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.5. An app may be able to bypass certain Privacy preferences. | https://support.apple.com/en-us/HT213843 | 2023-07-20T15:04:44.409Z | 2023-07-28T04:30:45.223Z | 2023-07-28T04:30:45.223Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38259 | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to access user-sensitive data. | https://support.apple.com/en-us/HT213843 | 2023-07-20T15:04:25.844Z | 2023-07-27T00:31:37.779Z | 2023-07-27T03:47:42.084Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-38936 | Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, AC5 V1.0 V15.03.06.28, FH1203 V2.0.1.6, AC9 V3.0 V15.03.06.42_multi and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function. | https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetSpeedWan/README.md | 2023-07-25T00:00:00 | 2023-08-07T00:00:00 | 2023-08-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-38035 | A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration. | https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface | 2023-07-12T01:00:11.880Z | 2023-08-21T16:51:20.678Z | 2023-08-21T16:51:20.678Z | {'Vendor': 'Ivanti', 'Product': 'MobileIron Sentry', 'Versions': '9.18.0 and below'} |
CVE-2023-38465 | In ims service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434 | 2023-07-18T07:24:19.588Z | 2023-09-04T01:16:10.114Z | 2023-09-04T01:16:10.114Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'} |
CVE-2023-38170 | HEVC Video Extensions Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38170 | 2023-07-12T23:41:45.863Z | 2023-08-08T17:08:43.944Z | 2023-12-14T20:03:16.209Z | {'Vendor': 'Microsoft', 'Product': 'HEVC Video Extension', 'Versions': '1.0.0.0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.