CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-38063
In JetBrains TeamCity before 2023.05.1 stored XSS while running custom builds was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-07-12T12:43:56.399Z
2023-07-12T12:48:20.416Z
2023-07-12T12:48:20.416Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-38576
Hidden functionality vulnerability in LAN-WH300N/RE all versions provided by LOGITEC CORPORATION allows an authenticated user to execute arbitrary OS commands on a certain management console.
https://www.elecom.co.jp/news/security/20230810-01/
2023-08-09T11:54:54.852Z
2023-08-18T09:39:29.926Z
2023-08-18T09:39:29.926Z
{'Vendor': 'LOGITEC CORPORATION', 'Product': 'LAN-WH300N/RE', 'Versions': 'all versions'}
CVE-2023-38126
Softing edgeAggregator Restore Configuration Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Softing edgeAggregator. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of backup zip files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this to execute code in the context of root. Was ZDI-CAN-20543.
https://www.zerodayinitiative.com/advisories/ZDI-23-1058/
2023-07-12T15:22:20.623Z
2023-12-19T21:50:37.477Z
2023-12-19T21:50:37.477Z
{'Vendor': 'Softing', 'Product': 'edgeAggregator', 'Versions': '3.40'}
CVE-2023-38151
Microsoft Host Integration Server 2020 Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38151
2023-07-12T23:41:45.860Z
2023-11-14T17:57:03.867Z
2024-01-09T17:04:59.803Z
{'Vendor': 'Microsoft', 'Product': 'Host Integration Server 2020', 'Versions': '7.0'}
CVE-2023-38501
copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue.
https://github.com/9001/copyparty/security/advisories/GHSA-f54q-j679-p9hh
2023-07-18T16:28:12.077Z
2023-07-25T21:06:18.006Z
2023-07-25T21:06:18.006Z
{'Vendor': '9001', 'Product': 'copyparty', 'Versions': '< 1.8.7'}
CVE-2023-38852
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the unicode_decode_wcstombs function in xlstool.c:266.
https://github.com/libxls/libxls/issues/124
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38444
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.585Z
2023-09-04T01:16:04.144Z
2023-09-04T01:16:04.144Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38690
matrix-appservice-irc is a Node.js IRC bridge for Matrix. Prior to version 1.0.1, it is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. Versions 1.0.1 and above are patched. There are no robust workarounds to the bug. One may disable dynamic channels in the config to disable the most common execution method but others may exist.
https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-3pmj-jqqp-2mj3
2023-07-24T16:19:28.363Z
2023-08-04T16:31:41.840Z
2023-08-04T16:31:41.840Z
{'Vendor': 'matrix-org', 'Product': 'matrix-appservice-irc', 'Versions': '< 1.0.1'}
CVE-2023-38556
Improper input validation vulnerability in SEIKO EPSON printer Web Config allows a remote attacker to turned off the printer. [Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers via a web browser. Web Config is pre-installed in some printers provided by SEIKO EPSON CORPORATION. For the details of the affected product names/model numbers, refer to the information provided by the vendor.
https://www.epson.jp/support/misc_t/230802_oshirase.htm
2023-07-20T05:02:21.624Z
2023-08-02T07:19:26.549Z
2023-08-02T07:19:26.549Z
{'Vendor': 'SEIKO EPSON CORPORATION', 'Product': 'SEIKO EPSON printer Web Config', 'Versions': 'unspecified'}
CVE-2023-38043
A vulnerability exists on all versions of the Ivanti Secure Access Client below 22.6R1.1, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to a denial of service (DoS) condition on the user machine and, in some cases, resulting in a full compromise of the system.
https://forums.ivanti.com/s/article/Security-fixes-included-in-the-latest-Ivanti-Secure-Access-Client-Release
2023-07-12T01:00:11.881Z
2023-11-14T23:18:08.378Z
2023-11-22T23:28:30.779Z
{'Vendor': 'Ivanti', 'Product': 'Secure Access Client Windows', 'Versions': '22.6R1.1'}
CVE-2023-38940
Tenda F1203 V2.0.1.6, FH1203 V2.0.1.6 and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
https://github.com/FirmRec/IoT-Vulns/tree/main/tenda/form_fast_setting_wifi_set
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38686
Sydent is an identity server for the Matrix communications protocol. Prior to version 2.5.6, if configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a man-in-the-middle (MITM) attack. Attackers with privileged access to the network can intercept room invitations and address confirmation emails. This is patched in Sydent 2.5.6. When patching, make sure that Sydent trusts the certificate of the server it is connecting to. This should happen automatically when using properly issued certificates. Those who use self-signed certificates should make sure to copy their Certification Authority certificate, or their self signed certificate if using only one, to the trust store of your operating system. As a workaround, one can ensure Sydent's emails fail to send by setting the configured SMTP server to a loopback or non-routable address under one's control which does not have a listening SMTP server.
https://github.com/matrix-org/sydent/security/advisories/GHSA-p6hw-wm59-3g5g
2023-07-24T16:19:28.363Z
2023-08-04T15:57:15.760Z
2023-08-04T15:57:15.760Z
{'Vendor': 'matrix-org', 'Product': 'sydent', 'Versions': '< 2.5.6'}
CVE-2023-38669
Use after free in paddle.diagonal in PaddlePaddle before 2.5.0. This resulted in a potentially exploitable condition.
https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-001.md
2023-07-24T07:55:02.090Z
2023-07-26T09:29:39.869Z
2023-07-26T09:29:39.869Z
{'Vendor': 'PaddlePaddle', 'Product': 'PaddlePaddle', 'Versions': '0'}
CVE-2023-38239
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.616Z
2023-08-10T13:17:28.116Z
2023-08-10T13:17:28.116Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38956
A path traversal vulnerability in ZKTeco BioAccess IVS v3.3.1 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload.
http://zkteco.com
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38405
On Crestron 3-Series Control Systems before 1.8001.0187, crafting and sending a specific BACnet packet can cause a crash.
https://www.crestron.com/release_notes/cp3n_1.8001.0187_release_notes.pdf
2023-07-17T00:00:00
2023-07-17T00:00:00
2023-07-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38517
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Realwebcare WRC Pricing Tables plugin <= 2.3.7 versions.
https://patchstack.com/database/vulnerability/wrc-pricing-tables/wordpress-wrc-pricing-tables-plugin-2-3-4-cross-site-scripting-xss?_s_id=cve
2023-07-18T17:33:34.155Z
2023-09-03T11:20:55.964Z
2023-09-03T11:20:55.964Z
{'Vendor': 'Realwebcare', 'Product': 'WRC Pricing Tables', 'Versions': 'n/a'}
CVE-2023-38147
Windows Miracast Wireless Display Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38147
2023-07-12T23:41:45.860Z
2023-09-12T16:58:21.260Z
2023-12-14T20:11:37.183Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38452
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.587Z
2023-09-04T01:16:06.450Z
2023-09-04T01:16:06.450Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38215
Adobe Experience Manager versions 6.5.17 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-43.html
2023-07-13T16:21:52.613Z
2023-09-13T13:01:34.163Z
2023-09-13T13:01:34.163Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-38350
PNP4Nagios through 81ebfc5 has stored XSS in the AJAX controller via the basket API and filters. This affects 0.6.26.
https://github.com/pnp4nagios/pnp4nagios/pull/16
2023-07-15T00:00:00
2023-07-15T00:00:00
2023-07-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38700
matrix-appservice-irc is a Node.js IRC bridge for Matrix. Prior to version 1.0.1, it was possible to craft an event such that it would leak part of a targeted message event from another bridged room. This required knowing an event ID to target. Version 1.0.1n fixes this issue. As a workaround, set the `matrixHandler.eventCacheSize` config value to `0`. This workaround may impact performance.
https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-c7hh-3v6c-fj4q
2023-07-24T16:19:28.365Z
2023-08-04T18:05:43.187Z
2023-08-04T18:05:43.187Z
{'Vendor': 'matrix-org', 'Product': 'matrix-appservice-irc', 'Versions': '< 1.0.1'}
CVE-2023-38429
An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
2023-07-17T00:00:00
2023-07-17T00:00:00
2023-07-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38583
A stack-based buffer overflow vulnerability exists in the LXT2 lxt2_rd_expand_integer_to_bits function of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1827
2023-08-02T15:30:11.396Z
2024-01-08T14:47:39.869Z
2024-01-08T18:00:21.456Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-38612
The issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.7, iOS 16.7 and iPadOS 16.7, iOS 17 and iPadOS 17, macOS Sonoma 14, macOS Ventura 13.6. An app may be able to access protected user data.
https://support.apple.com/en-us/HT213938
2023-07-20T15:04:44.409Z
2024-01-10T22:03:45.130Z
2024-01-10T22:03:45.130Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-38242
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.616Z
2023-08-10T13:17:29.730Z
2023-08-10T13:17:29.730Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38307
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Users and Groups functionality. The vulnerability occurs when an authenticated user adds a new user and inserts an XSS payload into the user's real name.
https://webmin.com/tags/webmin-changelog/
2023-07-14T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38887
File Upload vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to execute arbitrary code and obtain sensitive information via the extension filtering and renaming functions.
http://dolibarr.com
2023-07-25T00:00:00
2023-09-20T00:00:00
2023-09-20T00:05:14.062227
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38184
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38184
2023-07-12T23:41:45.869Z
2023-08-08T17:08:42.283Z
2023-12-14T20:03:14.698Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38491
Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to upload an arbitrary file to the content folder. Kirby sites are not affected if they don't allow file uploads for untrusted users or visitors or if the file extensions of uploaded files are limited to a fixed safe list. The attack requires user interaction by another user or visitor and cannot be automated. An editor with write access to the Kirby Panel could upload a file with an unknown file extension like `.xyz` that contains HTML code including harmful content like `<script>` tags. The direct link to that file could be sent to other users or visitors of the site. If the victim opened that link in a browser where they are logged in to Kirby and the file had not been opened by anyone since the upload, Kirby would not be able to send the correct MIME content type, instead falling back to `text/html`. The browser would then run the script, which could for example trigger requests to Kirby's API with the permissions of the victim. The issue was caused by the underlying `Kirby\Http\Response::file()` method, which didn't have an explicit fallback if the MIME type could not be determined from the file extension. If you use this method in site or plugin code, these uses may be affected by the same vulnerability. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have fixed the affected method to use a fallback MIME type of `text/plain` and set the `X-Content-Type-Options: nosniff` header if the MIME type of the file is unknown.
https://github.com/getkirby/kirby/security/advisories/GHSA-8fv7-wq38-f5c9
2023-07-18T16:28:12.075Z
2023-07-27T15:30:49.404Z
2023-07-27T15:44:17.158Z
{'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'}
CVE-2023-38254
Microsoft Message Queuing Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38254
2023-07-13T16:33:28.143Z
2023-08-08T17:08:31.932Z
2023-12-14T20:03:05.704Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-38604
An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in watchOS 9.6, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213846
2023-07-20T15:04:44.408Z
2023-07-28T04:30:43.764Z
2023-07-28T04:30:43.764Z
{'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'}
CVE-2023-38311
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the System Logs Viewer functionality. The vulnerability allows an attacker to store a malicious payload in the configuration field, triggering the execution of the payload when saving the configuration or when accessing the System Logs Viewer page.
https://webmin.com/tags/webmin-changelog/
2023-07-14T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38741
IBM TXSeries for Multiplatforms 8.1, 8.2, and 9.1 is vulnerable to a denial of service, caused by improper enforcement of the timeout on individual read operations. By conducting a slowloris-type attacks, a remote attacker could exploit this vulnerability to cause a denial of service. IBM X-Force ID: 262905.
https://www.ibm.com/support/pages/node/7025476
2023-07-25T00:01:17.450Z
2023-08-14T17:19:00.370Z
2023-08-14T17:19:00.370Z
{'Vendor': 'IBM', 'Product': 'TXSeries for Multiplatforms', 'Versions': '8.1, 8.2, 9.1'}
CVE-2023-38192
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows superadmincreate.php XSS via crafted incorrect passwords.
https://herolab.usd.de/security-advisories/
2023-07-13T00:00:00
2023-10-21T00:00:00
2023-10-21T00:04:23.170996
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38468
In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.589Z
2023-09-04T01:16:10.949Z
2023-09-04T01:16:10.949Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-38891
SQL injection vulnerability in Vtiger CRM v.7.5.0 allows a remote authenticated attacker to escalate privileges via the getQueryColumnsList function in ReportRun.php.
https://code.vtiger.com/vtiger/vtigercrm/-/blob/master/modules/Reports/ReportRun.php#L395
2023-07-25T00:00:00
2023-09-14T00:00:00
2023-09-14T22:24:03.562280
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38487
HedgeDoc is software for creating real-time collaborative markdown notes. Prior to version 1.9.9, the API of HedgeDoc 1 can be used to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one. When the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note by making a POST request to the `/new/<ALIAS>` API endpoint. The `<ALIAS>` parameter can be set to the ID of an existing note. HedgeDoc did not verify whether the provided `<ALIAS>` value corresponds to a valid ID of an existing note and always allowed creation of the new note. When a visitor tried to access the existing note, HedgeDoc will first search for a note with a matching alias before it searches using the ID, therefore only the new note can be accessed. Depending on the permission settings of the HedgeDoc instance, the issue can be exploited only by logged-in users or by all (including non-logged-in) users. The exploit requires knowledge of the ID of the target note. Attackers could use this issue to present a manipulated copy of the original note to the user, e.g. by replacing the links with malicious ones. Attackers can also use this issue to prevent access to the original note, causing a denial of service. No data is lost, as the original content of the affected notes is still present in the database. This issue was fixed in version 1.9.9. As a workaround, disabling freeURL mode prevents the exploitation of this issue. The impact can be limited by restricting freeURL note creation to trusted, logged-in users by enabling `requireFreeURLAuthentication`/`CMD_REQUIRE_FREEURL_AUTHENTICATION`.
https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-7494-7hcf-vxpg
2023-07-18T16:28:12.074Z
2023-08-04T15:40:16.370Z
2023-08-04T15:40:16.370Z
{'Vendor': 'hedgedoc', 'Product': 'hedgedoc', 'Versions': '< 1.9.9'}
CVE-2023-38653
Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is zero.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815
2023-07-21T18:51:56.223Z
2024-01-08T14:47:46.271Z
2024-01-08T18:00:21.156Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-38203
Adobe ColdFusion versions 2018u17 (and earlier), 2021u7 (and earlier) and 2023u1 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
https://helpx.adobe.com/security/products/coldfusion/apsb23-41.html
2023-07-13T16:21:52.611Z
2023-07-20T15:41:10.683Z
2023-07-20T15:41:10.683Z
{'Vendor': 'Adobe', 'Product': 'ColdFusion', 'Versions': '0'}
CVE-2023-38346
An issue was discovered in Wind River VxWorks 6.9 and 7. The function ``tarExtract`` implements TAR file extraction and thereby also processes files within an archive that have relative or absolute file paths. A developer using the "tarExtract" function may expect that the function will strip leading slashes from absolute paths or stop processing when encountering relative paths that are outside of the extraction path, unless otherwise forced. This could lead to unexpected and undocumented behavior, which in general could result in a directory traversal, and associated unexpected behavior.
https://support2.windriver.com/index.php?page=security-notices
2023-07-15T00:00:00
2023-09-22T00:00:00
2023-09-22T18:22:19.692072
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38595
The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213847
2023-07-20T15:04:44.407Z
2023-07-27T00:31:30.328Z
2023-07-27T03:47:35.857Z
{'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'}
CVE-2023-38829
An issue in NETIS SYSTEMS WF2409E v.3.6.42541 allows a remote attacker to execute arbitrary code via the ping and traceroute functions of the diagnostic tools component in the admin management interface.
https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E
2023-07-25T00:00:00
2023-09-11T00:00:00
2023-09-11T18:51:55.687234
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38594
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213847
2023-07-20T15:04:44.407Z
2023-07-26T23:46:22.932Z
2023-07-27T03:47:36.325Z
{'Vendor': 'Apple', 'Product': 'Safari', 'Versions': 'unspecified'}
CVE-2023-38652
Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_block_vch_decode dict parsing functionality of GTKWave 3.3.115. A specially crafted .vzt file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer overflow when num_time_ticks is not zero.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815
2023-07-21T18:51:56.223Z
2024-01-08T14:47:46.181Z
2024-01-08T18:00:21.002Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-38347
An issue was discovered in LWsystems Benno MailArchiv 2.10.1. Attackers can cause XSS via JavaScript content to a mailbox.
https://wiki.benno-mailarchiv.de/doku.php
2023-07-15T00:00:00
2023-08-09T00:00:00
2023-08-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38193
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Remote Code Execution via a crafted sendmail command line.
https://herolab.usd.de/security-advisories/
2023-07-13T00:00:00
2023-10-21T00:00:00
2023-10-21T00:08:36.274932
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38469
A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
https://access.redhat.com/security/cve/CVE-2023-38469
2023-07-18T09:48:04.752Z
2023-11-02T14:49:26.283Z
2023-11-02T14:49:26.283Z
{'Vendor': 'n/a', 'Product': 'avahi', 'Versions': ''}
CVE-2023-38039
When curl retrieves an HTTP response, it stores the incoming headers so that they can be accessed later via the libcurl headers API. However, curl did not have a limit in how many or how large headers it would accept in a response, allowing a malicious server to stream an endless series of headers and eventually cause curl to run out of heap memory.
https://hackerone.com/reports/2072338
2023-07-12T01:00:11.881Z
2023-09-15T03:21:54.348Z
2023-09-15T03:21:54.348Z
{'Vendor': 'curl', 'Product': 'curl', 'Versions': '8.3.0, 7.84.0'}
CVE-2023-38890
Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks.
https://github.com/akshadjoshi/CVE-2023-38890
2023-07-25T00:00:00
2023-08-18T00:00:00
2023-08-18T18:18:17.157485
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38486
A vulnerability in the secure boot implementation on affected Aruba 9200 and 9000 Series Controllers and Gateways allows an attacker to bypass security controls which would normally prohibit unsigned kernel images from executing. An attacker can use this vulnerability to execute arbitrary runtime operating systems, including unverified and unsigned OS images.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt
2023-07-18T14:34:27.165Z
2023-09-06T17:48:38.025Z
2023-09-06T17:48:38.025Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': '9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways', 'Versions': 'ArubaOS 10.4.x.x, ArubaOS 8.11.x.x, ArubaOS 8.10.x.x, ArubaOS 8.6.x.x'}
CVE-2023-38255
A potential attacker with or without (cookie theft) access to the device would be able to include malicious code (XSS) when uploading new device configuration that could affect the intended function of the device.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03
2023-09-06T15:41:16.539Z
2023-09-18T20:08:05.295Z
2023-09-18T20:08:05.295Z
{'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'}
CVE-2023-38605
This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.5. An app may be able to determine a user’s current location.
https://support.apple.com/en-us/HT213843
2023-07-20T15:04:44.408Z
2023-09-06T20:48:09.737Z
2023-09-06T20:48:09.737Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-38310
An issue was discovered in Webmin 2.021. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the configuration settings of the system logs functionality. The vulnerability allows an attacker to store an XSS payload in the configuration settings of specific log files. This results in the execution of that payload whenever the affected log files are accessed.
https://webmin.com/tags/webmin-changelog/
2023-07-14T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38740
IBM Db2 for Linux, UNIX, and Windows (includes Db2 Connect Server) 11.5 is vulnerable to a denial of service with a specially crafted SQL statement. IBM X-Force ID: 262613.
https://www.ibm.com/support/pages/node/7047489
2023-07-25T00:01:17.450Z
2023-10-16T21:24:15.155Z
2023-10-16T21:24:15.155Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.5'}
CVE-2023-38886
An issue in Dolibarr ERP CRM v.17.0.1 and before allows a remote privileged attacker to execute arbitrary code via a crafted command/script.
http://dolibarr.com
2023-07-25T00:00:00
2023-09-20T00:00:00
2023-09-20T00:07:16.247117
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38185
Microsoft Exchange Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38185
2023-07-12T23:41:45.869Z
2023-08-08T17:08:41.686Z
2023-12-14T20:03:14.211Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2019 Cumulative Update 13', 'Versions': '15.02.0'}
CVE-2023-38490
Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 only affects Kirby sites that use the `Xml` data handler (e.g. `Data::decode($string, 'xml')`) or the `Xml::parse()` method in site or plugin code. The Kirby core does not use any of the affected methods. XML External Entities (XXE) is a little used feature in the XML markup language that allows to include data from external files in an XML structure. If the name of the external file can be controlled by an attacker, this becomes a vulnerability that can be abused for various system impacts like the disclosure of internal or confidential data that is stored on the server (arbitrary file disclosure) or to perform network requests on behalf of the server (server-side request forgery, SSRF). Kirby's `Xml::parse()` method used PHP's `LIBXML_NOENT` constant, which enabled the processing of XML external entities during the parsing operation. The `Xml::parse()` method is used in the `Xml` data handler (e.g. `Data::decode($string, 'xml')`). Both the vulnerable method and the data handler are not used in the Kirby core. However they may be used in site or plugin code, e.g. to parse RSS feeds or other XML files. If those files are of an external origin (e.g. uploaded by a user or retrieved from an external URL), attackers may be able to include an external entity in the XML file that will then be processed in the parsing process. Kirby sites that don't use XML parsing in site or plugin code are *not* affected. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have removed the `LIBXML_NOENT` constant as processing of external entities is out of scope of the parsing logic. This protects all uses of the method against the described vulnerability.
https://github.com/getkirby/kirby/security/advisories/GHSA-q386-w6fg-gmgp
2023-07-18T16:28:12.075Z
2023-07-27T14:46:49.403Z
2023-07-27T15:44:49.436Z
{'Vendor': 'getkirby', 'Product': 'kirby', 'Versions': '< 3.5.8.3, >= 3.6.0, < 3.6.6.3, >= 3.7.0, < 3.7.5.2, >= 3.8.0, < 3.8.41, >= 3.9.0, < 3.9.6'}
CVE-2023-38243
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.616Z
2023-08-10T13:17:23.685Z
2023-08-10T13:17:23.685Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38306
An issue was discovered in Webmin 2.021. A Cross-site Scripting (XSS) Bypass vulnerability was discovered in the file upload functionality. Normally, the application restricts the upload of certain file types such as .svg, .php, etc., and displays an error message if a prohibited file type is detected. However, by following certain steps, an attacker can bypass these restrictions and inject malicious code.
https://webmin.com/tags/webmin-changelog/
2023-07-14T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38428
An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
2023-07-17T00:00:00
2023-07-17T00:00:00
2023-08-31T18:06:22.718217
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38582
Persistent cross-site scripting (XSS) in the web application of MOD3GP-SY-120K allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the field MAIL_RCV. When a legitimate user attempts to access to the vulnerable page of the web application, the XSS payload will be executed.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03
2023-09-06T15:41:16.557Z
2023-09-18T20:04:48.193Z
2023-09-18T20:04:48.193Z
{'Vendor': 'Socomec', 'Product': 'MODULYS GP (MOD3GP-SY-120K)', 'Versions': 'v01.12.10'}
CVE-2023-38994
The 'check_univention_joinstatus' prometheus monitoring script (and other scripts) in UCS 5.0-5 revealed the LDAP plaintext password of the machine account in the process list allowing attackers with local ssh access to gain higher privileges and perform followup attacks. By default, the configuration of UCS does not allow local ssh access for regular users.
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324
2023-07-25T00:00:00
2023-10-31T00:00:00
2023-11-08T22:00:00.892720
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38214
Adobe Experience Manager versions 6.5.17 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-43.html
2023-07-13T16:21:52.613Z
2023-09-13T13:01:33.386Z
2023-09-13T13:01:33.386Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-38351
MiniTool Partition Wizard 12.8 contains an insecure installation mechanism that allows attackers to achieve remote code execution through a man in the middle attack.
https://0dr3f.github.io/cve/
2023-07-15T00:00:00
2023-09-19T00:00:00
2023-09-19T15:36:35.393483
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38701
Hydra is the layer-two scalability solution for Cardano. Users of the Hydra head protocol send the UTxOs they wish to commit into the Hydra head first to the `commit` validator, where they remain until they are either collected into the `head` validator or the protocol initialisation is aborted and the value in the committed UTxOs is returned to the users who committed them. Prior to version 0.12.0, the `commit` validator contains a flawed check when the `ViaAbort` redeemer is used, which allows any user to spend any UTxO which is at the validator arbitrarily, meaning an attacker can steal the funds that users are trying to commit into the head validator. The intended behavior is that the funds must be returned to the user which committed the funds and can only be performed by a participant of the head. The `initial` validator also is similarly affected as the same flawed check is performed for the `ViaAbort` redeemer. Due to this issue, an attacker can steal any funds that user's try to commit into a Hydra head. Also, an attacker can prevent any Hydra head from being successfully opened. It does not allow an attacker to take funds which have been successfully collected into and currently reside in the `head` validator. Version 0.12.0 contains a fix for this issue.
https://github.com/input-output-hk/hydra/security/advisories/GHSA-6x9v-7x5r-w8w6
2023-07-24T16:19:28.365Z
2023-10-04T18:48:52.709Z
2023-10-04T18:48:52.709Z
{'Vendor': 'input-output-hk', 'Product': 'hydra', 'Versions': '< 0.12.0'}
CVE-2023-38845
An issue in Anglaise Company Anglaise.Company v.13.6.1 allows a remote attacker to obtain sensitive information via crafted GET request.
https://liff.line.me/1657030660-8nDEQNbe
2023-07-25T00:00:00
2023-10-25T00:00:00
2023-10-25T21:47:32.106011
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38516
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WP OnlineSupport, Essential Plugin Audio Player with Playlist Ultimate plugin <= 1.2.2 versions.
https://patchstack.com/database/vulnerability/audio-player-with-playlist-ultimate/wordpress-audio-player-with-playlist-ultimate-plugin-1-2-2-cross-site-scripting-xss?_s_id=cve
2023-07-18T17:33:34.154Z
2023-09-03T11:25:55.971Z
2023-09-03T11:28:49.896Z
{'Vendor': 'WP OnlineSupport, Essential Plugin', 'Product': 'Audio Player with Playlist Ultimate', 'Versions': 'n/a'}
CVE-2023-38146
Windows Themes Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38146
2023-07-12T23:41:45.859Z
2023-09-12T16:58:21.795Z
2023-09-15T21:43:00.409Z
{'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'}
CVE-2023-38453
In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.587Z
2023-09-04T01:16:06.759Z
2023-09-04T01:16:06.759Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38003
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a user with DATAACCESS privileges to execute routines that they should not have access to. IBM X-Force ID: 260214.
https://www.ibm.com/support/pages/node/7078681
2023-07-11T17:33:11.275Z
2023-12-04T00:12:37.484Z
2023-12-04T00:13:27.709Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1 ,11.5'}
CVE-2023-38280
IBM HMC (Hardware Management Console) 10.1.1010.0 and 10.2.1030.0 could allow a local user to escalate their privileges to root access on a restricted shell. IBM X-Force ID: 260740.
https://www.ibm.com/support/pages/node/7047713
2023-07-14T00:46:27.165Z
2023-10-16T01:03:27.915Z
2023-10-16T01:03:27.915Z
{'Vendor': 'IBM', 'Product': 'Power HMC', 'Versions': '10.1.1010.0, 10.2.1030.0'}
CVE-2023-38541
Insecure inherited permissions in some Intel HID Event Filter drivers for Windows 10 for some Intel NUC laptop software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00964.html
2023-08-23T03:00:02.533Z
2024-01-19T20:03:14.049Z
2024-01-19T20:03:14.049Z
{'Vendor': 'n/a', 'Product': 'Intel HID Event Filter drivers for Windows 10 for some Intel NUC laptop software installers', 'Versions': 'before version 2.2.2.1'}
CVE-2023-38812
null
null
2023-07-25T00:00:00
null
2023-08-03T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-38404
The XPRTLD web application in Veritas InfoScale Operations Manager (VIOM) before 8.0.0.410 allows an authenticated attacker to upload all types of files to the server. An authenticated attacker can then execute the malicious file to perform command execution on the remote server.
https://www.veritas.com/content/support/en_US/security/VTS23-009
2023-07-17T00:00:00
2023-07-17T00:00:00
2023-07-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38687
Svelecte is a flexible autocomplete/select component written in Svelte. Svelecte item names are rendered as raw HTML with no escaping. This allows the injection of arbitrary HTML into the Svelecte dropdown. This can be exploited to execute arbitrary JavaScript whenever a Svelecte dropdown is opened. Item names given to Svelecte appear to be directly rendered as HTML by the default item renderer. This means that any HTML tags in the name are rendered as HTML elements not as text. Note that the custom item renderer shown in https://mskocik.github.io/svelecte/#item-rendering is also vulnerable to the same exploit. Any site that uses Svelecte with dynamically created items either from an external source or from user-created content could be vulnerable to an XSS attack (execution of untrusted JavaScript), clickjacking or any other attack that can be performed with arbitrary HTML injection. The actual impact of this vulnerability for a specific application depends on how trustworthy the sources that provide Svelecte items are and the steps that the application has taken to mitigate XSS attacks. XSS attacks using this vulnerability are mostly mitigated by a Content Security Policy that blocks inline JavaScript. This issue has been addressed in version 3.16.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/mskocik/svelecte/security/advisories/GHSA-7h45-grc5-89wq
2023-07-24T16:19:28.363Z
2023-08-14T20:21:17.694Z
2023-08-14T20:21:17.694Z
{'Vendor': 'mskocik', 'Product': 'svelecte', 'Versions': '< 3.16.3'}
CVE-2023-38392
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Hiroaki Miyashita Custom Field Template plugin <= 2.5.9 versions.
https://patchstack.com/database/vulnerability/custom-field-template/wordpress-custom-field-template-plugin-2-5-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-07-17T15:22:13.926Z
2023-08-07T12:45:24.226Z
2023-08-07T12:45:24.226Z
{'Vendor': 'Hiroaki Miyashita', 'Product': 'Custom Field Template', 'Versions': 'n/a'}
CVE-2023-38668
Stack-based buffer over-read in disasm in nasm 2.16 allows attackers to cause a denial of service (crash).
https://bugzilla.nasm.us/show_bug.cgi?id=3392811
2023-07-23T00:00:00
2023-08-22T00:00:00
2023-08-22T15:44:39.384377
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38238
Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use-After-Free vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/acrobat/apsb23-30.html
2023-07-13T16:21:52.616Z
2023-08-10T13:17:37.123Z
2023-08-10T13:17:37.123Z
{'Vendor': 'Adobe', 'Product': 'Acrobat Reader', 'Versions': '0'}
CVE-2023-38557
A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q3). The affected product assigns improper access rights to the update script. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.
https://cert-portal.siemens.com/productcert/pdf/ssa-357182.pdf
2023-07-20T08:17:26.143Z
2023-09-14T10:39:28.689Z
2023-09-14T10:39:28.689Z
{'Vendor': 'Siemens', 'Product': 'Spectrum Power 7', 'Versions': 'All versions < V23Q3'}
CVE-2023-38412
Netgear R6900P v1.3.3.154 was discovered to contain multiple buffer overflows via the wla_ssid and wlg_ssid parameters at ia_ap_setting.cgi.
https://www.netgear.com/about/security/
2023-08-07T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38941
django-sspanel v2022.2.2 was discovered to contain a remote command execution (RCE) vulnerability via the component sspanel/admin_view.py -> GoodsCreateView._post.
https://github.com/Ehco1996/django-sspanel
2023-07-25T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38691
matrix-appservice-bridge provides an API for setting up bridges. Starting in version 4.0.0 and prior to versions 8.1.2 and 9.0.1, a malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing a bad actor to impersonate users when using the provisioning API. The library does not check that the servername part of the `sub` parameter (containing the user's *claimed* MXID) is the the same as the servername we are talking to. A malicious actor could spin up a server on any given domain, respond with a `sub` parameter according to the user they want to act as and use the resulting token to perform provisioning requests. Versions 8.1.2 and 9.0.1 contain a patch. As a workaround, disable the provisioning API.
https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-vc7j-h8xg-fv5x
2023-07-24T16:19:28.364Z
2023-08-04T16:34:54.312Z
2023-08-04T16:34:54.312Z
{'Vendor': 'matrix-org', 'Product': 'matrix-appservice-bridge', 'Versions': '>= 4.0.0, < 8.1.2, = 9.0.0'}
CVE-2023-38384
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Syntactics, Inc. EaSYNC plugin <= 1.3.7 versions.
https://patchstack.com/database/vulnerability/easync-booking/wordpress-easync-plugin-1-3-6-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve
2023-07-17T15:21:38.730Z
2023-08-08T12:30:55.096Z
2023-08-08T12:30:55.096Z
{'Vendor': 'Syntactics, Inc.', 'Product': 'eaSYNC', 'Versions': 'n/a'}
CVE-2023-38150
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38150
2023-07-12T23:41:45.860Z
2023-09-12T16:58:19.686Z
2023-12-14T20:11:35.620Z
{'Vendor': 'Microsoft', 'Product': 'Windows 11 version 21H2', 'Versions': '10.0.0'}
CVE-2023-38500
TYPO3 HTML Sanitizer is an HTML sanitizer, written in PHP, aiming to provide cross-site-scripting-safe markup based on explicitly allowed tags, attributes and values. Starting in version 1.0.0 and prior to versions 1.5.1 and 2.1.2, due to an encoding issue in the serialization layer, malicious markup nested in a `noscript` element was not encoded correctly. `noscript` is disabled in the default configuration, but might have been enabled in custom scenarios. This allows bypassing the cross-site scripting mechanism of TYPO3 HTML Sanitizer. Versions 1.5.1 and 2.1.2 fix the problem.
https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-59jf-3q9v-rh6g
2023-07-18T16:28:12.077Z
2023-07-25T20:59:53.135Z
2023-07-25T20:59:53.135Z
{'Vendor': 'TYPO3', 'Product': 'html-sanitizer', 'Versions': '>= 1.0.0, < 1.5.1, >= 2.0.0, < 2.1.2'}
CVE-2023-38853
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the xls_parseWorkBook function in xls.c:1015.
https://github.com/libxls/libxls/issues/124
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38916
SQL Injection vulnerability in eVotingSystem-PHP v.1.0 allows a remote attacker to execute arbitrary code and obtain sensitive information via the user input fields.
https://github.com/Mohammad-Ajazuddin/eVotingSytem-PHP/issues/1
2023-07-25T00:00:00
2023-08-15T00:00:00
2023-08-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38445
In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.586Z
2023-09-04T01:16:04.417Z
2023-09-04T01:16:04.417Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T606/T612/T616/T610/T618', 'Versions': 'Android9/Android10/Android11'}
CVE-2023-38432
An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d
2023-07-17T00:00:00
2023-07-17T00:00:00
2023-08-31T18:06:18.007865
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38598
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.6, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213846
2023-07-20T15:04:44.407Z
2023-07-28T04:30:44.741Z
2023-07-28T04:30:44.741Z
{'Vendor': 'Apple', 'Product': 'tvOS', 'Versions': 'unspecified'}
CVE-2023-38062
In JetBrains TeamCity before 2023.05.1 parameters of the "password" type could be shown in the UI in certain composite build configurations
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-07-12T12:43:55.856Z
2023-07-12T12:48:19.714Z
2023-07-12T12:48:19.714Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-38961
Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0.0 allows a remote attacker to execute arbitrary code via the scanner_is_context_needed component in js-scanner-until.c.
https://github.com/jerryscript-project/jerryscript/issues/5092
2023-07-25T00:00:00
2023-08-21T00:00:00
2023-08-21T14:16:03.913677
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38127
An integer overflow exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause the parser to make an under-sized allocation, which can later allow for memory corruption, potentially resulting in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808
2023-07-17T21:54:43.843Z
2023-10-19T17:00:43.288Z
2023-10-20T17:00:06.976Z
{'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'}
CVE-2023-38609
An injection issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.5. An app may be able to bypass certain Privacy preferences.
https://support.apple.com/en-us/HT213843
2023-07-20T15:04:44.409Z
2023-07-28T04:30:45.223Z
2023-07-28T04:30:45.223Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-38259
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.6.8, macOS Ventura 13.5, macOS Big Sur 11.7.9. An app may be able to access user-sensitive data.
https://support.apple.com/en-us/HT213843
2023-07-20T15:04:25.844Z
2023-07-27T00:31:37.779Z
2023-07-27T03:47:42.084Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-38936
Tenda AC10 V1.0 V15.03.06.23, AC1206 V15.03.06.23, AC6 V2.0 V15.03.06.23, AC7 V1.0 V15.03.06.44, AC5 V1.0 V15.03.06.28, FH1203 V2.0.1.6, AC9 V3.0 V15.03.06.42_multi and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function.
https://github.com/FirmRec/IoT-Vulns/blob/main/tenda/formSetSpeedWan/README.md
2023-07-25T00:00:00
2023-08-07T00:00:00
2023-08-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-38035
A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.
https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface
2023-07-12T01:00:11.880Z
2023-08-21T16:51:20.678Z
2023-08-21T16:51:20.678Z
{'Vendor': 'Ivanti', 'Product': 'MobileIron Sentry', 'Versions': '9.18.0 and below'}
CVE-2023-38465
In ims service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1698296481653522434
2023-07-18T07:24:19.588Z
2023-09-04T01:16:10.114Z
2023-09-04T01:16:10.114Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-38170
HEVC Video Extensions Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38170
2023-07-12T23:41:45.863Z
2023-08-08T17:08:43.944Z
2023-12-14T20:03:16.209Z
{'Vendor': 'Microsoft', 'Product': 'HEVC Video Extension', 'Versions': '1.0.0.0'}