CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-28600 | Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client.
| https://explore.zoom.us/en/trust/security/security-bulletin/ | 2023-03-17T13:27:32.368Z | 2023-06-13T17:00:53.178Z | 2023-06-13T18:52:54.462Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for macOS Client', 'Versions': 'before 5.14.0'} |
CVE-2023-28495 | Cross-Site Request Forgery (CSRF) vulnerability in MyThemeShop WP Shortcode by MyThemeShop plugin <= 1.4.16 versions. | https://patchstack.com/database/vulnerability/wp-shortcode/wordpress-wp-shortcode-by-mythemeshop-plugin-1-4-16-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-03-16T11:18:18.236Z | 2023-11-12T22:07:02.921Z | 2023-11-12T22:07:02.921Z | {'Vendor': 'MyThemeShop', 'Product': 'WP Shortcode by MyThemeShop', 'Versions': 'n/a'} |
CVE-2023-28180 | A denial-of-service issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. A user in a privileged network position may be able to cause a denial-of-service. | https://support.apple.com/en-us/HT213670 | 2023-03-13T00:00:00 | 2023-05-08T00:00:00 | 2023-07-27T03:45:41.578Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28929 | Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started. | https://helpcenter.trendmicro.com/en-us/article/tmka-19062 | 2023-03-27T22:16:25.202Z | 2023-06-26T21:52:22.423Z | 2023-06-26T21:52:22.423Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Security (Consumer)', 'Versions': '2023'} |
CVE-2023-28883 | In Cerebrate 1.13, a blind SQL injection exists in the searchAll API endpoint. | https://github.com/cerebrate-project/cerebrate/commit/5f1c99cd534442ec40c2129769608e3e61ff8be3 | 2023-03-27T00:00:00 | 2023-03-27T00:00:00 | 2023-10-30T21:18:01.636318 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28753 | netconsd prior to v0.2 was vulnerable to an integer overflow in its parse_packet function. A malicious individual could leverage this overflow to create heap memory corruption with attacker controlled data. | https://www.facebook.com/security/advisories/cve-2023-28753 | 2023-03-22T20:36:03.271Z | 2023-05-18T21:27:44.964Z | 2023-05-18T21:27:44.964Z | {'Vendor': 'Facebook', 'Product': 'netconsd', 'Versions': '0.0'} |
CVE-2023-28303 | Windows Snipping Tool Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28303 | 2023-03-13T22:23:36.190Z | 2023-06-13T16:24:46.551Z | 2023-12-14T18:31:56.734Z | {'Vendor': 'Microsoft', 'Product': 'Snipping Tool', 'Versions': '11.0.0'} |
CVE-2023-28616 | An issue was discovered in Stormshield Network Security (SNS) before 4.3.17, 4.4.x through 4.6.x before 4.6.4, and 4.7.x before 4.7.1. It affects user accounts for which the password has an equals sign or space character. The serverd process logs such passwords in cleartext, and potentially sends these logs to the Syslog component. | https://advisories.stormshield.eu/2023-006 | 2023-03-19T00:00:00 | 2023-12-26T00:00:00 | 2023-12-26T03:48:33.987011 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28246 | Windows Registry Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28246 | 2023-03-13T22:18:32.388Z | 2023-04-11T19:13:46.554Z | 2023-12-14T18:59:44.952Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'} |
CVE-2023-28568 | Information disclosure in WLAN HAL when reception status handler is called. | https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin | 2023-03-17T11:41:45.849Z | 2023-11-07T05:26:40.000Z | 2023-11-07T05:26:40.000Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6430, QCM4325, QCM4490, QCS4490, Robotics RB3 Platform, SC8180X+SDX55, SD460, SD662, SD670, SD730, SD835, SD855, SDX55, SG4150P, SM4125, SM6250, SM6250P, SM7250P, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 662 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon XR1 Platform, SW5100, SW5100P, SXR1120, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28092 | A potential security vulnerability has been identified in HPE ProLiant RL300 Gen11 Server. The vulnerability could result in the system being vulnerable to exploits by attackers with physical access inside the server chassis.
| https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04472en_us | 2023-03-10T14:47:44.212Z | 2023-05-01T14:10:19.471Z | 2023-05-01T14:46:03.772Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE ProLiant RL300 Gen11', 'Versions': 'System ROM v1.12, and HPE Integrated Lights-Out 6 (iLO 6) v1.05'} |
CVE-2023-28991 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PI Websolution Order date, Order pickup, Order date time, Pickup Location, delivery date for WooCommerce plugin <= 3.0.19 versions. | https://patchstack.com/database/vulnerability/pi-woocommerce-order-date-time-and-type/wordpress-order-date-time-for-woocommerce-plugin-3-0-19-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-29T12:14:55.898Z | 2023-06-26T05:27:18.323Z | 2023-06-26T05:27:18.323Z | {'Vendor': 'PI Websolution', 'Product': 'Order date, Order pickup, Order date time, Pickup Location, delivery date for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-28587 | Memory corruption in BT controller while parsing debug commands with specific sub-opcodes at HCI interface level. | https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin | 2023-03-17T11:41:45.853Z | 2023-12-05T03:03:56.759Z | 2023-12-05T03:03:56.759Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA2062, QCA2064, QCA2065, QCA2066, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCC2073, QCC2076, QCC710, QCC711, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN7605, QCN7606, QCN9024, QCN9074, QCS2290, QCS410, QCS4290, QCS4490, QCS5430, QCS610, QCS6125, QCS6490, QCS8550, QFW7114, QFW7124, QSM8350, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8770P, SA8775P, SA9000P, SC8180X+SDX55, SC8380XP, SD 8 Gen1 5G, SD660, SD855, SD865 5G, SD888, SDX55, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 845 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon Auto 5G Modem-RF Gen 2, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-28704 | Furbo dog camera has insufficient filtering for special parameter of device log management function. An unauthenticated remote attacker in the Bluetooth network with normal user privileges can exploit this vulnerability to perform command injection attack to execute arbitrary system commands or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7153-68f52-1.html | 2023-03-21T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Furbo', 'Product': 'dog camera fireware', 'Versions': '542'} |
CVE-2023-28211 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | https://support.apple.com/en-us/HT213670 | 2023-03-13T18:37:25.758Z | 2023-09-06T01:36:29.880Z | 2023-09-06T01:36:29.880Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28006 | The OSD Bare Metal Server uses a cryptographic algorithm that is no longer considered sufficiently secure.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0105601 | 2023-03-10T03:50:27.022Z | 2023-06-22T22:07:58.142Z | 2023-06-22T22:07:58.142Z | {'Vendor': 'HCL Software', 'Product': 'HCL BigFix OSD Bare Metal Server', 'Versions': '< 311.12'} |
CVE-2023-28513 | IBM MQ 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.3 LTS, 9.2 CD, and 9.3 CD and IBM MQ Appliance 9.2 LTS, 9.3 LTS, 9.2 CD, and 9.2 LTS, under certain configurations, is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 250397. | https://www.ibm.com/support/pages/node/7007421 | 2023-03-16T21:05:38.974Z | 2023-07-19T01:49:14.604Z | 2023-07-19T01:49:14.604Z | {'Vendor': 'IBM', 'Product': 'MQ', 'Versions': '9.0 LTS, 9.1 LTS, 9.2 LTS, 9.3 LTS, 9.2 CD, 9.3 CD'} |
CVE-2023-28143 |
Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7)
installer allows a local escalation of privilege bounded only to the time of
installation and only on older macOSX (macOS 10.15 and older) versions.
Attackers may exploit incorrect file permissions to give them ROOT command
execution privileges on the host. During the install of the PKG, a step in the
process involves extracting the package and copying files to several
directories. Attackers may gain writable access to files during the install of
PKG when extraction of the package and copying files to several directories,
enabling a local escalation of privilege.
| https://qualys.com/security-advisories | 2023-03-10T21:23:28.797Z | 2023-04-18T15:54:16.031Z | 2023-04-18T15:54:16.031Z | {'Vendor': 'Qualys', 'Product': 'Cloud Agent', 'Versions': '2.5.1-75'} |
CVE-2023-28840 | Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby, is commonly referred to as *Docker*.
Swarm Mode, which is compiled in and delivered by default in dockerd and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of SwarmKit and supporting network code.
The overlay network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of VXLAN, which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.
Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the IPsec Encapsulating Security Payload protocol in Transport mode. By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.
When setting an endpoint up on an encrypted overlay network, Moby installs three iptables (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the u32 iptables extension provided by the xt_u32 kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.
Two iptables rules serve to filter incoming VXLAN datagrams with a VNI that corresponds to an encrypted network and discards unencrypted datagrams. The rules are appended to the end of the INPUT filter chain, following any rules that have been previously set by the system administrator. Administrator-set rules take precedence over the rules Moby sets to discard unencrypted VXLAN datagrams, which can potentially admit unencrypted datagrams that should have been discarded.
The injection of arbitrary Ethernet frames can enable a Denial of Service attack. A sophisticated attacker may be able to establish a UDP or TCP connection by way of the container’s outbound gateway that would otherwise be blocked by a stateful firewall, or carry out other escalations beyond simple injection by smuggling packets into the overlay network.
Patches are available in Moby releases 23.0.3 and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.
Some workarounds are available. Close the VXLAN port (by default, UDP port 4789) to incoming traffic at the Internet boundary to prevent all VXLAN packet injection, and/or ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster. | https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp | 2023-03-24T16:25:34.466Z | 2023-04-04T21:13:03.347Z | 2023-04-04T21:13:03.347Z | {'Vendor': 'moby', 'Product': 'moby', 'Versions': '>= 1.12.0, < 20.10.24, >= 23.0.0, < 23.0.3'} |
CVE-2023-28790 | Auth. (editor+) Stored Cross-Site Scripting (XSS) vulnerability in Brett Shumaker Simple Staff List plugin <= 2.2.3 versions. | https://patchstack.com/database/vulnerability/simple-staff-list/wordpress-simple-staff-list-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-23T17:03:15.168Z | 2023-09-27T05:14:37.752Z | 2023-09-27T05:14:37.752Z | {'Vendor': 'Brett Shumaker', 'Product': 'Simple Staff List', 'Versions': 'n/a'} |
CVE-2023-28285 | Microsoft Office Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28285 | 2023-03-13T22:23:36.185Z | 2023-04-11T19:13:17.197Z | 2023-12-14T18:59:15.704Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Office 2019 for Mac', 'Versions': '16.0.0'} |
CVE-2023-28051 |
Dell Power Manager, versions 3.10 and prior, contains an Improper Access Control vulnerability. A low-privileged attacker could potentially exploit this vulnerability to elevate privileges on the system.
| https://www.dell.com/support/kbdoc/en-us/000211891/dsa-2023-221-dell-power-manager | 2023-03-10T05:01:43.871Z | 2023-04-07T07:20:12.446Z | 2023-04-07T07:20:12.446Z | {'Vendor': 'Dell', 'Product': 'Dell Power Manager (DPM)', 'Versions': 'Versions 3.10 and prior'} |
CVE-2023-28401 | Out-of-bounds write in some Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html | 2023-03-22T03:00:05.326Z | 2023-11-14T19:04:23.883Z | 2023-11-14T19:04:23.883Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers', 'Versions': 'before version 31.0.101.4255'} |
CVE-2023-28114 | `cilium-cli` is the command line interface to install, manage, and troubleshoot Kubernetes clusters running Cilium. Prior to version 0.13.2,`cilium-cli`, when used to configure cluster mesh functionality, can remove the enforcement of user permissions on the `etcd` store used to mirror local cluster information to remote clusters. Users who have set up cluster meshes using the Cilium Helm chart are not affected by this issue.
Due to an incorrect mount point specification, the settings specified by the `initContainer` that configures `etcd` users and their permissions are overwritten when using `cilium-cli` to configure a cluster mesh. An attacker who has already gained access to a valid key and certificate for an `etcd` cluster compromised in this manner could then modify state in that `etcd` cluster.
This issue is patched in `cilium-cli` 0.13.2. As a workaround, one may use Cilium's Helm charts to create their cluster. | https://github.com/cilium/cilium-cli/security/advisories/GHSA-6f27-3p6c-p5jc | 2023-03-10T18:34:29.227Z | 2023-03-22T18:30:16.774Z | 2023-03-22T18:30:16.774Z | {'Vendor': 'cilium', 'Product': 'cilium-cli', 'Versions': '< 0.13.2'} |
CVE-2023-28544 | Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers. | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.845Z | 2023-09-05T06:24:08.152Z | 2023-09-05T06:24:08.152Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, AR9380, CSR8811, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8069, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, QCA4024, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6428, QCA6430, QCA6438, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA7500, QCA8075, QCA8081, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9986, QCA9987, QCA9990, QCA9992, QCA9994, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCN5022, QCN5024, QCN5052, QCN5064, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6122, QCN6132, QCN7605, QCN7606, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, Qualcomm Robotics RB3 Platform, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 455, SD 675, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD835, SD855, SDX55, SG4150P, SM4125, SM4450, SM6250, SM6250P, SM7250P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon XR1 Platform, SW5100, SW5100P, SXR1120, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28397 | Improper access control in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated to potentially enable escalation of privileges via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | 2023-04-07T03:00:04.517Z | 2023-11-14T19:04:42.517Z | 2023-11-14T19:04:42.517Z | {'Vendor': 'n/a', 'Product': 'Intel(R) Aptio* V UEFI Firmware Integrator Tools', 'Versions': 'See references'} |
CVE-2023-28728 | A stack-based buffer overflow in Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files. | https://industry.panasonic.eu/factory-automation/programmable-logic-controllers-plc/plc-software/programming-software-control-fpwin-pro | 2023-03-22T05:49:11.016Z | 2023-07-21T06:03:00.280Z | 2023-07-21T06:03:00.280Z | {'Vendor': 'Panasonic', 'Product': 'Control FPWIN Pro', 'Versions': '7.6.0.3 and all previous versions'} |
CVE-2023-28378 | Improper authorization in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html | 2023-04-25T03:00:03.913Z | 2023-11-14T19:05:13.226Z | 2023-11-14T19:05:13.226Z | {'Vendor': 'n/a', 'Product': 'Intel(R) QAT drivers for Windows - HW Version 2.0', 'Versions': 'before version 2.0.4'} |
CVE-2023-28682 | Jenkins Performance Publisher Plugin 8.09 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2928 | 2023-03-20T19:59:08.758Z | 2023-03-23T11:26:09.595Z | 2023-10-24T12:49:28.537Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Performance Publisher Plugin', 'Versions': '0'} |
CVE-2023-28047 |
Dell Display Manager, versions 2.1.0 and prior, contains an arbitrary file or folder creation vulnerability during installation. A local low privilege attacker could potentially exploit this vulnerability, leading to the execution of arbitrary code on the operating system with high privileges.
| https://www.dell.com/support/kbdoc/en-uk/000211727/dsa-2023 | 2023-03-10T05:01:43.870Z | 2023-04-20T06:59:08.208Z | 2023-04-20T06:59:08.208Z | {'Vendor': 'Dell', 'Product': 'Dell Display Manager', 'Versions': '2.1.0 and prior'} |
CVE-2023-28102 | discordrb is an implementation of the Discord API using Ruby. In discordrb before commit `91e13043ffa` the `encoder.rb` file unsafely constructs a shell string using the file parameter, which can potentially leave clients of discordrb vulnerable to command injection. The library is not directly exploitable: the exploit requires that some client of the library calls the vulnerable method with user input. However, if unsafe input reaches the library method, then an attacker can execute arbitrary shell commands on the host machine. Full impact will depend on the permissions of the process running the `discordrb` library and will likely not be total system access. This issue has been addressed in code, but a new release of the `discordrb` gem has not been uploaded to rubygems. This issue is also tracked as `GHSL-2022-094`. | https://securitylab.github.com/advisories/GHSL-2022-094_discordrb/ | 2023-03-10T18:34:29.226Z | 2023-03-27T21:23:29.252Z | 2023-03-27T21:23:29.252Z | {'Vendor': 'shardlab', 'Product': 'discordrb', 'Versions': '<= 3.4.1'} |
CVE-2023-28801 | An Improper Verification of Cryptographic Signature in the SAML authentication of the Zscaler Admin UI allows a Privilege Escalation.This issue affects Admin UI: from 6.2 before 6.2r.
| https://help.zscaler.com/zia/release-upgrade-summary-2023 | 2023-03-23T18:29:15.803Z | 2023-08-31T13:53:11.266Z | 2023-08-31T13:53:27.304Z | {'Vendor': 'Zscaler', 'Product': 'ZIA Admin Portal', 'Versions': '6.2'} |
CVE-2023-28381 | An OS command injection vulnerability exists in the admin.cgi MVPN_trial_init functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1779 | 2023-06-14T20:05:43.486Z | 2023-10-11T15:16:57.415Z | 2023-10-11T17:00:08.675Z | {'Vendor': 'Peplink', 'Product': 'Surf SOHO HW1', 'Versions': 'v6.3.5 (in QEMU)'} |
CVE-2023-28694 | Cross-Site Request Forgery (CSRF) vulnerability in Wbcom Designs Wbcom Designs – BuddyPress Activity Social Share plugin <= 3.5.0 versions. | https://patchstack.com/database/vulnerability/bp-activity-social-share/wordpress-wbcom-designs-buddypress-activity-social-share-plugin-3-4-0-cross-site-request-forgery-csrf?_s_id=cve | 2023-03-21T07:14:41.939Z | 2023-11-12T21:47:32.264Z | 2023-11-12T21:47:32.264Z | {'Vendor': 'Wbcom Designs', 'Product': 'Wbcom Designs – BuddyPress Activity Social Share', 'Versions': 'n/a'} |
CVE-2023-28010 | In some configuration scenarios, the Domino server host name can be exposed. This information could be used to target future attacks.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107388 | 2023-03-10T03:50:27.022Z | 2023-09-08T17:36:51.368Z | 2023-09-08T17:36:51.368Z | {'Vendor': 'HCL Software', 'Product': 'HCL Domino Server', 'Versions': '12.0.2, 12.0.2FP1'} |
CVE-2023-28440 | Discourse is an open source platform for community discussion. In affected versions a maliciously crafted request from a Discourse administrator can lead to a long-running request and eventual timeout. This has the greatest potential impact in shared hosting environments where admins are untrusted. This issue has been addressed in versions 3.0.3 and 3.1.0.beta4. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/discourse/discourse/security/advisories/GHSA-vm65-pv5h-6g3w | 2023-03-15T15:59:10.055Z | 2023-04-18T20:40:13.534Z | 2023-04-18T20:40:13.534Z | {'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable: <= 3.0.2, beta: <= 3.1.0.beta3'} |
CVE-2023-28856 | Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 | 2023-03-24T16:25:34.468Z | 2023-04-18T20:50:03.691Z | 2023-04-18T20:50:03.691Z | {'Vendor': 'redis', 'Product': 'redis', 'Versions': '>= 7.0.0, < 7.0.11, >= 6.2.0, < 6.2.12, < 6.0.19'} |
CVE-2023-28155 | The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/request/request/issues/3442 | 2023-03-13T00:00:00 | 2023-03-16T00:00:00 | 2023-04-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28505 | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a buffer overflow in an API function, where a string is copied into a caller-provided buffer without checking the length. This requires a valid login to exploit. | https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | 2023-03-16T20:44:20.345Z | 2023-03-29T20:12:24.216Z | 2023-03-29T20:12:24.216Z | {'Vendor': 'Rocket Software', 'Product': 'UniData', 'Versions': '0'} |
CVE-2023-28786 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in SolidWP Solid Security – Password, Two Factor Authentication, and Brute Force Protection.This issue affects Solid Security – Password, Two Factor Authentication, and Brute Force Protection: from n/a through 8.1.4.
| https://patchstack.com/database/vulnerability/better-wp-security/wordpress-ithemes-security-plugin-8-1-4-open-redirection-via-host-header-vulnerability?_s_id=cve | 2023-03-23T17:03:15.168Z | 2023-12-29T09:46:31.612Z | 2023-12-29T09:46:31.612Z | {'Vendor': 'SolidWP', 'Product': 'Solid Security – Password, Two Factor Authentication, and Brute Force Protection', 'Versions': 'n/a'} |
CVE-2023-28769 | The buffer overflow vulnerability in the library “libclinkc.so” of the web server “zhttpd” in Zyxel DX5401-B0 firmware versions prior to V5.17(ABYO.1)C0 could allow a remote unauthenticated attacker to execute some OS commands or to cause denial-of-service (DoS) conditions on a vulnerable device. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities | 2023-03-23T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'Zyxel', 'Product': 'DX5401-B0 firmware', 'Versions': '< V5.17(ABYO.1)C0'} |
CVE-2023-28293 | Windows Kernel Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28293 | 2023-03-13T22:23:36.187Z | 2023-04-11T19:13:58.242Z | 2023-12-14T18:59:56.473Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28339 | OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege escalation because of sharing a terminal with the original session. NOTE: TIOCSTI is unavailable in OpenBSD 6.0 and later, and can be made unavailable in the Linux kernel 6.2 and later. | https://github.com/Duncaen/OpenDoas/issues/106 | 2023-03-14T00:00:00 | 2023-03-14T00:00:00 | 2023-03-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28572 | Memory corruption in WLAN HOST while processing the WLAN scan descriptor list. | https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin | 2023-03-17T11:41:45.850Z | 2023-11-07T05:26:44.626Z | 2023-11-07T05:26:44.626Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'CSRB31024, FastConnect 6800, FastConnect 6900, FastConnect 7800, MDM9628, MSM8996AU, QAM8295P, QCA6174A, QCA6175A, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA9377, QCA9379, QCC2073, QCC2076, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8295P, Snapdragon 820 Automotive Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon Auto 5G Modem-RF, Snapdragon X55 5G Modem-RF System, Snapdragon Auto 4G Modem, SW5100, SW5100P, WCD9380, WCD9385, WCN3980, WCN3988, WSA8810, WSA8815, WSA8830, WSA8835'} |
CVE-2023-28088 | An HPE OneView appliance dump may expose SAN switch administrative credentials | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04469en_us | 2023-03-10T14:47:44.212Z | 2023-04-25T18:43:01.040Z | 2023-04-25T19:05:03.640Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '0, 0'} |
CVE-2023-28122 | A local privilege escalation (LPE) vulnerability in UI Desktop for Windows (Version 0.59.1.71 and earlier) allows a malicious actor with local access to a Windows device running said application to submit arbitrary commands as SYSTEM.This vulnerability is fixed in Version 0.62.3 and later. | https://community.ui.com/releases/Security-Advisory-Bulletin-029-029/a47c68f2-1f3a-47c3-b577-eb70599644e4 | 2023-03-10T00:00:00 | 2023-04-19T00:00:00 | 2023-04-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'UI Desktop for Windows', 'Versions': 'Fixed on Version 0.62.3 or later.'} |
CVE-2023-28821 | Concrete CMS (previously concrete5) before 9.1 did not have a rate limit for password resets. | https://github.com/concretecms/concretecms/releases | 2023-03-24T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28964 | An Improper Handling of Length Parameter Inconsistency vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows a network based, unauthenticated attacker to cause an RPD crash leading to a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. Upon receipt of a malformed BGP flowspec update, RPD will crash resulting in a Denial of Service. This issue affects Juniper Networks Junos OS: All versions prior to 18.1R3-S11; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S1, 20.3R2; Juniper Networks Junos OS Evolved: All versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R2-EVO; 20.3 versions prior to 20.3R2-EVO; | https://supportportal.juniper.net/JSA70588 | 2023-03-29T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 18.2, 18.3, 18.4, 19.1, 19.2, 19.3, 19.4, 20.1, 20.2, 20.3'} |
CVE-2023-28437 | Dataease is an open source data visualization and analysis tool. The blacklist for SQL injection protection is missing entries. This vulnerability has been fixed in version 1.18.5. There are no known workarounds. | https://github.com/dataease/dataease/security/advisories/GHSA-7j7j-9rw6-3r56 | 2023-03-15T15:59:10.054Z | 2023-03-24T23:43:15.992Z | 2023-03-24T23:43:15.992Z | {'Vendor': 'dataease', 'Product': 'dataease', 'Versions': '< 1.18.5'} |
CVE-2023-28749 | Cross-Site Request Forgery (CSRF) vulnerability in CreativeMindsSolutions CM On Demand Search And Replace plugin <= 1.3.0 versions. | https://patchstack.com/database/vulnerability/cm-on-demand-search-and-replace/wordpress-cm-on-demand-search-and-replace-plugin-1-3-0-cross-site-request-forgery-csrf?_s_id=cve | 2023-03-22T16:47:14.447Z | 2023-11-22T13:02:55.222Z | 2023-11-22T13:02:55.222Z | {'Vendor': 'CreativeMindsSolutions', 'Product': 'CM On Demand Search And Replace', 'Versions': 'n/a'} |
CVE-2023-28319 | A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed. | https://hackerone.com/reports/1913733 | 2023-03-14T00:00:00 | 2023-05-26T00:00:00 | 2023-10-11T10:06:29.880561 | {'Vendor': 'n/a', 'Product': 'https://github.com/curl/curl', 'Versions': 'Fixed in 8.1.0'} |
CVE-2023-28876 | A Broken Access Control issue in comments to uploaded files in Filerun through Update 20220202 allows attackers to delete comments on files uploaded by other users. | https://filerun.com/changelog | 2023-03-27T00:00:00 | 2023-12-06T00:00:00 | 2023-12-06T01:04:35.270691 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28175 | Improper Authorization in SSH server in Bosch VMS 11.0, 11.1.0, and 11.1.1 allows a remote authenticated user to access resources within the trusted internal network via a port forwarding request. | https://psirt.bosch.com/security-advisories/BOSCH-SA-025794-bt.html | 2023-03-13T15:46:37.814Z | 2023-06-15T10:14:34.076Z | 2023-06-15T10:14:34.076Z | {'Vendor': 'Bosch', 'Product': 'BVMS', 'Versions': '7.5'} |
CVE-2023-28030 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T04:57:40.871Z | 2023-06-23T09:43:27.331Z | 2023-06-23T09:43:27.331Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28460 | A command injection vulnerability was discovered in Array Networks APV products. A remote attacker can send a crafted packet after logging into the affected appliance as an administrator, resulting in arbitrary shell code execution. This is fixed in 8.6.1.262 or newer and 10.4.2.93 or newer. | https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_Command_Injection_Vulnerabilities_APV_ID-133258.pdf | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28933 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in StPeteDesign Call Now Accessibility Button plugin <= 1.1 versions. | https://patchstack.com/database/vulnerability/accessibility-help-button/wordpress-call-now-accessibility-button-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-28T06:52:44.956Z | 2023-06-12T15:10:01.709Z | 2023-06-12T15:10:01.709Z | {'Vendor': 'StPeteDesign', 'Product': 'Call Now Accessibility Button', 'Versions': 'n/a'} |
CVE-2023-28899 | By sending a specific reset UDS request via OBDII port of Skoda vehicles, it is possible to cause vehicle engine shutdown and denial of service of other vehicle components even when the vehicle is moving at a high speed. No safety critical functions affected. | https://asrg.io/security-advisories/cve-2023-28899 | 2023-03-27T14:51:13.968Z | 2024-01-12T16:32:07.082Z | 2024-01-12T16:32:07.082Z | {'Vendor': 'Škoda', 'Product': 'Superb III', 'Versions': '0'} |
CVE-2023-28533 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in M Williams Cab Grid plugin <= 1.5.15 versions. | https://patchstack.com/database/vulnerability/cab-grid/wordpress-cab-grid-plugin-1-5-15-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-17T11:00:17.217Z | 2023-08-17T08:04:50.410Z | 2023-08-17T08:04:50.410Z | {'Vendor': 'M Williams', 'Product': 'Cab Grid', 'Versions': 'n/a'} |
CVE-2023-28163 | When downloading files through the Save As dialog on Windows with suggested filenames containing environment variable names, Windows would have resolved those in the context of the current user. <br>*This bug only affects Firefox on Windows. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-03-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-28499 | Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in simonpedge Slide Anything – Responsive Content / HTML Slider and Carousel plugin <= 2.4.9 versions. | https://patchstack.com/database/vulnerability/slide-anything/wordpress-slide-anything-plugin-2-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-16T11:18:18.237Z | 2023-11-07T17:34:48.417Z | 2023-11-07T17:34:48.417Z | {'Vendor': 'simonpedge', 'Product': 'Slide Anything – Responsive Content / HTML Slider and Carousel', 'Versions': 'n/a'} |
CVE-2023-28476 | Concrete CMS (previously concrete5) in versions 9.0 through 9.1.3 is vulnerable to Stored XSS on Tags on uploaded files. | https://concretecms.com | 2023-03-15T00:00:00 | 2023-04-28T00:00:00 | 2024-01-08T23:49:09.362123 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28026 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T04:57:40.870Z | 2023-06-23T10:23:05.908Z | 2023-06-23T10:23:05.908Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28708 |
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
| https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67 | 2023-03-21T17:26:28.837Z | 2023-03-22T10:10:58.956Z | 2023-03-22T10:10:58.956Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M1, 10.1.0-M1, 9.0.0-M1, 8.5.0'} |
CVE-2023-28358 | A vulnerability has been discovered in Rocket.Chat where a markdown parsing issue in the "Search Messages" feature allows the insertion of malicious tags. This can be exploited on servers with content security policy disabled possible leading to some issues attacks like account takeover. | https://hackerone.com/reports/1781131 | 2023-03-15T00:00:00 | 2023-05-11T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'Rocket.Chat', 'Versions': 'This issue has been fixed in version 6.0> and is backported for the supported versions. Check this document for more info: https://docs.rocket.chat/resources/get-support/enterprise-support#rocket.chat-versions'} |
CVE-2023-28837 | Wagtail is an open source content management system built on Django. Prior to versions 4.1.4 and 4.2.2, a memory exhaustion bug exists in Wagtail's handling of uploaded images and documents. For both images and documents, files are loaded into memory during upload for additional processing. A user with access to upload images or documents through the Wagtail admin interface could upload a file so large that it results in a crash of denial of service.
The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. It can only be exploited by admin users with permission to upload images or documents.
Image uploads are restricted to 10MB by default, however this validation only happens on the frontend and on the backend after the vulnerable code.
Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2). Site owners who are unable to upgrade to the new versions are encouraged to add extra protections outside of Wagtail to limit the size of uploaded files. | https://github.com/wagtail/wagtail/security/advisories/GHSA-33pv-vcgh-jfg9 | 2023-03-24T16:25:34.465Z | 2023-04-03T16:41:19.467Z | 2023-04-03T16:41:19.467Z | {'Vendor': 'wagtail', 'Product': 'wagtail', 'Versions': '< 4.1.4, >= 4.2, < 4.2.2'} |
CVE-2023-28134 | Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | https://support.checkpoint.com/results/sk/sk181597 | 2023-03-10T21:20:19.555Z | 2023-11-12T22:36:19.549Z | 2023-11-12T22:36:19.549Z | {'Vendor': 'checkpoint', 'Product': 'Harmony Endpoint.', 'Versions': 'E84.x (EOL), E85.x (EOL), E86.x, E87.x before E81.10'} |
CVE-2023-28564 | Memory corruption in WLAN HAL while passing command parameters through WMI interfaces. | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.848Z | 2023-09-05T06:24:20.269Z | 2023-09-05T06:24:20.269Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, AR8031, AR9380, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, Home Hub 100 Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8069, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM9250, MDM9628, MDM9640, MDM9650, MSM8996AU, QAM8295P, QCA4024, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6428, QCA6430, QCA6438, QCA6554A, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA7500, QCA8075, QCA8081, QCA9377, QCA9531, QCA9558, QCA9561, QCA9880, QCA9882, QCA9886, QCA9887, QCA9888, QCA9889, QCA9898, QCA9980, QCA9982, QCA9984, QCA9985, QCA9986, QCA9987, QCA9990, QCA9992, QCA9994, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5064, QCN5121, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6122, QCN6132, QCN7605, QCN7606, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QFE1922, QFE1952, Robotics RB3 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8295P, SC8180X+SDX55, SD 455, SD 675, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD835, SD855, SDX20M, SDX55, SG4150P, SM4125, SM4450, SM6250, SM6250P, SM7250P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X5 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28071 |
Dell Command | Update, Dell Update, and Alienware Update versions 4.9.0, A01 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability to create arbitrary folder leading to permanent Denial of Service (DOS).
| https://www.dell.com/support/kbdoc/en-us/000213546/dsa-2023-170-dell-command-update | 2023-03-10T05:07:55.140Z | 2023-06-23T10:37:19.968Z | 2023-06-23T10:37:19.968Z | {'Vendor': 'Dell', 'Product': 'Dell Command Update (DCU)', 'Versions': '4.9.0, A01 and Prior'} |
CVE-2023-28421 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Winwar Media WordPress Email Marketing Plugin – WP Email Capture.This issue affects WordPress Email Marketing Plugin – WP Email Capture: from n/a through 3.10.
| https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wp-email-capture-plugin-3-10-sensitive-data-exposure-vulnerability?_s_id=cve | 2023-03-15T12:35:19.371Z | 2023-12-21T14:11:31.887Z | 2023-12-21T14:11:31.887Z | {'Vendor': 'Winwar Media', 'Product': 'WordPress Email Marketing Plugin – WP Email Capture', 'Versions': 'n/a'} |
CVE-2023-28972 | An Improper Link Resolution Before File Access vulnerability in console port access of Juniper Networks Junos OS on NFX Series allows an attacker to bypass console access controls. When "set system ports console insecure" is enabled, root login is disallowed for Junos OS as expected. However, the root password can be changed using "set system root-authentication plain-text-password" on NFX Series systems, leading to a possible administrative bypass with physical access to the console. Password recovery, changing the root password from a console, should not have been allowed from an insecure console. This is similar to the vulnerability described in CVE-2019-0035 but affects different platforms and in turn requires a different fix. This issue affects Juniper Networks Junos OS on NFX Series: 19.2 versions prior to 19.2R3-S7; 19.3 versions prior to 19.3R3-S8; 19.4 versions prior to 19.4R3-S12; 20.2 versions prior to 20.2R3-S8; 20.4 versions prior to 20.4R3-S7; 21.1 versions prior to 21.1R3-S5; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2. | https://supportportal.juniper.net/JSA70596 | 2023-03-29T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': '19.2, 19.3, 19.4, 20.2, 20.4, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'} |
CVE-2023-28636 | GLPI is a free asset and IT management software package. Starting in version 0.60 and prior to versions 9.5.13 and 10.0.7, a vulnerability allows an administrator to create a malicious external link. This issue is fixed in versions 9.5.13 and 10.0.7. | https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46 | 2023-03-20T12:19:47.208Z | 2023-04-05T17:21:22.297Z | 2023-04-05T17:21:22.297Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 0.60, < 9.5.13, >= 10.0.0, < 10.0.7'} |
CVE-2023-28266 | Windows Common Log File System Driver Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28266 | 2023-03-13T22:23:36.181Z | 2023-04-11T19:13:43.328Z | 2023-12-14T18:59:41.828Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28773 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kolja Nolte Secondary Title plugin <= 2.0.9.1 versions. | https://patchstack.com/database/vulnerability/secondary-title/wordpress-secondary-title-plugin-2-0-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-23T17:01:46.245Z | 2023-08-08T12:14:56.889Z | 2023-08-08T12:14:56.889Z | {'Vendor': 'Kolja Nolte', 'Product': 'Secondary Title', 'Versions': 'n/a'} |
CVE-2023-28323 | A deserialization of untrusted data exists in EPM 2022 Su3 and all prior versions that allows an unauthenticated user to elevate rights. This exploit could potentially be used in conjunction with other OS (Operating System) vulnerabilities to escalate privileges on the machine or be used as a stepping stone to get to other network attached machines.
| https://forums.ivanti.com/s/article/SA-2023-06-20-CVE-2023-28323 | 2023-03-14T01:00:13.190Z | 2023-06-30T23:40:30.788Z | 2023-06-30T23:40:30.788Z | {'Vendor': 'Ivanti', 'Product': 'Ivanti Endpoint Manager', 'Versions': '2022'} |
CVE-2023-28231 | DHCP Server Service Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28231 | 2023-03-13T22:18:32.385Z | 2023-04-11T19:13:37.943Z | 2023-12-14T18:59:36.610Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-28661 | The WP Popup Banners WordPress Plugin, version <= 1.2.5, is affected by an authenticated SQL injection vulnerability in the 'value' parameter in the get_popup_data action. | https://www.tenable.com/security/research/tra-2023-2 | 2023-03-20T00:00:00 | 2023-03-22T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'WP Popup Banners WordPress Plugin', 'Versions': '<= 1.2.5'} |
CVE-2023-28724 |
NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| https://my.f5.com/manage/s/article/K000133233 | 2023-04-14T23:08:02.613Z | 2023-05-03T14:34:28.973Z | 2023-05-03T14:34:28.973Z | {'Vendor': 'F5', 'Product': 'NGINX Instance Manager', 'Versions': '2.0.0, 1.0.0'} |
CVE-2023-28548 | Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART. | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.846Z | 2023-09-05T06:24:09.548Z | 2023-09-05T06:24:09.548Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, AR8035, AR9380, CSR8811, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, PMP8074, QAM8295P, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA4024, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9886, QCA9888, QCA9889, QCA9980, QCA9984, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCM4490, QCM6490, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6100, QCN6102, QCN6112, QCN6122, QCN6132, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS4490, QCS6490, QCS8250, QRB5165M, QRB5165N, QSM8250, QSM8350, Qualcomm Robotics RB5 Platform, SA4150P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8295P, SC8180X+SDX55, SD 8 Gen1 5G, SD865 5G, SD888, SDX55, SM7315, SM7325P, Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SXR1230P, SXR2130, SXR2230P, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28118 | kaml provides YAML support for kotlinx.serialization. Prior to version 0.53.0, applications that use kaml to parse untrusted input containing anchors and aliases may consume excessive memory and crash. Version 0.53.0 and later default to refusing to parse YAML documents containing anchors and aliases. There are no known workarounds. | https://github.com/charleskorn/kaml/security/advisories/GHSA-c24f-2j3g-rg48 | 2023-03-10T18:34:29.228Z | 2023-03-20T12:39:42.075Z | 2023-03-20T12:39:42.075Z | {'Vendor': 'charleskorn', 'Product': 'kaml', 'Versions': '< 0.53.0'} |
CVE-2023-28677 | Jenkins Convert To Pipeline Plugin 1.0 and earlier uses basic string concatenation to convert Freestyle projects' Build Environment, Build Steps, and Post-build Actions to the equivalent Pipeline step invocations, allowing attackers able to configure Freestyle projects to prepare a crafted configuration that injects Pipeline script code into the (unsandboxed) Pipeline resulting from a convertion by Jenkins Convert To Pipeline Plugin. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2966 | 2023-03-20T19:59:08.757Z | 2023-03-23T11:26:06.014Z | 2023-10-24T12:49:22.726Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Convert To Pipeline Plugin', 'Versions': '0'} |
CVE-2023-28227 | Windows Bluetooth Driver Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28227 | 2023-03-13T22:18:32.384Z | 2023-04-11T19:13:36.351Z | 2023-12-14T18:59:35.082Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28732 | Missing access control in AnyMailing Joomla Plugin allows to list and access files containing sensitive information from the plugin itself and access to system files via path traversal, when being granted access to the campaign's creation on front-office.
This issue affects AnyMailing Joomla Plugin in versions below 8.3.0.
| https://www.acymailing.com/change-log/ | 2023-03-22T09:53:07.889Z | 2023-03-30T11:26:27.209Z | 2023-03-30T11:26:27.209Z | {'Vendor': 'AcyMailing', 'Product': 'Newsletter Plugin for Joomla ', 'Versions': '0'} |
CVE-2023-28698 | Wade Graphic Design FANTSY has a vulnerability of insufficient authorization check. An unauthenticated remote user can exploit this vulnerability by modifying URL parameters to gain administrator privileges to perform arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7101-f88db-1.html | 2023-03-21T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'WADE DIGITAL DESIGN CO, LTD.', 'Product': 'FANTSY', 'Versions': '2.1.8'} |
CVE-2023-28270 | Windows Lock Screen Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28270 | 2023-03-13T22:23:36.181Z | 2023-04-11T19:13:47.082Z | 2023-12-14T18:59:45.501Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28620 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Cyberus Labs Cyberus Key plugin <= 1.0 versions. | https://patchstack.com/database/vulnerability/cyberus-key/wordpress-cyberus-key-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-20T08:47:17.722Z | 2023-06-13T14:28:34.245Z | 2023-06-13T14:28:34.245Z | {'Vendor': 'Cyberus Labs', 'Product': 'Cyberus Key', 'Versions': 'n/a'} |
CVE-2023-28335 | The link to reset all templates of a database activity did not include the necessary token to prevent a CSRF risk. | https://moodle.org/mod/forum/discuss.php?d=445067 | 2023-03-14T00:00:00 | 2023-03-23T00:00:00 | 2023-03-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.1 to 4.1.1'} |
CVE-2023-28765 | An attacker with basic privileges in SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, can get access to lcmbiar file and further decrypt the file. After this attacker can gain access to BI user’s passwords and depending on the privileges of the BI user, the attacker can perform operations that can completely compromise the application.
| https://launchpad.support.sap.com/#/notes/3298961 | 2023-03-23T04:20:27.699Z | 2023-04-11T02:53:14.910Z | 2023-04-11T20:19:05.274Z | {'Vendor': 'SAP', 'Product': 'BusinessObjects Business Intelligence Platform (Promotion Management)', 'Versions': '420, 430'} |
CVE-2023-28509 | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 use weak encryption for packet-level security and passwords transferred on the wire. | https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | 2023-03-16T20:44:20.346Z | 2023-03-29T20:18:02.170Z | 2023-03-29T20:18:02.170Z | {'Vendor': 'Rocket Software', 'Product': 'UniData', 'Versions': '0'} |
CVE-2023-28159 | The fullscreen notification could have been hidden on Firefox for Android by using download popups, resulting in potential user confusion or spoofing attacks. <br>*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 111. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-03-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-28508 | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a heap-based overflow vulnerability, where certain input can corrupt the heap and crash the forked process. | https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | 2023-03-16T20:44:20.346Z | 2023-03-29T20:16:46.118Z | 2023-03-29T20:16:46.118Z | {'Vendor': 'Rocket Software', 'Product': 'UniData', 'Versions': '0'} |
CVE-2023-28158 | Privilege escalation via stored XSS using the file upload service to upload malicious content.
The issue can be exploited only by authenticated users which can create directory name to inject some XSS content and gain some privileges such admin user.
| https://lists.apache.org/thread/8pm6d5y9cptznm0bdny3n8voovmm0dtt | 2023-03-13T02:37:38.879Z | 2023-03-29T12:21:46.932Z | 2023-03-29T12:21:46.932Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Archiva', 'Versions': '2.0'} |
CVE-2023-28271 | Windows Kernel Memory Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271 | 2023-03-13T22:23:36.181Z | 2023-04-11T19:13:48.698Z | 2023-12-14T18:59:47.160Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28621 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wishfulthemes Raise Mag, Wishfulthemes Wishful Blog themes allows Reflected XSS.This issue affects Raise Mag: from n/a through 1.0.7; Wishful Blog: from n/a through 2.0.1.
| https://patchstack.com/database/vulnerability/wishful-blog/wordpress-wishful-blog-theme-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-20T08:47:17.722Z | 2023-11-16T19:17:24.812Z | 2023-11-16T19:17:24.812Z | {'Vendor': 'Wishfulthemes', 'Product': 'Raise Mag', 'Versions': 'n/a'} |
CVE-2023-28334 | Authenticated users were able to enumerate other users' names via the learning plans page. | https://moodle.org/mod/forum/discuss.php?d=445066 | 2023-03-14T00:00:00 | 2023-03-23T00:00:00 | 2023-03-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.1 to 4.1.1 and 4.0 to 4.0.6'} |
CVE-2023-28764 | SAP BusinessObjects Platform - versions 420, 430, Information design tool transmits sensitive information as cleartext in the binaries over the network. This could allow an unauthenticated attacker with deep knowledge to gain sensitive information such as user credentials and domain names, which may have a low impact on confidentiality and no impact on the integrity and availability of the system.
| https://i7p.wdf.sap.corp/sap/support/notes/3302595 | 2023-03-23T04:20:27.699Z | 2023-05-09T00:55:04.357Z | 2023-05-09T00:55:04.357Z | {'Vendor': 'SAP_SE', 'Product': 'SAP BusinessObjects Platform', 'Versions': '420, 430'} |
CVE-2023-28676 | A cross-site request forgery (CSRF) vulnerability in Jenkins Convert To Pipeline Plugin 1.0 and earlier allows attackers to create a Pipeline based on a Freestyle project, potentially leading to remote code execution (RCE). | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2963 | 2023-03-20T19:59:08.757Z | 2023-03-23T11:26:05.301Z | 2023-10-24T12:49:21.581Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Convert To Pipeline Plugin', 'Versions': '0'} |
CVE-2023-28226 | Windows Enroll Engine Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28226 | 2023-03-13T22:18:32.384Z | 2023-04-11T19:13:35.804Z | 2023-12-14T18:59:34.543Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28733 | AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office.
This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.
| https://www.acymailing.com/change-log/ | 2023-03-22T09:53:07.889Z | 2023-03-30T11:27:40.884Z | 2023-03-30T11:27:40.884Z | {'Vendor': 'AcyMailing', 'Product': 'Newsletter Plugin for Joomla in the Enterprise version ', 'Versions': '0'} |
CVE-2023-28699 | Wade Graphic Design FANTSY has a vulnerability of insufficient filtering for file type in its file update function. An authenticated remote attacker with general user privilege can exploit this vulnerability to upload a PHP file containing a webshell to perform arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7102-41ab8-1.html | 2023-03-21T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'WADE DIGITAL DESIGN CO, LTD.', 'Product': 'FANTSY', 'Versions': '2.1.8'} |
CVE-2023-28549 | Memory corruption in WLAN HAL while parsing Rx buffer in processing TLV payload. | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.846Z | 2023-09-05T06:24:11.272Z | 2023-09-05T06:24:11.272Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AQT1000, AR8035, AR9380, CSR8811, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, PMP8074, QAM8295P, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA4024, QCA6310, QCA6320, QCA6391, QCA6420, QCA6421, QCA6426, QCA6428, QCA6430, QCA6431, QCA6436, QCA6438, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA7500, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCM4490, QCM6490, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5064, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6100, QCN6102, QCN6112, QCN6122, QCN6132, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS4490, QCS6490, QCS8250, QRB5165M, QRB5165N, QSM8250, QSM8350, Qualcomm Robotics RB5 Platform, SA4150P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8295P, SC8180X+SDX55, SD 455, SD 8 Gen1 5G, SD660, SD835, SD865 5G, SD888, SDX55, SM4450, SM7250P, SM7315, SM7325P, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2130, SXR2230P, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.