CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-28119 | The crewjam/saml go library contains a partial implementation of the SAML standard in golang. Prior to version 0.4.13, the package's use of `flate.NewReader` does not limit the size of the input. The user can pass more than 1 MB of data in the HTTP request to the processing functions, which will be decompressed server-side using the Deflate algorithm. Therefore, after repeating the same request multiple times, it is possible to achieve a reliable crash since the operating system kills the process. This issue is patched in version 0.4.13.
| https://github.com/crewjam/saml/security/advisories/GHSA-5mqj-xc49-246p | 2023-03-10T18:34:29.228Z | 2023-03-22T19:51:13.210Z | 2023-03-22T19:51:13.210Z | {'Vendor': 'crewjam', 'Product': 'saml', 'Versions': '< 0.4.13'} |
CVE-2023-28660 | The Events Made Easy WordPress Plugin, version <= 2.3.14 is affected by an authenticated SQL injection vulnerability in the 'search_name' parameter in the eme_recurrences_list action. | https://www.tenable.com/security/research/tra-2023-2 | 2023-03-20T00:00:00 | 2023-03-22T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'Events Made Easy WordPress Plugin', 'Versions': '<= 2.3.14'} |
CVE-2023-28375 | Osprey Pump Controller version 1.01 is vulnerable to an unauthenticated file disclosure. Using a GET parameter, attackers can disclose arbitrary files on the affected device and disclose sensitive and system information. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 | 2023-03-21T21:17:06.873Z | 2023-03-28T20:02:00.775Z | 2023-03-28T20:02:00.775Z | {'Vendor': 'ProPump and Controls, Inc.', 'Product': 'Osprey Pump Controller', 'Versions': '1.01'} |
CVE-2023-28725 | General Bytes Crypto Application Server (CAS) 20230120, as distributed with General Bytes BATM devices, allows remote attackers to execute arbitrary Java code by uploading a Java application to the /batm/app/admin/standalone/deployments directory, aka BATM-4780, as exploited in the wild in March 2023. This is fixed in 20221118.48 and 20230120.44. | https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023 | 2023-03-21T00:00:00 | 2023-03-21T00:00:00 | 2023-03-21T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28637 | DataEase is an open source data visualization analysis tool. In Dataease users are normally allowed to modify data and the data sources are expected to properly sanitize data. The AWS redshift data source does not provide data sanitization which may lead to remote code execution. This vulnerability has been fixed in v1.18.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/dataease/dataease/security/advisories/GHSA-8wg2-9gwc-5fx2 | 2023-03-20T12:19:47.208Z | 2023-03-28T20:02:54.017Z | 2023-03-28T20:02:54.017Z | {'Vendor': 'dataease', 'Product': 'dataease', 'Versions': '< 1.18.5'} |
CVE-2023-28267 | Remote Desktop Protocol Client Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28267 | 2023-03-13T22:23:36.181Z | 2023-04-11T19:13:44.410Z | 2023-12-14T18:59:42.862Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28772 | An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow. | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 | 2023-03-23T00:00:00 | 2023-03-23T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28288 | Microsoft SharePoint Server Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28288 | 2023-03-13T22:23:36.186Z | 2023-04-11T19:13:18.266Z | 2023-12-14T18:59:16.788Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft SharePoint Enterprise Server 2016', 'Versions': '16.0.0'} |
CVE-2023-28322 | An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST. | https://hackerone.com/reports/1954658 | 2023-03-14T00:00:00 | 2023-05-26T00:00:00 | 2023-12-22T16:06:14.746366 | {'Vendor': 'n/a', 'Product': 'https://github.com/curl/curl', 'Versions': 'Fixed in 8.1.0'} |
CVE-2023-28836 | Wagtail is an open source content management system built on Django. Starting in version 1.5 and prior to versions 4.1.4 and 4.2.2, a stored cross-site scripting (XSS) vulnerability exists on ModelAdmin views within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft pages and documents that, when viewed by a user with higher privileges, could perform actions with that user's credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin, and only affects sites with ModelAdmin enabled. For page, the vulnerability is in the "Choose a parent page" ModelAdmin view (`ChooseParentView`), available when managing pages via ModelAdmin. For documents, the vulnerability is in the ModelAdmin Inspect view (`InspectView`) when displaying document fields. Patched versions have been released as Wagtail 4.1.4 and Wagtail 4.2.2. Site owners who are unable to upgrade to the new versions can disable or override the corresponding functionality. | https://github.com/wagtail/wagtail/commit/bc84bf9815610cfbf8db3b6050c7ddcbaa4b9713 | 2023-03-24T00:00:00 | 2023-04-03T00:00:00 | 2023-04-03T00:00:00 | {'Vendor': 'wagtail', 'Product': 'wagtail', 'Versions': '1.5, 4.1.1, 4.2, 4.2.2'} |
CVE-2023-28565 | Memory corruption in WLAN HAL while handling command streams through WMI interfaces. | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.848Z | 2023-09-05T06:24:21.806Z | 2023-09-05T06:24:21.806Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '9205 LTE Modem, APQ8017, APQ8064AU, APQ8076, APQ8092, APQ8094, AQT1000, AR7420, AR8031, AR8035, AR9380, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, Home Hub 100 Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8069, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM8215, MDM9215, MDM9250, MDM9310, MDM9615, MDM9628, MDM9640, MDM9645, MDM9650, MSM8996AU, QCA0000, QCA1023, QCA1990, QCA4004, QCA4010, QCA4012, QCA4024, QCA4531, QCA6174, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6428, QCA6430, QCA6438, QCA6554A, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6694, QCA6696, QCA6698AQ, QCA7500, QCA7520, QCA7550, QCA8075, QCA8081, QCA9367, QCA9377, QCA9379, QCA9531, QCA9558, QCA9561, QCA9563, QCA9880, QCA9882, QCA9886, QCA9887, QCA9888, QCA9889, QCA9896, QCA9898, QCA9980, QCA9982, QCA9984, QCA9985, QCA9986, QCA9987, QCA9988, QCA9990, QCA9992, QCA9994, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCN3018, QCN5022, QCN5024, QCN5052, QCN5064, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5501, QCN5502, QCN5550, QCN6023, QCN6024, QCN6122, QCN6132, QCN7605, QCN7606, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QFE1922, QFE1952, QTS110, Robotics RB3 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 455, SD 675, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD820, SD821, SD835, SD855, SDX20M, SDX55, SG4150P, SM4125, SM4450, SM6250, SM6250P, SM7250P, Smart Audio 200 Platform, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 652 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 808 Processor, Snapdragon 810 Processor, Snapdragon 820 Automotive Platform, Snapdragon 820 Mobile Platform, Snapdragon 821 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X5 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3610, WCN3615, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28070 |
Alienware Command Center Application, versions 5.5.43.0 and prior, contain an improper access control vulnerability. A local malicious user could potentially exploit this vulnerability during installation or update process leading to privilege escalation.
| https://www.dell.com/support/kbdoc/en-us/000212277/dsa-2023-135 | 2023-03-10T05:06:06.442Z | 2023-05-03T08:05:51.713Z | 2023-05-03T08:05:51.713Z | {'Vendor': 'Dell', 'Product': 'Alienware Command Center (AWCC)', 'Versions': 'Version 5.5.43.0 and prior'} |
CVE-2023-28420 | Cross-Site Request Forgery (CSRF) vulnerability in Leo Caseiro Custom Options Plus plugin <= 1.8.1 versions. | https://patchstack.com/database/vulnerability/custom-options-plus/wordpress-custom-options-plus-plugin-1-8-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-03-15T12:35:19.371Z | 2023-11-12T22:11:08.983Z | 2023-11-12T22:11:08.983Z | {'Vendor': 'Leo Caseiro', 'Product': 'Custom Options Plus', 'Versions': 'n/a'} |
CVE-2023-28973 | An Improper Authorization vulnerability in the 'sysmanctl' shell command of Juniper Networks Junos OS Evolved allows a local, authenticated attacker to execute administrative commands that could impact the integrity of the system or system availability. Administrative functions such as daemon restarting, routing engine (RE) switchover, and node shutdown can all be performed through exploitation of the 'sysmanctl' command. Access to the 'sysmanctl' command is only available from the Junos shell. Neither direct nor indirect access to 'sysmanctl' is available from the Junos CLI. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO; 21.4 versions prior to 21.4R1-S2-EVO, 21.4R2-EVO. | https://supportportal.juniper.net/JSA70597 | 2023-03-29T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': 'unspecified, 21.2, 21.3, 21.4'} |
CVE-2023-28709 | The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur.
| https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j | 2023-03-21T17:28:47.353Z | 2023-05-22T10:08:49.541Z | 2023-05-22T10:08:49.541Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Tomcat', 'Versions': '11.0.0-M2, 10.1.5, 9.0.71, 8.5.85'} |
CVE-2023-28359 | A NoSQL injection vulnerability has been identified in the listEmojiCustom method call within Rocket.Chat. This can be exploited by unauthenticated users when there is at least one custom emoji uploaded to the Rocket.Chat instance. The vulnerability causes a delay in the server response, with the potential for limited impact. | https://hackerone.com/reports/1757676 | 2023-03-15T00:00:00 | 2023-05-11T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'Rocket.Chat', 'Versions': 'This issue has been fixed in version 6.0> and is backported for the supported versions. Check this document for more info: https://docs.rocket.chat/resources/get-support/enterprise-support#rocket.chat-versions'} |
CVE-2023-28162 | While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-03-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-28498 | Cross-Site Request Forgery (CSRF) vulnerability in MotoPress Hotel Booking Lite plugin <= 4.6.0 versions. | https://patchstack.com/database/vulnerability/motopress-hotel-booking-lite/wordpress-hotel-booking-lite-plugin-4-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-03-16T11:18:18.237Z | 2023-11-12T21:57:22.327Z | 2023-11-12T21:57:22.327Z | {'Vendor': 'MotoPress', 'Product': 'Hotel Booking Lite', 'Versions': 'n/a'} |
CVE-2023-28477 | Concrete CMS (previously concrete5) versions 8.5.12 and below, and 9.0 through 9.1.3 is vulnerable to stored XSS on API Integrations via the name parameter. | https://concretecms.com | 2023-03-15T00:00:00 | 2023-04-28T00:00:00 | 2023-12-06T08:33:40.485128 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28027 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T04:57:40.870Z | 2023-06-23T10:04:42.451Z | 2023-06-23T10:04:42.451Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28877 | The VTEX [email protected] GraphQL API module does not properly restrict unauthorized access to private configuration data. ([email protected] is unaffected by this issue.) | https://developers.vtex.com/updates/release-notes/deprecation-of-apps-graphql%402.x | 2023-03-27T00:00:00 | 2023-03-31T00:00:00 | 2023-03-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28174 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in eLightUp eRocket plugin <= 1.2.4 versions. | https://patchstack.com/database/vulnerability/erocket/wordpress-erocket-plugin-1-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-13T14:15:16.910Z | 2023-06-22T11:59:55.295Z | 2023-06-22T11:59:55.295Z | {'Vendor': 'eLightUp', 'Product': 'eRocket', 'Versions': 'n/a'} |
CVE-2023-28031 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T04:57:40.871Z | 2023-06-23T10:11:12.555Z | 2023-06-23T10:11:12.555Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28461 | Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated "a new Array AG release with the fix will be available soon." | https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28932 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPMobile.App WPMobile.App — Android and iOS Mobile Application plugin <= 11.20 versions. | https://patchstack.com/database/vulnerability/wpappninja/wordpress-wpmobile-app-plugin-11-20-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-28T06:52:44.956Z | 2023-05-10T07:07:24.036Z | 2023-05-10T07:07:24.036Z | {'Vendor': 'WPMobile.App', 'Product': 'WPMobile.App — Android and iOS Mobile Application', 'Versions': 'n/a'} |
CVE-2023-28898 | The Real-Time Streaming Protocol implementation in the MIB3 infotainment incorrectly handles requests to /logs URI, when the id parameter equals to zero. This issue allows an attacker connected to the in-vehicle Wi-Fi network to cause denial-of-service of the infotainment system, when the certain preconditions are met.
Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022.
| https://nonexistent.com | 2023-03-27T14:51:13.968Z | 2024-01-12T16:04:57.218Z | 2024-01-12T16:04:57.218Z | {'Vendor': 'PREH GMBH', 'Product': 'MIB3 Infotainment Unit', 'Versions': '0'} |
CVE-2023-28748 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in biztechc Copy or Move Comments allows SQL Injection.This issue affects Copy or Move Comments: from n/a through 5.0.4.
| https://patchstack.com/database/vulnerability/copy-or-move-comments/wordpress-copy-or-move-comments-plugin-5-0-4-sql-injection-vulnerability?_s_id=cve | 2023-03-22T16:47:14.447Z | 2023-11-06T08:27:53.060Z | 2023-11-06T08:27:53.060Z | {'Vendor': 'biztechc', 'Product': 'Copy or Move Comments', 'Versions': 'n/a'} |
CVE-2023-28318 | A vulnerability has been discovered in Rocket.Chat, where messages can be hidden regardless of the Message_KeepHistory or Message_ShowDeletedStatus server configuration. This allows users to bypass the intended message deletion behavior, hiding messages and deletion notices. | https://hackerone.com/reports/1379451 | 2023-03-14T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'Rocket.Chat', 'Versions': 'This issue has been fixed in version 6.0> and is backported for the supported versions. Check this document for more info: https://docs.rocket.chat/resources/get-support/enterprise-support#rocket.chat-versions'} |
CVE-2023-28573 | Memory corruption in WLAN HAL while parsing WMI command parameters. | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.850Z | 2023-09-05T06:24:25.110Z | 2023-09-05T06:24:25.110Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AQT1000, AR8035, AR9380, CSR8811, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, PMP8074, QAM8255P, QAM8295P, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA4024, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9886, QCA9888, QCA9889, QCA9980, QCA9984, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCM4490, QCM6490, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6100, QCN6102, QCN6112, QCN6122, QCN6132, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS4490, QCS6490, QCS8250, QCS8550, QRB5165M, QRB5165N, QSM8250, QSM8350, Robotics RB5 Platform, SA4150P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SC8180X+SDX55, SD 8 Gen1 5G, SD865 5G, SD888, SDX55, SM7315, SM7325P, Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SXR1230P, SXR2130, SXR2230P, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28089 | An HPE OneView appliance dump may expose FTP credentials for c7000 Interconnect Modules | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04469en_us | 2023-03-10T14:47:44.212Z | 2023-04-25T18:44:21.865Z | 2023-04-25T19:04:39.921Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '0, 0'} |
CVE-2023-28123 | A permission misconfiguration in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow an user to hijack VPN credentials while UID VPN is starting.This vulnerability is fixed in Version 0.62.3 and later. | https://community.ui.com/releases/Security-Advisory-Bulletin-029-029/a47c68f2-1f3a-47c3-b577-eb70599644e4 | 2023-03-10T00:00:00 | 2023-04-19T00:00:00 | 2023-04-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'UI Desktop for Windows', 'Versions': 'Fixed on Version 0.62.3 or later.'} |
CVE-2023-28820 | Concrete CMS (previously concrete5) before 9.1 is vulnerable to stored XSS in RSS Displayer via the href attribute because the link element input was not sanitized. | https://github.com/concretecms/concretecms/releases | 2023-03-24T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28965 | An Improper Check or Handling of Exceptional Conditions within the storm control feature of Juniper Networks Junos OS allows an attacker sending a high rate of traffic to cause a Denial of Service. Continued receipt and processing of these packets will create a sustained Denial of Service (DoS) condition. Storm control monitors the level of applicable incoming traffic and compares it with the level specified. If the combined level of the applicable traffic exceeds the specified level, the switch drops packets for the controlled traffic types. This issue affects Juniper Networks Junos OS on QFX10002: All versions prior to 19.3R3-S7; 19.4 versions prior to 19.4R3-S11; 20.2 versions prior to 20.2R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R2. | https://supportportal.juniper.net/JSA70589 | 2023-03-29T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 19.4, 20.2, 20.4, 21.1, 21.2, 21.3, 21.4'} |
CVE-2023-28436 | Tailscale is software for using Wireguard and multi-factor authentication (MFA). A vulnerability identified in the implementation of Tailscale SSH starting in version 1.34.0 and prior to prior to 1.38.2 in FreeBSD allows commands to be run with a higher privilege group ID than that specified in Tailscale SSH access rules. A difference in the behavior of the FreeBSD `setgroups` system call from POSIX meant that the Tailscale client running on a FreeBSD-based operating system did not appropriately restrict groups on the host when using Tailscale SSH. When accessing a FreeBSD host over Tailscale SSH, the egid of the tailscaled process was used instead of that of the user specified in Tailscale SSH access rules.
Tailscale SSH commands may have been run with a higher privilege group ID than that specified in Tailscale SSH access rules if they met all of the following criteria: the destination node was a FreeBSD device with Tailscale SSH enabled; Tailscale SSH access rules permitted access for non-root users; and a non-interactive SSH session was used.
Affected users should upgrade to version 1.38.2 to remediate the issue.
| https://github.com/tailscale/tailscale/security/advisories/GHSA-vfgq-g5x8-g595 | 2023-03-15T15:59:10.053Z | 2023-03-23T19:27:48.051Z | 2023-03-23T19:27:48.051Z | {'Vendor': 'tailscale', 'Product': 'tailscale', 'Versions': '>= 1.34.0, < 1.38.2'} |
CVE-2023-28066 |
Dell OS Recovery Tool, versions 2.2.4013 and 2.3.7012.0, contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability in order to elevate privileges on the system.
| https://www.dell.com/support/kbdoc/en-us/000212575/dsa-2023-147 | 2023-03-10T05:06:06.441Z | 2023-06-01T15:40:50.096Z | 2023-06-01T15:40:50.096Z | {'Vendor': 'Dell', 'Product': 'Dell OS Recovery Tool', 'Versions': '2.2.4013 and 2.3.7012.0'} |
CVE-2023-28768 | Improper frame handling in the Zyxel XGS2220-30 firmware version V4.80(ABXN.1), XMG1930-30 firmware version V4.80(ACAR.1), and XS1930-10 firmware version V4.80(ABQE.1) could allow an unauthenticated LAN-based attacker to cause denial-of-service (DoS) conditions by sending crafted frames to an affected switch. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-dos-vulnerability-of-xgs2220-xmg1930-and-xs1930-series-switches | 2023-03-23T10:34:20.987Z | 2023-08-14T16:10:27.201Z | 2023-08-14T16:10:27.201Z | {'Vendor': 'Zyxel', 'Product': 'XGS2220-30 firmware', 'Versions': 'V4.80(ABXN.1)'} |
CVE-2023-28292 | Raw Image Extension Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28292 | 2023-03-13T22:23:36.187Z | 2023-04-11T19:13:19.310Z | 2023-12-14T18:59:17.878Z | {'Vendor': 'Microsoft', 'Product': 'Raw Image Extension', 'Versions': '2.1.0.0, 2.1.0.0'} |
CVE-2023-28338 | Any request send to a Netgear Nighthawk Wifi6 Router (RAX30)'s web service containing a “Content-Type” of “multipartboundary=” will result in the request body being written to “/tmp/mulipartFile” on the device itself. A sufficiently large file will cause device resources to be exhausted, resulting in the device becoming unusable until it is rebooted. | https://drupal9.tenable.com/security/research/tra-2023-12 | 2023-03-14T00:00:00 | 2023-03-15T00:00:00 | 2023-03-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'NETGEAR Nighthawk WiFi6 Router (RAX30)', 'Versions': 'All known versions'} |
CVE-2023-28441 | smartCARS 3 is flight tracking software. In version 0.5.8 and prior, all persons who have failed login attempts will have their password stored in error logs. This problem doesn't occur in version 0.5.9. As a workaround, delete the affected log file, and ensure one logs in correctly. | https://github.com/invernyx/smartcars-3-bugs/security/advisories/GHSA-fp42-c8g2-5jc7 | 2023-03-15T15:59:10.055Z | 2023-03-23T23:02:47.281Z | 2023-03-23T23:02:47.281Z | {'Vendor': 'invernyx', 'Product': 'smartcars-3-bugs', 'Versions': '< 0.5.9'} |
CVE-2023-28857 | Apereo CAS is an open source multilingual single sign-on solution for the web. Apereo CAS can be configured to use authentication based on client X509 certificates. These certificates can be provided via TLS handshake or a special HTTP header, such as “ssl_client_cert”. When checking the validity of the provided client certificate, X509CredentialsAuthenticationHandler performs check that this certificate is not revoked. To do so, it fetches URLs provided in the “CRL Distribution Points” extension of the certificate, which are taken from the certificate itself and therefore can be controlled by a malicious user. If the CAS server is configured to use an LDAP server for x509 authentication with a password, for example by setting a “cas.authn.x509.ldap.ldap-url” and “cas.authn.x509.ldap.bind-credential” properties, X509CredentialsAuthenticationHandler fetches revocation URLs from the certificate, which can be LDAP urls. When making requests to this LDAP urls, Apereo CAS uses the same password as for initially configured LDAP server, which can lead to a password leak. An unauthenticated user can leak the password used to LDAP connection configured on server. This issue has been addressed in version 6.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://securitylab.github.com/advisories/GHSL-2023-009_Apereo_CAS/ | 2023-03-24T16:25:34.468Z | 2023-06-27T17:10:47.930Z | 2023-06-27T17:10:47.930Z | {'Vendor': 'Apereo', 'Product': 'CAS', 'Versions': '>= 6.5.0, < 6.5.9.1, >= 6.6.0, < 6.6.6'} |
CVE-2023-28154 | Webpack 5 before 5.76.0 does not avoid cross-realm object access. ImportParserPlugin.js mishandles the magic comment feature. An attacker who controls a property of an untrusted object can obtain access to the real global object. | https://github.com/webpack/webpack/pull/16500 | 2023-03-13T00:00:00 | 2023-03-13T00:00:00 | 2023-04-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28504 | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a stack-based buffer overflow that can lead to remote code execution as the root user. | https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | 2023-03-16T20:44:20.345Z | 2023-03-29T20:11:20.055Z | 2023-03-29T20:11:20.055Z | {'Vendor': 'Rocket Software', 'Product': 'UniData', 'Versions': '0'} |
CVE-2023-28380 | Uncontrolled search path for the Intel(R) AI Hackathon software before version 2.0.0 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00877.html | 2023-04-01T03:00:04.529Z | 2023-08-11T02:37:15.835Z | 2023-08-11T02:37:15.835Z | {'Vendor': 'n/a', 'Product': 'Intel(R) AI Hackathon software', 'Versions': 'before version 2.0.0'} |
CVE-2023-28695 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Drew Phillips VigilanTor plugin <= 1.3.10 versions. | https://patchstack.com/database/vulnerability/vigilantor/wordpress-vigilantor-plugin-1-3-10-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-21T07:14:41.939Z | 2023-06-22T08:37:34.423Z | 2023-06-22T08:37:34.423Z | {'Vendor': 'Drew Phillips', 'Product': 'VigilanTor', 'Versions': 'n/a'} |
CVE-2023-28046 |
Dell Display Manager, versions 2.1.0 and prior, contains an arbitrary file or folder deletion vulnerability during uninstallation A local low privilege attacker could potentially exploit this vulnerability, leading to the deletion of arbitrary files on the operating system with high privileges.
| https://www.dell.com/support/kbdoc/en-us/000211727/dsa-2023 | 2023-03-10T05:01:43.869Z | 2023-04-06T06:07:35.341Z | 2023-04-06T06:07:35.341Z | {'Vendor': 'Dell', 'Product': 'Dell Display Manager', 'Versions': '2.1.0 and prior'} |
CVE-2023-28553 | Information Disclosure in WLAN Host when processing WMI event command. | https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin | 2023-03-17T11:41:45.847Z | 2023-11-07T05:26:33.920Z | 2023-11-07T05:26:33.920Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, AR9380, CSR8811, CSRB31024, FastConnect 6200, FastConnect 6800, FastConnect 6900, FastConnect 7800, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, Immersive Home 3210 Platform, Immersive Home 326 Platform, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, QAM8295P, QCA4024, QCA6175A, QCA6391, QCA6426, QCA6436, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA7500, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9990, QCA9992, QCA9994, QCC2073, QCC2076, QCC710, QCF8000, QCN5022, QCN5024, QCN5052, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6112, QCN6122, QCN6132, QCN6224, QCN6274, QCN9000, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QFW7114, QFW7124, SA4150P, SA4155P, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8295P, SD865 5G, SDX55, SDX65M, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 695 5G Mobile Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR2130, WCD9340, WCD9370, WCD9375, WCD9380, WCD9385, WCN3980, WCN3988, WSA8810, WSA8815, WSA8830, WSA8835'} |
CVE-2023-28103 | matrix-react-sdk is a Matrix chat protocol SDK for React Javascript. In certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-react-sdk functionality, causing denial of service and potentially affecting program logic. This is fixed in matrix-react-sdk 3.69.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. Note this advisory is distinct from GHSA-2x9c-qwgf-94xr which refers to a similar issue. | https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-6g43-88cp-w5gv | 2023-03-10T18:34:29.226Z | 2023-03-28T20:37:24.288Z | 2023-03-28T20:37:24.288Z | {'Vendor': 'matrix-org', 'Product': 'matrix-react-sdk', 'Versions': '< 3.69.0'} |
CVE-2023-28800 | When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.
| https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows&applicable_version=3.7&deployment_date=2021-11-26&id=1386541 | 2023-03-23T18:29:15.802Z | 2023-06-22T19:15:55.258Z | 2023-06-22T19:15:55.258Z | {'Vendor': 'Zscaler', 'Product': 'Client Connector', 'Versions': '0'} |
CVE-2023-28729 | A type confusion vulnerability in Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files. | https://industry.panasonic.eu/factory-automation/programmable-logic-controllers-plc/plc-software/programming-software-control-fpwin-pro | 2023-03-22T05:49:11.016Z | 2023-07-21T06:05:26.585Z | 2023-07-21T06:05:26.585Z | {'Vendor': 'Panasonic', 'Product': 'Control FPWIN Pro', 'Versions': '7.6.0.3 and all previous versions'} |
CVE-2023-28379 | A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738 | 2023-03-24T16:13:50.759Z | 2023-11-14T09:14:52.070Z | 2023-11-14T18:00:06.109Z | {'Vendor': 'Silicon Labs', 'Product': 'Gecko Platform', 'Versions': '4.3.1.0'} |
CVE-2023-28683 | Jenkins Phabricator Differential Plugin 2.1.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2942 | 2023-03-20T19:59:08.758Z | 2023-03-23T11:26:10.324Z | 2023-10-24T12:49:29.693Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Phabricator Differential Plugin', 'Versions': '0'} |
CVE-2023-28050 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T05:01:43.871Z | 2023-06-23T10:25:56.877Z | 2023-06-23T10:25:56.877Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28400 | mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-06 | 2023-04-03T21:34:49.140Z | 2023-04-27T22:18:43.429Z | 2023-04-27T22:18:43.429Z | {'Vendor': 'mySCADA Technologies', 'Product': 'mySCADA myPRO', 'Versions': '0'} |
CVE-2023-28953 | IBM Cognos Analytics on Cloud Pak for Data 4.0 could allow an attacker to make system calls that might compromise the security of the containers due to misconfigured security context. IBM X-Force ID: 251465. | https://www.ibm.com/support/pages/node/7006413 | 2023-03-29T01:33:55.065Z | 2023-07-10T00:17:30.448Z | 2023-07-10T00:17:30.448Z | {'Vendor': 'IBM', 'Product': 'Cognos Analytics Cartridge for Cloud Pak for Data', 'Versions': '4.0'} |
CVE-2023-28115 | Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2. | https://github.com/KnpLabs/snappy/security/advisories/GHSA-gq6w-q6wh-jggc | 2023-03-10T18:34:29.228Z | 2023-03-17T21:15:25.113Z | 2023-03-17T21:15:25.113Z | {'Vendor': 'KnpLabs', 'Product': 'snappy', 'Versions': '< 1.4.2'} |
CVE-2023-28545 | Memory corruption in TZ Secure OS while loading an app ELF. | https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin | 2023-03-17T11:41:45.846Z | 2023-11-07T05:26:32.849Z | 2023-11-07T05:26:32.849Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QAMSRV1H, QCA4004, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCA9377, QCA9984, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN7606, QCN9011, QCN9012, QCN9024, QCS2290, QCS4290, QCS4490, QCS6490, QCS7230, QCS8250, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRB5165M, QRB5165N, QRU1032, QRU1052, QRU1062, QSM8250, QSM8350, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA6145P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8255P, SA8295P, SA8540P, SA8650P, SA9000P, SC8380XP, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD662, SD670, SD675, SD855, SD865 5G, SD888, SDX55, SDX57M, SG4150P, SG8275P, SM4125, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon X24 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SRV1H, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-28791 | Cross-Site Request Forgery (CSRF) vulnerability in Gangesh Matta Simple Org Chart plugin <= 2.3.4 versions. | https://patchstack.com/database/vulnerability/simple-org-chart/wordpress-simple-org-chart-plugin-2-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-03-23T17:03:15.168Z | 2023-10-06T13:01:43.555Z | 2023-10-06T13:01:43.555Z | {'Vendor': 'Gangesh Matta', 'Product': 'Simple Org Chart', 'Versions': 'n/a'} |
CVE-2023-28284 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28284 | 2023-03-13T22:23:36.184Z | 2023-04-11T19:12:59.192Z | 2023-04-14T21:27:45.189Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge', 'Versions': '1.0.0'} |
CVE-2023-28142 |
A Race Condition exists in the Qualys Cloud Agent for Windows
platform in versions from 3.1.3.34 and before 4.5.3.1. This allows attackers to
escalate privileges limited on the local machine during uninstallation of the
Qualys Cloud Agent for Windows. Attackers may gain SYSTEM level privileges on
that asset to run arbitrary commands.
At the time of this disclosure, versions before 4.0 are classified as End
of Life.
| https://www.qualys.com/security-advisories/ | 2023-03-10T21:23:28.797Z | 2023-04-18T15:51:58.344Z | 2023-04-18T15:51:58.344Z | {'Vendor': 'Qualys', 'Product': 'Cloud Agent', 'Versions': ' 3.1.3.34'} |
CVE-2023-28841 | Moby is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker*.
Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of SwarmKit and supporting network code.
The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of VXLAN, which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with the VXLAN metadata, including a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes.
Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the IPsec Encapsulating Security Payload protocol in Transport mode. By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption.
When setting an endpoint up on an encrypted overlay network, Moby installs three iptables (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN.
An iptables rule designates outgoing VXLAN datagrams with a VNI that corresponds to an encrypted overlay network for IPsec encapsulation.
Encrypted overlay networks on affected platforms silently transmit unencrypted data. As a result, `overlay` networks may appear to be functional, passing traffic as expected, but without any of the expected confidentiality or data integrity guarantees.
It is possible for an attacker sitting in a trusted position on the network to read all of the application traffic that is moving across the overlay network, resulting in unexpected secrets or user data disclosure. Thus, because many database protocols, internal APIs, etc. are not protected by a second layer of encryption, a user may use Swarm encrypted overlay networks to provide confidentiality, which due to this vulnerability this is no longer guaranteed.
Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16.
Some workarounds are available. Close the VXLAN port (by default, UDP port 4789) to outgoing traffic at the Internet boundary in order to prevent unintentionally leaking unencrypted traffic over the Internet, and/or ensure that the `xt_u32` kernel module is available on all nodes of the Swarm cluster. | https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237 | 2023-03-24T16:25:34.466Z | 2023-04-04T21:12:17.406Z | 2023-04-04T21:12:17.406Z | {'Vendor': 'moby', 'Product': 'moby', 'Versions': '>= 1.12.0, < 20.10.24, >= 23.0.0, < 23.0.3'} |
CVE-2023-28705 | Openfind Mail2000 has insufficient filtering special characters of email content of its content filtering function. A remote attacker can exploit this vulnerability using phishing emails that contain malicious web pages injected with JavaScript. When users access the system and open the email, it triggers an XSS (Reflected Cross-site scripting) attack. | https://www.twcert.org.tw/tw/cp-132-7158-751a6-1.html | 2023-03-21T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Openfind', 'Product': 'Mail2000', 'Versions': 'unspecified'} |
CVE-2023-28210 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | https://support.apple.com/en-us/HT213670 | 2023-03-13T18:37:25.758Z | 2023-09-06T01:36:30.560Z | 2023-09-06T01:36:30.560Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28640 | Apiman is a flexible and open source API Management platform. Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL, which includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names. Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security). Apiman 3.1.0.Final resolved this issue. Users are advised to upgrade. The only known workaround is to restrict account access.
| https://github.com/apiman/apiman/security/advisories/GHSA-m6f8-hjrv-mw5f | 2023-03-20T12:19:47.208Z | 2023-03-27T20:46:33.400Z | 2023-03-27T20:46:33.400Z | {'Vendor': 'apiman', 'Product': 'apiman', 'Versions': '< 3.1.0.Final'} |
CVE-2023-28569 | Information disclosure in WLAN HAL while handling command through WMI interfaces. | https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin | 2023-03-17T11:41:45.849Z | 2023-11-07T05:26:42.279Z | 2023-11-07T05:26:42.279Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, AR9380, CSR8811, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8069, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4024, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6428, QCA6430, QCA6438, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA7500, QCA8075, QCA8081, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9986, QCA9987, QCA9990, QCA9992, QCA9994, QCM4325, QCM4490, QCM6125, QCN5022, QCN5024, QCN5052, QCN5064, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6122, QCN6132, QCN7605, QCN7606, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS410, QCS4490, QCS610, QCS6125, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SC8180X+SDX55, SD 675, SD 8CX, SD460, SD662, SD670, SD675, SD730, SD835, SD855, SDX55, SG4150P, SM4125, SM6250, SM6250P, SM7250P, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28093 | A user with a compromised configuration can start an unsigned binary as a service. | https://support.pega.com/support-doc/pega-security-advisory-b23-robotics-and-workforce-intelligence-local-privilege | 2023-03-10T00:00:00 | 2023-04-10T00:00:00 | 2023-04-10T00:00:00 | {'Vendor': 'Pegasystems', 'Product': 'RPA: Synchronization Engine', 'Versions': '3.1.1, unspecified'} |
CVE-2023-28586 | Information disclosure when the trusted application metadata symbol addresses are accessed while loading an ELF in TEE. | https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin | 2023-03-17T11:41:45.853Z | 2023-12-05T03:03:55.223Z | 2023-12-05T03:03:55.223Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, AQT1000, AR8031, AR8035, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, FSM10056, Home Hub 100 Platform, Immersive Home 3210 Platform, Immersive Home 326 Platform, IPQ5332, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ9008, IPQ9554, IPQ9570, IPQ9574, MDM9205S, MDM9250, MDM9628, MDM9640, MDM9650, MSM8108, MSM8209, MSM8608, MSM8996AU, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA0000, QCA4004, QCA4024, QCA6174A, QCA6234, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9367, QCA9377, QCA9379, QCA9984, QCC710, QCF8000, QCF8001, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5052, QCN5121, QCN5122, QCN5152, QCN6023, QCN6024, QCN6224, QCN6274, QCN7605, QCN7606, QCN9000, QCN9011, QCN9012, QCN9013, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS5430, QCS610, QCS6125, QCS6490, QCS7230, QCS8155, QCS8250, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRB5165M, QRB5165N, QRU1032, QRU1052, QRU1062, QSM8250, QSM8350, QTS110, Qualcomm 205 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8770P, SA8775P, SA9000P, SC8180X+SDX55, SC8380XP, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD662, SD670, SD675, SD730, SD820, SD821, SD835, SD855, SD865 5G, SD888, SDX55, SDX57M, SDX65M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 820 Mobile Platform, Snapdragon 821 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon Auto 5G Modem-RF Gen 2, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon X12 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3660B, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-28302 | Microsoft Message Queuing Denial of Service Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28302 | 2023-03-13T22:23:36.189Z | 2023-04-11T19:14:00.461Z | 2023-12-14T18:59:58.558Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28617 | org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters. | https://list.orgmode.org/tencent_04CF842704737012CCBCD63CD654DD41CA0A%40qq.com/T/#m6ef8e7d34b25fe17b4cbb655b161edce18c6655e | 2023-03-19T00:00:00 | 2023-03-19T00:00:00 | 2023-10-12T12:06:14.951878 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28247 | Windows Network File System Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28247 | 2023-03-13T22:18:32.388Z | 2023-04-11T19:13:47.610Z | 2023-12-14T18:59:46.054Z | {'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'} |
CVE-2023-28181 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.6 and iPadOS 15.7.6, macOS Monterey 12.6.4, macOS Big Sur 11.7.7, tvOS 16.4, watchOS 9.4. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213670 | 2023-03-13T00:00:00 | 2023-05-08T00:00:00 | 2023-07-27T03:46:02.701Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28882 | Trustwave ModSecurity 3.0.5 through 3.0.8 before 3.0.9 allows a denial of service (worker crash and unresponsiveness) because some inputs cause a segfault in the Transaction class for some configurations. | https://www.trustwave.com/en-us/resources/security-resources/software-updates/announcing-modsecurity-version-309/ | 2023-03-27T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28314 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28314 | 2023-03-13T22:23:36.192Z | 2023-04-11T19:13:23.485Z | 2023-12-14T18:59:22.035Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Dynamics 365 (on-premises) version 9.0', 'Versions': '9.0.0'} |
CVE-2023-28744 | A use-after-free vulnerability exists in the JavaScript engine of Foxit Software's PDF Reader, version 12.1.1.15289. A specially crafted PDF document can trigger the reuse of previously freed memory by manipulating form fields of a specific type. This can lead to memory corruption and arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1739 | 2023-03-28T16:21:44.980Z | 2023-07-19T13:16:38.150Z | 2023-07-19T17:00:09.181Z | {'Vendor': 'Foxit', 'Product': 'Foxit Reader', 'Versions': '12.1.1.15289'} |
CVE-2023-28251 | Windows Driver Revocation List Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28251 | 2023-03-13T22:18:32.389Z | 2023-05-09T17:03:07.801Z | 2023-12-14T19:06:17.501Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28601 | Zoom for Windows clients prior to 5.14.0 contain an improper restriction of operations within the bounds of a memory buffer vulnerability. A malicious user may alter protected Zoom Client memory buffer potentially causing integrity issues within the Zoom Client. | https://explore.zoom.us/en/trust/security/security-bulletin/ | 2023-03-17T13:27:32.368Z | 2023-06-13T17:05:58.289Z | 2023-06-13T18:53:16.672Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for Windows Client', 'Versions': 'before 5.14.0'} |
CVE-2023-28528 | IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the invscout command to execute arbitrary commands. IBM X-Force ID: 251207. | https://www.ibm.com/support/pages/node/6983232 | 2023-03-16T21:05:56.576Z | 2023-04-28T02:06:06.829Z | 2023-04-28T02:06:06.829Z | {'Vendor': 'IBM', 'Product': 'AIX', 'Versions': '7.1, 7.2, 7.3, VIOS 3.1'} |
CVE-2023-28178 | A logic issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Monterey 12.6.4, tvOS 16.4, watchOS 9.4. An app may be able to bypass Privacy preferences. | https://support.apple.com/en-us/HT213670 | 2023-03-13T00:00:00 | 2023-05-08T00:00:00 | 2023-07-27T03:46:03.182Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28482 | An issue was discovered in Tigergraph Enterprise 3.7.0. A single TigerGraph instance can host multiple graphs that are accessed by multiple different users. The TigerGraph platform does not protect the confidentiality of any data uploaded to the remote server. In this scenario, any user that has permissions to upload data can browse data uploaded by any other user (irrespective of their permissions). | https://neo4j.com/security/cve-2023-28482/ | 2023-03-16T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28197 | An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to access user-sensitive data. | https://support.apple.com/en-us/HT213670 | 2023-03-13T18:37:25.757Z | 2024-01-10T22:03:27.667Z | 2024-01-10T22:03:27.667Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28713 | Plaintext storage of a password exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. Because account information of the database is saved in a local file in plaintext, a user who can access the PC where the affected product is installed can obtain the information. As a result, information in the database may be obtained and/or altered by the user. | https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf | 2023-05-11T00:00:00 | 2023-06-01T00:00:00 | 2023-06-01T00:00:00 | {'Vendor': 'Contec Co., Ltd.', 'Product': 'CONPROSYS HMI System (CHS)', 'Versions': 'versions prior to 3.5.3'} |
CVE-2023-28343 | OS command injection affects Altenergy Power Control Software C1.2.5 via shell metacharacters in the index.php/management/set_timezone timezone parameter, because of set_timezone in models/management_model.php. | https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/os_command_injection.md | 2023-03-14T00:00:00 | 2023-03-14T00:00:00 | 2023-04-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28656 |
NGINX Management Suite may allow an authenticated attacker to gain access to configuration objects outside of their assigned environment.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| https://my.f5.com/manage/s/article/K000133417 | 2023-04-14T23:08:02.609Z | 2023-05-03T14:34:11.577Z | 2023-05-03T14:34:11.577Z | {'Vendor': 'F5', 'Product': 'NGINX Instance Manager', 'Versions': '2.0.0'} |
CVE-2023-28206 | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. | https://support.apple.com/en-us/HT213723 | 2023-03-13T00:00:00 | 2023-04-10T00:00:00 | 2023-07-27T03:46:03.649Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-28986 | Cross-Site Request Forgery (CSRF) vulnerability in wp.Insider, wpaffiliatemgr Affiliates Manager plugin <= 2.9.20 versions. | https://patchstack.com/database/vulnerability/affiliates-manager/wordpress-affiliates-manager-plugin-2-9-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-03-29T12:14:35.691Z | 2023-07-10T15:05:41.452Z | 2023-07-10T15:05:41.452Z | {'Vendor': 'wp.insider, wpaffiliatemgr', 'Product': 'Affiliates Manager', 'Versions': 'n/a'} |
CVE-2023-28085 | An HPE OneView Global Dashboard (OVGD) appliance dump may expose OVGD user account credentials | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04468en_us | 2023-03-10T14:47:44.212Z | 2023-04-14T14:22:24.896Z | 2023-04-14T14:22:24.896Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView Global Dashboard', 'Versions': '0'} |
CVE-2023-28291 | Raw Image Extension Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28291 | 2023-03-13T22:23:36.187Z | 2023-04-11T19:13:18.787Z | 2023-12-14T18:59:17.309Z | {'Vendor': 'Microsoft', 'Product': 'Raw Image Extension', 'Versions': '2.1.0.0, 2.1.0.0'} |
CVE-2023-28784 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Contest Gallery plugin <= 21.1.2 versions. | https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-21-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-23T17:03:15.168Z | 2023-06-22T11:21:07.805Z | 2023-06-22T11:21:07.805Z | {'Vendor': 'Contest Gallery', 'Product': 'Contest Gallery', 'Versions': 'n/a'} |
CVE-2023-28507 | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a memory-exhaustion issue, where a decompression routine will allocate increasing amounts of memory until all system memory is exhausted and the forked process crashes. | https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | 2023-03-16T20:44:20.346Z | 2023-03-29T20:15:41.119Z | 2023-03-29T20:15:41.119Z | {'Vendor': 'Rocket Software', 'Product': 'UniData', 'Versions': '0'} |
CVE-2023-28854 | nophp is a PHP web framework. Prior to version 0.0.1, nophp is vulnerable to shell command injection on httpd user. A patch was made available at commit e5409aa2d441789cbb35f6b119bef97ecc3986aa on 2023-03-30. Users should update index.php to 2023-03-30 or later or, as a workaround, add a function such as `env_patchsample230330.php` to env.php. | https://github.com/paijp/nophp/security/advisories/GHSA-9858-q3c2-9wwm | 2023-03-24T16:25:34.468Z | 2023-04-03T17:55:56.789Z | 2023-04-03T17:55:56.789Z | {'Vendor': 'paijp', 'Product': 'nophp', 'Versions': '< 0.0.1'} |
CVE-2023-28012 | HCL BigFix Mobile is vulnerable to a command injection attack. An authenticated attacker could run arbitrary shell commands on the WebUI server.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106372 | 2023-03-10T03:50:27.023Z | 2023-07-26T23:12:18.749Z | 2023-07-27T00:05:49.304Z | {'Vendor': 'HCL Software ', 'Product': 'HCL BigFix Mobile', 'Versions': '3.0'} |
CVE-2023-28442 | GeoNode is an open source platform that facilitates the creation, sharing, and collaborative use of geospatial data. Prior to versions 2.20.6, 2.19.6, and 2.18.7, anonymous users can obtain sensitive information about GeoNode configurations from the response of the `/geoserver/rest/about/status` Geoserver REST API endpoint. The Geoserver endpoint is secured by default, but the configuration of Geoserver for GeoNode opens a list of REST endpoints to support some of its public-facing services. The vulnerability impacts both GeoNode 3 and GeoNode 4 instances.
Geoserver security configuration is provided by `geoserver-geonode-ext`. A patch for 2.20.7 has been released which blocks access to the affected endpoint. The patch has been backported to branches 2.20.6, 2.19.7, 2.19.6, and 2.18.7. All the published artifacts and Docker images have been updated accordingly. A more advanced patch has been applied to the master and development versions, which require some changes to GeoNode code. They will be available with the next 4.1.0 release. The patched configuration only has an effect on new deployments. For existing setups, the patch must be applied manually inside the Geoserver data directory. The patched file must replace the existing `<geoserver_datadir>/security/rest.properties` file. | https://github.com/GeoNode/geonode/security/advisories/GHSA-87mh-vw7c-5v6w | 2023-03-15T15:59:10.055Z | 2023-03-23T23:10:49.688Z | 2023-03-23T23:10:49.688Z | {'Vendor': 'GeoNode', 'Product': 'geonode', 'Versions': '>= 2.20.0, < 2.20.6, >= 2.19.0, < 2.19.6, < 2.18.7'} |
CVE-2023-28696 | Cross-Site Request Forgery (CSRF) vulnerability in Harish Chouhan, Themeist I Recommend Tplugin <= 3.9.0 versions. | https://patchstack.com/database/vulnerability/i-recommend-this/wordpress-i-recommend-this-plugin-3-8-3-cross-site-request-forgery-csrf?_s_id=cve | 2023-03-21T07:14:41.939Z | 2023-11-12T21:40:12.162Z | 2023-11-12T21:40:12.162Z | {'Vendor': 'Harish Chouhan, Themeist', 'Product': 'I Recommend This', 'Versions': 'n/a'} |
CVE-2023-28229 | Windows CNG Key Isolation Service Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229 | 2023-03-13T22:18:32.384Z | 2023-04-11T19:13:37.417Z | 2023-12-14T18:59:36.116Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28679 | Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2813 | 2023-03-20T19:59:08.757Z | 2023-03-23T11:26:07.445Z | 2023-10-24T12:49:25.049Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Mashup Portlets Plugin', 'Versions': '0'} |
CVE-2023-28803 | An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
| https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 | 2023-03-23T18:29:15.803Z | 2023-10-23T13:32:17.505Z | 2023-10-23T13:32:17.505Z | {'Vendor': 'Zscaler', 'Product': 'Client Connector', 'Versions': '0'} |
CVE-2023-28550 | Memory corruption in MPP performance while accessing DSM watermark using external memory address. | https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin | 2023-03-17T11:41:45.846Z | 2023-12-05T03:03:48.538Z | 2023-12-05T03:03:48.538Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, 9206 LTE Modem, 9207 LTE Modem, APQ8017, APQ8037, AQT1000, AR8031, AR8035, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, FSM10055, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ5010, IPQ6010, IPQ6018, IPQ6028, IPQ8070, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, MDM8207, MDM9205S, MDM9230, MDM9250, MDM9330, MDM9628, MDM9630, MDM9640, MSM8108, MSM8209, MSM8608, MSM8909W, MSM8996AU, PMP8074, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA2062, QCA2064, QCA2065, QCA2066, QCA4004, QCA4024, QCA6174, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8337, QCA9367, QCA9377, QCA9888, QCA9889, QCA9984, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6224, QCN6274, QCN7605, QCN7606, QCN9000, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCS2290, QCS410, QCS4290, QCS4490, QCS5430, QCS610, QCS6125, QCS6490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, QSM8350, QTS110, Qualcomm 205 Mobile Platform, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8770P, SA8775P, SA9000P, SC8180X+SDX55, SC8380XP, SD 455, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD626, SD660, SD662, SD670, SD675, SD730, SD820, SD835, SD855, SD865 5G, SD888, SDM429W, SDX55, SDX57M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 1100 Wearable Platform, Snapdragon 1200 Wearable Platform, Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon Auto 5G Modem-RF, Snapdragon Auto 5G Modem-RF Gen 2, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon Wear 2100 Platform, Snapdragon Wear 2500 Platform, Snapdragon Wear 3100 Platform, Snapdragon Wear 4100+ Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X5 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, SXR2230P, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-28100 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4 contain a vulnerability similar to CVE-2017-5226, but using the `TIOCLINUX` ioctl command instead of `TIOCSTI`. If a Flatpak app is run on a Linux virtual console such as `/dev/tty1`, it can copy text from the virtual console and paste it into the command buffer, from which the command might be run after the Flatpak app has exited. Ordinary graphical terminal emulators like xterm, gnome-terminal and Konsole are unaffected. This vulnerability is specific to the Linux virtual consoles `/dev/tty1`, `/dev/tty2` and so on. A patch is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, don't run Flatpak on a Linux virtual console. Flatpak is primarily designed to be used in a Wayland or X11 graphical environment. | https://github.com/flatpak/flatpak/security/advisories/GHSA-7qpw-3vjv-xrqp | 2023-03-10T18:34:29.226Z | 2023-03-16T15:51:32.037Z | 2023-03-16T15:51:32.037Z | {'Vendor': 'flatpak', 'Product': 'flatpak', 'Versions': '< 1.10.8, >= 1.12.0, < 1.12.8, >= 1.14.0, < 1.14.4, >= 1.15.0, < 1.15.4'} |
CVE-2023-28415 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in XootiX Side Cart Woocommerce (Ajax) plugin <= 2.2 versions. | https://patchstack.com/database/vulnerability/side-cart-woocommerce/wordpress-side-cart-woocommerce-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-15T12:35:19.371Z | 2023-08-30T15:31:01.028Z | 2023-08-30T15:31:01.028Z | {'Vendor': 'XootiX', 'Product': 'Side Cart Woocommerce (Ajax)', 'Versions': 'n/a'} |
CVE-2023-28045 |
Dell CloudIQ Collector version 1.10.2 contains a missing encryption of sensitive data vulnerability. An attacker with low privileges could potentially exploit this vulnerability, leading to gain access to unauthorized data. | https://www.dell.com/support/kbdoc/en-us/000213696/dsa-2023-165-dell-cloudiq-collector-security-update-for-missing-encryption-of-sensitive-data-vulnerability | 2023-03-10T04:59:39.427Z | 2023-05-19T08:35:58.535Z | 2023-05-19T08:35:58.535Z | {'Vendor': 'Dell', 'Product': 'CloudIQ Collector', 'Versions': '1.10.2'} |
CVE-2023-28680 | Jenkins Crap4J Plugin 0.9 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2925 | 2023-03-20T19:59:08.757Z | 2023-03-23T11:26:08.166Z | 2023-10-24T12:49:26.189Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Crap4J Plugin', 'Versions': '0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.