CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-28395
Osprey Pump Controller version 1.01 is vulnerable to a weak session token generation algorithm that can be predicted and can aid in authentication and authorization bypass. This may allow an attacker to hijack a session by predicting the session id and gain unauthorized access to the product.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06
2023-03-21T21:17:06.865Z
2023-03-28T19:59:29.953Z
2023-03-28T19:59:29.953Z
{'Vendor': 'ProPump and Controls, Inc.', 'Product': 'Osprey Pump Controller', 'Versions': '1.01'}
CVE-2023-28116
Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an out-of-bounds write can occur in the BLE L2CAP module of the Contiki-NG operating system. The network stack of Contiki-NG uses a global buffer (packetbuf) for processing of packets, with the size of PACKETBUF_SIZE. In particular, when using the BLE L2CAP module with the default configuration, the PACKETBUF_SIZE value becomes larger then the actual size of the packetbuf. When large packets are processed by the L2CAP module, a buffer overflow can therefore occur when copying the packet data to the packetbuf. The vulnerability has been patched in the "develop" branch of Contiki-NG, and will be included in release 4.9. The problem can be worked around by applying the patch manually.
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-m737-4vx6-pfqp
2023-03-10T18:34:29.228Z
2023-03-17T21:22:54.703Z
2023-03-17T21:22:54.703Z
{'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'}
CVE-2023-28546
Memory Corruption in SPS Application while exporting public key in sorter TA.
https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin
2023-03-17T11:41:45.846Z
2023-12-05T03:03:46.993Z
2023-12-05T03:03:46.993Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, APQ8017, APQ8037, APQ8064AU, AQT1000, AR8031, AR8035, C-V2X 9150, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Home Hub 100 Platform, MDM9205S, MDM9640, MDM9650, MSM8996AU, PM8937, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA4004, QCA6174A, QCA6234, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCA9379, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN7606, QCN9011, QCN9012, QCN9024, QCN9074, QCS2290, QCS410, QCS4290, QCS4490, QCS5430, QCS610, QCS6125, QCS6490, QCS7230, QCS8155, QCS8250, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRB5165M, QRB5165N, QRU1032, QRU1052, QRU1062, QSM8250, QSM8350, QTS110, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8770P, SA8775P, SA9000P, SC8180X+SDX55, SC8380XP, SD 455, SD 675, SD 8 Gen1 5G, SD460, SD626, SD660, SD662, SD670, SD675, SD730, SD820, SD821, SD835, SD855, SD865 5G, SD888, SDM429W, SDX55, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 427 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 435 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 450 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 625 Mobile Platform, Snapdragon 626 Mobile Platform, Snapdragon 630 Mobile Platform, Snapdragon 632 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 820 Mobile Platform, Snapdragon 821 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon Auto 5G Modem-RF Gen 2, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-28950
IBM MQ 8.0, 9.0, 9.1, 9.2, and 9.3 could disclose sensitive user information from a trace file if that functionality has been enabled. IBM X-Force ID: 251358.
https://https://www.ibm.com/support/pages/node/6985837
2023-03-29T01:33:55.064Z
2023-05-19T15:20:50.476Z
2023-05-19T15:20:50.476Z
{'Vendor': 'IBM', 'Product': 'MQ', 'Versions': '8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.2 CD, 9.3 LTS, 9.3 CD'}
CVE-2023-28053
Dell NetWorker Virtual Edition versions 19.8 and below contain the use of deprecated cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to some information disclosure.
https://www.dell.com/support/kbdoc/en-us/000220547/dsa-2023-358-security-update-for-dell-networker-virtual-edition-ssh-cryptographic-vulnerabilities
2023-03-10T05:01:43.872Z
2023-12-18T11:30:11.738Z
2023-12-18T11:30:11.738Z
{'Vendor': 'Dell', 'Product': 'NetWorker Virtual Edition', 'Versions': 'Versions 19.9 through 19.9.0.2, Versions 19.8 through 19.8.0.3, Versions 19.7 through 19.7.0.5, Version 19.7.1, Versions Prior to 19.7'}
CVE-2023-28287
Microsoft Publisher Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287
2023-03-13T22:23:36.185Z
2023-06-17T00:29:14.218Z
2023-12-14T18:59:16.234Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Publisher 2016', 'Versions': '16.0.0'}
CVE-2023-28268
Netlogon RPC Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28268
2023-03-13T22:23:36.181Z
2023-04-11T19:13:45.472Z
2023-12-14T18:59:43.875Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-28792
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Continuous Image Carousel With Lightbox plugin <= 1.0.15 versions.
https://patchstack.com/database/vulnerability/continuous-image-carousel-with-lightbox/wordpress-continuous-image-carousel-with-lightbox-plugin-1-0-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-23T17:03:15.168Z
2023-04-07T14:00:46.304Z
2023-04-07T14:00:46.304Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'Continuous Image Carousel With Lightbox', 'Versions': 'n/a'}
CVE-2023-28638
Snappier is a high performance C# implementation of the Snappy compression algorithm. This is a buffer overrun vulnerability that can affect any user of Snappier 1.1.0. In this release, much of the code was rewritten to use byte references rather than pointers to pinned buffers. This change generally improves performance and reduces workload on the garbage collector. However, when the garbage collector performs compaction and rearranges memory, it must update any byte references on the stack to refer to the updated location. The .NET garbage collector can only update these byte references if they still point within the buffer or to a point one byte past the end of the buffer. If they point outside this area, the buffer itself may be moved while the byte reference stays the same. There are several places in 1.1.0 where byte references very briefly point outside the valid areas of buffers. These are at locations in the code being used for buffer range checks. While the invalid references are never dereferenced directly, if a GC compaction were to occur during the brief window when they are on the stack then it could invalidate the buffer range check and allow other operations to overrun the buffer. This should be very difficult for an attacker to trigger intentionally. It would require a repetitive bulk attack with the hope that a GC compaction would occur at precisely the right moment during one of the requests. However, one of the range checks with this problem is a check based on input data in the decompression buffer, meaning malformed input data could be used to increase the chance of success. Note that any resulting buffer overrun is likely to cause access to protected memory, which will then cause an exception and the process to be terminated. Therefore, the most likely result of an attack is a denial of service. This issue has been patched in release 1.1.1. Users are advised to upgrade. Users unable to upgrade may pin buffers to a fixed location before using them for compression or decompression to mitigate some, but not all, of these cases. At least one temporary decompression buffer is internal to the library and never pinned.
https://github.com/brantburnett/Snappier/security/advisories/GHSA-838x-pcvx-6p5w
2023-03-20T12:19:47.208Z
2023-03-27T20:43:20.431Z
2023-03-27T20:43:20.431Z
{'Vendor': 'brantburnett', 'Product': 'Snappier', 'Versions': '= 1.1.0'}
CVE-2023-28842
Moby) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as moby/moby is commonly referred to as *Docker*. Swarm Mode, which is compiled in and delivered by default in `dockerd` and is thus present in most major Moby downstreams, is a simple, built-in container orchestrator that is implemented through a combination of SwarmKit and supporting network code. The `overlay` network driver is a core feature of Swarm Mode, providing isolated virtual LANs that allow communication between containers and services across the cluster. This driver is an implementation/user of VXLAN, which encapsulates link-layer (Ethernet) frames in UDP datagrams that tag the frame with the VXLAN metadata, including a VXLAN Network ID (VNI) that identifies the originating overlay network. In addition, the overlay network driver supports an optional, off-by-default encrypted mode, which is especially useful when VXLAN packets traverses an untrusted network between nodes. Encrypted overlay networks function by encapsulating the VXLAN datagrams through the use of the IPsec Encapsulating Security Payload protocol in Transport mode. By deploying IPSec encapsulation, encrypted overlay networks gain the additional properties of source authentication through cryptographic proof, data integrity through check-summing, and confidentiality through encryption. When setting an endpoint up on an encrypted overlay network, Moby installs three iptables (Linux kernel firewall) rules that enforce both incoming and outgoing IPSec. These rules rely on the `u32` iptables extension provided by the `xt_u32` kernel module to directly filter on a VXLAN packet's VNI field, so that IPSec guarantees can be enforced on encrypted overlay networks without interfering with other overlay networks or other users of VXLAN. The `overlay` driver dynamically and lazily defines the kernel configuration for the VXLAN network on each node as containers are attached and detached. Routes and encryption parameters are only defined for destination nodes that participate in the network. The iptables rules that prevent encrypted overlay networks from accepting unencrypted packets are not created until a peer is available with which to communicate. Encrypted overlay networks silently accept cleartext VXLAN datagrams that are tagged with the VNI of an encrypted overlay network. As a result, it is possible to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams. The implications of this can be quite dire, and GHSA-vwm3-crmr-xfxw should be referenced for a deeper exploration. Patches are available in Moby releases 23.0.3, and 20.10.24. As Mirantis Container Runtime's 20.10 releases are numbered differently, users of that platform should update to 20.10.16. Some workarounds are available. In multi-node clusters, deploy a global ‘pause’ container for each encrypted overlay network, on every node. For a single-node cluster, do not use overlay networks of any sort. Bridge networks provide the same connectivity on a single node and have no multi-node features. The Swarm ingress feature is implemented using an overlay network, but can be disabled by publishing ports in `host` mode instead of `ingress` mode (allowing the use of an external load balancer), and removing the `ingress` network. If encrypted overlay networks are in exclusive use, block UDP port 4789 from traffic that has not been validated by IPSec.
https://github.com/moby/moby/security/advisories/GHSA-6wrf-mxfj-pf5p
2023-03-24T16:25:34.466Z
2023-04-04T21:07:27.575Z
2023-04-04T21:07:27.575Z
{'Vendor': 'moby', 'Product': 'moby', 'Versions': '>= 1.12.0, < 20.10.24, >= 23.0.0, < 23.0.3'}
CVE-2023-28141
An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded to the time of installation/uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life.
https://www.qualys.com/security-advisories/
2023-03-10T21:23:28.797Z
2023-04-18T15:50:19.411Z
2023-04-19T17:51:24.456Z
{'Vendor': 'Qualys', 'Product': 'Cloud Agent', 'Versions': '3.1.3.34'}
CVE-2023-28004
A CWE-129: Improper validation of an array index vulnerability exists where a specially crafted Ethernet request could result in denial of service or remote code execution.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-073-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-073-02.pdf
2023-03-09T15:40:32.544Z
2023-04-18T21:16:01.333Z
2023-04-18T21:16:01.333Z
{'Vendor': 'Schneider Electric', 'Product': 'PowerLogic HDPM6000', 'Versions': 'V0.58.6'}
CVE-2023-28213
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.
https://support.apple.com/en-us/HT213670
2023-03-13T18:37:25.759Z
2023-09-06T01:36:32.556Z
2023-09-06T01:36:32.556Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-28643
Nextcloud server is an open source home cloud implementation. In affected versions when a recipient receives 2 shares with the same name, while a memory cache is configured, the second share will replace the first one instead of being renamed to `{name} (2)`. It is recommended that the Nextcloud Server is upgraded to 25.0.3 or 24.0.9. Users unable to upgrade should avoid sharing 2 folders with the same name to the same user.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-hhq4-4pr8-wm27
2023-03-20T12:19:47.209Z
2023-03-30T18:31:31.609Z
2023-03-30T18:31:31.609Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 24.0.9, >= 25.0.0, < 25.0.3'}
CVE-2023-28356
A vulnerability has been identified where a maliciously crafted message containing a specific chain of characters can cause the chat to enter a hot loop on one of the processes, consuming ~120% CPU and rendering the service unresponsive.
https://hackerone.com/reports/1461340
2023-03-15T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'Rocket.Chat', 'Versions': 'This issue has been fixed in version 6.0> and is backported for the supported versions. Check this document for more info: https://docs.rocket.chat/resources/get-support/enterprise-support#rocket.chat-versions'}
CVE-2023-28706
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Software Foundation Apache Airflow Hive Provider.This issue affects Apache Airflow Hive Provider: before 6.0.0.
https://github.com/apache/airflow/pull/30212
2023-03-21T15:23:53.219Z
2023-04-07T14:54:37.177Z
2023-06-12T14:15:45.838Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow Hive Provider', 'Versions': '0'}
CVE-2023-28585
Memory corruption while loading an ELF segment in TEE Kernel.
https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin
2023-03-17T11:41:45.853Z
2023-12-05T03:03:53.662Z
2023-12-05T03:03:53.662Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, AQT1000, AR8031, AR8035, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, FSM10056, Immersive Home 3210 Platform, Immersive Home 326 Platform, IPQ5332, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ9008, IPQ9554, IPQ9570, IPQ9574, MDM9205S, QAM8255P, QAM8295P, QAM8650P, QAM8775P, QCA0000, QCA4004, QCA4024, QCA6174A, QCA6310, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9377, QCA9984, QCC710, QCF8000, QCF8001, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5052, QCN5121, QCN5122, QCN5152, QCN6023, QCN6024, QCN6224, QCN6274, QCN7606, QCN9000, QCN9011, QCN9012, QCN9013, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS5430, QCS610, QCS6125, QCS6490, QCS7230, QCS8155, QCS8250, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRB5165M, QRB5165N, QRU1032, QRU1052, QRU1062, QSM8250, QSM8350, QTS110, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8540P, SA8770P, SA8775P, SA9000P, SC8180X+SDX55, SC8380XP, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD662, SD670, SD675, SD730, SD855, SD865 5G, SD888, SDX55, SDX57M, SDX65M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon Auto 5G Modem-RF Gen 2, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon X24 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-28993
Unauth.  Reflected Cross-Site Scripting (XSS) vulnerability in Ignazio Scimone Albo Pretorio On Line plugin <= 4.6.1 versions.
https://patchstack.com/database/vulnerability/albo-pretorio-on-line/wordpress-albo-pretorio-on-line-plugin-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-29T12:14:55.899Z
2023-04-07T11:26:59.877Z
2023-04-07T11:26:59.877Z
{'Vendor': 'Ignazio Scimone', 'Product': 'Albo Pretorio On line', 'Versions': 'n/a'}
CVE-2023-28839
Shoppingfeed PrestaShop is an add-on to the PrestaShop ecommerce platform to synchronize data. The module Shoppingfeed for PrestaShop is vulnerable to SQL injection between version 1.4.0 and 1.8.2 due to a lack of input sanitization. This issue has been addressed in version 1.8.3. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/shoppingflux/module-prestashop/security/advisories/GHSA-vfmq-w777-qvcf
2023-03-24T16:25:34.466Z
2023-04-18T20:44:55.733Z
2023-04-18T20:44:55.733Z
{'Vendor': 'shoppingflux', 'Product': 'module-prestashop', 'Versions': '>= 1.4.0, < 1.8.3'}
CVE-2023-28090
An HPE OneView appliance dump may expose SNMPv3 read credentials
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04469en_us
2023-03-10T14:47:44.212Z
2023-04-25T18:45:35.090Z
2023-04-25T19:04:07.675Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '0, 0'}
CVE-2023-28614
Freewill iFIS (aka SMART Trade) 20.01.01.04 allows OS Command Injection via shell metacharacters to a report page.
https://www.freewillsolutions.com/smart-trade-ifis
2023-03-18T00:00:00
2023-09-15T00:00:00
2023-09-15T16:48:31.350675
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28244
Windows Kerberos Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28244
2023-03-13T22:18:32.388Z
2023-04-11T19:13:44.939Z
2023-12-14T18:59:43.373Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-28751
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Wpmet Wp Ultimate Review plugin <= 2.0.3 versions.
https://patchstack.com/database/vulnerability/wp-ultimate-review/wordpress-wp-ultimate-review-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-22T16:47:14.448Z
2023-06-23T12:26:27.148Z
2023-06-23T12:26:27.148Z
{'Vendor': 'Wpmet', 'Product': 'Wp Ultimate Review', 'Versions': 'n/a'}
CVE-2023-28301
Microsoft Edge (Chromium-based) Tampering Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28301
2023-03-13T22:23:36.189Z
2023-04-11T19:13:00.864Z
2023-12-14T18:59:58.038Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Edge for Android', 'Versions': '1.0.0'}
CVE-2023-28028
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T04:57:40.870Z
2023-06-23T09:56:11.813Z
2023-06-23T09:56:11.813Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28478
TP-Link EC-70 devices through 2.3.4 Build 20220902 rel.69498 have a Buffer Overflow.
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0006.md
2023-03-15T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28182
The issue was addressed with improved authentication. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. A user in a privileged network position may be able to spoof a VPN server that is configured with EAP-only authentication on a device.
https://support.apple.com/en-us/HT213670
2023-03-13T00:00:00
2023-05-08T00:00:00
2023-07-27T03:46:07.133Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-28497
Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Slideshow Gallery LITE plugin <= 1.7.6 versions.
https://patchstack.com/database/vulnerability/slideshow-gallery/wordpress-slideshow-gallery-lite-plugin-1-7-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-03-16T11:18:18.237Z
2023-11-12T22:01:56.040Z
2023-11-12T22:01:56.040Z
{'Vendor': 'Tribulant', 'Product': 'Slideshow Gallery LITE', 'Versions': 'n/a'}
CVE-2023-28252
Windows Common Log File System Driver Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252
2023-03-13T22:18:32.389Z
2023-04-11T19:13:51.886Z
2023-12-14T18:59:50.258Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28602
Zoom for Windows clients prior to 5.13.5 contain an improper verification of cryptographic signature vulnerability. A malicious user may potentially downgrade Zoom Client components to previous versions.
https://explore.zoom.us/en/trust/security/security-bulletin/
2023-03-17T13:27:32.368Z
2023-06-13T17:30:07.510Z
2023-06-13T18:53:34.369Z
{'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for Windows Client', 'Versions': 'before 5.13.5'}
CVE-2023-28317
A vulnerability has been discovered in Rocket.Chat, where editing messages can change the original timestamp, causing the UI to display messages in an incorrect order.
https://hackerone.com/reports/1379635
2023-03-14T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'Rocket.Chat', 'Versions': 'This issue has been fixed in version 6.0> and is backported for the supported versions. Check this document for more info: https://docs.rocket.chat/resources/get-support/enterprise-support#rocket.chat-versions'}
CVE-2023-28747
Cross-Site Request Forgery (CSRF) vulnerability in codeboxr CBX Currency Converter plugin <= 3.0.3 versions.
https://patchstack.com/database/vulnerability/cbcurrencyconverter/wordpress-cbx-currency-converter-plugin-3-0-3-cross-site-request-forgery-csrf?_s_id=cve
2023-03-22T16:47:14.447Z
2023-11-22T13:06:31.080Z
2023-11-22T13:06:31.080Z
{'Vendor': 'codeboxr', 'Product': 'CBX Currency Converter', 'Versions': 'n/a'}
CVE-2023-28194
The issue was addressed with improved checks. This issue is fixed in iOS 16.4 and iPadOS 16.4. An app may be able to unexpectedly create a bookmark on the Home Screen.
https://support.apple.com/en-us/HT213676
2023-03-13T00:00:00
2023-05-08T00:00:00
2023-07-27T03:46:08.067Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-28897
The secret value used for access to critical UDS services of the MIB3 infotainment is hardcoded in the firmware. Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022.
https://asrg.io/security-advisories/cve-2023-28897
2023-03-27T14:51:13.968Z
2024-01-12T15:55:00.234Z
2024-01-12T15:55:00.234Z
{'Vendor': 'PREH GMBH', 'Product': 'MIB3 Infotainment Unit', 'Versions': '0'}
CVE-2023-28481
An issue was discovered in Tigergraph Enterprise 3.7.0. There is unsecured write access to SSH authorized keys file. Any code running as the tigergraph user is able to add their SSH public key into the authorised keys file. This allows an attacker to obtain password-less SSH key access by using their own SSH key.
https://neo4j.com/security/cve-2023-28481/
2023-03-16T00:00:00
2023-08-14T00:00:00
2023-08-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28655
A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03
2023-03-20T14:52:02.992Z
2023-03-27T19:38:44.049Z
2023-03-27T19:38:44.049Z
{'Vendor': 'SAUTER', 'Product': 'EY-AS525F001 with moduWeb', 'Versions': 'all versions'}
CVE-2023-28205
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
https://support.apple.com/en-us/HT213723
2023-03-13T00:00:00
2023-04-10T00:00:00
2023-07-27T03:46:09.018Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-28710
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Spark Provider.This issue affects Apache Airflow Spark Provider: before 4.0.1.
https://github.com/apache/airflow/pull/30223
2023-03-21T20:08:27.179Z
2023-04-07T14:55:44.450Z
2023-06-12T14:16:06.937Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow Spark Provider', 'Versions': '0'}
CVE-2023-28340
Zoho ManageEngine Applications Manager through 16320 allows the admin user to conduct an XXE attack.
https://manageengine.com
2023-03-14T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28069
Dell Streaming Data Platform prior to 1.4 contains Open Redirect vulnerability. A remote unauthenticated attacker can phish the legitimate user to redirect to malicious website leading to information disclosure and launch of phishing attacks.
https://www.dell.com/support/kbdoc/en-us/000204266/dsa-2022-258-dell-streaming-data-platform-security-update-for-multiple-third-party-component-vulnerabilities
2023-03-10T05:06:06.442Z
2023-04-05T07:41:18.496Z
2023-06-14T07:44:57.264Z
{'Vendor': 'Dell', 'Product': 'Streaming Data Platform', 'Versions': '1.1.x, 1.2.x, 1.3.x'}
CVE-2023-28439
CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A cross-site scripting vulnerability has been discovered affecting Iframe Dialog and Media Embed packages. The vulnerability may trigger a JavaScript code after fulfilling special conditions: using one of the affected packages on a web page with missing proper Content Security Policy configuration; initializing the editor on an element and using an element other than `<textarea>` as a base; and destroying the editor instance. This vulnerability might affect a small percentage of integrators that depend on dynamic editor initialization/destroy mechanism. A fix is available in CKEditor4 version 4.21.0. In some rare cases, a security fix may be considered a breaking change. Starting from version 4.21.0, the Iframe Dialog plugin applies the `sandbox` attribute by default, which restricts JavaScript code execution in the iframe element. To change this behavior, configure the `config.iframe_attributes` option. Also starting from version 4.21.0, the Media Embed plugin regenerates the entire content of the embed widget by default. To change this behavior, configure the `config.embed_keepOriginalContent` option. Those who choose to enable either of the more permissive options or who cannot upgrade to a patched version should properly configure Content Security Policy to avoid any potential security issues that may arise from embedding iframe elements on their web page.
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-vh5c-xwqv-cv9g
2023-03-15T15:59:10.054Z
2023-03-22T20:55:00.208Z
2023-03-22T20:55:00.208Z
{'Vendor': 'ckeditor', 'Product': 'ckeditor4', 'Versions': '< 4.21.0'}
CVE-2023-28086
An HPE OneView appliance dump may expose proxy credential settings
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04469en_us
2023-03-10T14:47:44.212Z
2023-04-25T18:39:46.125Z
2023-04-25T19:02:17.186Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '0, 0'}
CVE-2023-28985
An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition. On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core. This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598. In order to identify the current SigPack version, following command can be used: user@junos# show security idp security-package-version
https://supportportal.juniper.net/JSA71662
2023-03-29T08:44:10.679Z
2023-07-14T16:34:24.993Z
2023-07-14T16:34:24.993Z
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified'}
CVE-2023-28858
redis-py before 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request in an off-by-one manner. NOTE: this CVE Record was initially created in response to reports about ChatGPT, and 4.3.6, 4.4.3, and 4.5.3 were released (changing the behavior for pipeline operations); however, please see CVE-2023-28859 about addressing data leakage across AsyncIO connections in general.
https://github.com/redis/redis-py/pull/2641
2023-03-26T00:00:00
2023-03-26T00:00:00
2023-03-30T21:53:08.718814Z
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28337
When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the device.
https://drupal9.tenable.com/security/research/tra-2023-12
2023-03-14T00:00:00
2023-03-15T00:00:00
2023-03-15T00:00:00
{'Vendor': 'n/a', 'Product': 'NETGEAR Nighthawk WiFi6 Router (RAX30)', 'Versions': 'All known versions'}
CVE-2023-28767
The configuration parser fails to sanitize user-controlled input in the Zyxel ATP series firmware versions 5.10 through 5.36, USG FLEX series firmware versions 5.00 through 5.36,  USG FLEX 50(W) series firmware versions 5.10 through 5.36, USG20(W)-VPN series firmware versions 5.10 through 5.36, and VPN series firmware versions 5.00 through 5.36. An unauthenticated, LAN-based attacker could leverage the vulnerability to inject some operating system (OS) commands into the device configuration data on an affected device when the cloud management mode is enabled.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers
2023-03-23T10:34:20.987Z
2023-07-17T16:59:45.258Z
2023-07-17T16:59:45.258Z
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': '5.10 through 5.36'}
CVE-2023-28272
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28272
2023-03-13T22:23:36.182Z
2023-04-11T19:13:49.221Z
2023-12-14T18:59:47.679Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28788
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Page Visit Counter Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress.This issue affects Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress: from n/a through 6.4.2.
https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-6-4-2-sql-injection-vulnerability?_s_id=cve
2023-03-23T17:03:15.168Z
2023-12-20T17:19:51.573Z
2023-12-20T17:19:51.573Z
{'Vendor': 'Page Visit Counter', 'Product': 'Advanced Page Visit Counter – Most Wanted Analytics Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-28622
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in Trident Technolabs Easy Slider Revolution plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/easy-slider-revolution/wordpress-easy-slider-revolution-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-20T08:47:17.722Z
2023-08-17T08:00:54.202Z
2023-08-17T08:00:54.202Z
{'Vendor': 'Trident Technolabs', 'Product': 'Easy Slider Revolution', 'Versions': 'n/a'}
CVE-2023-28419
Cross-Site Request Forgery (CSRF) vulnerability in Stranger Studios Force First and Last Name as Display Name plugin <= 1.2 versions.
https://patchstack.com/database/vulnerability/force-first-last/wordpress-force-first-and-last-name-as-display-name-plugin-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-03-15T12:35:19.371Z
2023-11-12T22:15:02.539Z
2023-11-12T22:15:02.539Z
{'Vendor': 'Stranger Studios', 'Product': 'Force First and Last Name as Display Name', 'Versions': 'n/a'}
CVE-2023-28730
A memory corruption vulnerability Panasonic Control FPWIN Pro versions 7.6.0.3 and all previous versions may allow arbitrary code execution when opening specially crafted project files.
https://industry.panasonic.eu/factory-automation/programmable-logic-controllers-plc/plc-software/programming-software-control-fpwin-pro
2023-03-22T05:49:11.016Z
2023-07-21T06:07:24.310Z
2023-07-21T06:07:24.310Z
{'Vendor': 'Panasonic', 'Product': 'Control FPWIN Pro', 'Versions': '7.6.0.3 and all previous versions'}
CVE-2023-28360
An omission of security-relevant information vulnerability exists in Brave desktop prior to version 1.48.171 when a user was saving a file there was no download safety check dialog presented to the user.
https://hackerone.com/reports/1848062
2023-03-15T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'https://laptop-updates.brave.com/latest/winx64', 'Versions': '1.48.171'}
CVE-2023-28675
A missing permission check in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials.
https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(4)
2023-03-20T19:59:08.757Z
2023-03-23T11:26:04.539Z
2023-10-24T12:49:20.404Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OctoPerf Load Testing Plugin Plugin', 'Versions': '0'}
CVE-2023-28225
Windows NTLM Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28225
2023-03-13T22:18:32.384Z
2023-04-11T19:13:35.263Z
2023-12-14T18:59:34.027Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28819
Concrete CMS (previously concrete5) versions 8.5.12 and below, 9.0.0 through 9.0.2 is vulnerable to Stored XSS in uploaded file and folder names.
https://github.com/concretecms/concretecms/releases
2023-03-24T00:00:00
2023-04-28T00:00:00
2023-12-06T09:02:40.048483
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28376
Out-of-bounds read in the firmware for some Intel(R) E810 Ethernet Controllers and Adapters before version 1.7.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00869.html
2023-03-22T03:00:05.362Z
2023-11-14T19:04:54.586Z
2023-11-14T19:04:54.586Z
{'Vendor': 'n/a', 'Product': 'Intel(R) E810 Ethernet Controllers and Adapters', 'Versions': 'before version 1.7.1'}
CVE-2023-28726
Panasonic AiSEG2 versions 2.80F through 2.93A allows remote attackers to execute arbitrary OS commands.
https://www2.panasonic.biz/jp/densetsu/aiseg/firmup_info.html
2023-03-22T05:49:11.015Z
2023-03-31T06:29:32.493Z
2023-03-31T06:29:32.493Z
{'Vendor': 'Panasonic', 'Product': 'AiSEG2', 'Versions': '2.80F'}
CVE-2023-28233
Windows Secure Channel Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28233
2023-03-13T22:18:32.386Z
2023-04-11T19:13:38.995Z
2023-12-14T18:59:37.638Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'}
CVE-2023-28663
The Formidable PRO2PDF WordPress Plugin, version < 3.11, is affected by an authenticated SQL injection vulnerability in the ‘fieldmap’ parameter in the fpropdf_export_file action.
https://www.tenable.com/security/research/tra-2023-2
2023-03-20T00:00:00
2023-03-22T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'Formidable PRO2PDF WordPress Plugin', 'Versions': '< 3.11'}
CVE-2023-28399
Incorrect permission assignment for critical resource exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. ACL (Access Control List) is not appropriately set to the local folder where the affected product is installed, therefore a wide range of privileges is permitted to a user of the PC where the affected product is installed. As a result, the user may be able to destroy the system and/or execute a malicious program.
https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf
2023-05-11T00:00:00
2023-06-01T00:00:00
2023-06-01T00:00:00
{'Vendor': 'Contec Co., Ltd.', 'Product': 'CONPROSYS HMI System (CHS)', 'Versions': 'versions prior to 3.5.3'}
CVE-2023-28008
HCL Workload Automation 9.4, 9.5, and 10.1 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371
2023-03-10T03:50:27.022Z
2023-04-26T19:24:37.974Z
2023-04-26T19:24:37.974Z
{'Vendor': 'HCL Software', 'Product': 'Workload Automation', 'Versions': '<=9.5.0.6, 10.1.0.0'}
CVE-2023-28458
pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Organizers can trigger the overwriting (with the standard pretalx 404 page content) of an arbitrary file.
https://pretalx.com/p/news/security-release-232/
2023-03-15T00:00:00
2023-04-20T00:00:00
2023-04-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28771
Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-remote-command-injection-vulnerability-of-firewalls
2023-03-23T00:00:00
2023-04-25T00:00:00
2023-06-09T00:00:00
{'Vendor': 'Zyxel', 'Product': 'ZyWALL/USG series firmware', 'Versions': '4.60 through 4.73'}
CVE-2023-28321
An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.
https://hackerone.com/reports/1950627
2023-03-14T00:00:00
2023-05-26T00:00:00
2023-10-11T14:06:17.325081
{'Vendor': 'n/a', 'Product': 'https://github.com/curl/curl', 'Versions': 'Fixed in 8.1.0'}
CVE-2023-28634
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39
2023-03-20T12:19:47.208Z
2023-04-05T16:06:11.361Z
2023-04-05T16:06:11.361Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 0.83, < 9.5.13, >= 10.0.0, < 10.0.7'}
CVE-2023-28970
An Improper Check or Handling of Exceptional Conditions vulnerability in packet processing on the network interfaces of Juniper Networks Junos OS on JRR200 route reflector appliances allows an adjacent, network-based attacker sending a specific packet to the device to cause a kernel crash, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue can only be triggered by an attacker on the local broadcast domain. Packets routed to the device are unable to trigger this crash. This issue affects Juniper Networks Junos OS on JRR200: All versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S4; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S2, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2; 22.4 versions prior to 22.4R1-S1, 22.4R2.
https://supportportal.juniper.net/JSA70594
2023-03-29T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 21.3, 21.4, 22.1, 22.2, 22.3, 22.4'}
CVE-2023-28073
Dell BIOS contains an improper authentication vulnerability. A locally authenticated malicious user may potentially exploit this vulnerability by bypassing certain authentication mechanisms in order to elevate privileges on the system.
https://www.dell.com/support/kbdoc/en-us/000213032/dsa-2023-160-dell-client
2023-03-10T05:07:55.140Z
2023-06-23T10:42:06.760Z
2023-06-23T10:42:06.760Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': ' 1.13.2'}
CVE-2023-28423
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Prism Tech Studios Modern Footnotes plugin <= 1.4.15 versions.
https://patchstack.com/database/vulnerability/modern-footnotes/wordpress-modern-footnotes-plugin-1-4-15-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-15T12:35:19.372Z
2023-06-22T08:09:08.118Z
2023-06-22T08:09:08.118Z
{'Vendor': 'Prism Tech Studios', 'Product': 'Modern Footnotes', 'Versions': 'n/a'}
CVE-2023-28566
Information disclosure in WLAN HAL while handling the WMI state info command.
https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin
2023-03-17T11:41:45.849Z
2023-11-07T05:26:38.950Z
2023-11-07T05:26:38.950Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6430, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCM4325, QCM4490, QCM6125, QCN7605, QCN7606, QCS410, QCS4490, QCS610, QCS6125, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SC8180X+SDX55, SD 675, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD835, SD855, SDX55, SG4150P, SM4125, SM6250, SM6250P, SM7250P, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'}
CVE-2023-28835
Nextcloud server is an open source home cloud implementation. In affected versions the generated fallback password when creating a share was using a weak complexity random number generator, so when the sharer did not change it the password could be guessable to an attacker willing to brute force it. It is recommended that the Nextcloud Server is upgraded to 24.0.10 or 25.0.4. This issue only affects users who do not have a password policy enabled, so enabling a password policy is an effective mitigation for users unable to upgrade.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7w2p-rp9m-9xp9
2023-03-24T16:25:34.465Z
2023-03-30T18:57:00.487Z
2023-03-30T18:57:00.487Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '< 24.0.10, >= 25.0.0, < 25.0.4'}
CVE-2023-28474
Concrete CMS (previously concrete5) in versions 9.0 through 9.1.3 is vulnerable to Stored XSS on Saved Presets on search.
https://concretecms.com
2023-03-15T00:00:00
2023-04-28T00:00:00
2024-01-08T23:41:24.474396
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28862
An issue was discovered in LemonLDAP::NG before 2.16.1. Weak session ID generation in the AuthBasic handler and incorrect failure handling during a password check allow attackers to bypass 2FA verification. Any plugin that tries to deny session creation after the store step does not deny an AuthBasic session.
https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2896
2023-03-26T00:00:00
2023-03-31T00:00:00
2023-07-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28531
ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.
https://www.openwall.com/lists/oss-security/2023/03/15/8
2023-03-17T00:00:00
2023-03-17T00:00:00
2023-12-22T13:06:32.319490
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28161
If temporary "one-time" permissions, such as the ability to use the Camera, were granted to a document loaded using a file: URL, that permission persisted in that tab for all other documents loaded from a file: URL. This is potentially dangerous if the local files came from different sources, such as in a download directory. This vulnerability affects Firefox < 111.
https://www.mozilla.org/security/advisories/mfsa2023-09/
2023-03-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-28248
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28248
2023-03-13T22:18:32.389Z
2023-04-11T19:13:48.153Z
2023-12-14T18:59:46.600Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28618
Cross-Site Request Forgery (CSRF) vulnerability in Marios Alexandrou Enhanced Plugin Admin plugin <= 1.16 versions.
https://patchstack.com/database/vulnerability/enhanced-plugin-admin/wordpress-enhanced-plugin-admin-plugin-1-16-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-03-20T08:47:17.720Z
2023-11-12T21:51:19.994Z
2023-11-12T21:51:19.994Z
{'Vendor': 'Marios Alexandrou', 'Product': 'Enhanced Plugin Admin', 'Versions': 'n/a'}
CVE-2023-28931
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Never5 Post Connector plugin <= 1.0.9 versions.
https://patchstack.com/database/vulnerability/post-connector/wordpress-post-connector-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-28T06:52:44.956Z
2023-08-08T12:35:44.360Z
2023-08-08T12:35:44.360Z
{'Vendor': 'Never5', 'Product': 'Post Connector', 'Versions': 'n/a'}
CVE-2023-28032
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T04:57:40.871Z
2023-06-23T09:59:02.895Z
2023-06-23T09:59:02.895Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28462
A JNDI rebind operation in the default ORB listener in Payara Server 4.1.2.191 (Enterprise), 5.20.0 and newer (Enterprise), and 5.2020.1 and newer (Community), when Java 1.8u181 and earlier is used, allows remote attackers to load malicious code on the server once a JNDI directory scan is performed.
https://blog.payara.fish/vulnerability-affecting-server-environments-on-java-1.8-on-updates-lower-than-1.8u191
2023-03-15T00:00:00
2023-03-30T00:00:00
2023-03-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28198
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213670
2023-03-13T18:37:25.757Z
2023-08-14T22:40:37.966Z
2023-08-14T22:40:37.966Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-28177
Memory safety bugs present in Firefox 110. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 111.
https://www.mozilla.org/security/advisories/mfsa2023-09/
2023-03-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-28527
IBM Informix Dynamic Server 12.10 and 14.10 cdr is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251206.
https://www.ibm.com/support/pages/node/7070188
2023-03-16T21:05:56.576Z
2023-12-09T02:15:39.553Z
2023-12-09T02:15:39.553Z
{'Vendor': 'IBM', 'Product': 'Informix Dynamic Server', 'Versions': '12.10, 14.10'}
CVE-2023-28874
The next parameter in the /accounts/login endpoint of Seafile 9.0.6 allows attackers to redirect users to arbitrary sites.
https://manual.seafile.com/changelog/server-changelog/#908-2022-09-07
2023-03-27T00:00:00
2023-12-09T00:00:00
2023-12-09T06:37:59.511121
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28435
Dataease is an open source data visualization and analysis tool. The permissions for the file upload interface is not checked so users who are not logged in can upload directly to the background. The file type also goes unchecked, users could upload any type of file. These vulnerabilities has been fixed in version 1.18.5.
https://github.com/dataease/dataease/security/advisories/GHSA-625h-q3g9-rffc
2023-03-15T15:59:10.053Z
2023-03-24T20:39:23.223Z
2023-03-24T20:39:23.223Z
{'Vendor': 'dataease', 'Product': 'dataease', 'Versions': '< 1.18.5'}
CVE-2023-28065
Dell Command | Update, Dell Update, and Alienware Update versions 4.8.0 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability leading to privilege escalation.
https://www.dell.com/support/kbdoc/en-us/000212574/dsa-2023-146
2023-03-10T05:06:06.441Z
2023-06-23T11:04:35.789Z
2023-06-23T11:04:35.789Z
{'Vendor': 'Dell', 'Product': 'Dell Command Update (DCU)', 'Versions': '4.8.0 and prior'}
CVE-2023-28966
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS Evolved allows a low-privileged local attacker with shell access to modify existing files or execute commands as root. The issue is caused by improper file and directory permissions on certain system files, allowing an attacker with access to these files and folders to inject CLI commands as root. This issue affects Juniper Networks Junos OS Evolved: All versions prior to 20.4R3-S5-EVO; 21.2 versions prior to 21.2R3-EVO; 21.3 versions prior to 21.3R2-EVO.
https://supportportal.juniper.net/JSA70590
2023-03-29T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS Evolved', 'Versions': 'unspecified, 21.2, 21.3'}
CVE-2023-28989
Cross-Site Request Forgery (CSRF) vulnerability in weDevs Happy Addons for Elementor plugin <= 3.8.2 versions.
https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-8-2-cross-site-request-forgery-csrf-on-collect-data-popup?_s_id=cve
2023-03-29T12:14:35.692Z
2023-07-10T12:51:07.650Z
2023-07-10T12:51:07.650Z
{'Vendor': 'weDevs', 'Product': 'Happy Addons for Elementor', 'Versions': 'n/a'}
CVE-2023-28823
Uncontrolled search path in some Intel(R) oneAPI Toolkit and component software installers before version 4.3.1.493 may allow an authenticated user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00890.html
2023-04-07T03:00:04.506Z
2023-08-11T02:37:17.988Z
2023-08-11T02:37:17.988Z
{'Vendor': 'n/a', 'Product': 'Intel(R) oneAPI Toolkit and component software installers', 'Versions': 'before version 4.3.1.493'}
CVE-2023-28570
Memory corruption while processing audio effects.
https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin
2023-03-17T11:41:45.849Z
2023-11-07T05:26:43.590Z
2023-11-07T05:26:43.590Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, AR8035, FastConnect 6200, FastConnect 6800, FastConnect 6900, FastConnect 7800, MDM9628, MSM8996AU, QAM8295P, QCA6310, QCA6320, QCA6391, QCA6420, QCA6426, QCA6430, QCA6436, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA8081, QCA8337, QCC710, QCN6224, QCN6274, QCN9074, QCS410, QCS610, QFW7114, QFW7124, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8295P, SD835, SD855, SD865 5G, SDM429W, SDX55, Snapdragon 429 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 4100+ Platform, Snapdragon X55 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR2 5G Platform, SW5100, SW5100P, SXR2130, WCD9335, WCD9340, WCD9341, WCD9370, WCD9380, WCN3610, WCN3620, WCN3660B, WCN3680B, WCN3950, WCN3980, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8835'}
CVE-2023-28209
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.
https://support.apple.com/en-us/HT213670
2023-03-13T18:37:25.758Z
2023-09-06T01:36:33.874Z
2023-09-06T01:36:33.874Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-28659
The Waiting: One-click Countdowns WordPress Plugin, version <= 0.6.2, is affected by an authenticated SQL injection vulnerability in the pbc_down[meta][id] parameter of the pbc_save_downs action.
https://www.tenable.com/security/research/tra-2023-2
2023-03-20T00:00:00
2023-03-22T00:00:00
2023-03-22T00:00:00
{'Vendor': 'n/a', 'Product': 'Waiting: One-click Countdowns WordPress Plugin', 'Versions': '<= 0.6.2'}
CVE-2023-28208
A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. A user may send a text from a secondary eSIM despite configuring a contact to use a primary eSIM.
https://support.apple.com/en-us/HT213606
2023-03-13T18:37:25.758Z
2023-09-06T01:36:34.516Z
2023-09-06T01:36:34.516Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-28658
Insecure inherited permissions in some Intel(R) oneMKL software before version 2022.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00873.html
2023-03-29T03:00:02.735Z
2023-08-11T02:37:14.703Z
2023-08-11T02:37:14.703Z
{'Vendor': 'n/a', 'Product': 'Intel(R) oneMKL software', 'Versions': 'before version 2022.0'}
CVE-2023-28434
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c
2023-03-15T15:59:10.053Z
2023-03-22T20:44:04.216Z
2023-03-22T20:44:04.216Z
{'Vendor': 'minio', 'Product': 'minio', 'Versions': '< RELEASE.2023-03-20T20-16-18Z'}
CVE-2023-28064
Dell BIOS contains an Out-of-bounds Write vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.
https://www.dell.com/support/kbdoc/en-us/000214778/dsa-2023-174-dell-client-bios-security-update-for-an-out-of-bounds-write-vulnerability
2023-03-10T05:06:06.441Z
2023-06-23T10:57:51.106Z
2023-06-23T10:57:51.106Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28967
A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.
https://supportportal.juniper.net/JSA70591
2023-03-29T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 21.1R1, 21.2R1, 21.3R1, 21.4, 22.1, 22.2'}
CVE-2023-28988
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PI Websolution Direct checkout, Add to cart redirect, Quick purchase button, Buy now button, Quick View button for WooCommerce plugin <= 2.1.48 versions.
https://patchstack.com/database/vulnerability/add-to-cart-direct-checkout-for-woocommerce/wordpress-direct-checkout-add-to-cart-redirect-for-woocommerce-plugin-2-1-48-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-29T12:14:35.692Z
2023-06-26T05:05:12.321Z
2023-06-26T05:05:12.321Z
{'Vendor': 'PI Websolution', 'Product': 'Direct checkout, Add to cart redirect, Quick purchase button, Buy now button, Quick View button for WooCommerce', 'Versions': 'n/a'}
CVE-2023-28571
Information disclosure in WLAN HOST while processing the WLAN scan descriptor list during roaming scan.
https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletin
2023-03-17T11:41:45.849Z
2023-10-03T05:00:37.642Z
2023-10-03T05:00:37.642Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'APQ8064AU, CSRB31024, FastConnect 6800, FastConnect 6900, FastConnect 7800, MDM9650, MSM8996AU, QAM8255P, QAM8295P, QCA6175A, QCA6310, QCA6320, QCA6391, QCA6421, QCA6426, QCA6431, QCA6436, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA6797AQ, QCC2073, QCC2076, QCN9074, QCS410, QCS610, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8255P, SA8295P, SD835, SD865 5G, SM8550P, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X55 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR2130, WCD9335, WCD9340, WCD9341, WCD9370, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3980, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-28121
An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated.
https://developer.woocommerce.com/2023/03/23/critical-vulnerability-detected-in-woocommerce-payments-what-you-need-to-know/
2023-03-10T00:00:00
2023-04-12T00:00:00
2023-07-03T00:00:00
{'Vendor': 'n/a', 'Product': 'WooCommerce Payments WordPress Plugin', 'Versions': 'Fixed version 5.6.2'}
CVE-2023-28930
Cross-Site Request Forgery (CSRF) vulnerability in Robin Phillips Mobile Banner plugin <= 1.5 versions.
https://patchstack.com/database/vulnerability/mobile-banner/wordpress-mobile-banner-plugin-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-03-28T06:52:44.956Z
2023-11-12T21:32:59.127Z
2023-11-12T21:32:59.127Z
{'Vendor': 'Robin Phillips', 'Product': 'Mobile Banner', 'Versions': 'n/a'}