CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-28033 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T04:57:40.871Z | 2023-06-23T09:37:19.592Z | 2023-06-23T09:37:19.592Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28199 | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in macOS Ventura 13.3. An app may be able to disclose kernel memory. | https://support.apple.com/en-us/HT213670 | 2023-03-13T18:37:25.757Z | 2023-08-14T22:40:39.047Z | 2023-08-14T22:40:39.047Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28176 | Memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 111, Firefox ESR < 102.9, and Thunderbird < 102.9. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-03-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-28526 |
IBM Informix Dynamic Server 12.10 and 14.10 archecker is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow a local user to cause a segmentation fault. IBM X-Force ID: 251204.
| https://www.ibm.com/support/pages/node/7070188 | 2023-03-16T21:05:56.575Z | 2023-12-09T02:22:19.624Z | 2023-12-09T02:22:19.624Z | {'Vendor': 'IBM', 'Product': 'Informix Dynamic Server', 'Versions': '12.10, 14.10'} |
CVE-2023-28875 | A Stored XSS issue in shared files download terms in Filerun Update 20220202 allows attackers to inject JavaScript code that is executed when a user follows the crafted share link. | https://filerun.com/changelog | 2023-03-27T00:00:00 | 2023-12-06T00:00:00 | 2023-12-06T01:04:39.637102 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28249 | Windows Boot Manager Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28249 | 2023-03-13T22:18:32.389Z | 2023-04-11T19:13:49.756Z | 2023-12-14T18:59:48.203Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28475 | Concrete CMS (previously concrete5) versions 8.5.12 and below, and versions 9.0 through 9.1.3 is vulnerable to Reflected XSS on the Reply form because msgID was not sanitized. | https://concretecms.com | 2023-03-15T00:00:00 | 2023-04-28T00:00:00 | 2023-12-06T08:19:40.327099 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28025 | Due to this vulnerability, the Master operator could potentially incorporate an SVG tag into HTML, leading to an alert pop-up displaying a cookie. To mitigate stored XSS vulnerabilities, a preventive measure involves thoroughly sanitizing and validating all user inputs before they are processed and stored in the server storage.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0109318 | 2023-03-10T03:59:29.453Z | 2023-12-21T00:32:29.551Z | 2023-12-21T00:32:29.551Z | {'Vendor': 'HCL Software', 'Product': 'HCL BigFix Mobile / Modern Client Management', 'Versions': '<= 3.1'} |
CVE-2023-28863 | AMI MegaRAC SPx12 and SPx13 devices have Insufficient Verification of Data Authenticity. | https://ami.com | 2023-03-26T00:00:00 | 2023-04-18T00:00:00 | 2023-04-18T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28530 | IBM Cognos Analytics 11.1 and 11.2 is vulnerable to stored cross-site scripting, caused by improper validation of SVG Files in Custom Visualizations. A remote attacker could exploit this vulnerability to execute scripts in a victim's Web browser within the security context of the hosting Web site. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. IBM X-Force ID: 251214. | https://www.ibm.com/support/pages/node/7012621 | 2023-03-16T21:05:56.576Z | 2023-07-22T01:47:06.552Z | 2023-07-22T01:47:06.552Z | {'Vendor': 'IBM', 'Product': 'Cognos Analytics', 'Versions': '11.1, 11.2'} |
CVE-2023-28160 | When following a redirect to a publicly accessible web extension file, the URL may have been translated to the actual local path, leaking potentially sensitive information. This vulnerability affects Firefox < 111. | https://www.mozilla.org/security/advisories/mfsa2023-09/ | 2023-03-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-28971 | An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the timescaledb feature of Juniper Networks Paragon Active Assurance (PAA) (Formerly Netrounds) allows an attacker to bypass existing firewall rules and limitations used to restrict internal communcations. The Test Agents (TA) Appliance connects to the Control Center (CC) using OpenVPN. TA's are assigned an internal IP address in the 100.70.0.0/16 range. Firewall rules exists to limit communication from TA's to the CC to specific services only. OpenVPN is configured to not allow direct communication between Test Agents in the OpenVPN application itself, and routing is normally not enabled on the server running the CC application. The timescaledb feature is installed as an optional package on the Control Center. When the timescaledb container is started, this causes side-effects by bypassing the existing firewall rules and limitations for Test Agent communications. Note: This issue only affects customers hosting their own on-prem Control Center. The Paragon Active Assurance Software as a Service (SaaS) is not affected by this vulnerability since the timescaledb service is not enabled. This issue affects all on-prem versions of Juniper Networks Paragon Active Assurance prior to 4.1.2. | https://supportportal.juniper.net/JSA70595 | 2023-03-29T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Juniper Networks', 'Product': 'Paragon Active Assurance', 'Versions': 'unspecified'} |
CVE-2023-28072 |
Dell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system.
| https://www.dell.com/support/kbdoc/en-in/000212982/dsa-2023-158 | 2023-03-10T05:07:55.140Z | 2023-09-04T15:38:15.693Z | 2023-09-04T15:38:15.693Z | {'Vendor': 'Dell', 'Product': 'Alienware Command Center (AWCC)', 'Versions': 'Versions prior to 5.5.51.0'} |
CVE-2023-28588 | Transient DOS in Bluetooth Host while rfc slot allocation. | https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin | 2023-03-17T11:41:45.853Z | 2023-12-05T03:03:58.097Z | 2023-12-05T03:03:58.097Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'APQ8017, APQ8064AU, AQT1000, AR8031, AR8035, CSRA6620, CSRA6640, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, MSM8108, MSM8209, MSM8608, MSM8996AU, QAM8295P, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6595, QCA6595AU, QCA6696, QCA8081, QCA8337, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN6224, QCN6274, QCN7606, QCN9011, QCN9012, QCN9074, QCS2290, QCS410, QCS4290, QCS4490, QCS5430, QCS610, QCS6125, QCS6490, QCS7230, QCS8250, QCS8550, QFW7114, QFW7124, QRB5165M, QRB5165N, Qualcomm 205 Mobile Platform, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8295P, SD 675, SD 8 Gen1 5G, SD626, SD660, SD670, SD675, SD730, SD835, SD855, SD865 5G, SD888, SDX55, SG4150P, SG8275P, SM4125, SM6250, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 625 Mobile Platform, Snapdragon 626 Mobile Platform, Snapdragon 630 Mobile Platform, Snapdragon 632 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon AR2 Gen 1 Platform, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-28422 | Auth. (admin+) Stored Cross-site Scripting (XSS) vulnerability in MagePeople Team Event Manager and Tickets Selling Plugin for WooCommerce <= 3.8.6. versions. | https://patchstack.com/database/vulnerability/mage-eventpress/wordpress-event-manager-for-woocommerce-plugin-3-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-15T12:35:19.372Z | 2023-03-23T11:45:07.840Z | 2023-03-23T11:45:07.840Z | {'Vendor': 'MagePeople Team', 'Product': 'Event Manager and Tickets Selling Plugin for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-28567 | Memory corruption in WLAN HAL while handling command through WMI interfaces. | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.849Z | 2023-09-05T06:24:23.598Z | 2023-09-05T06:24:23.598Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AQT1000, AR8031, AR8035, AR9380, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, PMP8074, QAM8295P, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA4024, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6428, QCA6430, QCA6431, QCA6436, QCA6438, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA7500, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5064, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5550, QCN6023, QCN6024, QCN6100, QCN6102, QCN6112, QCN6122, QCN6132, QCN7605, QCN7606, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8250, QRB5165M, QRB5165N, QSM8250, QSM8350, Robotics RB3 Platform, Robotics RB5 Platform, SA4150P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8295P, SC8180X+SDX55, SD 455, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD835, SD855, SD865 5G, SD888, SDX55, SG4150P, SM4125, SM4450, SM6250, SM6250P, SM7250P, SM7315, SM7325P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28834 | Nextcloud Server is an open source personal cloud server. Nextcloud Server 24.0.0 until 24.0.6 and 25.0.0 until 25.0.4, as well as Nextcloud Enterprise Server 23.0.0 until 23.0.11, 24.0.0 until 24.0.6, and 25.0.0 until 25.0.4, have an information disclosure vulnerability. A user was able to get the full data directory path of the Nextcloud server from an API endpoint. By itself this information is not problematic as it can also be guessed for most common setups, but it could speed up other unknown attacks in the future if the information is known. Nextcloud Server 24.0.6 and 25.0.4 and Nextcloud Enterprise Server 23.0.11, 24.0.6, and 25.0.4 contain patches for this issue. There are no known workarounds. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5w64-6c42-rgcv | 2023-03-24T16:25:34.465Z | 2023-04-03T16:19:48.382Z | 2023-04-03T16:19:48.382Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 23.0.0, < 23.0.14, >= 24.0.0, < 24.0.10, >= 25.0.0, < 25.0.4'} |
CVE-2023-28770 | The sensitive information exposure vulnerability in the CGI “Export_Log” and the binary “zcmd” in Zyxel DX5401-B0 firmware versions prior to V5.17(ABYO.1)C0 could allow a remote unauthenticated attacker to read the system files and to retrieve the password of the supervisor from the encrypted file. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities | 2023-03-23T00:00:00 | 2023-04-27T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'Zyxel', 'Product': 'DX5401-B0 firmware', 'Versions': '< V5.17(ABYO.1)C0'} |
CVE-2023-28320 | A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave. | https://hackerone.com/reports/1929597 | 2023-03-14T00:00:00 | 2023-05-26T00:00:00 | 2023-10-11T10:06:23.211995 | {'Vendor': 'n/a', 'Product': 'https://github.com/curl/curl', 'Versions': 'Fixed in 8.1.0'} |
CVE-2023-28635 | vantage6 is privacy preserving federated learning infrastructure. Prior to version 4.0.0, malicious users may try to get access to resources they are not allowed to see, by creating resources with integers as names. One example where this is a risk, is when users define which users are allowed to run algorithms on their node. This may be defined by username or user id. Now, for example, if user id 13 is allowed to run tasks, and an attacker creates a username with username '13', they would be wrongly allowed to run an algorithm. There may also be other places in the code where such a mixup of resource ID or name leads to issues. Version 4.0.0 contains a patch for this issue. The best solution is to check when resources are created or modified, that the resource name always starts with a character. | https://github.com/vantage6/vantage6/security/advisories/GHSA-7x94-6g2m-3hp2 | 2023-03-20T12:19:47.208Z | 2023-10-11T19:21:23.678Z | 2023-10-11T19:21:23.678Z | {'Vendor': 'vantage6', 'Product': 'vantage6', 'Versions': '< 4.0.0'} |
CVE-2023-28009 | HCL Workload Automation is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371 | 2023-03-10T03:50:27.022Z | 2023-04-26T19:38:54.631Z | 2023-04-26T19:38:54.631Z | {'Vendor': 'HCL Software', 'Product': 'Workload Automation', 'Versions': '<=9.5.0.6, 10.1.0.0'} |
CVE-2023-28459 | pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files. | https://pretalx.com/p/news/security-release-232/ | 2023-03-15T00:00:00 | 2023-04-20T00:00:00 | 2023-04-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28377 | Improper authentication in some Intel(R) NUC Kit NUC11PH USB firmware installation software before version 1.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html | 2023-06-02T03:00:03.811Z | 2023-11-14T19:04:48.989Z | 2023-11-14T19:04:48.989Z | {'Vendor': 'n/a', 'Product': 'Intel(R) NUC Kit NUC11PH USB firmware installation software', 'Versions': 'before version 1.1 for Windows'} |
CVE-2023-28727 | Panasonic AiSEG2 versions 2.00J through 2.93A allows adjacent attackers bypass authentication due to mishandling of X-Forwarded-For headers. | https://www2.panasonic.biz/jp/densetsu/aiseg/firmup_info.html | 2023-03-22T05:49:11.015Z | 2023-03-31T06:30:25.635Z | 2023-03-31T06:30:25.635Z | {'Vendor': 'Panasonic', 'Product': 'AiSEG2', 'Versions': '2.00J'} |
CVE-2023-28232 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28232 | 2023-03-13T22:18:32.385Z | 2023-04-11T19:13:38.464Z | 2023-12-14T18:59:37.116Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28662 | The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action. | https://www.tenable.com/security/research/tra-2023-2 | 2023-03-20T00:00:00 | 2023-03-22T00:00:00 | 2023-03-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'Gift Cards (Gift Vouchers and Packages) WordPress Plugin', 'Versions': '<= 4.3.1'} |
CVE-2023-28398 | Osprey Pump Controller version 1.01 could allow an unauthenticated user to create an account and bypass authentication, thereby gaining unauthorized access to the system. A threat actor could exploit this vulnerability to create a user account without providing valid credentials. A threat actor who successfully exploits this vulnerability could gain access to the pump controller and cause disruption in operation, modify data, or shut down the controller. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 | 2023-03-21T21:17:06.897Z | 2023-03-28T20:08:09.624Z | 2023-03-28T20:08:09.624Z | {'Vendor': 'ProPump and Controls, Inc.', 'Product': 'Osprey Pump Controller', 'Versions': '1.01'} |
CVE-2023-28818 | An issue was discovered in Veritas NetBackup IT Analytics 11 before 11.2.0. The application upgrade process included unsigned files that could be exploited and result in a customer installing unauthentic components. A malicious actor could install rogue Collector executable files (aptare.jar or upgrademanager.zip) on the Portal server, which might then be downloaded and installed on collectors. | https://www.veritas.com/content/support/en_US/security/VTS23-002 | 2023-03-24T00:00:00 | 2023-03-24T00:00:00 | 2023-03-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28731 | AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected.
This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0.
| https://www.acymailing.com/change-log/ | 2023-03-22T09:53:07.889Z | 2023-03-30T11:25:36.854Z | 2023-03-30T11:25:36.854Z | {'Vendor': 'AcyMailing', 'Product': 'Newsletter Plugin for Joomla in the Enterprise version', 'Versions': '0'} |
CVE-2023-28361 | A Cross-site WebSocket Hijacking (CSWSH) vulnerability found in UniFi OS 2.5 and earlier allows a malicious actor to access certain confidential information by persuading a UniFi OS user to visit a malicious webpage.Affected Products:Cloud Key Gen2Cloud Key Gen2 PlusUNVRUNVR ProfessionalUDMUDM ProfessionalUDM SEUDRMitigation:Update affected products to UniFi OS 3.0.13 or later. | https://community.ui.com/releases/Security-Advisory-Bulletin-030-030/f9de9e65-585f-4c66-81e9-5d8f54ba66dd | 2023-03-15T00:00:00 | 2023-05-11T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'UniFi OS', 'Versions': 'Fixed in UniFi OS 3.0.13 or later.'} |
CVE-2023-28674 | A cross-site request forgery (CSRF) vulnerability in Jenkins OctoPerf Load Testing Plugin Plugin 4.5.2 and earlier allows attackers to connect to a previously configured Octoperf server using attacker-specified credentials. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(4) | 2023-03-20T19:59:08.757Z | 2023-03-23T11:26:03.841Z | 2023-10-24T12:49:19.234Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins OctoPerf Load Testing Plugin Plugin', 'Versions': '0'} |
CVE-2023-28224 | Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28224 | 2023-03-13T22:18:32.384Z | 2023-04-11T19:13:34.739Z | 2023-12-14T18:59:33.440Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28418 | Auth. (subscriber+) Reflected Cross-Site Scripting (XSS) vulnerability in Yudlee themes Mediciti Lite theme <= 1.3.0 versions. | https://patchstack.com/database/vulnerability/mediciti-lite/wordpress-mediciti-lite-theme-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-15T12:35:19.371Z | 2023-06-22T12:00:47.306Z | 2023-06-22T12:00:47.306Z | {'Vendor': 'Yudlee themes', 'Product': 'Mediciti Lite', 'Versions': 'n/a'} |
CVE-2023-28336 | Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access. | https://moodle.org/mod/forum/discuss.php?d=445068 | 2023-03-14T00:00:00 | 2023-03-23T00:00:00 | 2023-03-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.1 to 4.1.1, 4.0 to 4.0.6, 3.11 to 3.11.12, 3.9 to 3.9.19 and earlier unsupported versions'} |
CVE-2023-28766 | A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80 < V9.60), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.40), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.40), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions < V9.40), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.40), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7ST85 (CP300) (All versions >= V7.80 < V9.60), SIPROTEC 5 7ST86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SX82 (CP150) (All versions < V9.40), SIPROTEC 5 7SX85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.40), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 Communication Module ETH-BA-2EL (All versions < V9.40), SIPROTEC 5 Communication Module ETH-BB-2FO (All versions < V9.40), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.40). Affected devices lack proper validation of http request parameters of the hosted web service.
An unauthenticated remote attacker could send specially crafted packets that could cause denial of service condition of the target device. | https://cert-portal.siemens.com/productcert/pdf/ssa-322980.pdf | 2023-03-23T09:09:31.711Z | 2023-04-11T09:03:05.547Z | 2023-09-12T09:32:04.639Z | {'Vendor': 'Siemens', 'Product': 'SIPROTEC 5 6MD85 (CP300)', 'Versions': 'All versions >= V7.80 < V9.40'} |
CVE-2023-28273 | Windows Clip Service Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28273 | 2023-03-13T22:23:36.182Z | 2023-04-11T19:13:50.830Z | 2023-12-14T18:59:49.219Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28789 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Cimatti Consulting WordPress Contact Forms by Cimatti plugin <= 1.5.4 versions. | https://patchstack.com/database/vulnerability/contact-forms/wordpress-contact-forms-by-cimatti-plugin-1-5-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-23T17:03:15.168Z | 2023-04-07T14:12:32.469Z | 2023-04-07T14:12:32.469Z | {'Vendor': 'Cimatti Consulting', 'Product': 'WordPress Contact Forms by Cimatti', 'Versions': 'n/a'} |
CVE-2023-28623 | Zulip is an open-source team collaboration tool with unique topic-based threading. In the event that 1: `ZulipLDAPAuthBackend` and an external authentication backend (any aside of `ZulipLDAPAuthBackend` and `EmailAuthBackend`) are the only ones enabled in `AUTHENTICATION_BACKENDS` in `/etc/zulip/settings.py` and 2: The organization permissions don't require invitations to join. An attacker can create a new account in the organization with an arbitrary email address in their control that's not in the organization's LDAP directory. The impact is limited to installations which have this specific combination of authentication backends as described above in addition to having `Invitations are required for joining this organization` organization permission disabled. This issue has been addressed in version 6.2. Users are advised to upgrade. Users unable to upgrade may enable the `Invitations are required for joining this organization` organization permission to prevent this issue. | https://github.com/zulip/zulip/security/advisories/GHSA-7p62-pjwg-56rv | 2023-03-20T12:19:47.206Z | 2023-05-19T21:04:51.624Z | 2023-05-19T21:04:51.624Z | {'Vendor': 'zulip', 'Product': 'zulip', 'Versions': '>= 2.1.0, < 6.2'} |
CVE-2023-28859 | redis-py before 4.4.4 and 4.5.x before 4.5.4 leaves a connection open after canceling an async Redis command at an inopportune time, and can send response data to the client of an unrelated request. (This could, for example, happen for a non-pipeline operation.) NOTE: the solutions for CVE-2023-28859 address data leakage across AsyncIO connections in general. | https://github.com/redis/redis-py/pull/2641 | 2023-03-26T00:00:00 | 2023-03-26T00:00:00 | 2023-03-30T21:38:05.900609Z | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28068 |
Dell Command Monitor, versions 10.9 and prior, contains an improper folder permission vulnerability. A local authenticated malicious user can potentially exploit this vulnerability leading to privilege escalation by writing to a protected directory when Dell Command Monitor is installed to a non-default path
| https://www.dell.com/support/kbdoc/en-us/000212226/dsa-2023-133 | 2023-03-10T05:06:06.442Z | 2023-05-05T06:41:46.222Z | 2023-05-30T13:48:54.148Z | {'Vendor': 'Dell', 'Product': 'Dell Command Monitor (DCM)', 'Versions': 'Versions 10.9 and prior'} |
CVE-2023-28438 | Pimcore is an open source data and experience management platform. Prior to version 10.5.19, since a user with 'report' permission can already write arbitrary SQL queries and given the fact that this endpoint is using the GET method (no CSRF protection), an attacker can inject an arbitrary query by manipulating a user to click on a link. Users should upgrade to version 10.5.19 to receive a patch or, as a workaround, may apply the patch manually. | https://github.com/pimcore/pimcore/security/advisories/GHSA-vf7q-g2pv-jxvx | 2023-03-15T15:59:10.054Z | 2023-03-22T20:46:33.646Z | 2023-03-22T20:46:33.646Z | {'Vendor': 'pimcore', 'Product': 'pimcore', 'Versions': '< 10.5.19'} |
CVE-2023-28087 | An HPE OneView appliance dump may expose OneView user accounts | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04469en_us | 2023-03-10T14:47:44.212Z | 2023-04-25T18:41:15.824Z | 2023-04-25T19:06:26.122Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '0, 0'} |
CVE-2023-28984 | A Use After Free vulnerability in the Layer 2 Address Learning Manager (l2alm) of Juniper Networks Junos OS on QFX Series allows an adjacent attacker to cause the Packet Forwarding Engine to crash and restart, leading to a Denial of Service (DoS). The PFE may crash when a lot of MAC learning and aging happens, but due to a Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization) that is outside the attackers direct control. This issue affects: Juniper Networks Junos OS versions prior to 19.4R3-S10 on QFX Series; 20.2 versions prior to 20.2R3-S7 on QFX Series; 20.3 versions prior to 20.3R3-S6 on QFX Series; 20.4 versions prior to 20.4R3-S5 on QFX Series; 21.1 versions prior to 21.1R3-S4 on QFX Series; 21.2 versions prior to 21.2R3-S3 on QFX Series; 21.3 versions prior to 21.3R3-S3 on QFX Series; 21.4 versions prior to 21.4R3 on QFX Series; 22.1 versions prior to 22.1R3 on QFX Series; 22.2 versions prior to 22.2R2 on QFX Series. | https://supportportal.juniper.net/JSA70610 | 2023-03-29T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 20.2, 20.3, 20.4, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2'} |
CVE-2023-28654 | Osprey Pump Controller version 1.01 has a hidden administrative account that has the hardcoded password that allows full access to the web management interface configuration. The user is not visible in Usernames and Passwords menu list of the application and the password cannot be changed through any normal operation of the device. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 | 2023-03-21T21:17:06.877Z | 2023-03-28T20:03:03.238Z | 2023-03-28T20:03:03.238Z | {'Vendor': 'ProPump and Controls, Inc.', 'Product': 'Osprey Pump Controller', 'Versions': '1.01'} |
CVE-2023-28204 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited. | https://support.apple.com/en-us/HT213758 | 2023-03-13T00:00:00 | 2023-06-23T00:00:00 | 2023-07-27T03:46:21.574Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28711 | Insufficient control flow management in the Hyperscan Library maintained by Intel(R) before version 5.4.1 may allow an authenticated user to potentially enable denial of service via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00879.html | 2023-04-01T03:00:04.518Z | 2023-08-11T02:37:16.933Z | 2023-08-11T02:37:16.933Z | {'Vendor': 'n/a', 'Product': 'Hyperscan Library maintained by Intel(R)', 'Versions': 'before version 5.4.1'} |
CVE-2023-28341 | Stored Cross site scripting (XSS) vulnerability in Zoho ManageEngine Applications Manager through 16340 allows an unauthenticated user to inject malicious javascript on the incorrect login details page. | https://manageengine.com | 2023-03-14T00:00:00 | 2023-04-11T00:00:00 | 2023-04-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28195 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.3. An app may be able to read sensitive location information. | https://support.apple.com/en-us/HT213670 | 2023-03-13T18:37:25.756Z | 2023-09-06T01:36:35.868Z | 2023-09-06T01:36:35.868Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28896 | Access to critical Unified Diagnostics Services (UDS) of the Modular Infotainment Platform 3 (MIB3) infotainment is transmitted via Controller Area Network (CAN) bus in a form that can be easily decoded by attackers with physical access to the vehicle.
Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022.
| https://asrg.io/security-advisories/cve-2023-28896/ | 2023-03-27T14:51:13.967Z | 2023-12-01T14:01:05.877Z | 2023-12-01T14:01:05.877Z | {'Vendor': 'PREH GMBH', 'Product': 'MIB3 Infotainment Unit', 'Versions': '0'} |
CVE-2023-28879 | In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written. | https://bugs.ghostscript.com/show_bug.cgi?id=706494 | 2023-03-27T00:00:00 | 2023-03-31T00:00:00 | 2023-09-17T06:06:38.404811 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28480 | An issue was discovered in Tigergraph Enterprise 3.7.0. The TigerGraph platform allows users to define new User Defined Functions (UDFs) from C/C++ code. To support this functionality TigerGraph allows users to upload custom C/C++ code which is then compiled and installed into the platform. An attacker who has filesystem access on a remote TigerGraph system can alter the behavior of the database against the will of the database administrator; thus effectively bypassing the built in RBAC controls. | https://neo4j.com/security/cve-2023-28480/ | 2023-03-16T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28253 | Windows Kernel Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28253 | 2023-03-13T22:18:32.389Z | 2023-04-11T19:13:52.958Z | 2023-12-14T18:59:51.304Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28603 | Zoom VDI client installer prior to 5.14.0 contains an improper access control vulnerability. A malicious user may potentially delete local files without proper permissions. | https://explore.zoom.us/en/trust/security/security-bulletin/ | 2023-03-17T13:27:32.369Z | 2023-06-13T17:34:55.364Z | 2023-06-13T18:51:04.275Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom VDI Windows Meeting Client', 'Versions': 'before 5.14.0'} |
CVE-2023-28316 | A security vulnerability has been discovered in the implementation of 2FA on the rocket.chat platform, where other active sessions are not invalidated upon activating 2FA. This could potentially allow an attacker to maintain access to a compromised account even after 2FA is enabled. | https://hackerone.com/reports/992280 | 2023-03-14T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'Rocket.Chat', 'Versions': 'Fixed in 6.0> and back-ported accordingly to our supported versions. Check https://docs.rocket.chat/resources/get-support/enterprise-support#rocket.chat-versions for more info'} |
CVE-2023-28029 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T04:57:40.871Z | 2023-06-23T09:12:17.085Z | 2023-06-23T09:12:17.085Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28479 | An issue was discovered in Tigergraph Enterprise 3.7.0. The TigerGraph platform installs a full development toolchain within every TigerGraph deployment. An attacker is able to compile new executables on each Tigergraph system and modify system and Tigergraph binaries. | https://neo4j.com/security/cve-2023-28479/ | 2023-03-16T00:00:00 | 2023-08-15T00:00:00 | 2023-08-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28496 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SMTP2GO – Email Made Easy plugin <= 1.4.2 versions. | https://patchstack.com/database/vulnerability/smtp2go/wordpress-smtp2go-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-16T11:18:18.237Z | 2023-06-22T08:24:44.600Z | 2023-06-22T08:24:44.600Z | {'Vendor': 'SMTP2GO', 'Product': 'SMTP2GO – Email Made Easy', 'Versions': 'n/a'} |
CVE-2023-28750 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Ignazio Scimone Albo Pretorio On line plugin <= 4.6 versions. | https://patchstack.com/database/vulnerability/albo-pretorio-on-line/wordpress-albo-pretorio-on-line-plugin-4-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-22T16:47:14.447Z | 2023-06-22T11:25:14.380Z | 2023-06-22T11:25:14.380Z | {'Vendor': 'Ignazio Scimone', 'Product': 'Albo Pretorio On line', 'Versions': 'n/a'} |
CVE-2023-28300 | Azure Service Connector Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28300 | 2023-03-13T22:23:36.189Z | 2023-04-11T19:13:21.392Z | 2023-12-14T18:59:19.954Z | {'Vendor': 'Microsoft', 'Product': 'Azure Service Connector', 'Versions': '0.0.0'} |
CVE-2023-28584 | Transient DOS in WLAN Host when a mobile station receives invalid channel in CSA IE while doing channel switch announcement (CSA). | https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin | 2023-03-17T11:41:45.852Z | 2023-09-05T06:24:27.838Z | 2023-09-05T06:24:27.838Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6900, FastConnect 7800, QAM8255P, QAM8295P, QCA6310, QCA6320, QCA6420, QCA6430, QCA6554A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCM4325, QCM4490, QCS410, QCS4490, QCS610, QCS8550, SA4150P, SA6155P, SA8155P, SA8195P, SA8255P, SA8295P, SD 8 Gen1 5G, SD835, SD855, SG4150P, SM4450, Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SXR1230P, SXR2230P, WCD9335, WCD9340, WCD9341, WCD9370, WCD9375, WCD9380, WCD9385, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'} |
CVE-2023-28992 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Elliot Sowersby, RelyWP Coupon Affiliates – WooCommerce Affiliate Plugin plugin <= 5.4.3 versions. | https://patchstack.com/database/vulnerability/woo-coupon-usage/wordpress-coupon-affiliates-plugin-5-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-29T12:14:55.898Z | 2023-06-26T05:21:43.742Z | 2023-06-26T05:21:43.742Z | {'Vendor': 'Elliot Sowersby, RelyWP', 'Product': 'Coupon Affiliates – WooCommerce Affiliate Plugin', 'Versions': 'n/a'} |
CVE-2023-28838 | GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance > Statistics` and `Tools > Reports` read rights from every user. | https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f | 2023-03-24T16:25:34.465Z | 2023-04-05T17:39:04.966Z | 2023-04-05T17:39:04.966Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 0.50, < 9.5.13, >= 10.0.0, < 10.0.7'} |
CVE-2023-28091 | HPE OneView virtual appliance "Migrate server hardware" option may expose sensitive information in an HPE OneView support dump | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04467en_us | 2023-03-10T14:47:44.212Z | 2023-04-14T14:04:35.333Z | 2023-04-14T14:08:08.103Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '7.0'} |
CVE-2023-28212 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory. | https://support.apple.com/en-us/HT213670 | 2023-03-13T18:37:25.759Z | 2023-09-06T01:36:37.327Z | 2023-09-06T01:36:37.327Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-28642 | runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
| https://github.com/opencontainers/runc/security/advisories/GHSA-g2j6-57v7-gm8c | 2023-03-20T12:19:47.209Z | 2023-03-29T18:15:48.957Z | 2023-03-29T18:15:48.957Z | {'Vendor': 'opencontainers', 'Product': 'runc', 'Versions': '< 1.1.5'} |
CVE-2023-28357 | A vulnerability has been identified in Rocket.Chat, where the ACL checks in the Slash Command /mute occur after checking whether a user is a member of a given channel, leaking private channel members to unauthorized users. This allows authenticated users to enumerate whether a username is a member of a channel that they do not have access to. | https://hackerone.com/reports/1445810 | 2023-03-15T00:00:00 | 2023-05-11T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'Rocket.Chat', 'Versions': 'This issue has been fixed in version 6.0> and is backported for the supported versions. Check this document for more info: https://docs.rocket.chat/resources/get-support/enterprise-support#rocket.chat-versions'} |
CVE-2023-28707 | Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow Drill Provider.This issue affects Apache Airflow Drill Provider: before 2.3.2.
| https://github.com/apache/airflow/pull/30215 | 2023-03-21T16:20:38.379Z | 2023-04-07T14:53:24.274Z | 2023-04-07T14:53:24.274Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow Drill Provider', 'Versions': '0'} |
CVE-2023-28843 | PrestaShop/paypal is an open source module for the PrestaShop web commerce ecosystem which provides paypal payment support. A SQL injection vulnerability found in the PrestaShop paypal module from release from 3.12.0 to and including 3.16.3 allow a remote attacker to gain privileges, modify data, and potentially affect system availability. The cause of this issue is that SQL queries were being constructed with user input which had not been properly filtered. Only deployments on PrestaShop 1.6 are affected. Users are advised to upgrade to module version 3.16.4. There are no known workarounds for this vulnerability. | https://github.com/202ecommerce/paypal/security/advisories/GHSA-66pc-8gh8-mx7m | 2023-03-24T16:25:34.466Z | 2023-03-31T17:02:27.845Z | 2023-03-31T17:02:27.845Z | {'Vendor': '202ecommerce', 'Product': 'paypal', 'Versions': '>= 3.12.0, < 3.16.4'} |
CVE-2023-28140 |
An Executable Hijacking condition exists in the
Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers
may load a malicious copy of a Dependency Link Library (DLL) via a local
attack vector instead of the DLL that the application was expecting, when
processes are running with escalated privileges. This vulnerability
is bounded only to the time of uninstallation and can only be exploited
locally.
At the time of this disclosure, versions before 4.0 are classified as End of
Life.
| https://www.qualys.com/security-advisories/ | 2023-03-10T21:23:28.796Z | 2023-04-18T15:47:37.719Z | 2023-04-18T15:47:37.719Z | {'Vendor': 'Qualys', 'Product': 'Cloud Agent', 'Versions': '3.1.3.34'} |
CVE-2023-28005 | A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows� Secure Boot process in an attempt to execute other attacks to obtain access to the contents of the device.
An attacker must first obtain physical access to the target system in order to exploit this vulnerability. It is also important to note that the contents of the drive(s) encrypted with TMEE FDE would still be protected and would NOT be accessible by the attacker by exploitation of this vulnerability alone. | https://success.trendmicro.com/solution/000292473 | 2023-03-09T22:34:57.194Z | 2023-03-14T21:51:21.908Z | 2023-03-22T04:39:47.581424Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Endpoint Encryption Full Disk Encryption', 'Versions': '6.0'} |
CVE-2023-28286 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28286 | 2023-03-13T22:23:36.185Z | 2023-04-27T18:34:08.500Z | 2023-12-14T18:31:56.243Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Edge (Chromium-based)', 'Versions': '1.0.0'} |
CVE-2023-28269 | Windows Boot Manager Security Feature Bypass Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28269 | 2023-03-13T22:23:36.181Z | 2023-04-11T19:13:45.999Z | 2023-12-14T18:59:44.417Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28793 | Buffer overflow vulnerability in the signelf library used by Zscaler Client Connector on Linux allows Code Injection. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
| https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.3.1&deployment_date=2022-09-19 | 2023-03-23T18:29:15.801Z | 2023-10-23T13:26:08.391Z | 2023-10-23T13:26:08.391Z | {'Vendor': 'Zscaler', 'Product': 'Client Connector', 'Versions': '0'} |
CVE-2023-28639 | GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7. | https://github.com/glpi-project/glpi/releases/tag/10.0.7 | 2023-03-20T00:00:00 | 2023-04-05T00:00:00 | 2023-04-05T00:00:00 | {'Vendor': 'glpi', 'Product': 'glpi', 'Versions': '0.85, 9.5.13, 10.0.0, 10.0.7'} |
CVE-2023-28117 | Sentry SDK is the official Python SDK for Sentry, real-time crash reporting software. When using the Django integration of versions prior to 1.14.0 of the Sentry SDK in a specific configuration it is possible to leak sensitive cookies values, including the session cookie to Sentry. These sensitive cookies could then be used by someone with access to your Sentry issues to impersonate or escalate their privileges within your application.
In order for these sensitive values to be leaked, the Sentry SDK configuration must have `sendDefaultPII` set to `True`; one must use a custom name for either `SESSION_COOKIE_NAME` or `CSRF_COOKIE_NAME` in one's Django settings; and one must not be configured in one's organization or project settings to use Sentry's data scrubbing features to account for the custom cookie names.
As of version 1.14.0, the Django integration of the `sentry-sdk` will detect the custom cookie names based on one's Django settings and will remove the values from the payload before sending the data to Sentry. As a workaround, use the SDK's filtering mechanism to remove the cookies from the payload that is sent to Sentry. For error events, this can be done with the `before_send` callback method and for performance related events (transactions) one can use the `before_send_transaction` callback method. Those who want to handle filtering of these values on the server-side can also use Sentry's advanced data scrubbing feature to account for the custom cookie names. Look for the `$http.cookies`, `$http.headers`, `$request.cookies`, or `$request.headers` fields to target with a scrubbing rule. | https://github.com/getsentry/sentry-python/security/advisories/GHSA-29pr-6jr8-q5jm | 2023-03-10T18:34:29.228Z | 2023-03-22T19:37:18.748Z | 2023-03-22T19:37:18.748Z | {'Vendor': 'getsentry', 'Product': 'sentry-python', 'Versions': '< 1.14.0'} |
CVE-2023-28052 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T05:01:43.872Z | 2023-06-23T09:02:08.343Z | 2023-06-23T09:02:08.343Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All versions'} |
CVE-2023-28681 | Jenkins Visual Studio Code Metrics Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2926 | 2023-03-20T19:59:08.758Z | 2023-03-23T11:26:08.881Z | 2023-10-24T12:49:27.348Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Visual Studio Code Metrics Plugin', 'Versions': '0'} |
CVE-2023-28394 | Beekeeper Studio versions prior to 3.9.9 allows a remote authenticated attacker to execute arbitrary JavaScript code with the privilege of the application on the PC where the affected product is installed. As a result, an arbitrary OS command may be executed as well. | https://www.beekeeperstudio.io/ | 2023-03-15T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'Beekeeper Studio, Inc.', 'Product': 'Beekeeper Studio', 'Versions': 'versions prior to 3.9.9'} |
CVE-2023-28802 | An Improper Validation of Integrity Check Value in Zscaler Client Connector on Windows allows an authenticated user to disable ZIA/ZPA by interrupting the service restart from Zscaler Diagnostics. This issue affects Client Connector: before 4.2.0.149.
| https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023?applicable_category=Windows&applicable_version=4.2 | 2023-03-23T18:29:15.803Z | 2023-11-21T10:51:50.755Z | 2023-11-21T10:51:50.755Z | {'Vendor': 'Zscaler', 'Product': 'Client Connector', 'Versions': '0'} |
CVE-2023-28551 | Memory corruption in UTILS when modem processes memory specific Diag commands having arbitrary address values as input arguments. | https://www.qualcomm.com/company/product-security/bulletins/december-2023-bulletin | 2023-03-17T11:41:45.846Z | 2023-12-05T03:03:50.075Z | 2023-12-05T03:03:50.075Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, 9205 LTE Modem, 9206 LTE Modem, 9207 LTE Modem, APQ8017, APQ8037, AQT1000, AR8035, C-V2X 9150, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, FSM10055, MDM8207, MDM9205S, MDM9250, MDM9628, MDM9640, MSM8108, MSM8209, MSM8608, MSM8909W, MSM8996AU, QCA4004, QCA6174A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595AU, QCA6696, QCA6698AQ, QCA8081, QCA8337, QCA9367, QCA9377, QCC710, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS2290, QCS410, QCS4290, QCS4490, QCS5430, QCS610, QCS6125, QCS6490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, QTS110, Qualcomm 205 Mobile Platform, Qualcomm 215 Mobile Platform, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, SC8180X+SDX55, SD 455, SD 675, SD460, SD626, SD660, SD662, SD670, SD675, SD730, SD820, SD835, SD855, SD865 5G, SD888, SDM429W, SDX55, SDX57M, SG4150P, SG8275P, SM4125, SM6250, SM6250P, SM7250P, SM7315, SM7325P, SM8550P, Smart Audio 200 Platform, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon 1100 Wearable Platform, Snapdragon 1200 Wearable Platform, Snapdragon 208 Processor, Snapdragon 210 Processor, Snapdragon 212 Mobile Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 425 Mobile Platform, Snapdragon 429 Mobile Platform, Snapdragon 430 Mobile Platform, Snapdragon 439 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon Auto 5G Modem-RF, Snapdragon Auto 5G Modem-RF Gen 2, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 1300 Platform, Snapdragon Wear 2100 Platform, Snapdragon Wear 2500 Platform, Snapdragon Wear 3100 Platform, Snapdragon Wear 4100+ Platform, Snapdragon X12 LTE Modem, Snapdragon X20 LTE Modem, Snapdragon X24 LTE Modem, Snapdragon X5 LTE Modem, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR1120, SXR2130, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCD9390, WCD9395, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-28101 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4, if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. A fix is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, use a GUI like GNOME Software rather than the command-line interface, or only install apps whose maintainers you trust. | https://github.com/flatpak/flatpak/security/advisories/GHSA-h43h-fwqx-mpp8 | 2023-03-10T18:34:29.226Z | 2023-03-16T15:55:53.576Z | 2023-03-16T15:55:53.576Z | {'Vendor': 'flatpak', 'Product': 'flatpak', 'Versions': '< 1.10.8, >= 1.12.0, < 1.12.8, >= 1.14.0, < 1.14.4, >= 1.15.0, < 1.15.4'} |
CVE-2023-28414 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in ApexChat plugin <= 1.3.1 versions. | https://patchstack.com/database/vulnerability/apexchat/wordpress-apexchat-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-15T12:35:19.370Z | 2023-05-12T15:10:27.666Z | 2023-05-12T15:10:27.666Z | {'Vendor': 'ApexChat', 'Product': 'ApexChat', 'Versions': 'n/a'} |
CVE-2023-28044 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T04:59:39.426Z | 2023-06-23T10:20:01.132Z | 2023-06-23T10:20:01.132Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28697 | Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7021-eb43a-1.html | 2023-03-21T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'Moxa', 'Product': 'MiiNePort E1', 'Versions': '1.7.2'} |
CVE-2023-28228 | Windows Spoofing Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28228 | 2023-03-13T22:18:32.384Z | 2023-04-11T19:13:36.879Z | 2023-12-14T18:59:35.589Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28678 | Jenkins Cppcheck Plugin 1.26 and earlier does not escape file names from Cppcheck report files before showing them on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control report file contents. | https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2809 | 2023-03-20T19:59:08.757Z | 2023-03-23T11:26:06.733Z | 2023-10-24T12:49:23.891Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Cppcheck Plugin', 'Versions': '0'} |
CVE-2023-28382 | Directory traversal vulnerability in ESS REC Agent Server Edition series allows an authenticated attacker to view or alter an arbitrary file on the server. Affected products and versions are as follows: ESS REC Agent Server Edition for Linux V1.0.0 to V1.4.3, ESS REC Agent Server Edition for Solaris V1.1.0 to V1.4.0, ESS REC Agent Server Edition for HP-UX V1.1.0 to V1.4.0, and ESS REC Agent Server Edition for AIX V1.2.0 to V1.4.1 | https://customer.et-x.jp/app/answers/detail/a_id/2260 | 2023-03-15T00:00:00 | 2023-05-26T00:00:00 | 2023-05-26T00:00:00 | {'Vendor': 'Encourage Technologies Co.,Ltd.', 'Product': 'ESS REC Agent Server Edition series', 'Versions': 'ESS REC Agent Server Edition for Linux V1.0.0 to V1.4.3, ESS REC Agent Server Edition for Solaris V1.1.0 to V1.4.0, ESS REC Agent Server Edition for HP-UX V1.1.0 to V1.4.0, and ESS REC Agent Server Edition for AIX V1.2.0 to V1.4.1'} |
CVE-2023-28506 | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 suffer from a stack-based buffer overflow, where a string is copied into a buffer using a memcpy-like function and a user-provided length. This requires a valid login to exploit. | https://www.rapid7.com/blog/post/2023/03/29/multiple-vulnerabilities-in-rocket-software-unirpc-server-fixed/ | 2023-03-16T20:44:20.345Z | 2023-03-29T20:13:44.320Z | 2023-03-29T20:13:44.320Z | {'Vendor': 'Rocket Software', 'Product': 'UniData', 'Versions': '0'} |
CVE-2023-28855 | Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior to versions 1.13.1 and 1.20.4, lack of access control check allows any authenticated user to write data to any fields container, including those to which they have no configured access. Versions 1.13.1 and 1.20.4 contain a patch for this issue. | https://github.com/pluginsGLPI/fields/security/advisories/GHSA-52vv-hm4x-8584 | 2023-03-24T16:25:34.468Z | 2023-04-05T17:48:22.384Z | 2023-04-05T17:48:22.384Z | {'Vendor': 'pluginsGLPI', 'Product': 'fields', 'Versions': '< 1.13.1, >= 1.20.0, < 1.20.4'} |
CVE-2023-28013 | HCL Verse is susceptible to a Reflected Cross Site Scripting (XSS) vulnerability. By tricking a user into entering crafted markup a remote, unauthenticated attacker could execute script in a victim's web browser to perform operations as the victim and/or steal the victim's cookies, session tokens, or other sensitive information.
| https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0105905 | 2023-03-10T03:50:27.023Z | 2023-07-26T22:54:44.917Z | 2023-07-31T17:13:33.252Z | {'Vendor': 'HCL Software', 'Product': 'HCL Verse', 'Versions': '< 3.1'} |
CVE-2023-28443 | Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 9.23.3, the `directus_refresh_token` is not redacted properly from the log outputs and can be used to impersonate users without their permission. This issue is patched in version 9.23.3. | https://github.com/directus/directus/security/advisories/GHSA-8vg2-wf3q-mwv7 | 2023-03-15T15:59:10.056Z | 2023-03-23T23:13:58.299Z | 2023-03-23T23:13:58.299Z | {'Vendor': 'directus', 'Product': 'directus', 'Versions': '< 9.23.3'} |
CVE-2023-28290 | Microsoft Remote Desktop app for Windows Information Disclosure Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28290 | 2023-03-13T22:23:36.186Z | 2023-05-09T17:03:08.342Z | 2023-12-14T19:06:18.011Z | {'Vendor': 'Microsoft', 'Product': 'Microsoft Remote Desktop', 'Versions': '10.1.0.0'} |
CVE-2023-28785 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Yoast Yoast SEO: Local plugin <= 14.9 versions. | https://patchstack.com/database/vulnerability/wpseo-local/wordpress-yoast-seo-local-plugin-14-9-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-03-23T17:03:15.168Z | 2023-05-28T18:47:17.763Z | 2023-05-28T18:47:17.763Z | {'Vendor': 'Yoast', 'Product': 'Yoast SEO: Local', 'Versions': 'n/a'} |
CVE-2023-28448 | Versionize is a framework for version tolerant serializion/deserialization of Rust data structures, designed for usecases that need fast deserialization times and minimal size overhead. An issue was discovered in the ‘Versionize::deserialize’ implementation provided by the ‘versionize’ crate for ‘vmm_sys_utils::fam::FamStructWrapper', which can lead to out of bounds memory accesses. The impact started with version 0.1.1. The issue was corrected in version 0.1.10 by inserting a check that verifies, for any deserialized header, the lengths of compared flexible arrays are equal and aborting deserialization otherwise.
| https://github.com/firecracker-microvm/versionize/security/advisories/GHSA-8vxc-r5wp-vgvc | 2023-03-15T15:59:10.057Z | 2023-03-24T19:34:29.037Z | 2023-03-24T19:34:29.037Z | {'Vendor': 'firecracker-microvm', 'Product': 'versionize', 'Versions': '< 0.1.10'} |
CVE-2023-28331 | Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk. | https://moodle.org/mod/forum/discuss.php?d=445063 | 2023-03-14T00:00:00 | 2023-03-23T00:00:00 | 2023-03-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.1 to 4.1.1, 4.0 to 4.0.6, 3.11 to 3.11.12, 3.9 to 3.9.19 and earlier unsupported versions'} |
CVE-2023-28761 | In SAP NetWeaver Enterprise Portal - version 7.50, an unauthenticated attacker can attach to an open interface and make use of an open API to access a service which will enable them to access or modify server settings and data, leading to limited impact on confidentiality and integrity.
| https://launchpad.support.sap.com/#/notes/3289994 | 2023-03-23T04:20:27.699Z | 2023-04-11T02:51:23.530Z | 2023-04-11T20:18:43.102Z | {'Vendor': 'SAP', 'Product': 'NetWeaver Enterprise Portal', 'Versions': '7.50'} |
CVE-2023-28274 | Windows Win32k Elevation of Privilege Vulnerability | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28274 | 2023-03-13T22:23:36.182Z | 2023-04-11T19:13:51.361Z | 2023-12-14T18:59:49.743Z | {'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'} |
CVE-2023-28809 | Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user. | https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-access-control-intercom/ | 2023-03-23T00:00:00 | 2023-06-15T00:00:00 | 2023-09-05T16:06:26.704372 | {'Vendor': 'hikvision', 'Product': 'DS-K1T804AXX', 'Versions': 'V1.4.0_build221212'} |
CVE-2023-28736 | Buffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html | 2023-04-01T03:00:04.501Z | 2023-08-11T02:36:51.218Z | 2023-08-11T02:36:51.218Z | {'Vendor': 'n/a', 'Product': 'Intel(R) SSD Tools software', 'Versions': 'before version mdadm-4.2-rc2'} |
CVE-2023-28366 | The broker in Eclipse Mosquitto 1.3.2 through 2.x before 2.0.16 has a memory leak that can be abused remotely when a client sends many QoS 2 messages with duplicate message IDs, and fails to respond to PUBREC commands. This occurs because of mishandling of EAGAIN from the libc send function. | https://github.com/eclipse/mosquitto/compare/v2.0.15...v2.0.16 | 2023-03-15T00:00:00 | 2023-09-01T00:00:00 | 2024-01-07T10:06:19.321332 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.