CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-28039
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T04:59:39.425Z
2023-06-23T09:51:49.758Z
2023-06-23T09:51:49.758Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28486
Sudo before 1.9.13 does not escape control characters in log messages.
https://github.com/sudo-project/sudo/commit/334daf92b31b79ce68ed75e2ee14fca265f029ca
2023-03-16T00:00:00
2023-03-16T00:00:00
2023-09-29T13:06:21.533399
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28255
Windows DNS Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28255
2023-03-13T22:18:32.390Z
2023-04-11T19:13:55.078Z
2023-12-14T18:59:53.412Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-28310
Microsoft Exchange Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28310
2023-03-13T22:23:36.191Z
2023-06-14T14:52:08.662Z
2024-01-09T17:39:02.028Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Exchange Server 2016 Cumulative Update 23', 'Versions': '15.01.0'}
CVE-2023-28740
Uncontrolled search path element in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00861.html
2023-04-13T03:00:03.841Z
2023-11-14T19:05:13.791Z
2023-11-14T19:05:13.791Z
{'Vendor': 'n/a', 'Product': 'Intel(R) QAT drivers for Windows - HW Version 2.0', 'Versions': 'before version 2.0.4'}
CVE-2023-28185
An integer overflow was addressed through improved input validation. This issue is fixed in tvOS 16.4, macOS Big Sur 11.7.5, iOS 16.4 and iPadOS 16.4, watchOS 9.4, macOS Monterey 12.6.4, iOS 15.7.4 and iPadOS 15.7.4. An app may be able to cause a denial-of-service.
https://support.apple.com/en-us/HT213676
2023-03-13T18:37:25.755Z
2024-01-10T22:03:45.995Z
2024-01-10T22:03:45.995Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-28869
Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers read the contents of arbitrary files on the operating system by creating a symbolic link.
https://herolab.usd.de/en/security-advisories/usd-2022-0003/
2023-03-27T00:00:00
2023-12-09T00:00:00
2023-12-09T06:30:24.600372
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28490
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Estatik Estatik Mortgage Calculator plugin <= 2.0.7 versions.
https://patchstack.com/database/vulnerability/estatik-mortgage-calculator/wordpress-wordpress-mortgage-calculator-estatik-plugin-2-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-16T11:18:18.236Z
2023-09-27T05:05:19.138Z
2023-09-27T05:05:19.138Z
{'Vendor': 'Estatik', 'Product': 'Estatik Mortgage Calculator', 'Versions': 'n/a'}
CVE-2023-28613
An issue was discovered in Samsung Exynos Mobile Processor and Baseband Modem Processor for Exynos 1280, Exynos 2200, and Exynos Modem 5300. An integer overflow in IPv4 fragment handling can occur due to insufficient parameter validation when reassembling these fragments.
https://semiconductor.samsung.com/processor/modem/
2023-03-18T00:00:00
2023-04-04T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28243
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28243
2023-03-13T22:18:32.388Z
2023-04-11T19:13:43.867Z
2023-12-14T18:59:42.345Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28756
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/
2023-03-23T00:00:00
2023-03-31T00:00:00
2024-01-24T05:06:38.560368
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28306
Windows DNS Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28306
2023-03-13T22:23:36.190Z
2023-04-11T19:14:01.637Z
2023-12-14T18:59:59.592Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2019', 'Versions': '10.0.0'}
CVE-2023-28428
PDFio is a C library for reading and writing PDF files. In versions 1.1.0 and prior, a denial of service vulnerability exists in the pdfio parser. Crafted pdf files can cause the program to run at 100% utilization and never terminate. This is different from CVE-2023-24808. A patch for this issue is available in version 1.1.1.
https://github.com/michaelrsweet/pdfio/security/advisories/GHSA-68x8-9phf-j7jf
2023-03-15T15:59:10.051Z
2023-03-20T14:51:43.619Z
2023-03-20T14:51:43.619Z
{'Vendor': 'michaelrsweet', 'Product': 'pdfio', 'Versions': '<= 1.1.0'}
CVE-2023-28097
OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.9 and 3.2.6, a malformed SIP message containing a large _Content-Length_ value and a specially crafted Request-URI causes a segmentation fault in OpenSIPS. This issue occurs when a large amount of shared memory using the `-m` flag was allocated to OpenSIPS, such as 10 GB of RAM. On the test system, this issue occurred when shared memory was set to `2362` or higher. This issue is fixed in versions 3.1.9 and 3.2.6. The only workaround is to guarantee that the Content-Length value of input messages is never larger than `2147483647`.
https://github.com/OpenSIPS/opensips/security/advisories/GHSA-c6j5-f4h4-2xrq
2023-03-10T18:34:29.225Z
2023-03-15T22:03:41.362Z
2023-03-15T22:03:41.362Z
{'Vendor': 'OpenSIPS', 'Product': 'opensips', 'Versions': '< 3.1.9, >= 3.2.0, < 3.2.6'}
CVE-2023-28994
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in UX-themes Flatsome plugin <= 3.16.8 versions.
https://patchstack.com/database/vulnerability/flatsome/wordpress-flatsome-theme-3-16-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-29T12:14:55.899Z
2023-08-23T14:04:05.637Z
2023-08-23T14:04:05.637Z
{'Vendor': 'UX-themes', 'Product': 'Flatsome', 'Versions': 'n/a'}
CVE-2023-28214
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.
https://support.apple.com/en-us/HT213670
2023-03-13T18:37:25.759Z
2023-09-06T01:36:40.847Z
2023-09-06T01:36:40.847Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-28644
Nextcloud server is an open source home cloud implementation. In releases of the 25.0.x branch before 25.0.3 an inefficient fetch operation may impact server performances and/or can lead to a denial of service. This issue has been addressed and it is recommended that the Nextcloud Server is upgraded to 25.0.3. There are no known workarounds for this vulnerability.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9wmj-gp8v-477j
2023-03-20T12:19:47.209Z
2023-03-30T18:36:27.380Z
2023-03-30T18:36:27.380Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.3'}
CVE-2023-28351
An issue was discovered in Faronics Insight 10.0.19045 on Windows. Every keystroke made by any user on a computer with the Student application installed is logged to a world-readable directory. A local attacker can trivially extract these cleartext keystrokes, potentially enabling them to obtain PII and/or to compromise personal accounts owned by the victim.
https://research.nccgroup.com/?research=Technical%20advisories
2023-03-14T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28701
ELITE TECHNOLOGY CORP. Web Fax has a vulnerability of SQL Injection. An unauthenticated remote attacker can inject SQL commands into the input field of the login page to perform arbitrary system commands, disrupt service or terminate service.
https://www.twcert.org.tw/tw/cp-132-7145-1a0d4-1.html
2023-03-21T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'ELITE', 'Product': 'Web Fax', 'Versions': '0'}
CVE-2023-28845
Nextcloud talk is a video & audio conferencing app for Nextcloud. In affected versions the talk app does not properly filter access to a conversations member list. As a result an attacker could use this vulnerability to gain information about the members of a Talk conversation, even if they themselves are not members. It is recommended that the Nextcloud Talk is upgraded to 14.0.9 or 15.0.4. There are no known workarounds for this vulnerability.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3m6r-479j-4chf
2023-03-24T16:25:34.466Z
2023-03-31T22:13:44.046Z
2023-03-31T22:13:44.046Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 15.0.0, < 15.0.4, >= 14.0.0, < 14.0.9'}
CVE-2023-28900
The Skoda Automotive cloud contains a Broken Access Control vulnerability, allowing to obtain nicknames and other user identifiers of Skoda Connect service users by specifying an arbitrary vehicle VIN number.
https://asrg.io/security-advisories/cve-2023-28900
2023-03-27T14:51:13.968Z
2024-01-18T16:23:07.819Z
2024-01-18T16:23:07.819Z
{'Vendor': 'Škoda Auto', 'Product': 'Škoda Connect', 'Versions': '0'}
CVE-2023-28003
A CWE-613: Insufficient Session Expiration vulnerability exists that could allow an attacker to maintain unauthorized access over a hijacked session in PME after the legitimate user has signed out of their account.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-073-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-073-01.pdf
2023-03-09T15:40:32.544Z
2023-04-18T20:43:50.362Z
2023-04-18T20:43:50.362Z
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Power Monitoring Expert', 'Versions': 'All '}
CVE-2023-28795
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=Linux&applicable_version=1.3.1&deployment_date=2022-09-19
2023-03-23T18:29:15.802Z
2023-10-23T13:27:24.262Z
2023-10-23T13:27:24.262Z
{'Vendor': 'Zscaler', 'Product': 'Client Connector', 'Versions': '0'}
CVE-2023-28812
There is a buffer overflow vulnerability in a web browser plug-in could allow an attacker to exploit the vulnerability by sending crafted messages to computers installed with this plug-in, which could lead to arbitrary code execution or cause process exception of the plug-in.
https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-web-browser-plug-in-locals/
2023-03-23T19:49:08.440Z
2023-11-23T08:35:01.739Z
2023-11-23T08:35:01.739Z
{'Vendor': 'Hikvision', 'Product': 'LocalServiceComponents', 'Versions': 'version 1.0.0.78 and the versions prior to it'}
CVE-2023-28111
Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, attackers are able to bypass Discourse's server-side request forgery (SSRF) protection for private IPv4 addresses by using a IPv4-mapped IPv6 address. The issue is patched in the latest beta and tests-passed version of Discourse. version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
https://github.com/discourse/discourse/security/advisories/GHSA-26h3-8ww8-v5fc
2023-03-10T18:34:29.227Z
2023-03-17T17:00:04.375Z
2023-03-17T17:00:04.375Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'beta < 3.1.0.beta3, tests-passed < 3.1.0.beta3'}
CVE-2023-28541
Memory Corruption in Data Modem while processing DMA buffer release event about CFR data.
https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin
2023-03-17T11:41:45.845Z
2023-07-04T04:46:44.316Z
2023-07-04T04:46:44.316Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AQT1000, AR8031, AR9380, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, MDM9250, MDM9628, MDM9640, MDM9650, MSM8909W, QAM8255P, QAM8295P, QCA4024, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA6797AQ, QCA7500, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9377, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9990, QCA9992, QCA9994, QCM6125, QCM6490, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6122, QCN6132, QCN7605, QCN7606, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS410, QCS610, QCS6125, QCS6490, QRB5165M, QRB5165N, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA6145P, SA6150P, SA6155P, SA8145P, SA8150P, SA8155P, SA8195P, SA8255P, SA8295P, SD660, SD835, SD855, SD865 5G, SDM429W, SDX20M, SDX55, SDX65M, Smart Audio 400 Platform, Snapdragon 429 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 820 Automotive Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon Wear 2100 Platform, Snapdragon Wear 2500 Platform, Snapdragon Wear 3100 Platform, Snapdragon X20 LTE Modem, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR2 5G Platform, Snapdragon Auto 4G Modem, SW5100, SW5100P, SXR2130, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9375, WCD9380, WCD9385, WCN3620, WCN3660B, WCN3950, WCN3980, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8835'}
CVE-2023-28054
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T05:01:43.872Z
2023-06-23T09:06:40.143Z
2023-06-23T09:06:40.143Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28404
Out-of-bounds read in the Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers before version 31.0.101.4255 may allow an authenticated user to potentially enable information disclosure via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00864.html
2023-03-22T03:00:05.368Z
2023-11-14T19:04:24.382Z
2023-11-14T19:04:24.382Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Arc(TM) & Iris(R) Xe Graphics - WHQL - Windows drivers', 'Versions': 'before version 31.0.101.4255'}
CVE-2023-28668
Jenkins Role-based Authorization Strategy Plugin 587.v2872c41fa_e51 and earlier grants permissions even after they've been disabled.
https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3053
2023-03-20T19:59:08.755Z
2023-03-23T11:25:59.292Z
2023-10-24T12:49:12.141Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Role-based Authorization Strategy Plugin', 'Versions': '0'}
CVE-2023-28392
Wi-Fi AP UNIT AC-PD-WAPU v1.05_B04 and earlier, AC-PD-WAPUM v1.05_B04 and earlier, AC-PD-WAPU-P v1.05_B04P and earlier, AC-PD-WAPUM-P v1.05_B04P and earlier, AC-WAPU-300 v1.00_B07 and earlier, AC-WAPU-300-P v1.00_B08P and earlier, AC-WAPUM-300 v1.00_B07 and earlier, and AC-WAPUM-300-P v1.00_B08P and earlier allow an authenticated user with an administrative privilege to execute an arbitrary OS command.
https://www.inaba.co.jp/abaniact/news/Wi-Fi%20AP%20UNIT%E3%80%8CAC-WAPU-300%E3%80%8D%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8BOS%E3%82%B3%E3%83%9E%E3%83%B3%E3%83%89%E3%82%A4%E3%83%B3%E3%82%B8%E3%82%A7%E3%82%AF%E3%82%B7%E3%83%A7%E3%83%B3%E3%81%AE%E8%84%86%E5%BC%B1%E6%80%A7%E3%81%AB%E3%81%A4%E3%81%84%E3%81%A6.pdf
2023-03-15T00:00:00
2023-05-23T00:00:00
2023-06-09T00:00:00
{'Vendor': 'Inaba Denki Sangyo Co., Ltd.', 'Product': 'Wi-Fi AP UNIT', 'Versions': 'AC-WAPU-300 v1.00_B07 and earlier, AC-WAPU-300-P v1.00_B08P and earlier, AC-WAPUM-300 v1.00_B07 and earlier, and AC-WAPUM-300-P v1.00_B08P and earlier'}
CVE-2023-28238
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28238
2023-03-13T22:18:32.387Z
2023-04-11T19:13:41.719Z
2023-12-14T18:59:40.282Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28557
Memory corruption in WLAN HAL while processing command parameters from untrusted WMI payload.
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
2023-03-17T11:41:45.847Z
2023-09-05T06:24:12.673Z
2023-09-05T06:24:12.673Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': '315 5G IoT Modem, AQT1000, AR8031, AR8035, AR9380, CSR8811, CSRA6620, CSRA6640, CSRB31024, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, IPQ4018, IPQ4028, IPQ4029, IPQ5010, IPQ5028, IPQ6000, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8069, IPQ8070, IPQ8070A, IPQ8071A, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9574, PMP8074, QAM8295P, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA4024, QCA6310, QCA6320, QCA6335, QCA6391, QCA6420, QCA6421, QCA6426, QCA6428, QCA6430, QCA6431, QCA6436, QCA6438, QCA6554A, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6696, QCA6698AQ, QCA8072, QCA8075, QCA8081, QCA8082, QCA8084, QCA8085, QCA8337, QCA8386, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCM2290, QCM4290, QCM4325, QCM4490, QCM6125, QCM6490, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN6023, QCN6024, QCN6100, QCN6102, QCN6112, QCN6122, QCN6132, QCN7605, QCN7606, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9274, QCS2290, QCS410, QCS4290, QCS4490, QCS610, QCS6125, QCS6490, QCS8250, QRB5165M, QRB5165N, QSM8250, QSM8350, Qualcomm Robotics RB3 Platform, Qualcomm Robotics RB5 Platform, SA4150P, SA6145P, SA6150P, SA6155, SA6155P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8295P, SC8180X+SDX55, SD 455, SD 675, SD 8 Gen1 5G, SD 8CX, SD460, SD660, SD662, SD670, SD675, SD730, SD835, SD855, SD865 5G, SD888, SDX55, SG4150P, SM4125, SM4450, SM6250, SM6250P, SM7250P, SM7315, SM7325P, Smart Audio 400 Platform, Snapdragon 4 Gen 1 Mobile Platform, Snapdragon 460 Mobile Platform, Snapdragon 480 5G Mobile Platform, Snapdragon 480+ 5G Mobile Platform (SM4350-AC), Snapdragon 630 Mobile Platform, Snapdragon 636 Mobile Platform, Snapdragon 660 Mobile Platform, Snapdragon 662 Mobile Platform, Snapdragon 665 Mobile Platform, Snapdragon 670 Mobile Platform, Snapdragon 675 Mobile Platform, Snapdragon 678 Mobile Platform (SM6150-AC), Snapdragon 680 4G Mobile Platform, Snapdragon 685 4G Mobile Platform (SM6225-AD), Snapdragon 690 5G Mobile Platform, Snapdragon 695 5G Mobile Platform, Snapdragon 710 Mobile Platform, Snapdragon 712 Mobile Platform, Snapdragon 720G Mobile Platform, Snapdragon 730 Mobile Platform (SM7150-AA), Snapdragon 730G Mobile Platform (SM7150-AB), Snapdragon 732G Mobile Platform (SM7150-AC), Snapdragon 750G 5G Mobile Platform, Snapdragon 765 5G Mobile Platform (SM7250-AA), Snapdragon 765G 5G Mobile Platform (SM7250-AB), Snapdragon 768G 5G Mobile Platform (SM7250-AC), Snapdragon 778G 5G Mobile Platform, Snapdragon 778G+ 5G Mobile Platform (SM7325-AE), Snapdragon 780G 5G Mobile Platform, Snapdragon 782G Mobile Platform (SM7325-AF), Snapdragon 7c Compute Platform (SC7180-AC), Snapdragon 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", Snapdragon 7c+ Gen 3 Compute, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 8+ Gen 1 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon 845 Mobile Platform, Snapdragon 850 Mobile Compute Platform, Snapdragon 855 Mobile Platform, Snapdragon 855+/860 Mobile Platform (SM8150-AC), Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon 888 5G Mobile Platform, Snapdragon 888+ 5G Mobile Platform (SM8350-AC), Snapdragon 8c Compute Platform (SC8180X-AD) "Poipu Lite", Snapdragon 8c Compute Platform (SC8180XP-AD) "Poipu Lite", Snapdragon 8cx Compute Platform (SC8180X-AA, AB), Snapdragon 8cx Compute Platform (SC8180XP-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180X-AC, AF) "Poipu Pro", Snapdragon 8cx Gen 2 5G Compute Platform (SC8180XP-AA, AB), Snapdragon 8cx Gen 3 Compute Platform (SC8280XP-AB, BB), Snapdragon AR2 Gen 1 Platform, Snapdragon Auto 5G Modem-RF, Snapdragon W5+ Gen 1 Wearable Platform, Snapdragon X50 5G Modem-RF System, Snapdragon X55 5G Modem-RF System, Snapdragon X65 5G Modem-RF System, Snapdragon XR1 Platform, Snapdragon XR2 5G Platform, Snapdragon XR2+ Gen 1 Platform, Snapdragon Auto 4G Modem, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1230P, SXR2130, SXR2230P, Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, WCD9326, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9380, WCD9385, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3999, WCN6740, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835'}
CVE-2023-28107
Discourse is an open-source discussion platform. Prior to version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches, a user logged as an administrator can request backups multiple times, which will eat up all the connections to the DB. If this is done on a site using multisite, then it can affect the whole cluster. The vulnerability is patched in version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds.
https://github.com/discourse/discourse/security/advisories/GHSA-cp7c-fm4c-6xxx
2023-03-10T18:34:29.227Z
2023-03-17T16:23:31.324Z
2023-03-17T16:23:31.324Z
{'Vendor': 'discourse', 'Product': 'discourse', 'Versions': 'stable < 3.0.2, beta < 3.1.0.beta3, tests-passed < 3.1.0.beta3'}
CVE-2023-28804
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105
https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023
2023-03-23T18:29:15.803Z
2023-10-23T13:33:19.903Z
2023-10-23T13:33:19.903Z
{'Vendor': 'Zscaler', 'Product': 'Client Connector', 'Versions': '0'}
CVE-2023-28412
When supplied with a random MAC address, Snap One OvrC cloud servers will return information about the device. The MAC address of devices can be enumerated in an attack and the OvrC cloud will disclose their information.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01
2023-04-26T19:18:23.279Z
2023-05-22T19:24:06.082Z
2023-05-22T19:24:06.082Z
{'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'}
CVE-2023-28042
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T04:59:39.426Z
2023-06-23T09:22:39.934Z
2023-06-23T09:22:39.934Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28384
mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-096-06
2023-04-03T21:34:49.132Z
2023-04-27T22:09:56.434Z
2023-04-27T22:09:56.434Z
{'Vendor': 'mySCADA Technologies', 'Product': 'mySCADA myPRO', 'Versions': '0'}
CVE-2023-28853
Mastodon is a free, open-source social network server based on ActivityPub Mastodon allows configuration of LDAP for authentication. Starting in version 2.5.0 and prior to versions 3.5.8, 4.0.4, and 4.1.2, the LDAP query made during login is insecure and the attacker can perform LDAP injection attack to leak arbitrary attributes from LDAP database. This issue is fixed in versions 3.5.8, 4.0.4, and 4.1.2.
https://github.com/mastodon/mastodon/security/advisories/GHSA-38g9-pfm9-gfqv
2023-03-24T16:25:34.467Z
2023-04-04T21:14:53.350Z
2023-04-04T21:14:53.350Z
{'Vendor': 'mastodon', 'Product': 'mastodon', 'Versions': '>= 2.5.0, < 3.5.8, >= 4.0.0, < 4.0.4, >= 4.1.0, < 4.1.2'}
CVE-2023-28150
An issue was discovered in Independentsoft JODF before 1.1.110. The API is prone to XML external entity (XXE) injection via a remote DTD in a DOCX file.
https://www.independentsoft.de/jword/index.html
2023-03-12T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28500
A Java insecure deserialization vulnerability in Adobe LiveCycle ES4 version 11.0 and earlier allows unauthenticated remote attackers to gain operating system code execution by submitting specially crafted Java serialized objects to a specific URL. Adobe LiveCycle ES4 version 11.0.1 and later may be vulnerable if the application is installed with Java environment 7u21 and earlier. Exploitation of the vulnerability depends on two factors: insecure deserialization methods used in the Adobe LiveCycle application, and the use of Java environments 7u21 and earlier. The code execution is performed in the context of the account that is running the Adobe LiveCycle application. If the account is privileged, exploitation provides privileged access to the operating system. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://coastalsecurity.gitbook.io/critical-vulnerability-adobe-livecycle-es4v11.0/
2023-03-16T00:00:00
2023-04-06T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28015
The HCL Domino AppDev Pack IAM service is susceptible to a User Account Enumeration vulnerability.   During a failed login attempt a difference in messages could allow an attacker to determine if the user is valid or not.  The attacker could use this information to focus a brute force attack on valid users.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0105093
2023-03-10T03:50:27.023Z
2023-05-23T21:25:09.044Z
2023-05-23T21:25:09.044Z
{'Vendor': 'HCL Software', 'Product': 'Domino AppDev Pack', 'Versions': '< 1.0.6'}
CVE-2023-28445
Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. Resizable ArrayBuffers passed to asynchronous functions that are shrunk during the asynchronous operation could result in an out-of-bound read/write. It is unlikely that this has been exploited in the wild, as the only version affected is Deno 1.32.0. Deno Deploy users are not affected. The problem has been resolved by disabling resizable ArrayBuffers temporarily in Deno 1.32.1. Deno 1.32.2 will re-enable resizable ArrayBuffers with a proper fix. As a workaround, run with `--v8-flags=--no-harmony-rab-gsab` to disable resizable ArrayBuffers.
https://github.com/denoland/deno/security/advisories/GHSA-c25x-cm9x-qqgx
2023-03-15T15:59:10.056Z
2023-03-23T23:23:27.931Z
2023-03-23T23:23:27.931Z
{'Vendor': 'denoland', 'Product': 'deno', 'Versions': '= 1.32.0'}
CVE-2023-28296
Visual Studio Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28296
2023-03-13T22:23:36.188Z
2023-04-11T19:13:58.852Z
2023-12-14T18:59:56.986Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)', 'Versions': '15.9.0'}
CVE-2023-28629
GoCD is an open source continuous delivery server. GoCD versions before 23.1.0 are vulnerable to a stored XSS vulnerability, where pipeline configuration with a malicious pipeline label configuration can affect browser display of pipeline runs generated from that configuration. An attacker that has permissions to configure GoCD pipelines could include JavaScript elements within the label template, causing a XSS vulnerability to be triggered for any users viewing the Value Stream Map or Job Details for runs of the affected pipeline, potentially allowing them to perform arbitrary actions within the victim's browser context rather than their own. This issue has been fixed in GoCD 23.1.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/gocd/gocd/security/advisories/GHSA-3vvg-gjfr-q9vm
2023-03-20T12:19:47.207Z
2023-03-27T20:36:27.329Z
2023-03-27T20:36:27.329Z
{'Vendor': 'gocd', 'Product': 'gocd', 'Versions': '< 23.1.0'}
CVE-2023-28783
Auth. (shop manager+) Stored Cross-Site Scripting (XSS) vulnerability in PHPRADAR Woocommerce Tip/Donation plugin <= 1.2 versions.
https://patchstack.com/database/vulnerability/woo-tipdonation/wordpress-woocommerce-tip-donation-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-23T17:03:15.167Z
2023-08-17T14:50:26.842Z
2023-08-17T14:50:26.842Z
{'Vendor': 'PHPRADAR', 'Product': 'Woocommerce Tip/Donation', 'Versions': 'n/a'}
CVE-2023-28961
An Improper Handling of Unexpected Data Type vulnerability in IPv6 firewall filter processing of Juniper Networks Junos OS on the ACX Series devices will prevent a firewall filter with the term 'from next-header ah' from being properly installed in the packet forwarding engine (PFE). There is no immediate indication of an incomplete firewall filter commit shown at the CLI, which could allow an attacker to send valid packets to or through the device that were explicitly intended to be dropped. An indication that the filter was not installed can be identified with the following logs: fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_rule_prepare : Config failed: Unsupported Ip-protocol 51 in the filter lo0.0-inet6-i fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_rule_prepare : Please detach the filter, remove unsupported match and re-attach fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_process_rule : Status:104 dnx_dfw_rule_prepare failed fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_process_filter : Status:104 dnx_dfw_process_rule failed fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_update_filter_in_hw : Status:104 Could not process filter(lo0.0-inet6-i) for rule expansion Unsupported match, action present. fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_create_hw_instance : Status:104 Could not program dfw(lo0.0-inet6-i) type(IFP_DFLT_INET6_Lo0_FILTER)! [104] fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_bind_shim : [104] Could not create dfw(lo0.0-inet6-i) type(IFP_DFLT_INET6_Lo0_FILTER) fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_update_resolve : [100] Failed to bind filter(3) to bind point fpc0 ACX_DFW_CFG_FAILED: ACX Error (dfw):dnx_dfw_change_end : dnx_dfw_update_resolve (resolve type) failed This issue affects Juniper Networks Junos OS on ACX Series: All versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2.
https://supportportal.juniper.net/JSA70586
2023-03-29T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 20.4, 21.1, 21.2, 21.3, 21.4, 22.1'}
CVE-2023-28432
Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q
2023-03-15T15:59:10.052Z
2023-03-22T20:16:38.641Z
2023-03-27T00:08:29.261163Z
{'Vendor': 'minio', 'Product': 'minio', 'Versions': '>= RELEASE.2019-12-17T23-16-33Z, < RELEASE.2023-03-20T20-16-18Z'}
CVE-2023-28062
Dell PPDM versions 19.12, 19.11 and 19.10, contain an improper access control vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability to bypass intended access restrictions and perform unauthorized actions.
https://www.dell.com/support/kbdoc/en-us/000212242/dsa-2023-137-dell-powerprotect-data-manager-security-update-for-proprietary-code-vulnerability
2023-03-10T05:06:06.441Z
2023-04-11T13:55:40.618Z
2023-04-11T13:55:40.618Z
{'Vendor': 'Dell', 'Product': 'PPDM Reporting (PowerProtect Data Manager)', 'Versions': '19.10, 19.11 and 19.12'}
CVE-2023-28598
Zoom for Linux clients prior to 5.13.10 contain an HTML injection vulnerability. If a victim starts a chat with a malicious user it could result in a Zoom application crash.
https://explore.zoom.us/en/trust/security/security-bulletin/
2023-03-17T13:27:32.368Z
2023-06-13T16:49:29.971Z
2023-06-13T18:51:28.481Z
{'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for Linux clients', 'Versions': 'before 5.13.10'}
CVE-2023-28577
In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.
https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin
2023-03-17T11:41:45.851Z
2023-08-08T09:15:07.162Z
2023-08-08T09:15:07.162Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'FastConnect 6800, FastConnect 6900, FastConnect 7800, QCA6391, QCA6426, QCA6436, QCN9074, QCS410, QCS610, SD865 5G, Snapdragon 8 Gen 1 Mobile Platform, Snapdragon 865 5G Mobile Platform, Snapdragon 865+ 5G Mobile Platform (SM8250-AB), Snapdragon 870 5G Mobile Platform (SM8250-AC), Snapdragon X55 5G Modem-RF System, Snapdragon XR2 5G Platform, SW5100, SW5100P, SXR2130, WCD9341, WCD9370, WCD9380, WCN3660B, WCN3680B, WCN3950, WCN3980, WCN3988, WSA8810, WSA8815, WSA8830, WSA8835'}
CVE-2023-28127
A path traversal vulnerability exists in Avalanche version 6.3.x and below that when exploited could result in possible information disclosure.
https://forums.ivanti.com/s/article/ZDI-CAN-17769-Ivanti-Avalanche-getLogFile-Directory-Traversal-Information-Disclosure?language=en_US
2023-03-10T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'Avalanche', 'Versions': 'Avalanche version 6.3.x and below'}
CVE-2023-28824
Server-side request forgery vulnerability exists in CONPROSYS HMI System (CHS) versions prior to 3.5.3. A user who can access the affected product with an administrative privilege may bypass the database restriction set on the query setting page, and connect to a user unintended database.
https://www.contec.com/api/downloadlogger?download=/-/media/Contec/jp/support/security-info/contec_security_chs_230531_en.pdf
2023-05-11T00:00:00
2023-06-01T00:00:00
2023-06-01T00:00:00
{'Vendor': 'Contec Co., Ltd.', 'Product': 'CONPROSYS HMI System (CHS)', 'Versions': 'versions prior to 3.5.3'}
CVE-2023-28609
api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication.
https://github.com/ansible-semaphore/semaphore/releases/tag/v2.8.89
2023-03-18T00:00:00
2023-03-18T00:00:00
2023-03-18T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28035
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T04:57:40.871Z
2023-06-23T09:34:51.323Z
2023-06-23T09:34:51.323Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28465
The package-decompression feature in HL7 (Health Level 7) FHIR Core Libraries before 5.6.106 allows attackers to copy arbitrary files to certain directories via directory traversal, if an allowed directory name is a substring of the directory name chosen by the attacker. NOTE: this issue exists because of an incomplete fix for CVE-2023-24057.
https://www.smilecdr.com/our-blog/statement-on-cve-2023-24057-smile-digital-health
2023-03-15T00:00:00
2023-12-12T00:00:00
2023-12-12T17:02:45.547798
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28936
Attacker can access arbitrary recording/room Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 2.0.0 before 7.1.0
https://lists.apache.org/thread/y6vng44c22ll221rtvsv208x1pbjmdoc
2023-03-28T15:43:06.369Z
2023-05-12T07:45:04.835Z
2023-05-12T07:45:04.835Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache OpenMeetings', 'Versions': '2.0.0'}
CVE-2023-28873
An XSS issue in wiki and discussion pages in Seafile 9.0.6 allows attackers to inject JavaScript into the Markdown editor.
https://herolab.usd.de/en/security-advisories/usd-2022-0032/
2023-03-27T00:00:00
2023-12-09T00:00:00
2023-12-09T06:37:56.438058
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28170
Unrestricted Upload of File with Dangerous Type vulnerability in Themely Theme Demo Import.This issue affects Theme Demo Import: from n/a through 1.1.1.
https://patchstack.com/database/vulnerability/theme-demo-import/wordpress-theme-demo-import-plugin-1-1-1-arbitrary-file-upload-vulnerability?_s_id=cve
2023-03-13T14:15:16.909Z
2023-12-20T19:12:26.012Z
2023-12-20T19:12:26.012Z
{'Vendor': 'Themely', 'Product': 'Theme Demo Import', 'Versions': 'n/a'}
CVE-2023-28520
IBM Planning Analytics Local 2.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 250454.
https://www.ibm.com/support/pages/node/6986639
2023-03-16T21:05:38.975Z
2023-05-12T01:11:55.961Z
2023-05-12T01:11:55.961Z
{'Vendor': 'IBM', 'Product': 'Planning Analytics Local', 'Versions': '2.0'}
CVE-2023-28473
Concrete CMS (previously concrete5) versions 8.5.12 and below, and 9.0 through 9.1.3 is vulnerable to possible Auth bypass in the jobs section.
https://concretecms.com
2023-03-15T00:00:00
2023-04-28T00:00:00
2023-12-06T08:14:30.264193
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28189
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, macOS Monterey 12.6.4, macOS Big Sur 11.7.5. An app may be able to view sensitive information.
https://support.apple.com/en-us/HT213670
2023-03-13T00:00:00
2023-05-08T00:00:00
2023-07-27T03:47:43.062Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-28023
A cross site request forgery vulnerability in the BigFix WebUI Software Distribution interface site version 44 and before allows an NMO attacker to access files on server side systems (server machine and all the ones in its network). 
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106123
2023-03-10T03:59:29.453Z
2023-07-18T19:07:40.553Z
2023-08-01T00:45:42.530Z
{'Vendor': 'HCL Software', 'Product': 'HCL BigFix WebUI Software Distribution', 'Versions': '<=44'}
CVE-2023-28166
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Aakif Kadiwala Tags Cloud Manager plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/tags-cloud-manager/wordpress-tags-cloud-manager-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-03-13T14:15:16.909Z
2023-06-22T08:05:24.116Z
2023-06-22T08:05:24.116Z
{'Vendor': 'Aakif Kadiwala', 'Product': 'Tags Cloud Manager', 'Versions': 'n/a'}
CVE-2023-28648
Osprey Pump Controller version 1.01 inputs passed to a GET parameter are not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06
2023-03-21T21:17:06.892Z
2023-03-28T20:06:56.715Z
2023-03-28T20:06:56.715Z
{'Vendor': 'ProPump and Controls, Inc.', 'Product': 'Osprey Pump Controller', 'Versions': '1.01'}
CVE-2023-28218
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28218
2023-03-13T22:18:32.383Z
2023-04-11T19:13:15.078Z
2023-12-14T18:59:14.101Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28424
Soko if the code that powers packages.gentoo.org. Prior to version 1.0.2, the two package search handlers, `Search` and `SearchFeed`, implemented in `pkg/app/handler/packages/search.go`, are affected by a SQL injection via the `q` parameter. As a result, unauthenticated attackers can execute arbitrary SQL queries on `https://packages.gentoo.org/`. It was also demonstrated that primitive was enough to gain code execution in the context of the PostgreSQL container. The issue was addressed in commit `4fa6e4b619c0362728955b6ec56eab0e0cbf1e23y` of version 1.0.2 using prepared statements to interpolate user-controlled data in SQL queries.
https://github.com/gentoo/soko/security/advisories/GHSA-gc2x-86p3-mxg2
2023-03-15T15:59:10.046Z
2023-03-20T12:47:13.250Z
2023-03-20T12:47:13.250Z
{'Vendor': 'gentoo', 'Product': 'soko', 'Versions': '< 1.0.2'}
CVE-2023-28832
A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1). The web based management of affected devices does not properly validate user input, making it susceptible to command injection. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges.
https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf
2023-03-24T15:17:33.934Z
2023-05-09T11:51:28.740Z
2023-05-09T11:51:28.740Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC Cloud Connect 7 CC712', 'Versions': 'All versions >= V2.0 < V2.1'}
CVE-2023-28998
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure, and add new files.​ Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr
2023-03-29T17:39:16.141Z
2023-04-04T12:45:42.156Z
2023-04-04T12:45:42.156Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 3.0.0, < 3.6.5'}
CVE-2023-28131
A vulnerability in the expo.io framework allows an attacker to take over accounts and steal credentials on an application/website that configured the "Expo AuthSession Redirect Proxy" for social sign-in. This can be achieved once a victim clicks a malicious link. The link itself may be sent to the victim in various ways (including email, text message, an attacker-controlled website, etc).
https://blog.expo.dev/security-advisory-for-developers-using-authsessions-useproxy-options-and-auth-expo-io-e470fe9346df
2023-03-10T00:00:00
2023-04-24T00:00:00
2023-05-25T00:00:00
{'Vendor': 'Expo.io', 'Product': 'Expo AuthSession module', 'Versions': 'All versions prior to SDK 48.* (Affected SDK 45.*, 46.* and 47.*)'}
CVE-2023-28561
Memory corruption in QESL while processing payload from external ESL device to firmware.
https://www.qualcomm.com/company/product-security/bulletins/august-2023-bulletin
2023-03-17T11:41:45.848Z
2023-08-08T09:15:03.741Z
2023-08-08T09:15:03.741Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'QCN7606'}
CVE-2023-28776
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Continuous Image Carousel With Lightbox plugin <= 1.0.15 versions.
https://patchstack.com/database/vulnerability/continuous-image-carousel-with-lightbox/wordpress-continuous-image-carousel-with-lightbox-plugin-1-0-15-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve
2023-03-23T17:01:46.246Z
2023-06-22T11:29:43.390Z
2023-06-22T11:29:43.390Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'Continuous Image Carousel With Lightbox', 'Versions': 'n/a'}
CVE-2023-28326
Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 2.0.0 before 7.0.0 Description: Attacker can elevate their privileges in any room
https://lists.apache.org/thread/r9vn12dp5yofn1h3wd5x4h7c3vmmr5d9
2023-03-14T09:26:00.600Z
2023-03-28T12:36:11.566Z
2023-03-28T12:36:11.566Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache OpenMeetings', 'Versions': '2.0.0'}
CVE-2023-28633
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf
2023-03-20T12:19:47.207Z
2023-04-05T15:27:58.849Z
2023-04-05T15:27:58.849Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 0.84, < 9.5.13, >= 10.0.0, < 10.0.7'}
CVE-2023-28263
Visual Studio Information Disclosure Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263
2023-03-13T22:18:32.393Z
2023-04-11T19:13:57.714Z
2023-12-14T18:59:55.962Z
{'Vendor': 'Microsoft', 'Product': 'Microsoft Visual Studio 2022 version 17.2', 'Versions': '17.2.0'}
CVE-2023-28799
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain. 
https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=Windows&applicable_version=3.7&deployment_date=2021-11-26&id=1386541
2023-03-23T18:29:15.802Z
2023-06-22T19:06:24.943Z
2023-06-22T19:06:24.943Z
{'Vendor': 'Zscaler', 'Product': 'Client Connector', 'Versions': '0'}
CVE-2023-28849
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.7, GLPI inventory endpoint can be used to drive a SQL injection attack. It can also be used to store malicious code that could be used to perform XSS attack. By default, GLPI inventory endpoint requires no authentication. Version 10.0.7 contains a patch for this issue. As a workaround, disable native inventory.
https://github.com/glpi-project/glpi/security/advisories/GHSA-9r84-jpg3-h4m6
2023-03-24T16:25:34.467Z
2023-04-05T17:41:20.945Z
2023-04-05T17:41:20.945Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 10.0.0, < 10.0.7'}
CVE-2023-28371
In Stellarium through 1.2, attackers can write to files that are typically unintended, such as ones with absolute pathnames or .. directory traversal.
https://github.com/Stellarium/stellarium/commit/1261f74dc4aa6bbd01ab514343424097f8cf46b7
2023-03-15T00:00:00
2023-03-15T00:00:00
2023-03-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28234
Windows Secure Channel Denial of Service Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28234
2023-03-13T22:18:32.386Z
2023-04-11T19:13:39.524Z
2023-12-14T18:59:38.177Z
{'Vendor': 'Microsoft', 'Product': 'Windows Server 2022', 'Versions': '10.0.0'}
CVE-2023-28664
The Meta Data and Taxonomies Filter WordPress plugin, in versions < 1.3.1, is affected by a reflected cross-site scripting vulnerability in the 'tax_name' parameter of the mdf_get_tax_options_in_widget action, which can only be triggered by an authenticated user.
https://www.tenable.com/security/research/tra-2023-3
2023-03-20T00:00:00
2023-03-22T00:00:00
2023-03-22T00:00:00
{'Vendor': 'n/a', 'Product': 'Meta Data and Taxonomies Filter WordPress Plugin', 'Versions': '< 1.3.1'}
CVE-2023-28408
Directory traversal vulnerability in MW WP Form versions v4.4.2 and earlier allows a remote unauthenticated attacker to alter the website or cause a denial-of-service (DoS) condition, and obtain sensitive information depending on settings.
https://plugins.2inc.org/mw-wp-form/blog/2023/05/08/752/
2023-03-15T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'Monkey Wrench Inc.', 'Product': 'MW WP Form', 'Versions': 'versions v4.4.2 and earlier'}
CVE-2023-28058
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T05:01:55.232Z
2023-06-23T10:30:27.581Z
2023-06-23T10:30:27.581Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28737
Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
2023-04-25T03:00:03.909Z
2023-11-14T19:04:41.403Z
2023-11-14T19:04:41.403Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Aptio* V UEFI Firmware Integrator Tools', 'Versions': 'See references'}
CVE-2023-28367
Cross-site scripting vulnerability in CTA post function of VK All in One Expansion Unit 9.88.1.0 and earlier allows a remote authenticated attacker to inject an arbitrary script.
https://www.vektor-inc.co.jp/product-update/vk-blocks-exunit-xss/
2023-03-15T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'Vektor,Inc.', 'Product': 'VK All in One Expansion Unit', 'Versions': '9.88.1.0 and earlier'}
CVE-2023-28672
Jenkins OctoPerf Load Testing Plugin Plugin 4.5.1 and earlier does not perform a permission check in a connection test HTTP endpoint, allowing attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-3067%20(2)
2023-03-20T19:59:08.756Z
2023-03-23T11:26:02.427Z
2023-10-24T12:49:16.921Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins OctoPerf Load Testing Plugin Plugin', 'Versions': '0'}
CVE-2023-28388
Uncontrolled search path element in some Intel(R) Chipset Device Software before version 10.1.19444.8378 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00870.html
2023-04-13T03:00:03.863Z
2023-11-14T19:05:12.312Z
2023-11-14T19:05:12.312Z
{'Vendor': 'n/a', 'Product': 'Intel(R) Chipset Device Software', 'Versions': 'before version 10.1.19444.8378'}
CVE-2023-28222
Windows Kernel Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28222
2023-03-13T22:18:32.384Z
2023-04-11T19:13:16.130Z
2023-12-14T18:59:15.158Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28808
Some Hikvision Hybrid SAN/Cluster Storage products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices.
https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-hybrid-san-cluster-stor/
2023-03-23T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'hikvision', 'Product': 'DS-A71024/48/72R,DS-A80624S,DS-A81016S,DS-A72024/72R,DS-A80316S,DS-A82024D', 'Versions': 'V2.X'}
CVE-2023-28330
Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.
https://moodle.org/mod/forum/discuss.php?d=445062
2023-03-14T00:00:00
2023-03-23T00:00:00
2023-03-30T00:00:00
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.1 to 4.1.1, 4.0 to 4.0.6, 3.11 to 3.11.12, 3.9 to 3.9.19 and earlier unsupported versions'}
CVE-2023-28275
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28275
2023-03-13T22:23:36.182Z
2023-04-11T19:13:52.414Z
2023-12-14T18:59:50.764Z
{'Vendor': 'Microsoft', 'Product': 'Windows 10 Version 1809', 'Versions': '10.0.0'}
CVE-2023-28625
mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-f5xw-rvfr-24qr
2023-03-20T12:19:47.206Z
2023-04-03T13:19:40.422Z
2023-04-03T13:19:40.422Z
{'Vendor': 'OpenIDC', 'Product': 'mod_auth_openidc', 'Versions': '>= 2.0.0, < 2.4.13.2'}
CVE-2023-28019
Insufficient validation in Bigfix WebUI API App site version < 14 allows an authenticated WebUI user to issue SQL queries via an unparameterized SQL query.
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0106123
2023-03-10T03:59:29.452Z
2023-07-18T17:57:23.111Z
2023-07-18T17:57:23.111Z
{'Vendor': 'HCL Software', 'Product': 'HCL BigFix WebUI API', 'Versions': '< 14'}