CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-34609 | An issue was discovered flexjson thru 3.3 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://sourceforge.net/p/flexjson/bugs/48/ | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34259 | Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575. | https://sec-consult.com/vulnerability-lab/ | 2023-05-31T00:00:00 | 2023-11-03T00:00:00 | 2023-11-03T03:46:51.840800 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34258 | An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code execution. | https://www.errno.fr/PatrolAdvisory.html#remote-secrets-leak-using-patrols-pconfig-22100 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34937 | A stack overflow in the UpdateSnat function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34937.md | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34034 | Using "**" as a pattern in Spring Security configuration
for WebFlux creates a mismatch in pattern matching between Spring
Security and Spring WebFlux, and the potential for a security bypass.
| https://spring.io/security/cve-2023-34034 | 2023-05-25T17:21:56.199Z | 2023-07-19T14:16:12.150Z | 2023-07-19T14:16:12.150Z | {'Vendor': 'n/a', 'Product': 'Spring Security', 'Versions': 'Spring Security 6.1.0, Spring Security 6.0.0 , Spring Security 5.8.0, Spring Security 5.7.0 , Spring Security 5.6.0'} |
CVE-2023-34464 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 2.2.1 until versions 14.4.8, 14.10.5, and 15.1RC1 of org.xwiki.platform:xwiki-platform-web and any version prior to 14.4.8, 14.10.5, and 15.1.RC1 of org.xwiki.platform:xwiki-platform-web-templates, any user who can edit a document in a wiki like the user profile can create a stored cross-site scripting attack. The attack occurs by putting plain HTML code into that document and then tricking another user to visit that document with the `displaycontent` or `rendercontent` template and plain output syntax. If a user with programming rights is tricked into visiting such a URL, arbitrary actions be performed with this user's rights, impacting the confidentiality, integrity, and availability of the whole XWiki installation. This has been patched in XWiki 14.4.8, 14.10.5 and 15.1RC1 by setting the content type of the response to plain text when the output syntax is not an HTML syntax. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fp7h-f9f5-x4q7 | 2023-06-06T16:16:53.560Z | 2023-06-23T14:44:47.064Z | 2023-06-23T14:44:47.064Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': 'org.xwiki.platform:xwiki-platform-web >= 2.2.1, < 14.4.8, org.xwiki.platform:xwiki-platform-web-templates < 14.4.8, org.xwiki.platform:xwiki-platform-web-templates >= 14.5, < 14.10.5, org.xwiki.platform:xwiki-platform-web-templates >= 15.0-rc-1, < 15.1-rc-1'} |
CVE-2023-34171 | Cross-Site Request Forgery (CSRF) vulnerability in Alex Raven WP Report Post plugin <= 2.1.2 versions. | https://patchstack.com/database/vulnerability/wp-report-post/wordpress-wp-report-post-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-29T13:52:11.723Z | 2023-11-09T19:22:26.206Z | 2023-11-09T19:22:26.206Z | {'Vendor': 'Alex Raven', 'Product': 'WP Report Post', 'Versions': 'n/a'} |
CVE-2023-34872 | A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open. | https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe | 2023-06-07T00:00:00 | 2023-07-31T00:00:00 | 2023-12-06T03:06:22.697756 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34433 |
PiiGAB M-Bus stores passwords using a weak hash algorithm.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01 | 2023-06-27T16:55:52.771Z | 2023-07-06T23:06:34.227Z | 2023-07-06T23:06:34.227Z | {'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'} |
CVE-2023-34063 | Aria Automation contains a Missing Access Control vulnerability.
An authenticated malicious actor may
exploit this vulnerability leading to unauthorized access to remote
organizations and workflows.
| https://www.vmware.com/security/advisories/VMSA-2024-0001.html | 2023-05-25T17:21:56.204Z | 2024-01-16T09:10:09.738Z | 2024-01-16T09:10:09.738Z | {'Vendor': 'N/A', 'Product': 'VMware Aria Automation, VMware Cloud Foundation', 'Versions': 'Aria Automation 8.14.1, Aria Automation 8.14.0, Aria Automation 8.13.1, Aria Automation 8.13.0, Aria Automation 8.12.2, Aria Automation 8.12.1, Aria Automation 8.12.0, Aria Automation 8.11.2, Aria Automation 8.11.1, Aria Automation 8.11.0 '} |
CVE-2023-34599 | Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code. | https://github.com/maddsec/CVE-2023-34599 | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34960 | A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name. | http://chamilo.com | 2023-06-07T00:00:00 | 2023-08-01T00:00:00 | 2023-08-24T16:06:19.539291 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34576 | SQL injection vulnerability in updatepos.php in PrestaShop opartfaq through 1.0.3 allows remote attackers to run arbitrary SQL commands via unspedified vector. | https://security.friendsofpresta.org/modules/2023/09/19/opartfaq.html | 2023-06-07T00:00:00 | 2023-09-21T00:00:00 | 2023-09-21T19:23:25.731680 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34126 | Vulnerability in SonicWall GMS and Analytics allows an authenticated attacker to upload files on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.851Z | 2023-07-13T00:44:10.845Z | 2023-07-13T00:44:10.845Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34219 | In JetBrains TeamCity before 2023.05 improper permission checks allowed users without appropriate permissions to edit Build Configuration settings via REST API | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:32.869Z | 2023-05-31T13:03:13.367Z | 2023-05-31T13:03:13.367Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34976 | A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network.
We have already fixed the vulnerability in the following version:
Video Station 5.7.0 ( 2023/07/27 ) and later
| https://www.qnap.com/en/security-advisory/qsa-23-52 | 2023-06-08T08:26:04.295Z | 2023-10-13T19:17:17.403Z | 2023-10-13T19:17:17.403Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'} |
CVE-2023-34425 | The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.6, macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges. | https://support.apple.com/en-us/HT213841 | 2023-07-20T15:04:25.833Z | 2023-07-28T04:30:39.127Z | 2023-07-28T04:30:39.127Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-34130 | SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.851Z | 2023-07-13T01:06:27.492Z | 2023-07-13T01:06:27.492Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34833 | An arbitrary file upload vulnerability in the component /api/upload.php of ThinkAdmin v6 allows attackers to execute arbitrary code via a crafted file. | https://note.youdao.com/s/3tge43wH | 2023-06-07T00:00:00 | 2023-06-15T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34999 | A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface. | https://psirt.bosch.com/security-advisories/BOSCH-SA-893251-BT.html | 2023-06-16T06:04:24.396Z | 2023-09-18T10:16:14.009Z | 2023-09-18T10:16:14.009Z | {'Vendor': 'RTS', 'Product': 'VLink Virtual Matrix Software', 'Versions': '5.0.0, 6.0.0'} |
CVE-2023-34472 | AMI SPx contains a vulnerability in the BMC where an Attacker may cause an improper neutralization of CRLF sequences in HTTP Headers. A successful exploit of this vulnerability may lead to a loss of integrity.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf | 2023-06-07T03:10:19.974Z | 2023-07-05T18:08:16.990Z | 2023-07-05T18:08:16.990Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0, 13.0'} |
CVE-2023-34188 | The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers. By sending a single attack payload over TCP, an attacker can cause an infinite loop in which the server continuously reparses that payload, and does not respond to any other requests. | https://github.com/cesanta/mongoose/commit/4663090a8fb036146dfe77718cff612b0101cb0f | 2023-05-30T00:00:00 | 2023-06-23T00:00:00 | 2023-09-06T16:32:14.992132 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34022 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rakib Hasan Dynamic QR Code Generator plugin <= 0.0.5 versions. | https://patchstack.com/database/vulnerability/dynamic-qr-code-generator/wordpress-dynamic-qr-code-generator-plugin-0-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-25T11:26:00.466Z | 2023-08-30T14:46:01.651Z | 2023-08-30T14:46:01.651Z | {'Vendor': 'Rakib Hasan', 'Product': 'Dynamic QR Code Generator', 'Versions': 'n/a'} |
CVE-2023-34537 | A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data. | https://github.com/leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5 | 2023-06-07T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34167 | Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. | https://consumer.huawei.com/en/support/bulletin/2023/6/ | 2023-05-29T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-34235 | Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue. | https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f | 2023-05-31T13:51:51.169Z | 2023-07-25T17:24:19.864Z | 2023-07-25T17:24:19.864Z | {'Vendor': 'strapi', 'Product': 'strapi', 'Versions': '< 4.10.8'} |
CVE-2023-34409 | In Percona Monitoring and Management (PMM) server 2.x before 2.37.1, the authenticate function in auth_server.go does not properly formalize and sanitize URL paths to reject path traversal attempts. This allows an unauthenticated remote user, when a crafted POST request is made against unauthenticated API routes, to access otherwise protected API routes leading to escalation of privileges and information disclosure. | https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/ | 2023-06-05T00:00:00 | 2023-06-06T00:00:00 | 2023-06-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34059 | open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the
/dev/uinput file descriptor allowing them to simulate user inputs. | https://www.vmware.com/security/advisories/VMSA-2023-0024.html | 2023-05-25T17:21:56.204Z | 2023-10-27T04:53:31.893Z | 2023-10-27T04:53:31.893Z | {'Vendor': 'n/a', 'Product': 'open-vm-tools', 'Versions': '11.0.0'} |
CVE-2023-34327 |
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]
AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.
Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.
1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
a previous vCPUs debug mask state.
2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
up the CPU entirely.
| https://xenbits.xenproject.org/xsa/advisory-444.html | 2023-06-01T10:44:17.066Z | 2024-01-05T16:34:10.958Z | 2024-01-05T16:34:10.958Z | {'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-444'} |
CVE-2023-34798 | An arbitrary file upload vulnerability in eoffice before v9.5 allows attackers to execute arbitrary code via uploading a crafted file. | https://gist.github.com/Zhu013/e5e6e03613704a2a4107cc6456f1e8e2 | 2023-06-07T00:00:00 | 2023-07-25T00:00:00 | 2023-07-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34761 | An unauthenticated attacker within BLE proximity can remotely connect to a 7-Eleven LED Message Cup, Hello Cup 1.3.1 for Android, and bypass the application's client-side chat censor filter. | https://github.com/actuator/7-Eleven-Bluetooth-Smart-Cup-Jailbreak | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34624 | An issue was discovered htmlcleaner thru = 2.28 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://github.com/amplafi/htmlcleaner/issues/13 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-08-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34448 | Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`. | https://github.com/getgrav/grav/security/advisories/GHSA-whr7-m3f8-mpm8 | 2023-06-06T16:16:53.558Z | 2023-06-14T22:06:01.338Z | 2023-06-14T22:16:40.551Z | {'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '< 1.7.42'} |
CVE-2023-34018 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoundCloud Inc. SoundCloud Shortcode allows Stored XSS.This issue affects SoundCloud Shortcode: from n/a through 3.1.0.
| https://patchstack.com/database/vulnerability/soundcloud-shortcode/wordpress-soundcloud-shortcode-plugin-3-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-25T11:26:00.464Z | 2023-11-30T17:01:49.611Z | 2023-11-30T17:01:49.611Z | {'Vendor': 'SoundCloud Inc.', 'Product': 'SoundCloud Shortcode', 'Versions': 'n/a'} |
CVE-2023-34736 | Guantang Equipment Management System version 4.12 is vulnerable to Arbitrary File Upload. | https://github.com/prismbreak/vulnerabilities/issues/5 | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34366 | A use-after-free vulnerability exists in the Figure stream parsing functionality of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause memory corruption, resulting in arbitrary code execution. Victim would need to open a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758 | 2023-06-08T15:45:16.455Z | 2023-10-19T17:00:43.773Z | 2023-10-20T17:00:06.097Z | {'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'} |
CVE-2023-34673 | Elenos ETG150 FM transmitter running on version 3.12 was discovered to be leaking SMTP credentials and other sensitive information by exploiting the publicly accessible Memcached service. The attack can occur over the public Internet in some cases. | http://elenos.com | 2023-06-07T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34389 | An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time.
See product Instruction Manual Appendix A dated 20230830 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-06-02T17:18:29.697Z | 2023-11-30T16:54:29.986Z | 2023-11-30T16:54:29.986Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-451', 'Versions': 'R315-V0, R316-V0, R317-V0, R318-V0, R320-V0, R321-V0, R322-V0, R323-V0, R324-V0, R325-V0, R326-V0, R327-V0'} |
CVE-2023-34223 | In JetBrains TeamCity before 2023.05 parameters of the "password" type from build dependencies could be logged in some cases | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:33.891Z | 2023-05-31T13:03:15.563Z | 2023-05-31T13:03:15.563Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34468 | The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.
The resolution validates the Database URL and rejects H2 JDBC locations.
You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
| https://nifi.apache.org/security.html#CVE-2023-34468 | 2023-06-06T17:30:23.654Z | 2023-06-12T15:09:20.711Z | 2023-06-12T15:09:20.711Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '0.0.2'} |
CVE-2023-34192 | Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function. | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | 2023-05-30T00:00:00 | 2023-07-06T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34038 | VMware Horizon Server contains an information disclosure vulnerability. A malicious actor with network access may be able to access information relating to the internal network configuration.
| https://www.vmware.com/security/advisories/VMSA-2023-0017.html | 2023-05-25T17:21:56.201Z | 2023-08-04T11:24:57.885Z | 2023-08-04T11:24:57.885Z | {'Vendor': 'n/a', 'Product': 'VMware Horizon Server', 'Versions': 'Horizon Server 2306, Horizon Server 2303, Horizon Server 2212, Horizon Server 2209, Horizon Server 2206, Horizon Server 2111.x, Horizon Server 2106, Horizon Server 2103, Horizon Server 2012, Horizon Server 2006'} |
CVE-2023-34487 | itsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to SQL Injection. SQL injection points exist in the login password input box. This vulnerability can be exploited through time-based blind injection. | https://github.com/JunyanYip/itsourcecode_justines_sql_vul | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34254 | The GLPI Agent is a generic management agent. Prior to version 1.5, if glpi-agent is running remoteinventory task against an Unix platform with ssh command, an administrator user on the remote can manage to inject a command in a specific workflow the agent would run with the privileges it uses. In the case, the agent is running with administration privileges, a malicious user could gain high privileges on the computer glpi-agent is running on. A malicious user could also disclose all remote accesses the agent is configured with for remoteinventory task. This vulnerability has been patched in glpi-agent 1.5. | https://github.com/glpi-project/glpi-agent/security/advisories/GHSA-39vc-hxgm-j465 | 2023-05-31T13:51:51.175Z | 2023-06-23T20:19:03.534Z | 2023-06-23T20:19:03.534Z | {'Vendor': 'glpi-project', 'Product': 'glpi-agent', 'Versions': '< 1.5'} |
CVE-2023-34829 | Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext. | https://github.com/SecureScripts/TP-Link_Tapo_Hack | 2023-06-07T00:00:00 | 2023-12-28T00:00:00 | 2023-12-28T02:50:46.930266 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34203 | In Progress OpenEdge OEM (OpenEdge Management) and OEE (OpenEdge Explorer) before 12.7, a remote user (who has any OEM or OEE role) could perform a URL injection attack to change identity or role membership, e.g., escalate to admin. This affects OpenEdge LTS before 11.7.16, 12.x before 12.2.12, and 12.3.x through 12.6.x before 12.7. | https://www.progress.com/openedge | 2023-05-30T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34346 | A stack-based buffer overflow vulnerability exists in the httpd gwcfg.cgi get functionality of Yifan YF325 v1.0_20221108. A specially crafted network packet can lead to command execution. An attacker can send a network request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764 | 2023-06-12T17:06:03.616Z | 2023-10-11T15:14:30.390Z | 2023-10-11T17:00:08.032Z | {'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'} |
CVE-2023-34429 |
Weintek Weincloud v0.13.6
could allow an attacker to cause a denial-of-service condition for Weincloud by sending a forged JWT token.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-04 | 2023-07-13T15:55:48.894Z | 2023-07-19T21:45:39.544Z | 2023-07-19T21:45:39.544Z | {'Vendor': 'Weintek', 'Product': 'Weincloud', 'Versions': '0'} |
CVE-2023-34995 |
There are no requirements for setting a complex password for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01 | 2023-06-27T16:55:52.765Z | 2023-07-06T23:05:21.253Z | 2023-07-06T23:08:16.962Z | {'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'} |
CVE-2023-34096 | Thruk is a multibackend monitoring webinterface which currently supports Naemon, Icinga, Shinken and Nagios as backends. In versions 3.06 and prior, the file `panorama.pm` is vulnerable to a Path Traversal vulnerability which allows an attacker to upload a file to any folder which has write permissions on the affected system. The parameter location is not filtered, validated or sanitized and it accepts any kind of characters. For a path traversal attack, the only characters required were the dot (`.`) and the slash (`/`). A fix is available in version 3.06.2. | https://github.com/sni/Thruk/security/advisories/GHSA-vhqc-649h-994h | 2023-05-25T21:56:51.245Z | 2023-06-08T18:59:51.787Z | 2023-06-08T18:59:51.787Z | {'Vendor': 'sni', 'Product': 'Thruk', 'Versions': '< 3.06.2'} |
CVE-2023-34215 | TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the certification-generation function, which could potentially allow malicious users to execute remote code on affected devices.
| https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities | 2023-05-31T08:58:06.149Z | 2023-08-17T06:35:06.293Z | 2023-08-17T06:35:06.293Z | {'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'} |
CVE-2023-34645 | jfinal CMS 5.1.0 has an arbitrary file read vulnerability. | https://github.com/jflyfox/jfinal_cms/issues/57 | 2023-06-07T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34350 | Uncontrolled search path element in some Intel(R) XTU software before version 7.12.0.15 may allow an authenticated user to potentially enable escalation of privilege via local access. | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00941.html | 2023-06-06T03:00:05.057Z | 2023-11-14T19:04:20.051Z | 2023-11-14T19:04:20.051Z | {'Vendor': 'n/a', 'Product': 'Intel(R) XTU software', 'Versions': 'before version 7.12.0.15'} |
CVE-2023-34184 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Bhavik Patel Woocommerce Order address Print plugin <= 3.2 versions. | https://patchstack.com/database/vulnerability/woocommerce-order-address-print/wordpress-woocommerce-order-address-print-plugin-3-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-29T13:52:39.505Z | 2023-08-30T13:28:58.159Z | 2023-08-30T13:28:58.159Z | {'Vendor': 'Bhavik Patel', 'Product': 'Woocommerce Order address Print', 'Versions': 'n/a'} |
CVE-2023-34868 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c. | https://github.com/jerryscript-project/jerryscript/issues/5083 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34612 | An issue was discovered ph-json thru 9.5.5 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://github.com/phax/ph-commons/issues/35 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34242 | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of `ReferenceGrant` resources to admin users by using Kubernetes RBAC. | https://github.com/cilium/cilium/security/advisories/GHSA-r7wr-4w5q-55m6 | 2023-05-31T13:51:51.172Z | 2023-06-15T19:07:14.624Z | 2023-06-15T19:07:14.624Z | {'Vendor': 'cilium', 'Product': 'cilium', 'Versions': '< 1.13.4'} |
CVE-2023-34110 | Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2.
| https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3 | 2023-05-25T21:56:51.246Z | 2023-06-22T22:34:39.865Z | 2023-06-22T22:34:39.865Z | {'Vendor': 'dpgaspar', 'Product': 'Flask-AppBuilder', 'Versions': '< 4.3.2'} |
CVE-2023-34540 | An issue discovered in Langchain before 0.0.225 allows attacker to run arbitrary code via jira.run('other' substring. | https://github.com/hwchase17/langchain/issues/4833 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-12-06T20:29:06.151582 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34055 | In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
* the application uses Spring MVC or Spring WebFlux
* org.springframework.boot:spring-boot-actuator is on the classpath
| https://spring.io/security/cve-2023-34055 | 2023-05-25T17:21:56.203Z | 2023-11-28T08:27:25.132Z | 2023-11-28T08:27:25.132Z | {'Vendor': 'Spring', 'Product': 'Spring Boot', 'Versions': '2.7.0, 3.0.0, 3.1.0, older unsupported versions'} |
CVE-2023-34669 | TOTOLINK CP300+ V5.2cu.7594 contains a Denial of Service vulnerability in function RebootSystem of the file lib/cste_modules/system which can reboot the system. | https://w3b5h3ll.notion.site/w3b5h3ll/TOTOLINK-CP300-c96d775881f0476b9ef465dba9c6d9b8 | 2023-06-07T00:00:00 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34239 | Gradio is an open-source Python library that is used to build machine learning and data science. Due to a lack of path filtering Gradio does not properly restrict file access to users. Additionally Gradio does not properly restrict the what URLs are proxied. These issues have been addressed in version 3.34.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/gradio-app/gradio/security/advisories/GHSA-3qqg-pgqq-3695 | 2023-05-31T13:51:51.169Z | 2023-06-07T23:20:06.549Z | 2023-06-07T23:20:06.549Z | {'Vendor': 'gradio-app', 'Product': 'gradio', 'Versions': '< 3.34.0'} |
CVE-2023-34844 | Play With Docker < 0.0.2 has an insecure CAP_SYS_ADMIN privileged mode causing the docker container to escape. | https://hacku.top/wl/?id=MACBtnorZyp6hC3E5bw2CqBAusuWoKe3 | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34147 | An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34148. | https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US | 2023-05-26T18:41:36.333Z | 2023-06-26T21:58:09.816Z | 2023-06-26T21:58:09.816Z | {'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019'} |
CVE-2023-34452 | Grav is a flat-file content management system. In versions 1.7.42 and prior, the "/forgot_password" page has a self-reflected cross-site scripting vulnerability that can be exploited by injecting a script into the "email" parameter of the request. While this vulnerability can potentially allow an attacker to execute arbitrary code on the user's browser, the impact is limited as it requires user interaction to trigger the vulnerability. As of time of publication, a patch is not available. Server-side validation should be implemented to prevent this vulnerability. | https://github.com/getgrav/grav/security/advisories/GHSA-xcr8-cc2j-62fc | 2023-06-06T16:16:53.558Z | 2023-06-14T22:28:34.824Z | 2023-06-14T22:31:29.728Z | {'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '<= 1.7.42'} |
CVE-2023-34002 | Cross-Site Request Forgery (CSRF) vulnerability in WP Inventory Manager plugin <= 2.1.0.13 versions. | https://patchstack.com/database/vulnerability/wp-inventory-manager/wordpress-wp-inventory-manager-plugin-2-1-0-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T11:25:11.063Z | 2023-11-09T17:53:24.757Z | 2023-11-09T17:53:24.757Z | {'Vendor': 'WP Inventory Manager', 'Product': 'WP Inventory Manager', 'Versions': 'n/a'} |
CVE-2023-34151 | A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546). | https://github.com/ImageMagick/ImageMagick/issues/6341 | 2023-05-29T00:00:00 | 2023-05-30T00:00:00 | 2023-08-31T02:07:21.664100 | {'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'ImageMagick-6.7'} |
CVE-2023-34852 | PublicCMS <=V4.0.202302 is vulnerable to Insecure Permissions. | https://github.com/sanluan/PublicCMS | 2023-06-07T00:00:00 | 2023-06-15T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34917 | Fuge CMS v1.0 contains an Open Redirect vulnerability in member/RegisterAct.java. | https://github.com/fuge/cms/issues/3 | 2023-06-07T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34106 | GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch. | https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c | 2023-05-25T21:56:51.246Z | 2023-07-05T17:48:32.727Z | 2023-07-05T17:48:32.727Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 0.68, < 10.0.8'} |
CVE-2023-34043 | VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'. | https://www.vmware.com/security/advisories/VMSA-2023-0020.html | 2023-05-25T17:21:56.202Z | 2023-09-26T17:14:36.790Z | 2023-09-26T17:14:36.790Z | {'Vendor': 'n/a', 'Product': 'VMware Aria Operations', 'Versions': 'VMware Aria Operations 8.12.x, 8.10.x, 8.6.x, VCF 5.x, 4.x'} |
CVE-2023-34940 | Asus RT-N10LX Router v2.0.0.39 was discovered to contain a stack overflow via the url parameter at /start-apply.html. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://github.com/OlivierLaflamme/cve/blob/main/ASUS-N10LX_2.0.0.39/URLFilterList_Stack_BOF.md | 2023-06-07T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34385 | Unrestricted Upload of File with Dangerous Type vulnerability in Akshay Menariya Export Import Menus.This issue affects Export Import Menus: from n/a through 1.8.0.
| https://patchstack.com/database/vulnerability/export-import-menus/wordpress-export-import-menus-plugin-1-8-0-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-06-02T15:48:00.545Z | 2023-12-20T18:44:48.701Z | 2023-12-20T18:44:48.701Z | {'Vendor': 'Akshay Menariya', 'Product': 'Export Import Menus', 'Versions': 'n/a'} |
CVE-2023-34048 | vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution. | https://www.vmware.com/security/advisories/VMSA-2023-0023.html | 2023-05-25T17:21:56.202Z | 2023-10-25T04:21:42.267Z | 2023-10-25T04:21:42.267Z | {'Vendor': 'VMware', 'Product': 'VMware vCenter Server', 'Versions': '8.0, 7.0'} |
CVE-2023-34418 | A valid, authenticated LXCA user may be able to gain unauthorized access to events and other data stored in LXCA due to a SQL injection vulnerability in a specific web API. | https://support.lenovo.com/us/en/product_security/LEN-98715 | 2023-06-05T19:15:31.604Z | 2023-06-26T19:45:05.363Z | 2023-06-26T19:45:05.363Z | {'Vendor': 'Lenovo', 'Product': 'Lenovo XClarity Administrator', 'Versions': 'Versions prior to 4.0'} |
CVE-2023-34224 | In JetBrains TeamCity before 2023.05 open redirect during oAuth configuration was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:34.144Z | 2023-05-31T13:03:15.821Z | 2023-05-31T13:03:15.821Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34336 | AMI BMC contains a vulnerability in the IPMI handler, where an
attacker with the required privileges can cause a buffer overflow, which may
lead to code execution, denial of service, or escalation of privileges.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023005.pdf | 2023-06-01T16:05:31.612Z | 2023-06-12T17:08:21.474Z | 2023-06-12T17:08:21.474Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '13.0, 12.0'} |
CVE-2023-34623 | An issue was discovered jtidy thru r938 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://github.com/trajano/jtidy/issues/4 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34459 | OpenZeppelin Contracts is a library for smart contract development. Starting in version 4.7.0 and prior to version 4.9.2, when the `verifyMultiProof`, `verifyMultiProofCalldata`, `procesprocessMultiProof`, or `processMultiProofCalldat` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves.
A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertedly for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree.
A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the @openzeppelin/merkle-tree library are safe.
The problem has been patched in version 4.9.2.
Some workarounds are available. For those using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the @openzeppelin/merkle-tree package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves. | https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wprv-93r4-jj2p | 2023-06-06T16:16:53.559Z | 2023-06-16T22:13:18.181Z | 2023-06-16T22:13:18.181Z | {'Vendor': 'OpenZeppelin', 'Product': 'openzeppelin-contracts', 'Versions': '>= 4.7.0, < 4.9.2'} |
CVE-2023-34320 | Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412
where software, under certain circumstances, could deadlock a core
due to the execution of either a load to device or non-cacheable memory,
and either a store exclusive or register read of the Physical
Address Register (PAR_EL1) in close proximity.
| https://xenbits.xenproject.org/xsa/advisory-436.html | 2023-06-01T10:44:17.064Z | 2023-12-08T20:54:06.993Z | 2023-12-08T20:54:06.993Z | {'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-436'} |
CVE-2023-34635 | Wifi Soft Unibox Administration 3.0 and 3.1 is vulnerable to SQL Injection. The vulnerability occurs because of not validating or sanitizing the user input in the username field of the login page. | http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html | 2023-06-07T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34377 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Joseph C Dolson My Content Management plugin <= 1.7.6 versions. | https://patchstack.com/database/vulnerability/my-content-management/wordpress-my-content-management-plugin-1-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-06-02T15:45:18.620Z | 2023-08-05T22:51:09.632Z | 2023-08-05T22:51:09.632Z | {'Vendor': 'Joseph C Dolson', 'Product': 'My Content Management', 'Versions': 'n/a'} |
CVE-2023-34232 | snowflake-connector-nodejs, a NodeJS driver for Snowflake, is vulnerable to command injection via single sign on (SSO) browser URL authentication in versions prior to 1.6.21. In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. Version 1.6.21 contains a patch for this issue. | https://github.com/snowflakedb/snowflake-connector-nodejs/security/advisories/GHSA-h53w-7qw7-vh5c | 2023-05-31T13:51:51.168Z | 2023-06-08T20:17:49.734Z | 2023-06-08T20:17:49.734Z | {'Vendor': 'snowflakedb', 'Product': 'snowflake-connector-nodejs', 'Versions': '< 1.6.21'} |
CVE-2023-34475 | A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service. | https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0 | 2023-06-07T00:00:00 | 2023-06-16T00:00:00 | 2023-08-31T02:07:13.710051 | {'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed in ImageMagick 7.1.1-10'} |
CVE-2023-34025 | Cross-Site Request Forgery (CSRF) vulnerability in LWS LWS Hide Login plugin <= 2.1.6 versions. | https://patchstack.com/database/vulnerability/lws-hide-login/wordpress-lws-hide-login-plugin-2-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T12:13:20.690Z | 2023-11-09T20:29:07.527Z | 2023-11-09T20:29:07.527Z | {'Vendor': 'LWS', 'Product': 'LWS Hide Login', 'Versions': 'n/a'} |
CVE-2023-34160 | Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled. | https://consumer.huawei.com/en/support/bulletin/2023/6/ | 2023-05-29T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-34249 | benjjvi/PyBB is an open source bulletin board. Prior to commit dcaeccd37198ecd3e41ea766d1099354b60d69c2, benjjvi/PyBB is vulnerable to SQL Injection. This vulnerability has been fixed as of commit dcaeccd37198ecd3e41ea766d1099354b60d69c2. As a workaround, a user may be able to update the software manually to avoid this problem by sanitizing user queries to `BulletinDatabaseModule.py`. | https://github.com/benjjvi/PyBB/security/advisories/GHSA-5qrx-fgxq-95gg | 2023-05-31T13:51:51.174Z | 2023-06-13T16:40:44.556Z | 2023-06-13T16:40:44.556Z | {'Vendor': 'benjjvi', 'Product': 'PyBB', 'Versions': '< dcaeccd37198ecd3e41ea766d1099354b60d69c2'} |
CVE-2023-34422 | A valid, authenticated LXCA user with elevated privileges may be able to delete folders in the LXCA filesystem through a specifically crafted web API call due to insufficient input validation. | https://support.lenovo.com/us/en/product_security/LEN-98715 | 2023-06-05T19:15:31.605Z | 2023-06-26T19:45:31.576Z | 2023-06-26T19:45:31.576Z | {'Vendor': 'Lenovo', 'Product': 'Lenovo XClarity Administrator', 'Versions': 'Versions prior to 4.0'} |
CVE-2023-34971 | An inadequate encryption strength vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to decrypt the data using brute force attacks via unspecified vectors.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2425 build 20230609 and later
QTS 5.1.0.2444 build 20230629 and later
QTS 4.5.4.2467 build 20230718 and later
QuTS hero h5.1.0.2424 build 20230609 and later
QuTS hero h4.5.4.2476 build 20230728 and later
| https://www.qnap.com/en/security-advisory/qsa-23-60 | 2023-06-08T08:26:04.294Z | 2023-08-24T16:14:56.611Z | 2023-08-24T16:14:56.611Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QTS', 'Versions': '5.0.*, 5.1.*, 4.5.*'} |
CVE-2023-34834 | A Directory Browsing vulnerability in MCL-Net version 4.3.5.8788 webserver running on default port 5080, allows attackers to gain sensitive information about the configured databases via the "/file" endpoint. | http://www.mclv4.mcl-collection.com/index.php | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34137 | SonicWall GMS and Analytics CAS Web Services application use static values for authentication without proper checks leading to authentication bypass vulnerability. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
| https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.852Z | 2023-07-13T02:43:08.405Z | 2023-07-13T02:43:08.405Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34567 | Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg. | https://hackmd.io/%400dayResearch/H1xUqzfHh | 2023-06-07T00:00:00 | 2023-06-08T00:00:00 | 2023-06-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34967 | A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves. | https://access.redhat.com/errata/RHSA-2023:6667 | 2023-06-07T21:11:04.261Z | 2023-07-20T14:57:45.624Z | 2024-01-25T20:45:04.634Z | {'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.16.11, 4.17.10, 4.18.5'} |
CVE-2023-34434 | Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0.
The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8130 .
| https://lists.apache.org/thread/7f1o71w5r732cspltmtdydn01gllf4jo | 2023-06-06T11:15:53.221Z | 2023-07-25T07:09:58.676Z | 2023-07-25T07:09:58.676Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.4.0'} |
CVE-2023-34064 | Workspace ONE Launcher contains a Privilege Escalation Vulnerability. A malicious actor with physical access to Workspace ONE Launcher could utilize the Edge Panel feature to bypass setup to gain access to sensitive information. | https://www.vmware.com/security/advisories/VMSA-2023-0027.html | 2023-05-25T17:21:56.204Z | 2023-12-12T19:50:51.210Z | 2023-12-12T19:50:51.210Z | {'Vendor': 'n/a', 'Product': 'VMware Workspace ONE Launcher', 'Versions': 'VMware Workspace ONE Launcher 22.x, 23.x'} |
CVE-2023-34571 | Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter shareSpeed at /goform/WifiGuestSet. | https://hackmd.io/%400dayResearch/S1GcUxzSn | 2023-06-07T00:00:00 | 2023-06-08T00:00:00 | 2023-06-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34121 | Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access. | https://explore.zoom.us/en/trust/security/security-bulletin/ | 2023-05-25T22:01:29.098Z | 2023-06-13T17:42:17.823Z | 2023-06-13T18:49:00.798Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for Windows', 'Versions': 'before 5.14.0'} |
CVE-2023-34988 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters. | https://fortiguard.com/psirt/FG-IR-23-141 | 2023-06-09T06:59:37.970Z | 2023-10-10T16:50:39.390Z | 2023-10-10T16:50:39.390Z | {'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'} |
CVE-2023-34208 | Path Traversal in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to extract files into arbitrary directories via a crafted ZIP archive. | https://zuso.ai/Advisory/ZA-2023-05 | 2023-05-30T09:41:32.477Z | 2023-10-17T04:00:05.711Z | 2023-10-17T04:00:05.711Z | {'Vendor': 'EasyUse Digital Technology', 'Product': 'MailHunter Ultimate', 'Versions': '0'} |
CVE-2023-34658 | Telegram v9.6.3 on iOS allows attackers to hide critical information on the User Interface via calling the function SFSafariViewController. | https://crsrg.sh/crsrg-2308101/ | 2023-06-07T00:00:00 | 2023-06-29T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.