CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-34609
An issue was discovered flexjson thru 3.3 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://sourceforge.net/p/flexjson/bugs/48/
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34259
Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575.
https://sec-consult.com/vulnerability-lab/
2023-05-31T00:00:00
2023-11-03T00:00:00
2023-11-03T03:46:51.840800
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34258
An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code execution.
https://www.errno.fr/PatrolAdvisory.html#remote-secrets-leak-using-patrols-pconfig-22100
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34937
A stack overflow in the UpdateSnat function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34937.md
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34034
Using "**" as a pattern in Spring Security configuration for WebFlux creates a mismatch in pattern matching between Spring Security and Spring WebFlux, and the potential for a security bypass.
https://spring.io/security/cve-2023-34034
2023-05-25T17:21:56.199Z
2023-07-19T14:16:12.150Z
2023-07-19T14:16:12.150Z
{'Vendor': 'n/a', 'Product': 'Spring Security', 'Versions': 'Spring Security 6.1.0, Spring Security 6.0.0 , Spring Security 5.8.0, Spring Security 5.7.0 , Spring Security 5.6.0'}
CVE-2023-34464
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting in version 2.2.1 until versions 14.4.8, 14.10.5, and 15.1RC1 of org.xwiki.platform:xwiki-platform-web and any version prior to 14.4.8, 14.10.5, and 15.1.RC1 of org.xwiki.platform:xwiki-platform-web-templates, any user who can edit a document in a wiki like the user profile can create a stored cross-site scripting attack. The attack occurs by putting plain HTML code into that document and then tricking another user to visit that document with the `displaycontent` or `rendercontent` template and plain output syntax. If a user with programming rights is tricked into visiting such a URL, arbitrary actions be performed with this user's rights, impacting the confidentiality, integrity, and availability of the whole XWiki installation. This has been patched in XWiki 14.4.8, 14.10.5 and 15.1RC1 by setting the content type of the response to plain text when the output syntax is not an HTML syntax.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fp7h-f9f5-x4q7
2023-06-06T16:16:53.560Z
2023-06-23T14:44:47.064Z
2023-06-23T14:44:47.064Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': 'org.xwiki.platform:xwiki-platform-web >= 2.2.1, < 14.4.8, org.xwiki.platform:xwiki-platform-web-templates < 14.4.8, org.xwiki.platform:xwiki-platform-web-templates >= 14.5, < 14.10.5, org.xwiki.platform:xwiki-platform-web-templates >= 15.0-rc-1, < 15.1-rc-1'}
CVE-2023-34171
Cross-Site Request Forgery (CSRF) vulnerability in Alex Raven WP Report Post plugin <= 2.1.2 versions.
https://patchstack.com/database/vulnerability/wp-report-post/wordpress-wp-report-post-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-29T13:52:11.723Z
2023-11-09T19:22:26.206Z
2023-11-09T19:22:26.206Z
{'Vendor': 'Alex Raven', 'Product': 'WP Report Post', 'Versions': 'n/a'}
CVE-2023-34872
A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open.
https://gitlab.freedesktop.org/poppler/poppler/-/commit/591235c8b6c65a2eee88991b9ae73490fd9afdfe
2023-06-07T00:00:00
2023-07-31T00:00:00
2023-12-06T03:06:22.697756
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34433
PiiGAB M-Bus stores passwords using a weak hash algorithm.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01
2023-06-27T16:55:52.771Z
2023-07-06T23:06:34.227Z
2023-07-06T23:06:34.227Z
{'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'}
CVE-2023-34063
Aria Automation contains a Missing Access Control vulnerability. An authenticated malicious actor may exploit this vulnerability leading to unauthorized access to remote organizations and workflows.
https://www.vmware.com/security/advisories/VMSA-2024-0001.html
2023-05-25T17:21:56.204Z
2024-01-16T09:10:09.738Z
2024-01-16T09:10:09.738Z
{'Vendor': 'N/A', 'Product': 'VMware Aria Automation, VMware Cloud Foundation', 'Versions': 'Aria Automation 8.14.1, Aria Automation 8.14.0, Aria Automation 8.13.1, Aria Automation 8.13.0, Aria Automation 8.12.2, Aria Automation 8.12.1, Aria Automation 8.12.0, Aria Automation 8.11.2, Aria Automation 8.11.1, Aria Automation 8.11.0 '}
CVE-2023-34599
Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.
https://github.com/maddsec/CVE-2023-34599
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34960
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
http://chamilo.com
2023-06-07T00:00:00
2023-08-01T00:00:00
2023-08-24T16:06:19.539291
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34576
SQL injection vulnerability in updatepos.php in PrestaShop opartfaq through 1.0.3 allows remote attackers to run arbitrary SQL commands via unspedified vector.
https://security.friendsofpresta.org/modules/2023/09/19/opartfaq.html
2023-06-07T00:00:00
2023-09-21T00:00:00
2023-09-21T19:23:25.731680
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34126
Vulnerability in SonicWall GMS and Analytics allows an authenticated attacker to upload files on the underlying filesystem with root privileges. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.851Z
2023-07-13T00:44:10.845Z
2023-07-13T00:44:10.845Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34219
In JetBrains TeamCity before 2023.05 improper permission checks allowed users without appropriate permissions to edit Build Configuration settings via REST API
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:32.869Z
2023-05-31T13:03:13.367Z
2023-05-31T13:03:13.367Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34976
A SQL injection vulnerability has been reported to affect Video Station. If exploited, the vulnerability could allow authenticated users to inject malicious code via a network. We have already fixed the vulnerability in the following version: Video Station 5.7.0 ( 2023/07/27 ) and later
https://www.qnap.com/en/security-advisory/qsa-23-52
2023-06-08T08:26:04.295Z
2023-10-13T19:17:17.403Z
2023-10-13T19:17:17.403Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'Video Station', 'Versions': '5.7.x'}
CVE-2023-34425
The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.6, macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges.
https://support.apple.com/en-us/HT213841
2023-07-20T15:04:25.833Z
2023-07-28T04:30:39.127Z
2023-07-28T04:30:39.127Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-34130
SonicWall GMS and Analytics use outdated Tiny Encryption Algorithm (TEA) with a hardcoded key to encrypt sensitive data. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.851Z
2023-07-13T01:06:27.492Z
2023-07-13T01:06:27.492Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34833
An arbitrary file upload vulnerability in the component /api/upload.php of ThinkAdmin v6 allows attackers to execute arbitrary code via a crafted file.
https://note.youdao.com/s/3tge43wH
2023-06-07T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34999
A command injection vulnerability exists in RTS VLink Virtual Matrix Software Versions v5 (< 5.7.6) and v6 (< 6.5.0) that allows an attacker to perform arbitrary code execution via the admin web interface.
https://psirt.bosch.com/security-advisories/BOSCH-SA-893251-BT.html
2023-06-16T06:04:24.396Z
2023-09-18T10:16:14.009Z
2023-09-18T10:16:14.009Z
{'Vendor': 'RTS', 'Product': 'VLink Virtual Matrix Software', 'Versions': '5.0.0, 6.0.0'}
CVE-2023-34472
AMI SPx contains a vulnerability in the BMC where an Attacker may cause an improper neutralization of CRLF sequences in HTTP Headers. A successful exploit of this vulnerability may lead to a loss of integrity.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023006.pdf
2023-06-07T03:10:19.974Z
2023-07-05T18:08:16.990Z
2023-07-05T18:08:16.990Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0, 13.0'}
CVE-2023-34188
The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers. By sending a single attack payload over TCP, an attacker can cause an infinite loop in which the server continuously reparses that payload, and does not respond to any other requests.
https://github.com/cesanta/mongoose/commit/4663090a8fb036146dfe77718cff612b0101cb0f
2023-05-30T00:00:00
2023-06-23T00:00:00
2023-09-06T16:32:14.992132
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34022
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rakib Hasan Dynamic QR Code Generator plugin <= 0.0.5 versions.
https://patchstack.com/database/vulnerability/dynamic-qr-code-generator/wordpress-dynamic-qr-code-generator-plugin-0-0-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-25T11:26:00.466Z
2023-08-30T14:46:01.651Z
2023-08-30T14:46:01.651Z
{'Vendor': 'Rakib Hasan', 'Product': 'Dynamic QR Code Generator', 'Versions': 'n/a'}
CVE-2023-34537
A Reflected XSS was discovered in HotelDruid version 3.0.5, an attacker can issue malicious code/command on affected webpage's parameter to trick user on browser and/or exfiltrate data.
https://github.com/leekenghwa/CVE-2023-34537---XSS-reflected--found-in-HotelDruid-3.0.5
2023-06-07T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34167
Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled.
https://consumer.huawei.com/en/support/bulletin/2023/6/
2023-05-29T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-34235
Strapi is an open-source headless content management system. Prior to version 4.10.8, it is possible to leak private fields if one is using the `t(number)` prefix. Knex query allows users to change the default prefix. For example, if someone changes the prefix to be the same as it was before or to another table they want to query, the query changes from `password` to `t1.password`. `password` is protected by filtering protections but `t1.password` is not protected. This can lead to filtering attacks on everything related to the object again, including admin passwords and reset-tokens. Version 4.10.8 fixes this issue.
https://github.com/strapi/strapi/security/advisories/GHSA-9xg4-3qfm-9w8f
2023-05-31T13:51:51.169Z
2023-07-25T17:24:19.864Z
2023-07-25T17:24:19.864Z
{'Vendor': 'strapi', 'Product': 'strapi', 'Versions': '< 4.10.8'}
CVE-2023-34409
In Percona Monitoring and Management (PMM) server 2.x before 2.37.1, the authenticate function in auth_server.go does not properly formalize and sanitize URL paths to reject path traversal attempts. This allows an unauthenticated remote user, when a crafted POST request is made against unauthenticated API routes, to access otherwise protected API routes leading to escalation of privileges and information disclosure.
https://www.percona.com/blog/pmm-authentication-bypass-vulnerability-fixed-in-2-37-1/
2023-06-05T00:00:00
2023-06-06T00:00:00
2023-06-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34059
open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the /dev/uinput file descriptor allowing them to simulate user inputs.
https://www.vmware.com/security/advisories/VMSA-2023-0024.html
2023-05-25T17:21:56.204Z
2023-10-27T04:53:31.893Z
2023-10-27T04:53:31.893Z
{'Vendor': 'n/a', 'Product': 'open-vm-tools', 'Versions': '11.0.0'}
CVE-2023-34327
[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] AMD CPUs since ~2014 have extensions to normal x86 debugging functionality. Xen supports guests using these extensions. Unfortunately there are errors in Xen's handling of the guest state, leading to denials of service. 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of a previous vCPUs debug mask state. 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT. This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock up the CPU entirely.
https://xenbits.xenproject.org/xsa/advisory-444.html
2023-06-01T10:44:17.066Z
2024-01-05T16:34:10.958Z
2024-01-05T16:34:10.958Z
{'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-444'}
CVE-2023-34798
An arbitrary file upload vulnerability in eoffice before v9.5 allows attackers to execute arbitrary code via uploading a crafted file.
https://gist.github.com/Zhu013/e5e6e03613704a2a4107cc6456f1e8e2
2023-06-07T00:00:00
2023-07-25T00:00:00
2023-07-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34761
An unauthenticated attacker within BLE proximity can remotely connect to a 7-Eleven LED Message Cup, Hello Cup 1.3.1 for Android, and bypass the application's client-side chat censor filter.
https://github.com/actuator/7-Eleven-Bluetooth-Smart-Cup-Jailbreak
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34624
An issue was discovered htmlcleaner thru = 2.28 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://github.com/amplafi/htmlcleaner/issues/13
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-08-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34448
Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`.
https://github.com/getgrav/grav/security/advisories/GHSA-whr7-m3f8-mpm8
2023-06-06T16:16:53.558Z
2023-06-14T22:06:01.338Z
2023-06-14T22:16:40.551Z
{'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '< 1.7.42'}
CVE-2023-34018
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SoundCloud Inc. SoundCloud Shortcode allows Stored XSS.This issue affects SoundCloud Shortcode: from n/a through 3.1.0.
https://patchstack.com/database/vulnerability/soundcloud-shortcode/wordpress-soundcloud-shortcode-plugin-3-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-25T11:26:00.464Z
2023-11-30T17:01:49.611Z
2023-11-30T17:01:49.611Z
{'Vendor': 'SoundCloud Inc.', 'Product': 'SoundCloud Shortcode', 'Versions': 'n/a'}
CVE-2023-34736
Guantang Equipment Management System version 4.12 is vulnerable to Arbitrary File Upload.
https://github.com/prismbreak/vulnerabilities/issues/5
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34366
A use-after-free vulnerability exists in the Figure stream parsing functionality of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause memory corruption, resulting in arbitrary code execution. Victim would need to open a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758
2023-06-08T15:45:16.455Z
2023-10-19T17:00:43.773Z
2023-10-20T17:00:06.097Z
{'Vendor': 'Ichitaro 2023', 'Product': 'Ichitaro 2023', 'Versions': '1.0.1.59372'}
CVE-2023-34673
Elenos ETG150 FM transmitter running on version 3.12 was discovered to be leaking SMTP credentials and other sensitive information by exploiting the publicly accessible Memcached service. The attack can occur over the public Internet in some cases.
http://elenos.com
2023-06-07T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34389
An allocation of resources without limits or throttling vulnerability in the Schweitzer Engineering Laboratories SEL-451 could allow a remote authenticated attacker to make the system unavailable for an indefinite amount of time. See product Instruction Manual Appendix A dated 20230830 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-06-02T17:18:29.697Z
2023-11-30T16:54:29.986Z
2023-11-30T16:54:29.986Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-451', 'Versions': 'R315-V0, R316-V0, R317-V0, R318-V0, R320-V0, R321-V0, R322-V0, R323-V0, R324-V0, R325-V0, R326-V0, R327-V0'}
CVE-2023-34223
In JetBrains TeamCity before 2023.05 parameters of the "password" type from build dependencies could be logged in some cases
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:33.891Z
2023-05-31T13:03:15.563Z
2023-05-31T13:03:15.563Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34468
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
https://nifi.apache.org/security.html#CVE-2023-34468
2023-06-06T17:30:23.654Z
2023-06-12T15:09:20.711Z
2023-06-12T15:09:20.711Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '0.0.2'}
CVE-2023-34192
Cross Site Scripting vulnerability in Zimbra ZCS v.8.8.15 allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
2023-05-30T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34038
VMware Horizon Server contains an information disclosure vulnerability. A malicious actor with network access may be able to access information relating to the internal network configuration.
https://www.vmware.com/security/advisories/VMSA-2023-0017.html
2023-05-25T17:21:56.201Z
2023-08-04T11:24:57.885Z
2023-08-04T11:24:57.885Z
{'Vendor': 'n/a', 'Product': 'VMware Horizon Server', 'Versions': 'Horizon Server 2306, Horizon Server 2303, Horizon Server 2212, Horizon Server 2209, Horizon Server 2206, Horizon Server 2111.x, Horizon Server 2106, Horizon Server 2103, Horizon Server 2012, Horizon Server 2006'}
CVE-2023-34487
itsourcecode Online Hotel Management System Project In PHP v1.0.0 is vulnerable to SQL Injection. SQL injection points exist in the login password input box. This vulnerability can be exploited through time-based blind injection.
https://github.com/JunyanYip/itsourcecode_justines_sql_vul
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34254
The GLPI Agent is a generic management agent. Prior to version 1.5, if glpi-agent is running remoteinventory task against an Unix platform with ssh command, an administrator user on the remote can manage to inject a command in a specific workflow the agent would run with the privileges it uses. In the case, the agent is running with administration privileges, a malicious user could gain high privileges on the computer glpi-agent is running on. A malicious user could also disclose all remote accesses the agent is configured with for remoteinventory task. This vulnerability has been patched in glpi-agent 1.5.
https://github.com/glpi-project/glpi-agent/security/advisories/GHSA-39vc-hxgm-j465
2023-05-31T13:51:51.175Z
2023-06-23T20:19:03.534Z
2023-06-23T20:19:03.534Z
{'Vendor': 'glpi-project', 'Product': 'glpi-agent', 'Versions': '< 1.5'}
CVE-2023-34829
Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext.
https://github.com/SecureScripts/TP-Link_Tapo_Hack
2023-06-07T00:00:00
2023-12-28T00:00:00
2023-12-28T02:50:46.930266
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34203
In Progress OpenEdge OEM (OpenEdge Management) and OEE (OpenEdge Explorer) before 12.7, a remote user (who has any OEM or OEE role) could perform a URL injection attack to change identity or role membership, e.g., escalate to admin. This affects OpenEdge LTS before 11.7.16, 12.x before 12.2.12, and 12.3.x through 12.6.x before 12.7.
https://www.progress.com/openedge
2023-05-30T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34346
A stack-based buffer overflow vulnerability exists in the httpd gwcfg.cgi get functionality of Yifan YF325 v1.0_20221108. A specially crafted network packet can lead to command execution. An attacker can send a network request to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1764
2023-06-12T17:06:03.616Z
2023-10-11T15:14:30.390Z
2023-10-11T17:00:08.032Z
{'Vendor': 'Yifan', 'Product': 'YF325', 'Versions': 'v1.0_20221108'}
CVE-2023-34429
Weintek Weincloud v0.13.6 could allow an attacker to cause a denial-of-service condition for Weincloud by sending a forged JWT token.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-04
2023-07-13T15:55:48.894Z
2023-07-19T21:45:39.544Z
2023-07-19T21:45:39.544Z
{'Vendor': 'Weintek', 'Product': 'Weincloud', 'Versions': '0'}
CVE-2023-34995
There are no requirements for setting a complex password for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01
2023-06-27T16:55:52.765Z
2023-07-06T23:05:21.253Z
2023-07-06T23:08:16.962Z
{'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'}
CVE-2023-34096
Thruk is a multibackend monitoring webinterface which currently supports Naemon, Icinga, Shinken and Nagios as backends. In versions 3.06 and prior, the file `panorama.pm` is vulnerable to a Path Traversal vulnerability which allows an attacker to upload a file to any folder which has write permissions on the affected system. The parameter location is not filtered, validated or sanitized and it accepts any kind of characters. For a path traversal attack, the only characters required were the dot (`.`) and the slash (`/`). A fix is available in version 3.06.2.
https://github.com/sni/Thruk/security/advisories/GHSA-vhqc-649h-994h
2023-05-25T21:56:51.245Z
2023-06-08T18:59:51.787Z
2023-06-08T18:59:51.787Z
{'Vendor': 'sni', 'Product': 'Thruk', 'Versions': '< 3.06.2'}
CVE-2023-34215
TN-5900 Series firmware versions v3.3 and prior are vulnerable to the command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the certification-generation function, which could potentially allow malicious users to execute remote code on affected devices. 
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
2023-05-31T08:58:06.149Z
2023-08-17T06:35:06.293Z
2023-08-17T06:35:06.293Z
{'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'}
CVE-2023-34645
jfinal CMS 5.1.0 has an arbitrary file read vulnerability.
https://github.com/jflyfox/jfinal_cms/issues/57
2023-06-07T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34350
Uncontrolled search path element in some Intel(R) XTU software before version 7.12.0.15 may allow an authenticated user to potentially enable escalation of privilege via local access.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00941.html
2023-06-06T03:00:05.057Z
2023-11-14T19:04:20.051Z
2023-11-14T19:04:20.051Z
{'Vendor': 'n/a', 'Product': 'Intel(R) XTU software', 'Versions': 'before version 7.12.0.15'}
CVE-2023-34184
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Bhavik Patel Woocommerce Order address Print plugin <= 3.2 versions.
https://patchstack.com/database/vulnerability/woocommerce-order-address-print/wordpress-woocommerce-order-address-print-plugin-3-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-29T13:52:39.505Z
2023-08-30T13:28:58.159Z
2023-08-30T13:28:58.159Z
{'Vendor': 'Bhavik Patel', 'Product': 'Woocommerce Order address Print', 'Versions': 'n/a'}
CVE-2023-34868
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c.
https://github.com/jerryscript-project/jerryscript/issues/5083
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34612
An issue was discovered ph-json thru 9.5.5 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://github.com/phax/ph-commons/issues/35
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34242
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to version 1.13.4, when Gateway API is enabled in Cilium, the absence of a check on the namespace in which a ReferenceGrant is created could result in Cilium unintentionally gaining visibility of secrets (including certificates) and services across namespaces. An attacker on an affected cluster can leverage this issue to use cluster secrets that should not be visible to them, or communicate with services that they should not have access to. Gateway API functionality is disabled by default. This vulnerability is fixed in Cilium release 1.13.4. As a workaround, restrict the creation of `ReferenceGrant` resources to admin users by using Kubernetes RBAC.
https://github.com/cilium/cilium/security/advisories/GHSA-r7wr-4w5q-55m6
2023-05-31T13:51:51.172Z
2023-06-15T19:07:14.624Z
2023-06-15T19:07:14.624Z
{'Vendor': 'cilium', 'Product': 'cilium', 'Versions': '< 1.13.4'}
CVE-2023-34110
Flask-AppBuilder is an application development framework, built on top of Flask. Prior to version 4.3.2, an authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed password. This vulnerability has been fixed in version 4.3.2.
https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3
2023-05-25T21:56:51.246Z
2023-06-22T22:34:39.865Z
2023-06-22T22:34:39.865Z
{'Vendor': 'dpgaspar', 'Product': 'Flask-AppBuilder', 'Versions': '< 4.3.2'}
CVE-2023-34540
An issue discovered in Langchain before 0.0.225 allows attacker to run arbitrary code via jira.run('other' substring.
https://github.com/hwchase17/langchain/issues/4833
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-12-06T20:29:06.151582
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34055
In Spring Boot versions 2.7.0 - 2.7.17, 3.0.0-3.0.12 and 3.1.0-3.1.5, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * org.springframework.boot:spring-boot-actuator is on the classpath
https://spring.io/security/cve-2023-34055
2023-05-25T17:21:56.203Z
2023-11-28T08:27:25.132Z
2023-11-28T08:27:25.132Z
{'Vendor': 'Spring', 'Product': 'Spring Boot', 'Versions': '2.7.0, 3.0.0, 3.1.0, older unsupported versions'}
CVE-2023-34669
TOTOLINK CP300+ V5.2cu.7594 contains a Denial of Service vulnerability in function RebootSystem of the file lib/cste_modules/system which can reboot the system.
https://w3b5h3ll.notion.site/w3b5h3ll/TOTOLINK-CP300-c96d775881f0476b9ef465dba9c6d9b8
2023-06-07T00:00:00
2023-07-17T00:00:00
2023-07-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34239
Gradio is an open-source Python library that is used to build machine learning and data science. Due to a lack of path filtering Gradio does not properly restrict file access to users. Additionally Gradio does not properly restrict the what URLs are proxied. These issues have been addressed in version 3.34.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/gradio-app/gradio/security/advisories/GHSA-3qqg-pgqq-3695
2023-05-31T13:51:51.169Z
2023-06-07T23:20:06.549Z
2023-06-07T23:20:06.549Z
{'Vendor': 'gradio-app', 'Product': 'gradio', 'Versions': '< 3.34.0'}
CVE-2023-34844
Play With Docker < 0.0.2 has an insecure CAP_SYS_ADMIN privileged mode causing the docker container to escape.
https://hacku.top/wl/?id=MACBtnorZyp6hC3E5bw2CqBAusuWoKe3
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34147
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34148.
https://success.trendmicro.com/dcx/s/solution/000293322?language=en_US
2023-05-26T18:41:36.333Z
2023-06-26T21:58:09.816Z
2023-06-26T21:58:09.816Z
{'Vendor': 'Trend Micro, Inc.', 'Product': 'Trend Micro Apex One', 'Versions': '2019'}
CVE-2023-34452
Grav is a flat-file content management system. In versions 1.7.42 and prior, the "/forgot_password" page has a self-reflected cross-site scripting vulnerability that can be exploited by injecting a script into the "email" parameter of the request. While this vulnerability can potentially allow an attacker to execute arbitrary code on the user's browser, the impact is limited as it requires user interaction to trigger the vulnerability. As of time of publication, a patch is not available. Server-side validation should be implemented to prevent this vulnerability.
https://github.com/getgrav/grav/security/advisories/GHSA-xcr8-cc2j-62fc
2023-06-06T16:16:53.558Z
2023-06-14T22:28:34.824Z
2023-06-14T22:31:29.728Z
{'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '<= 1.7.42'}
CVE-2023-34002
Cross-Site Request Forgery (CSRF) vulnerability in WP Inventory Manager plugin <= 2.1.0.13 versions.
https://patchstack.com/database/vulnerability/wp-inventory-manager/wordpress-wp-inventory-manager-plugin-2-1-0-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T11:25:11.063Z
2023-11-09T17:53:24.757Z
2023-11-09T17:53:24.757Z
{'Vendor': 'WP Inventory Manager', 'Product': 'WP Inventory Manager', 'Versions': 'n/a'}
CVE-2023-34151
A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
https://github.com/ImageMagick/ImageMagick/issues/6341
2023-05-29T00:00:00
2023-05-30T00:00:00
2023-08-31T02:07:21.664100
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'ImageMagick-6.7'}
CVE-2023-34852
PublicCMS <=V4.0.202302 is vulnerable to Insecure Permissions.
https://github.com/sanluan/PublicCMS
2023-06-07T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34917
Fuge CMS v1.0 contains an Open Redirect vulnerability in member/RegisterAct.java.
https://github.com/fuge/cms/issues/3
2023-06-07T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34106
GLPI is a free asset and IT management software package. Versions of the software starting with 0.68 and prior to 10.0.8 have an incorrect rights check on a on a file accessible by an authenticated user. This allows access to the list of all users and their personal information. Users should upgrade to version 10.0.8 to receive a patch.
https://github.com/glpi-project/glpi/security/advisories/GHSA-923r-hqh4-wj7c
2023-05-25T21:56:51.246Z
2023-07-05T17:48:32.727Z
2023-07-05T17:48:32.727Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 0.68, < 10.0.8'}
CVE-2023-34043
VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'.
https://www.vmware.com/security/advisories/VMSA-2023-0020.html
2023-05-25T17:21:56.202Z
2023-09-26T17:14:36.790Z
2023-09-26T17:14:36.790Z
{'Vendor': 'n/a', 'Product': 'VMware Aria Operations', 'Versions': 'VMware Aria Operations 8.12.x, 8.10.x, 8.6.x, VCF 5.x, 4.x'}
CVE-2023-34940
Asus RT-N10LX Router v2.0.0.39 was discovered to contain a stack overflow via the url parameter at /start-apply.html. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://github.com/OlivierLaflamme/cve/blob/main/ASUS-N10LX_2.0.0.39/URLFilterList_Stack_BOF.md
2023-06-07T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34385
Unrestricted Upload of File with Dangerous Type vulnerability in Akshay Menariya Export Import Menus.This issue affects Export Import Menus: from n/a through 1.8.0.
https://patchstack.com/database/vulnerability/export-import-menus/wordpress-export-import-menus-plugin-1-8-0-arbitrary-file-upload-vulnerability?_s_id=cve
2023-06-02T15:48:00.545Z
2023-12-20T18:44:48.701Z
2023-12-20T18:44:48.701Z
{'Vendor': 'Akshay Menariya', 'Product': 'Export Import Menus', 'Versions': 'n/a'}
CVE-2023-34048
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
https://www.vmware.com/security/advisories/VMSA-2023-0023.html
2023-05-25T17:21:56.202Z
2023-10-25T04:21:42.267Z
2023-10-25T04:21:42.267Z
{'Vendor': 'VMware', 'Product': 'VMware vCenter Server', 'Versions': '8.0, 7.0'}
CVE-2023-34418
A valid, authenticated LXCA user may be able to gain unauthorized access to events and other data stored in LXCA due to a SQL injection vulnerability in a specific web API.
https://support.lenovo.com/us/en/product_security/LEN-98715
2023-06-05T19:15:31.604Z
2023-06-26T19:45:05.363Z
2023-06-26T19:45:05.363Z
{'Vendor': 'Lenovo', 'Product': 'Lenovo XClarity Administrator', 'Versions': 'Versions prior to 4.0'}
CVE-2023-34224
In JetBrains TeamCity before 2023.05 open redirect during oAuth configuration was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:34.144Z
2023-05-31T13:03:15.821Z
2023-05-31T13:03:15.821Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34336
AMI BMC contains a vulnerability in the IPMI handler, where an attacker with the required privileges can cause a buffer overflow, which may lead to code execution, denial of service, or escalation of privileges.  
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023005.pdf
2023-06-01T16:05:31.612Z
2023-06-12T17:08:21.474Z
2023-06-12T17:08:21.474Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '13.0, 12.0'}
CVE-2023-34623
An issue was discovered jtidy thru r938 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://github.com/trajano/jtidy/issues/4
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34459
OpenZeppelin Contracts is a library for smart contract development. Starting in version 4.7.0 and prior to version 4.9.2, when the `verifyMultiProof`, `verifyMultiProofCalldata`, `procesprocessMultiProof`, or `processMultiProofCalldat` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves. A contract may be vulnerable if it uses multiproofs for verification and the merkle tree that is processed includes a node with value 0 at depth 1 (just under the root). This could happen inadvertedly for balanced trees with 3 leaves or less, if the leaves are not hashed. This could happen deliberately if a malicious tree builder includes such a node in the tree. A contract is not vulnerable if it uses single-leaf proving (`verify`, `verifyCalldata`, `processProof`, or `processProofCalldata`), or if it uses multiproofs with a known tree that has hashed leaves. Standard merkle trees produced or validated with the @openzeppelin/merkle-tree library are safe. The problem has been patched in version 4.9.2. Some workarounds are available. For those using multiproofs: When constructing merkle trees hash the leaves and do not insert empty nodes in your trees. Using the @openzeppelin/merkle-tree package eliminates this issue. Do not accept user-provided merkle roots without reconstructing at least the first level of the tree. Verify the merkle tree structure by reconstructing it from the leaves.
https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wprv-93r4-jj2p
2023-06-06T16:16:53.559Z
2023-06-16T22:13:18.181Z
2023-06-16T22:13:18.181Z
{'Vendor': 'OpenZeppelin', 'Product': 'openzeppelin-contracts', 'Versions': '>= 4.7.0, < 4.9.2'}
CVE-2023-34320
Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.
https://xenbits.xenproject.org/xsa/advisory-436.html
2023-06-01T10:44:17.064Z
2023-12-08T20:54:06.993Z
2023-12-08T20:54:06.993Z
{'Vendor': 'Xen', 'Product': 'Xen', 'Versions': 'consult Xen advisory XSA-436'}
CVE-2023-34635
Wifi Soft Unibox Administration 3.0 and 3.1 is vulnerable to SQL Injection. The vulnerability occurs because of not validating or sanitizing the user input in the username field of the login page.
http://packetstormsecurity.com/files/173669/Wifi-Soft-Unibox-Administration-3.0-3.1-SQL-Injection.html
2023-06-07T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34377
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Joseph C Dolson My Content Management plugin <= 1.7.6 versions.
https://patchstack.com/database/vulnerability/my-content-management/wordpress-my-content-management-plugin-1-7-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-06-02T15:45:18.620Z
2023-08-05T22:51:09.632Z
2023-08-05T22:51:09.632Z
{'Vendor': 'Joseph C Dolson', 'Product': 'My Content Management', 'Versions': 'n/a'}
CVE-2023-34232
snowflake-connector-nodejs, a NodeJS driver for Snowflake, is vulnerable to command injection via single sign on (SSO) browser URL authentication in versions prior to 1.6.21. In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. Version 1.6.21 contains a patch for this issue.
https://github.com/snowflakedb/snowflake-connector-nodejs/security/advisories/GHSA-h53w-7qw7-vh5c
2023-05-31T13:51:51.168Z
2023-06-08T20:17:49.734Z
2023-06-08T20:17:49.734Z
{'Vendor': 'snowflakedb', 'Product': 'snowflake-connector-nodejs', 'Versions': '< 1.6.21'}
CVE-2023-34475
A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service.
https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0
2023-06-07T00:00:00
2023-06-16T00:00:00
2023-08-31T02:07:13.710051
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed in ImageMagick 7.1.1-10'}
CVE-2023-34025
Cross-Site Request Forgery (CSRF) vulnerability in LWS LWS Hide Login plugin <= 2.1.6 versions.
https://patchstack.com/database/vulnerability/lws-hide-login/wordpress-lws-hide-login-plugin-2-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T12:13:20.690Z
2023-11-09T20:29:07.527Z
2023-11-09T20:29:07.527Z
{'Vendor': 'LWS', 'Product': 'LWS Hide Login', 'Versions': 'n/a'}
CVE-2023-34160
Vulnerability of spoofing trustlists of Huawei desktop.Successful exploitation of this vulnerability can cause third-party apps to hide app icons on the desktop to prevent them from being uninstalled.
https://consumer.huawei.com/en/support/bulletin/2023/6/
2023-05-29T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.0'}
CVE-2023-34249
benjjvi/PyBB is an open source bulletin board. Prior to commit dcaeccd37198ecd3e41ea766d1099354b60d69c2, benjjvi/PyBB is vulnerable to SQL Injection. This vulnerability has been fixed as of commit dcaeccd37198ecd3e41ea766d1099354b60d69c2. As a workaround, a user may be able to update the software manually to avoid this problem by sanitizing user queries to `BulletinDatabaseModule.py`.
https://github.com/benjjvi/PyBB/security/advisories/GHSA-5qrx-fgxq-95gg
2023-05-31T13:51:51.174Z
2023-06-13T16:40:44.556Z
2023-06-13T16:40:44.556Z
{'Vendor': 'benjjvi', 'Product': 'PyBB', 'Versions': '< dcaeccd37198ecd3e41ea766d1099354b60d69c2'}
CVE-2023-34422
A valid, authenticated LXCA user with elevated privileges may be able to delete folders in the LXCA filesystem through a specifically crafted web API call due to insufficient input validation.
https://support.lenovo.com/us/en/product_security/LEN-98715
2023-06-05T19:15:31.605Z
2023-06-26T19:45:31.576Z
2023-06-26T19:45:31.576Z
{'Vendor': 'Lenovo', 'Product': 'Lenovo XClarity Administrator', 'Versions': 'Versions prior to 4.0'}
CVE-2023-34971
An inadequate encryption strength vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to decrypt the data using brute force attacks via unspecified vectors. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2425 build 20230609 and later QTS 5.1.0.2444 build 20230629 and later QTS 4.5.4.2467 build 20230718 and later QuTS hero h5.1.0.2424 build 20230609 and later QuTS hero h4.5.4.2476 build 20230728 and later
https://www.qnap.com/en/security-advisory/qsa-23-60
2023-06-08T08:26:04.294Z
2023-08-24T16:14:56.611Z
2023-08-24T16:14:56.611Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QTS', 'Versions': '5.0.*, 5.1.*, 4.5.*'}
CVE-2023-34834
A Directory Browsing vulnerability in MCL-Net version 4.3.5.8788 webserver running on default port 5080, allows attackers to gain sensitive information about the configured databases via the "/file" endpoint.
http://www.mclv4.mcl-collection.com/index.php
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34137
SonicWall GMS and Analytics CAS Web Services application use static values for authentication without proper checks leading to authentication bypass vulnerability. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.852Z
2023-07-13T02:43:08.405Z
2023-07-13T02:43:08.405Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34567
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg.
https://hackmd.io/%400dayResearch/H1xUqzfHh
2023-06-07T00:00:00
2023-06-08T00:00:00
2023-06-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34967
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
https://access.redhat.com/errata/RHSA-2023:6667
2023-06-07T21:11:04.261Z
2023-07-20T14:57:45.624Z
2024-01-25T20:45:04.634Z
{'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.16.11, 4.17.10, 4.18.5'}
CVE-2023-34434
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.7.0.  The attacker could bypass the current logic and achieve arbitrary file reading. To solve it, users are advised to upgrade to Apache InLong's 1.8.0 or cherry-pick https://github.com/apache/inlong/pull/8130 .
https://lists.apache.org/thread/7f1o71w5r732cspltmtdydn01gllf4jo
2023-06-06T11:15:53.221Z
2023-07-25T07:09:58.676Z
2023-07-25T07:09:58.676Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.4.0'}
CVE-2023-34064
Workspace ONE Launcher contains a Privilege Escalation Vulnerability. A malicious actor with physical access to Workspace ONE Launcher could utilize the Edge Panel feature to bypass setup to gain access to sensitive information.
https://www.vmware.com/security/advisories/VMSA-2023-0027.html
2023-05-25T17:21:56.204Z
2023-12-12T19:50:51.210Z
2023-12-12T19:50:51.210Z
{'Vendor': 'n/a', 'Product': 'VMware Workspace ONE Launcher', 'Versions': 'VMware Workspace ONE Launcher 22.x, 23.x'}
CVE-2023-34571
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter shareSpeed at /goform/WifiGuestSet.
https://hackmd.io/%400dayResearch/S1GcUxzSn
2023-06-07T00:00:00
2023-06-08T00:00:00
2023-06-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34121
Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access.
https://explore.zoom.us/en/trust/security/security-bulletin/
2023-05-25T22:01:29.098Z
2023-06-13T17:42:17.823Z
2023-06-13T18:49:00.798Z
{'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for Windows', 'Versions': 'before 5.14.0'}
CVE-2023-34988
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters.
https://fortiguard.com/psirt/FG-IR-23-141
2023-06-09T06:59:37.970Z
2023-10-10T16:50:39.390Z
2023-10-10T16:50:39.390Z
{'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'}
CVE-2023-34208
Path Traversal in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to extract files into arbitrary directories via a crafted ZIP archive.
https://zuso.ai/Advisory/ZA-2023-05
2023-05-30T09:41:32.477Z
2023-10-17T04:00:05.711Z
2023-10-17T04:00:05.711Z
{'Vendor': 'EasyUse Digital Technology', 'Product': 'MailHunter Ultimate', 'Versions': '0'}
CVE-2023-34658
Telegram v9.6.3 on iOS allows attackers to hide critical information on the User Interface via calling the function SFSafariViewController.
https://crsrg.sh/crsrg-2308101/
2023-06-07T00:00:00
2023-06-29T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}