CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-34033
Cross-Site Request Forgery (CSRF) vulnerability in Malinky Ajax Pagination and Infinite Scroll plugin <= 2.0.1 versions.
https://patchstack.com/database/vulnerability/malinky-ajax-pagination/wordpress-ajax-pagination-and-infinite-scroll-plugin-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T12:13:20.691Z
2023-11-09T19:31:04.794Z
2023-11-09T19:31:04.794Z
{'Vendor': 'Malinky', 'Product': 'Ajax Pagination and Infinite Scroll', 'Versions': 'n/a'}
CVE-2023-34463
DataEase is an open source data visualization analysis tool to analyze data and gain insight into business trends. In affected versions Unauthorized users can delete an application erroneously. This vulnerability has been fixed in version 1.18.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/dataease/dataease/security/advisories/GHSA-4c4p-qfwq-85fj
2023-06-06T16:16:53.560Z
2023-06-26T20:29:38.074Z
2023-06-26T20:29:38.074Z
{'Vendor': 'dataease', 'Product': 'dataease', 'Versions': '< 1.18.8'}
CVE-2023-34930
A stack overflow in the EditMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34930.md
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34176
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Chilexpress Chilexpress woo oficial plugin <= 1.2.9 versions.
https://patchstack.com/database/vulnerability/chilexpress-oficial/wordpress-chilexpress-woo-oficial-plugin-1-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-29T13:52:11.724Z
2023-08-30T13:33:20.320Z
2023-08-30T13:33:20.320Z
{'Vendor': 'Chilexpress', 'Product': 'Chilexpress woo oficial', 'Versions': 'n/a'}
CVE-2023-34228
In JetBrains TeamCity before 2023.05 authentication checks were missing – 2FA was not checked for some sensitive account actions
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:35.117Z
2023-05-31T13:03:17.042Z
2023-05-31T13:03:17.042Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34382
Deserialization of Untrusted Data vulnerability in weDevs Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy.This issue affects Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy: from n/a through 3.7.19.
https://patchstack.com/database/vulnerability/dokan-lite/wordpress-dokan-plugin-3-7-19-php-object-injection-vulnerability?_s_id=cve
2023-06-02T15:48:00.545Z
2023-12-19T19:40:58.498Z
2023-12-19T19:40:58.498Z
{'Vendor': 'weDevs', 'Product': 'Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy', 'Versions': 'n/a'}
CVE-2023-34551
In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote).
http://ezviz.com
2023-06-07T00:00:00
2023-08-01T00:00:00
2023-08-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34101
Contiki-NG is an operating system for internet of things devices. In version 4.8 and prior, when processing ICMP DAO packets in the `dao_input_storing` function, the Contiki-NG OS does not verify that the packet buffer is big enough to contain the bytes it needs before accessing them. Up to 16 bytes can be read out of bounds in the `dao_input_storing` function. An attacker can truncate an ICMP packet so that it does not contain enough data, leading to an out-of-bounds read on these lines. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in release 4.9. As a workaround, one can apply the changes in Contiki-NG pull request #2435 to patch the system.
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-fp66-ff6x-7w2w
2023-05-25T21:56:51.245Z
2023-06-14T14:50:21.267Z
2023-06-14T14:50:21.267Z
{'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'}
CVE-2023-34414
The error page for sites with invalid TLS certificates was missing the activation-delay Firefox uses to protect prompts and permission dialogs from attacks that exploit human response time delays. If a malicious page elicited user clicks in precise locations immediately before navigating to a site with a certificate error and made the renderer extremely busy at the same time, it could create a gap between when the error page was loaded and when the display actually refreshed. With the right timing the elicited clicks could land in that gap and activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12.
https://bugzilla.mozilla.org/show_bug.cgi?id=1695986
2023-06-05T16:57:22.624Z
2023-06-19T10:14:49.519Z
2023-06-19T10:14:49.519Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-34044
VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
https://www.vmware.com/security/advisories/VMSA-2023-0022.html
2023-05-25T17:21:56.202Z
2023-10-20T08:56:53.136Z
2023-10-20T08:56:53.136Z
{'Vendor': 'VMware', 'Product': 'Workstation', 'Versions': '17.x'}
CVE-2023-34855
A Cross Site Scripting (XSS) vulnerability in Youxun Electronic Equipment (Shanghai) Co., Ltd AC Centralized Management Platform v1.02.040 allows attackers to execute arbitrary code via uploading a crafted HTML file to the interface /upfile.cgi.
https://github.com/hashshfza/Vulnerability/issues/1
2023-06-07T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34156
Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied.
https://consumer.huawei.com/en/support/bulletin/2023/6/
2023-05-29T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-34013
Server-Side Request Forgery (SSRF) vulnerability in Poll Maker Team Poll Maker – Best WordPress Poll Plugin.This issue affects Poll Maker – Best WordPress Poll Plugin: from n/a through 4.6.2.
https://patchstack.com/database/vulnerability/poll-maker/wordpress-poll-maker-plugin-4-6-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve
2023-05-25T11:25:36.399Z
2023-11-13T02:28:32.010Z
2023-11-13T02:28:32.010Z
{'Vendor': 'Poll Maker Team', 'Product': 'Poll Maker – Best WordPress Poll Plugin', 'Versions': 'n/a'}
CVE-2023-34140
A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2, VPN series firmware versions 4.30 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers
2023-05-26T03:44:51.339Z
2023-07-17T17:49:38.175Z
2023-07-17T17:49:38.175Z
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': '4.32 through 5.36 Patch 2'}
CVE-2023-34843
Traggo Server 0.3.0 is vulnerable to directory traversal via a crafted GET request.
https://github.com/rootd4ddy/CVE-2023-34843
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34455
snappy-java is a fast compressor/decompressor for Java. Due to use of an unchecked chunk length, an unrecoverable fatal error can occur in versions prior to 1.1.10.1. The code in the function hasNextChunk in the fileSnappyInputStream.java checks if a given stream has more chunks to read. It does that by attempting to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function returns false. Otherwise, if 4 bytes were available, the code treats them as the length of the next chunk. In the case that the `compressed` variable is null, a byte array is allocated with the size given by the input data. Since the code doesn’t test the legality of the `chunkSize` variable, it is possible to pass a negative number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a `java.lang.NegativeArraySizeException` exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), which would raise the fatal `java.lang.OutOfMemoryError` error. Version 1.1.10.1 contains a patch for this issue.
https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh
2023-06-06T16:16:53.559Z
2023-06-15T17:15:00.311Z
2023-06-15T17:15:00.311Z
{'Vendor': 'xerial', 'Product': 'snappy-java', 'Versions': '< 1.1.10.1'}
CVE-2023-34005
Cross-Site Request Forgery (CSRF) vulnerability in Etoile Web Design Front End Users plugin <= 3.2.24 versions.
https://patchstack.com/database/vulnerability/front-end-only-users/wordpress-front-end-users-plugin-3-2-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T11:25:36.397Z
2023-07-17T14:46:12.815Z
2023-07-17T14:46:12.815Z
{'Vendor': 'Etoile Web Design', 'Product': 'Front End Users', 'Versions': 'n/a'}
CVE-2023-34394
In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-02
2023-07-13T18:01:11.679Z
2023-07-19T21:55:31.934Z
2023-07-19T21:55:31.934Z
{'Vendor': 'Keysight Technologies', 'Product': 'N6845A Geolocation Server', 'Versions': '0'}
CVE-2023-34117
Relative path traversal in the Zoom Client SDK before version 5.15.0 may allow an unauthorized user to enable information disclosure via local access.
https://explore.zoom.us/en/trust/security/security-bulletin/
2023-05-25T22:01:29.097Z
2023-07-11T16:59:20.228Z
2023-07-11T16:59:20.228Z
{'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom Client SDK', 'Versions': 'before 5.15.0'}
CVE-2023-34052
VMware Aria Operations for Logs contains a deserialization vulnerability. A malicious actor with non-administrative access to the local system can trigger the deserialization of data which could result in authentication bypass.
https://www.vmware.com/security/advisories/VMSA-2023-0021.html
2023-05-25T17:21:56.203Z
2023-10-20T04:11:45.105Z
2023-10-20T04:11:45.105Z
{'Vendor': 'n/a', 'Product': 'VMware Aria Operations for Logs', 'Versions': 'VMware Aria Operations for Logs 8.x, VMware Cloud Foundation (VMware Aria Operations for Logs) 5.x 4.x '}
CVE-2023-34615
An issue was discovered JSONUtil thru 5.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://github.com/billdavidson/JSONUtil/issues/10
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34245
@udecode/plate-link is the link handler for the udecode/plate rich-text editor plugin system for Slate & React. Affected versions of the link plugin and link UI component do not sanitize URLs to prevent use of the `javascript:` scheme. As a result, links with JavaScript URLs can be inserted into the Plate editor through various means, including opening or pasting malicious content. `@udecode/plate-link` 20.0.0 resolves this issue by introducing an `allowedSchemes` option to the link plugin, defaulting to `['http', 'https', 'mailto', 'tel']`. URLs using a scheme that isn't in this list will not be rendered to the DOM. Users are advised to upgrade. Users unable to upgrade are advised to override the `LinkElement` and `PlateFloatingLink` components with implementations that explicitly check the URL scheme before rendering any anchor elements.
https://github.com/udecode/plate/security/advisories/GHSA-4882-hxpr-hrvm
2023-05-31T13:51:51.173Z
2023-06-09T17:04:23.815Z
2023-06-09T17:04:23.815Z
{'Vendor': 'udecode', 'Product': 'plate', 'Versions': '< 20.0.0'}
CVE-2023-34750
bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the cid parameter at admin/index.php?mode=settings&page=projects&action=edit.
https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34029
Cross-Site Request Forgery (CSRF) vulnerability in Prem Tiwari Disable WordPress Update Notifications and auto-update Email Notifications plugin <= 2.3.3 versions.
https://patchstack.com/database/vulnerability/disable-update-notifications/wordpress-disable-wordpress-update-notifications-and-auto-update-email-notifications-plugin-2-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T12:13:20.691Z
2023-07-11T12:25:42.496Z
2023-07-11T12:25:42.496Z
{'Vendor': 'Prem Tiwari', 'Product': 'Disable WordPress Update Notifications and auto-update Email Notifications', 'Versions': 'n/a'}
CVE-2023-34183
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Valiano Unite Gallery Lite plugin <= 1.7.61 versions.
https://patchstack.com/database/vulnerability/unite-gallery-lite/wordpress-unite-gallery-lite-plugin-1-7-60-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-29T13:52:39.505Z
2023-08-30T13:07:02.118Z
2023-08-30T13:07:02.118Z
{'Vendor': 'Valiano', 'Product': 'Unite Gallery Lite', 'Versions': 'n/a'}
CVE-2023-34880
cmseasy v7.7.7.7 20230520 was discovered to contain a path traversal vulnerability via the add_action method at lib/admin/language_admin.php. This vulnerability allows attackers to execute arbitrary code and perform a local file inclusion.
https://blog.pumpk1n.com/2023/06/06/cmseasy-v7-7-7-7-20230520-path-traversal/
2023-06-07T00:00:00
2023-06-15T00:00:00
2023-06-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34212
The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts locations to a set of allowed schemes. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
https://nifi.apache.org/security.html#CVE-2023-34212
2023-05-30T16:13:48.779Z
2023-06-12T15:14:06.990Z
2023-06-12T15:14:06.990Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '1.8.0'}
CVE-2023-34642
KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function showDirectoryPicker() which can then be used to open an unprivileged command prompt.
https://www.kioware.com/versionhistory.aspx?pid=15
2023-06-07T00:00:00
2023-06-19T00:00:00
2023-06-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34357
Soar Cloud Ltd. HR Portal has a weak Password Recovery Mechanism for Forgotten Password. The reset password link sent out through e-mail, and the link will remain valid after the password has been reset and after the expected expiration date. An attacker with access to the browser history or has the line can thus use the URL again to change the password in order to take over the account.
https://www.twcert.org.tw/tw/cp-132-7347-2653e-1.html
2023-06-02T08:28:37.821Z
2023-09-07T02:00:15.946Z
2023-09-07T02:00:15.946Z
{'Vendor': 'Soar Cloud Ltd. ', 'Product': 'HR Portal', 'Versions': '7.3.2023.0510, 7.3.2023.0705'}
CVE-2023-34091
Kyverno is a policy engine designed for Kubernetes. In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `Enforce`. This situation occurs as resources pending deletion were being consciously exempted by Kyverno, as a way to reduce processing load as policies are typically not applied to objects which are being deleted. However, this could potentially result in allowing a malicious user to leverage the Kubernetes finalizers feature by setting a finalizer which causes the Kubernetes API server to set the `deletionTimestamp` and then not completing the delete operation as a way to explicitly to bypass a Kyverno policy. Note that this is not applicable to Kubernetes Pods but, as an example, a Kubernetes Service resource can be manipulated using an indefinite finalizer to bypass policies. This is resolved in Kyverno 1.10.0. There is no known workaround.
https://github.com/kyverno/kyverno/security/advisories/GHSA-hq4m-4948-64cc
2023-05-25T21:56:51.244Z
2023-06-01T16:24:53.920Z
2023-06-01T16:24:53.920Z
{'Vendor': 'kyverno', 'Product': 'kyverno', 'Versions': '< 1.10.0'}
CVE-2023-34992
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.
https://fortiguard.com/psirt/FG-IR-23-130
2023-06-09T06:59:37.971Z
2023-10-10T16:50:21.319Z
2023-10-10T16:50:21.319Z
{'Vendor': 'Fortinet', 'Product': 'FortiSIEM', 'Versions': '7.0.0, 6.7.0, 6.6.0, 6.5.0, 6.4.0'}
CVE-2023-34838
A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Description parameter.
https://github.com/sahiloj/CVE-2023-34838/blob/main/README.md
2023-06-07T00:00:00
2023-06-27T00:00:00
2023-06-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34654
taocms <=3.0.2 is vulnerable to Cross Site Scripting (XSS).
https://github.com/ae6e361b/taocms-XSS
2023-06-07T00:00:00
2023-07-05T00:00:00
2023-07-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34204
imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it.
https://github.com/imapsync/imapsync/issues/399
2023-05-30T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34341
AMI BMC contains a vulnerability in the SPX REST API, where an attacker with the required privileges can read and write to arbitrary locations within the memory context of the IPMI server process, which may lead to code execution, denial of service, information disclosure, or data tampering.
https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023005.pdf
2023-06-01T20:50:32.674Z
2023-06-12T17:00:01.049Z
2023-06-12T17:00:01.049Z
{'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0, 13.0'}
CVE-2023-34438
Race condition in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
2023-06-09T03:00:03.511Z
2023-08-11T02:37:29.580Z
2023-08-11T02:37:29.580Z
{'Vendor': 'n/a', 'Product': 'Intel(R) NUC BIOS firmware', 'Versions': 'See references'}
CVE-2023-34984
A protection mechanism failure in Fortinet FortiWeb 7.2.0 through 7.2.1, 7.0.0 through 7.0.6, 6.4.0 through 6.4.3, 6.3.6 through 6.3.23 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
https://fortiguard.com/psirt/FG-IR-23-068
2023-06-09T06:59:37.969Z
2023-09-13T12:29:20.911Z
2023-09-13T12:29:20.911Z
{'Vendor': 'Fortinet', 'Product': 'FortiWeb', 'Versions': '7.2.0, 7.0.0, 6.4.0, 6.3.6'}
CVE-2023-34087
An improper array index validation vulnerability exists in the EVCD var len parsing functionality of GTKWave 3.3.115. A specially crafted .evcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1803
2023-06-30T17:45:51.428Z
2024-01-08T14:47:54.135Z
2024-01-08T18:00:13.639Z
{'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'}
CVE-2023-34253
Grav is a flat-file content management system. Prior to version 1.7.42, the denylist introduced in commit 9d6a2d to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in multiple ways -- (1) using unsafe functions that are not banned, (2) using capitalised callable names, and (3) using fully-qualified names for referencing callables. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. A patch in version 1.7.42 improves the denylist.
https://github.com/getgrav/grav/security/advisories/GHSA-j3v8-v77f-fvgm
2023-05-31T13:51:51.175Z
2023-06-14T22:00:12.569Z
2023-06-14T22:16:52.675Z
{'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '< 1.7.42'}
CVE-2023-34603
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryFilterTableDictInfo at org.jeecg.modules.api.controller.SystemApiController.
https://github.com/jeecgboot/jeecg-boot/issues/4984
2023-06-07T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34316
​An attacker could bypass the latest Delta Electronics InfraSuite Device Master (versions prior to 1.0.7) patch, which could allow an attacker to retrieve file contents.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-01
2023-06-06T14:32:07.393Z
2023-07-10T19:01:51.280Z
2023-07-10T19:01:51.280Z
{'Vendor': 'Delta Electronics', 'Product': 'Infrasuite Device Master', 'Versions': '0'}
CVE-2023-34195
An issue was discovered in SystemFirmwareManagementRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The implementation of the GetImage method retrieves the value of a runtime variable named GetImageProgress, and later uses this value as a function pointer. This variable is wiped out by the same module near the end of the function. By setting this UEFI variable from the OS to point into custom code, an attacker could achieve arbitrary code execution in the DXE phase, before several chipset locks are set.
https://www.insyde.com/security-pledge
2023-05-30T00:00:00
2023-09-18T00:00:00
2023-09-18T12:02:46.744601
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34194
StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace.
https://sourceforge.net/p/tinyxml/git/ci/master/tree/tinyxmlparser.cpp
2023-05-30T00:00:00
2023-12-13T00:00:00
2024-01-12T02:06:22.795816
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34878
An issue was discovered in Ujcms v6.0.2 allows attackers to gain sensitive information via the dir parameter to /api/backend/core/web-file-html/download-zip.
https://github.com/ujcms/ujcms/issues/6
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34252
Grav is a flat-file content management system. Prior to version 1.7.42, there is a logic flaw in the `GravExtension.filterFilter()` function whereby validation against a denylist of unsafe functions is only performed when the argument passed to filter is a string. However, passing an array as a callable argument allows the validation check to be skipped. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. The vulnerability can be found in the `GravExtension.filterFilter()` function declared in `/system/src/Grav/Common/Twig/Extension/GravExtension.php`. Version 1.7.42 contains a patch for this issue. End users should also ensure that `twig.undefined_functions` and `twig.undefined_filters` properties in `/path/to/webroot/system/config/system.yaml` configuration file are set to `false` to disallow Twig from treating undefined filters/functions as PHP functions and executing them.
https://github.com/getgrav/grav/security/advisories/GHSA-96xv-rmwj-6p9w
2023-05-31T13:51:51.174Z
2023-06-14T21:38:48.358Z
2023-06-14T22:17:06.852Z
{'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '< 1.7.42'}
CVE-2023-34602
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryTableDictItemsByCode at org.jeecg.modules.api.controller.SystemApiController.
https://github.com/jeecgboot/jeecg-boot/issues/4983
2023-06-07T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34317
An improper input validation vulnerability exists in the OAS Engine User Creation functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772
2023-06-13T17:03:40.750Z
2023-09-05T16:15:04.162Z
2023-09-05T16:15:04.162Z
{'Vendor': 'Open Automation Software', 'Product': 'OAS Platform', 'Versions': 'v18.00.0072'}
CVE-2023-34747
File upload vulnerability in ujcms 6.0.2 via /api/backend/core/web-file-upload/upload.
https://github.com/ujcms/ujcms/issues/4
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34439
Pleasanter 1.3.47.0 and earlier contains a stored cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the user's web browser.
https://pleasanter.org/archives/vulnerability-update-202311
2023-10-31T01:54:12.452Z
2023-12-06T08:40:53.373Z
2023-12-06T08:40:53.373Z
{'Vendor': 'Implem Inc.', 'Product': 'Pleasanter', 'Versions': '1.3.47.0 and earlier'}
CVE-2023-34985
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters.
https://fortiguard.com/psirt/FG-IR-23-141
2023-06-09T06:59:37.970Z
2023-10-10T16:50:43.265Z
2023-10-10T16:50:43.265Z
{'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'}
CVE-2023-34086
Improper input validation in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html
2023-06-09T03:00:03.485Z
2023-08-11T02:37:27.980Z
2023-08-11T02:37:27.980Z
{'Vendor': 'n/a', 'Product': 'Intel(R) NUC BIOS firmware', 'Versions': 'See references'}
CVE-2023-34205
In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW).
https://github.com/moov-io/signedxml/issues/23
2023-05-30T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34340
Improper Authentication vulnerability in Apache Software Foundation Apache Accumulo. This issue affects Apache Accumulo: 2.1.0. Accumulo 2.1.0 contains a defect in the user authentication process that may succeed when invalid credentials are provided. Users are advised to upgrade to 2.1.1.
https://lists.apache.org/thread/syy6jftvy9l6tlhn33o0rzwhh4rd0z4t
2023-06-01T18:53:04.811Z
2023-06-21T07:01:48.171Z
2023-06-21T07:01:48.171Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Accumulo', 'Versions': '2.1.0'}
CVE-2023-34585
null
null
2023-06-07T00:00:00
null
2023-06-14T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-34090
Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. Decidim uses a third-party library named Ransack for filtering certain database collections (e.g., public meetings). By default, this library allows filtering on all data attributes and associations. This allows an unauthenticated remote attacker to exfiltrate non-public data from the underlying database of a Decidim instance (e.g., exfiltrating data from the user table). This issue may lead to Sensitive Data Disclosure. The problem was patched in version 0.27.3.
https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9
2023-05-25T21:56:51.244Z
2023-07-11T17:29:36.629Z
2023-07-11T17:29:36.629Z
{'Vendor': 'decidim', 'Product': 'decidim', 'Versions': '>= 0.27.0, < 0.27.3'}
CVE-2023-34993
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
https://fortiguard.com/psirt/FG-IR-23-140
2023-06-09T06:59:37.971Z
2023-10-10T16:51:08.092Z
2023-10-10T16:51:08.092Z
{'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'}
CVE-2023-34839
A Cross Site Request Forgery (CSRF) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via a Custom CSRF exploit to create new user function in the application.
https://github.com/sahiloj/CVE-2023-34839/blob/main/README.md
2023-06-07T00:00:00
2023-06-27T00:00:00
2023-06-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34213
TN-5900 Series firmware versions v3.3 and prior are vulnerable to command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices. 
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities
2023-05-31T08:58:06.148Z
2023-08-17T02:20:20.289Z
2023-08-17T02:20:20.289Z
{'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'}
CVE-2023-34356
An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778
2023-06-14T20:04:18.559Z
2023-10-11T15:16:57.837Z
2023-10-11T17:00:08.369Z
{'Vendor': 'Peplink', 'Product': 'Surf SOHO HW1', 'Versions': 'v6.3.5 (in QEMU)'}
CVE-2023-34028
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional plugin <= 1.0.7 versions.
https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T12:13:20.690Z
2023-06-22T14:21:00.258Z
2023-06-22T14:21:00.258Z
{'Vendor': 'realmag777', 'Product': 'WOLF – WordPress Posts Bulk Editor and Manager Professional', 'Versions': 'n/a'}
CVE-2023-34478
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk
2023-06-07T18:50:06.956Z
2023-07-24T18:24:45.619Z
2023-07-24T18:24:45.619Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Shiro', 'Versions': '0, 0'}
CVE-2023-34182
Cross-Site Request Forgery (CSRF) vulnerability in Peter Shaw LH Password Changer plugin <= 1.55 versions.
https://patchstack.com/database/vulnerability/lh-password-changer/wordpress-lh-password-changer-plugin-1-55-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-29T13:52:39.505Z
2023-11-09T19:01:04.963Z
2023-11-09T19:01:04.963Z
{'Vendor': 'Peter Shaw', 'Product': 'LH Password Changer', 'Versions': 'n/a'}
CVE-2023-34614
An issue was discovered jmarsden/jsonij thru 0.5.2 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34244
GLPI is a free asset and IT management software package. Starting in version 9.4.0 and prior to version 10.0.8, a malicious link can be crafted by an unauthenticated user that can exploit a reflected XSS in case any authenticated user opens the crafted link. Users should upgrade to version 10.0.8 to receive a patch.
https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w
2023-05-31T13:51:51.172Z
2023-07-05T19:22:07.569Z
2023-07-05T19:22:07.569Z
{'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.4.0, < 10.0.8'}
CVE-2023-34751
bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the gid parameter at admin/index.php?mode=user&page=groups&action=edit.
https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34116
Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access.
https://explore.zoom.us/en/trust/security/security-bulletin/
2023-05-25T22:01:29.097Z
2023-07-11T16:56:16.132Z
2023-07-11T16:56:16.132Z
{'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom Desktop Client for Windows', 'Versions': 'before 5.15.0'}
CVE-2023-34053
In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition. Specifically, an application is vulnerable when all of the following are true: * the application uses Spring MVC or Spring WebFlux * io.micrometer:micrometer-core is on the classpath * an ObservationRegistry is configured in the application to record observations Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator dependency to meet all conditions.
https://spring.io/security/cve-2023-34053
2023-05-25T17:21:56.203Z
2023-11-28T08:10:37.217Z
2023-11-28T08:10:37.217Z
{'Vendor': 'Spring', 'Product': 'Spring Framework', 'Versions': '6.0.0'}
CVE-2023-34395
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider. In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution. Starting version 4.0.0 driver can be set only from the hook constructor. This issue affects Apache Airflow ODBC Provider: before 4.0.0.
https://github.com/apache/airflow/pull/31713
2023-06-03T15:26:13.230Z
2023-06-27T11:36:58.116Z
2023-06-27T11:36:58.116Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow ODBC Provider', 'Versions': '0'}
CVE-2023-34141
A command injection vulnerability in the access point (AP) management feature of the Zyxel ATP series firmware versions 5.00 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.00 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.00 through 5.36 Patch 2, VPN series firmware versions 5.00 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the managed AP list in advance.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers
2023-05-26T03:44:51.339Z
2023-07-17T17:56:26.818Z
2023-07-17T17:56:26.818Z
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': '5.00 through 5.36 Patch 2'}
CVE-2023-34842
Remote Code Execution vulnerability in DedeCMS through 5.7.109 allows remote attackers to run arbitrary code via crafted POST request to /dede/tpl.php.
http://dedecms.com
2023-06-07T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34454
snappy-java is a fast compressor/decompressor for Java. Due to unchecked multiplications, an integer overflow may occur in versions prior to 1.1.10.1, causing an unrecoverable fatal error. The function `compress(char[] input)` in the file `Snappy.java` receives an array of characters and compresses it. It does so by multiplying the length by 2 and passing it to the rawCompress` function. Since the length is not tested, the multiplication by two can cause an integer overflow and become negative. The rawCompress function then uses the received length and passes it to the natively compiled maxCompressedLength function, using the returned value to allocate a byte array. Since the maxCompressedLength function treats the length as an unsigned integer, it doesn’t care that it is negative, and it returns a valid value, which is casted to a signed integer by the Java engine. If the result is negative, a `java.lang.NegativeArraySizeException` exception will be raised while trying to allocate the array `buf`. On the other side, if the result is positive, the `buf` array will successfully be allocated, but its size might be too small to use for the compression, causing a fatal Access Violation error. The same issue exists also when using the `compress` functions that receive double, float, int, long and short, each using a different multiplier that may cause the same issue. The issue most likely won’t occur when using a byte array, since creating a byte array of size 0x80000000 (or any other negative value) is impossible in the first place. Version 1.1.10.1 contains a patch for this issue.
https://github.com/xerial/snappy-java/security/advisories/GHSA-fjpj-2g6w-x25r
2023-06-06T16:16:53.559Z
2023-06-15T16:27:45.467Z
2023-06-15T16:27:45.467Z
{'Vendor': 'xerial', 'Product': 'snappy-java', 'Versions': '< 1.1.10.1'}
CVE-2023-34004
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Box Office plugin <= 1.1.50 versions.
https://patchstack.com/database/vulnerability/woocommerce-box-office/wordpress-woocommerce-box-office-plugin-1-1-50-contributor-stored-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-25T11:25:36.397Z
2023-08-30T14:56:05.558Z
2023-08-30T14:56:05.558Z
{'Vendor': 'WooCommerce', 'Product': 'WooCommerce Box Office', 'Versions': 'n/a'}
CVE-2023-34157
Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app.
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672
2023-05-29T09:03:29.116Z
2023-06-16T06:55:57.262Z
2023-06-16T06:55:57.262Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.0.0'}
CVE-2023-34012
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Premium Addons for Elementor Premium Addons PRO plugin <= 2.8.24 versions.
https://patchstack.com/database/vulnerability/premium-addons-pro/wordpress-premium-addons-pro-plugin-2-8-24-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-25T11:25:36.399Z
2023-06-23T11:24:51.803Z
2023-06-23T11:24:51.803Z
{'Vendor': 'Premium Addons for Elementor', 'Product': 'Premium Addons PRO', 'Versions': 'n/a'}
CVE-2023-34442
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Camel.This issue affects Apache Camel: from 3.X through <=3.14.8, from 3.18.X through <=3.18.7, from 3.20.X through <= 3.20.5, from 4.X through <= 4.0.0-M3. Users should upgrade to 3.14.9, 3.18.8, 3.20.6 or 3.21.0 and for users on Camel 4.x update to 4.0.0-M1
https://lists.apache.org/thread/x4vy2hhbltb1xrvy1g6m8hpjgj2k7wgh
2023-06-06T15:08:25.142Z
2023-07-10T09:31:05.286Z
2023-07-10T09:31:05.286Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Camel JIRA', 'Versions': '3.x, 3.18.x, 3.20.x, 4.x'}
CVE-2023-34100
Contiki-NG is an open-source, cross-platform operating system for IoT devices. When reading the TCP MSS option value from an incoming packet, the Contiki-NG OS does not verify that certain buffer indices to read from are within the bounds of the IPv6 packet buffer, uip_buf. In particular, there is a 2-byte buffer read in the module os/net/ipv6/uip6.c. The buffer is indexed using 'UIP_IPTCPH_LEN + 2 + c' and 'UIP_IPTCPH_LEN + 3 + c', but the uip_buf buffer may not have enough data, resulting in a 2-byte read out of bounds. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in release 4.9. Users are advised to watch for the 4.9 release and to upgrade when it becomes available. There are no workarounds for this vulnerability aside from manually patching with the diff in commit `cde4e9839`.
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-3v7c-jq9x-cmph
2023-05-25T21:56:51.245Z
2023-06-09T17:30:50.048Z
2023-06-09T17:30:50.048Z
{'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'}
CVE-2023-34415
When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114.
https://bugzilla.mozilla.org/show_bug.cgi?id=1811999
2023-06-05T16:57:22.625Z
2023-06-19T10:40:49.021Z
2023-06-19T10:40:49.021Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-34045
VMware Fusion(13.x prior to 13.5) contains a local privilege escalation vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.
https://www.vmware.com/security/advisories/VMSA-2023-0022.html
2023-05-25T17:21:56.202Z
2023-10-20T09:00:30.352Z
2023-10-20T09:00:30.352Z
{'Vendor': 'VMware', 'Product': 'Fusion', 'Versions': '13.x'}
CVE-2023-34229
In JetBrains TeamCity before 2023.05 stored XSS in GitLab Connection page was possible
https://www.jetbrains.com/privacy-security/issues-fixed/
2023-05-31T12:49:35.320Z
2023-05-31T13:03:17.292Z
2023-05-31T13:03:17.292Z
{'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'}
CVE-2023-34383
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP Project Manager wedevs-project-manager allows SQL Injection.This issue affects WP Project Manager: from n/a through 2.6.0.
https://patchstack.com/database/vulnerability/wedevs-project-manager/wordpress-wp-project-manager-task-team-and-project-management-plugin-featuring-kanban-board-and-gantt-charts-plugin-2-6-0-sql-injection-vulnerability?_s_id=cve
2023-06-02T15:48:00.545Z
2023-11-03T11:11:51.699Z
2023-11-03T11:11:51.699Z
{'Vendor': 'weDevs', 'Product': 'WP Project Manager', 'Versions': 'n/a'}
CVE-2023-34032
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pascal Casier bbPress Toolkit plugin <= 1.0.12 versions.
https://patchstack.com/database/vulnerability/bbp-toolkit/wordpress-bbpress-toolkit-plugin-1-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-25T12:13:20.691Z
2023-08-30T14:19:23.198Z
2023-08-30T14:19:23.198Z
{'Vendor': 'Pascal Casier', 'Product': 'bbPress Toolkit', 'Versions': 'n/a'}
CVE-2023-34462
Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final.
https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845
2023-06-06T16:16:53.560Z
2023-06-22T23:00:12.104Z
2023-06-22T23:00:12.104Z
{'Vendor': 'netty', 'Product': 'netty', 'Versions': '< 4.1.94.Final'}
CVE-2023-34198
In Stormshield Network Security (SNS) 1.0.0 through 3.7.36 before 3.7.37, 3.8.0 through 3.11.24 before 3.11.25, 4.0.0 through 4.3.18 before 4.3.19, 4.4.0 through 4.6.5 before 4.6.6, and 4.7.0 before 4.7.1, the usage of a Network object created from an inactive DHCP interface in the filtering slot results in the usage of an object of the :any" type, which may have unexpected results for access control.
https://advisories.stormshield.eu/2023-019
2023-05-30T00:00:00
2023-12-25T00:00:00
2023-12-25T19:37:15.762531
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34931
A stack overflow in the EditWlanMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34931.md
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34177
Cross-Site Request Forgery (CSRF) vulnerability in Kenth Hagström WP-Cache.Com plugin <= 1.1.1 versions.
https://patchstack.com/database/vulnerability/wp-cachecom/wordpress-wp-cache-com-plugin-1-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-29T13:52:11.724Z
2023-11-09T19:11:12.978Z
2023-11-09T19:11:12.978Z
{'Vendor': 'Kenth Hagström', 'Product': 'WP-Cache.com', 'Versions': 'n/a'}
CVE-2023-34209
Exposure of Sensitive System Information to an Unauthorized Control Sphere in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to obtain the absolute path via unencrypted VIEWSTATE parameter.
https://zuso.ai/Advisory/ZA-2023-06
2023-05-30T09:41:32.477Z
2023-10-17T04:00:28.128Z
2023-10-17T04:00:28.128Z
{'Vendor': 'EasyUse Digital Technology', 'Product': 'MailHunter Ultimate', 'Versions': '0'}
CVE-2023-34659
jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the id parameter of the /jeecg-boot/jmreport/show interface.
https://github.com/jeecgboot/jeecg-boot/issues/4976
2023-06-07T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34966
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.
https://access.redhat.com/errata/RHSA-2023:6667
2023-06-07T21:11:04.261Z
2023-07-20T14:56:14.644Z
2024-01-25T20:44:56.046Z
{'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.16.11, 4.17.10, 4.18.5'}
CVE-2023-34570
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter devName at /goform/SetOnlineDevName.
https://hackmd.io/%400dayResearch/S1eI91_l2
2023-06-07T00:00:00
2023-06-08T00:00:00
2023-06-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34120
Improper privilege management in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access. Users may potentially utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges.
https://explore.zoom.us/en/trust/security/security-bulletin/
2023-05-25T22:01:29.098Z
2023-06-13T17:38:52.940Z
2023-06-13T18:48:05.631Z
{'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for Windows Client', 'Versions': 'before 5.14.0'}
CVE-2023-34989
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters.
https://fortiguard.com/psirt/FG-IR-23-141
2023-06-09T06:59:37.970Z
2023-10-10T16:50:55.029Z
2023-10-10T16:50:55.029Z
{'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'}
CVE-2023-34823
fdkaac before 1.0.5 was discovered to contain a stack overflow in read_callback function in src/main.c.
https://github.com/nu774/fdkaac/issues/55
2023-06-07T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34970
A local non-privileged user can make improper GPU processing operations to access a limited amount outside of buffer bounds or to exploit a software race condition. If the system’s memory is carefully prepared by the user, then this in turn could give them access to already freed memory
https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities
2023-06-08T02:45:25.666Z
2023-10-03T16:44:14.509Z
2023-10-03T16:44:14.509Z
{'Vendor': 'Arm Ltd', 'Product': 'Valhall GPU Kernel Driver', 'Versions': 'r44p0'}
CVE-2023-34835
A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.
https://github.com/sahiloj/CVE-2023-34835/blob/main/README.md
2023-06-07T00:00:00
2023-06-27T00:00:00
2023-06-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34136
Vulnerability in SonicWall GMS and Analytics allows unauthenticated attacker to upload files to a restricted location not controlled by the attacker. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010
2023-05-25T22:45:46.852Z
2023-07-13T02:40:20.667Z
2023-07-13T02:40:20.667Z
{'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'}
CVE-2023-34566
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter time at /goform/saveParentControlInfo.
https://hackmd.io/%400dayResearch/rk8hQf5rh
2023-06-07T00:00:00
2023-06-08T00:00:00
2023-06-08T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34927
Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.
https://github.com/casdoor/casdoor/issues/1531
2023-06-07T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-34474
A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0
2023-06-07T00:00:00
2023-06-16T00:00:00
2023-08-31T02:07:20.128629
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed in ImageMagick 7.1.1-10'}
CVE-2023-34024
Cross-Site Request Forgery (CSRF) vulnerability in Guillemant David WP Full Auto Tags Manager plugin <= 2.2 versions.
https://patchstack.com/database/vulnerability/wp-full-auto-tags-manager/wordpress-wp-full-auto-tags-manager-plugin-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-25T12:13:20.690Z
2023-11-09T20:32:09.956Z
2023-11-09T20:32:09.956Z
{'Vendor': 'Guillemant David', 'Product': 'WP Full Auto Tags Manager', 'Versions': 'n/a'}
CVE-2023-34161
nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally.
https://consumer.huawei.com/en/support/bulletin/2023/6/
2023-05-29T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'}