CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-34033 | Cross-Site Request Forgery (CSRF) vulnerability in Malinky Ajax Pagination and Infinite Scroll plugin <= 2.0.1 versions. | https://patchstack.com/database/vulnerability/malinky-ajax-pagination/wordpress-ajax-pagination-and-infinite-scroll-plugin-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T12:13:20.691Z | 2023-11-09T19:31:04.794Z | 2023-11-09T19:31:04.794Z | {'Vendor': 'Malinky', 'Product': 'Ajax Pagination and Infinite Scroll', 'Versions': 'n/a'} |
CVE-2023-34463 | DataEase is an open source data visualization analysis tool to analyze data and gain insight into business trends. In affected versions Unauthorized users can delete an application erroneously. This vulnerability has been fixed in version 1.18.8. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/dataease/dataease/security/advisories/GHSA-4c4p-qfwq-85fj | 2023-06-06T16:16:53.560Z | 2023-06-26T20:29:38.074Z | 2023-06-26T20:29:38.074Z | {'Vendor': 'dataease', 'Product': 'dataease', 'Versions': '< 1.18.8'} |
CVE-2023-34930 | A stack overflow in the EditMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34930.md | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34176 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Chilexpress Chilexpress woo oficial plugin <= 1.2.9 versions. | https://patchstack.com/database/vulnerability/chilexpress-oficial/wordpress-chilexpress-woo-oficial-plugin-1-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-29T13:52:11.724Z | 2023-08-30T13:33:20.320Z | 2023-08-30T13:33:20.320Z | {'Vendor': 'Chilexpress', 'Product': 'Chilexpress woo oficial', 'Versions': 'n/a'} |
CVE-2023-34228 | In JetBrains TeamCity before 2023.05 authentication checks were missing – 2FA was not checked for some sensitive account actions | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:35.117Z | 2023-05-31T13:03:17.042Z | 2023-05-31T13:03:17.042Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34382 | Deserialization of Untrusted Data vulnerability in weDevs Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy.This issue affects Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy: from n/a through 3.7.19.
| https://patchstack.com/database/vulnerability/dokan-lite/wordpress-dokan-plugin-3-7-19-php-object-injection-vulnerability?_s_id=cve | 2023-06-02T15:48:00.545Z | 2023-12-19T19:40:58.498Z | 2023-12-19T19:40:58.498Z | {'Vendor': 'weDevs', 'Product': 'Dokan – Best WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy', 'Versions': 'n/a'} |
CVE-2023-34551 | In certain EZVIZ products, two stack buffer overflows in netClientSetWlanCfg function of the EZVIZ SDK command server can allow an authenticated attacker present on the same local network as the camera to achieve remote code execution. This affects CS-C6N-B0-1G2WF Firmware versions before V5.3.0 build 230215 and CS-C6N-R101-1G2WF Firmware versions before V5.3.0 build 230215 and CS-CV310-A0-1B2WFR Firmware versions before V5.3.0 build 230221 and CS-CV310-A0-1C2WFR-C Firmware versions before V5.3.2 build 230221 and CS-C6N-A0-1C2WFR-MUL Firmware versions before V5.3.2 build 230218 and CS-CV310-A0-3C2WFRL-1080p Firmware versions before V5.2.7 build 230302 and CS-CV310-A0-1C2WFR Wifi IP66 2.8mm 1080p Firmware versions before V5.3.2 build 230214 and CS-CV248-A0-32WMFR Firmware versions before V5.2.3 build 230217 and EZVIZ LC1C Firmware versions before V5.3.4 build 230214. The impact is: execute arbitrary code (remote). | http://ezviz.com | 2023-06-07T00:00:00 | 2023-08-01T00:00:00 | 2023-08-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34101 | Contiki-NG is an operating system for internet of things devices. In version 4.8 and prior, when processing ICMP DAO packets in the `dao_input_storing` function, the Contiki-NG OS does not verify that the packet buffer is big enough to contain the bytes it needs before accessing them. Up to 16 bytes can be read out of bounds in the `dao_input_storing` function. An attacker can truncate an ICMP packet so that it does not contain enough data, leading to an out-of-bounds read on these lines. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in release 4.9. As a workaround, one can apply the changes in Contiki-NG pull request #2435 to patch the system. | https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-fp66-ff6x-7w2w | 2023-05-25T21:56:51.245Z | 2023-06-14T14:50:21.267Z | 2023-06-14T14:50:21.267Z | {'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'} |
CVE-2023-34414 | The error page for sites with invalid TLS certificates was missing the
activation-delay Firefox uses to protect prompts and permission dialogs
from attacks that exploit human response time delays. If a malicious
page elicited user clicks in precise locations immediately before
navigating to a site with a certificate error and made the renderer
extremely busy at the same time, it could create a gap between when
the error page was loaded and when the display actually refreshed.
With the right timing the elicited clicks could land in that gap and
activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12. | https://bugzilla.mozilla.org/show_bug.cgi?id=1695986 | 2023-06-05T16:57:22.624Z | 2023-06-19T10:14:49.519Z | 2023-06-19T10:14:49.519Z | {'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'} |
CVE-2023-34044 | VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds
read vulnerability that exists in the functionality for sharing host
Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual
machine may be able to read privileged information contained in
hypervisor memory from a virtual machine. | https://www.vmware.com/security/advisories/VMSA-2023-0022.html | 2023-05-25T17:21:56.202Z | 2023-10-20T08:56:53.136Z | 2023-10-20T08:56:53.136Z | {'Vendor': 'VMware', 'Product': 'Workstation', 'Versions': '17.x'} |
CVE-2023-34855 | A Cross Site Scripting (XSS) vulnerability in Youxun Electronic Equipment (Shanghai) Co., Ltd AC Centralized Management Platform v1.02.040 allows attackers to execute arbitrary code via uploading a crafted HTML file to the interface /upfile.cgi. | https://github.com/hashshfza/Vulnerability/issues/1 | 2023-06-07T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34156 | Vulnerability of services denied by early fingerprint APIs on HarmonyOS products.Successful exploitation of this vulnerability may cause services to be denied. | https://consumer.huawei.com/en/support/bulletin/2023/6/ | 2023-05-29T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
CVE-2023-34013 | Server-Side Request Forgery (SSRF) vulnerability in Poll Maker Team Poll Maker – Best WordPress Poll Plugin.This issue affects Poll Maker – Best WordPress Poll Plugin: from n/a through 4.6.2.
| https://patchstack.com/database/vulnerability/poll-maker/wordpress-poll-maker-plugin-4-6-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve | 2023-05-25T11:25:36.399Z | 2023-11-13T02:28:32.010Z | 2023-11-13T02:28:32.010Z | {'Vendor': 'Poll Maker Team', 'Product': 'Poll Maker – Best WordPress Poll Plugin', 'Versions': 'n/a'} |
CVE-2023-34140 | A buffer overflow vulnerability in the Zyxel ATP series firmware versions 4.32 through 5.36 Patch 2, USG FLEX series firmware versions 4.50 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 4.16 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 4.16 through 5.36 Patch 2, VPN series firmware versions 4.30 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to cause denial of service (DoS) conditions by sending a crafted request to the CAPWAP daemon. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers | 2023-05-26T03:44:51.339Z | 2023-07-17T17:49:38.175Z | 2023-07-17T17:49:38.175Z | {'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': '4.32 through 5.36 Patch 2'} |
CVE-2023-34843 | Traggo Server 0.3.0 is vulnerable to directory traversal via a crafted GET request. | https://github.com/rootd4ddy/CVE-2023-34843 | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34455 | snappy-java is a fast compressor/decompressor for Java. Due to use of an unchecked chunk length, an unrecoverable fatal error can occur in versions prior to 1.1.10.1.
The code in the function hasNextChunk in the fileSnappyInputStream.java checks if a given stream has more chunks to read. It does that by attempting to read 4 bytes. If it wasn’t possible to read the 4 bytes, the function returns false. Otherwise, if 4 bytes were available, the code treats them as the length of the next chunk.
In the case that the `compressed` variable is null, a byte array is allocated with the size given by the input data. Since the code doesn’t test the legality of the `chunkSize` variable, it is possible to pass a negative number (such as 0xFFFFFFFF which is -1), which will cause the code to raise a `java.lang.NegativeArraySizeException` exception. A worse case would happen when passing a huge positive value (such as 0x7FFFFFFF), which would raise the fatal `java.lang.OutOfMemoryError` error.
Version 1.1.10.1 contains a patch for this issue. | https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh | 2023-06-06T16:16:53.559Z | 2023-06-15T17:15:00.311Z | 2023-06-15T17:15:00.311Z | {'Vendor': 'xerial', 'Product': 'snappy-java', 'Versions': '< 1.1.10.1'} |
CVE-2023-34005 | Cross-Site Request Forgery (CSRF) vulnerability in Etoile Web Design Front End Users plugin <= 3.2.24 versions. | https://patchstack.com/database/vulnerability/front-end-only-users/wordpress-front-end-users-plugin-3-2-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T11:25:36.397Z | 2023-07-17T14:46:12.815Z | 2023-07-17T14:46:12.815Z | {'Vendor': 'Etoile Web Design', 'Product': 'Front End Users', 'Versions': 'n/a'} |
CVE-2023-34394 |
In Keysight Geolocation Server v2.4.2 and prior, an attacker could upload a specially crafted malicious file or delete any file or directory with SYSTEM privileges due to an improper path validation, which could result in local privilege escalation or a denial-of-service condition.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-02 | 2023-07-13T18:01:11.679Z | 2023-07-19T21:55:31.934Z | 2023-07-19T21:55:31.934Z | {'Vendor': 'Keysight Technologies', 'Product': 'N6845A Geolocation Server', 'Versions': '0'} |
CVE-2023-34117 | Relative path traversal in the Zoom Client SDK before version 5.15.0 may allow an unauthorized user to enable information disclosure via local access.
| https://explore.zoom.us/en/trust/security/security-bulletin/ | 2023-05-25T22:01:29.097Z | 2023-07-11T16:59:20.228Z | 2023-07-11T16:59:20.228Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom Client SDK', 'Versions': 'before 5.15.0'} |
CVE-2023-34052 | VMware Aria Operations for Logs contains a deserialization vulnerability. A malicious actor with non-administrative access to the local system can trigger the deserialization of data which could result in authentication bypass.
| https://www.vmware.com/security/advisories/VMSA-2023-0021.html | 2023-05-25T17:21:56.203Z | 2023-10-20T04:11:45.105Z | 2023-10-20T04:11:45.105Z | {'Vendor': 'n/a', 'Product': 'VMware Aria Operations for Logs', 'Versions': 'VMware Aria Operations for Logs 8.x, VMware Cloud Foundation (VMware Aria Operations for Logs) 5.x 4.x '} |
CVE-2023-34615 | An issue was discovered JSONUtil thru 5.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://github.com/billdavidson/JSONUtil/issues/10 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34245 | @udecode/plate-link is the link handler for the udecode/plate rich-text editor plugin system for Slate & React. Affected versions of the link plugin and link UI component do not sanitize URLs to prevent use of the `javascript:` scheme. As a result, links with JavaScript URLs can be inserted into the Plate editor through various means, including opening or pasting malicious content. `@udecode/plate-link` 20.0.0 resolves this issue by introducing an `allowedSchemes` option to the link plugin, defaulting to `['http', 'https', 'mailto', 'tel']`. URLs using a scheme that isn't in this list will not be rendered to the DOM. Users are advised to upgrade. Users unable to upgrade are advised to override the `LinkElement` and `PlateFloatingLink` components with implementations that explicitly check the URL scheme before rendering any anchor elements. | https://github.com/udecode/plate/security/advisories/GHSA-4882-hxpr-hrvm | 2023-05-31T13:51:51.173Z | 2023-06-09T17:04:23.815Z | 2023-06-09T17:04:23.815Z | {'Vendor': 'udecode', 'Product': 'plate', 'Versions': '< 20.0.0'} |
CVE-2023-34750 | bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the cid parameter at admin/index.php?mode=settings&page=projects&action=edit. | https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34029 | Cross-Site Request Forgery (CSRF) vulnerability in Prem Tiwari Disable WordPress Update Notifications and auto-update Email Notifications plugin <= 2.3.3 versions. | https://patchstack.com/database/vulnerability/disable-update-notifications/wordpress-disable-wordpress-update-notifications-and-auto-update-email-notifications-plugin-2-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T12:13:20.691Z | 2023-07-11T12:25:42.496Z | 2023-07-11T12:25:42.496Z | {'Vendor': 'Prem Tiwari', 'Product': 'Disable WordPress Update Notifications and auto-update Email Notifications', 'Versions': 'n/a'} |
CVE-2023-34183 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Valiano Unite Gallery Lite plugin <= 1.7.61 versions. | https://patchstack.com/database/vulnerability/unite-gallery-lite/wordpress-unite-gallery-lite-plugin-1-7-60-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-29T13:52:39.505Z | 2023-08-30T13:07:02.118Z | 2023-08-30T13:07:02.118Z | {'Vendor': 'Valiano', 'Product': 'Unite Gallery Lite', 'Versions': 'n/a'} |
CVE-2023-34880 | cmseasy v7.7.7.7 20230520 was discovered to contain a path traversal vulnerability via the add_action method at lib/admin/language_admin.php. This vulnerability allows attackers to execute arbitrary code and perform a local file inclusion. | https://blog.pumpk1n.com/2023/06/06/cmseasy-v7-7-7-7-20230520-path-traversal/ | 2023-06-07T00:00:00 | 2023-06-15T00:00:00 | 2023-06-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34212 | The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.
The resolution validates the JNDI URL and restricts locations to a set of allowed schemes.
You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
| https://nifi.apache.org/security.html#CVE-2023-34212 | 2023-05-30T16:13:48.779Z | 2023-06-12T15:14:06.990Z | 2023-06-12T15:14:06.990Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache NiFi', 'Versions': '1.8.0'} |
CVE-2023-34642 | KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function showDirectoryPicker() which can then be used to open an unprivileged command prompt. | https://www.kioware.com/versionhistory.aspx?pid=15 | 2023-06-07T00:00:00 | 2023-06-19T00:00:00 | 2023-06-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34357 |
Soar Cloud Ltd. HR Portal has a weak Password Recovery Mechanism for Forgotten Password. The reset password link sent out through e-mail, and the link will remain valid after the password has been reset and after the expected expiration date. An attacker with access to the browser history or has the line can thus use the URL again to change the password in order to take over the account.
| https://www.twcert.org.tw/tw/cp-132-7347-2653e-1.html | 2023-06-02T08:28:37.821Z | 2023-09-07T02:00:15.946Z | 2023-09-07T02:00:15.946Z | {'Vendor': 'Soar Cloud Ltd. ', 'Product': 'HR Portal', 'Versions': '7.3.2023.0510, 7.3.2023.0705'} |
CVE-2023-34091 | Kyverno is a policy engine designed for Kubernetes. In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `Enforce`. This situation occurs as resources pending deletion were being consciously exempted by Kyverno, as a way to reduce processing load as policies are typically not applied to objects which are being deleted. However, this could potentially result in allowing a malicious user to leverage the Kubernetes finalizers feature by setting a finalizer which causes the Kubernetes API server to set the `deletionTimestamp` and then not completing the delete operation as a way to explicitly to bypass a Kyverno policy. Note that this is not applicable to Kubernetes Pods but, as an example, a Kubernetes Service resource can be manipulated using an indefinite finalizer to bypass policies. This is resolved in Kyverno 1.10.0. There is no known workaround. | https://github.com/kyverno/kyverno/security/advisories/GHSA-hq4m-4948-64cc | 2023-05-25T21:56:51.244Z | 2023-06-01T16:24:53.920Z | 2023-06-01T16:24:53.920Z | {'Vendor': 'kyverno', 'Product': 'kyverno', 'Versions': '< 1.10.0'} |
CVE-2023-34992 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests. | https://fortiguard.com/psirt/FG-IR-23-130 | 2023-06-09T06:59:37.971Z | 2023-10-10T16:50:21.319Z | 2023-10-10T16:50:21.319Z | {'Vendor': 'Fortinet', 'Product': 'FortiSIEM', 'Versions': '7.0.0, 6.7.0, 6.6.0, 6.5.0, 6.4.0'} |
CVE-2023-34838 | A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Description parameter. | https://github.com/sahiloj/CVE-2023-34838/blob/main/README.md | 2023-06-07T00:00:00 | 2023-06-27T00:00:00 | 2023-06-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34654 | taocms <=3.0.2 is vulnerable to Cross Site Scripting (XSS). | https://github.com/ae6e361b/taocms-XSS | 2023-06-07T00:00:00 | 2023-07-05T00:00:00 | 2023-07-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34204 | imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it. | https://github.com/imapsync/imapsync/issues/399 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34341 | AMI BMC contains a vulnerability in the SPX REST API, where an
attacker with the required privileges can read and write to arbitrary locations
within the memory context of the IPMI server process, which may lead to code
execution, denial of service, information disclosure, or data tampering.
| https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023005.pdf | 2023-06-01T20:50:32.674Z | 2023-06-12T17:00:01.049Z | 2023-06-12T17:00:01.049Z | {'Vendor': 'AMI', 'Product': 'MegaRAC_SPx', 'Versions': '12.0, 13.0'} |
CVE-2023-34438 | Race condition in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html | 2023-06-09T03:00:03.511Z | 2023-08-11T02:37:29.580Z | 2023-08-11T02:37:29.580Z | {'Vendor': 'n/a', 'Product': 'Intel(R) NUC BIOS firmware', 'Versions': 'See references'} |
CVE-2023-34984 | A protection mechanism failure in Fortinet FortiWeb 7.2.0 through 7.2.1, 7.0.0 through 7.0.6, 6.4.0 through 6.4.3, 6.3.6 through 6.3.23 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests. | https://fortiguard.com/psirt/FG-IR-23-068 | 2023-06-09T06:59:37.969Z | 2023-09-13T12:29:20.911Z | 2023-09-13T12:29:20.911Z | {'Vendor': 'Fortinet', 'Product': 'FortiWeb', 'Versions': '7.2.0, 7.0.0, 6.4.0, 6.3.6'} |
CVE-2023-34087 | An improper array index validation vulnerability exists in the EVCD var len parsing functionality of GTKWave 3.3.115. A specially crafted .evcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1803 | 2023-06-30T17:45:51.428Z | 2024-01-08T14:47:54.135Z | 2024-01-08T18:00:13.639Z | {'Vendor': 'GTKWave', 'Product': 'GTKWave', 'Versions': '3.3.115'} |
CVE-2023-34253 | Grav is a flat-file content management system. Prior to version 1.7.42, the denylist introduced in commit 9d6a2d to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in multiple ways -- (1) using unsafe functions that are not banned, (2) using capitalised callable names, and (3) using fully-qualified names for referencing callables. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. A patch in version 1.7.42 improves the denylist. | https://github.com/getgrav/grav/security/advisories/GHSA-j3v8-v77f-fvgm | 2023-05-31T13:51:51.175Z | 2023-06-14T22:00:12.569Z | 2023-06-14T22:16:52.675Z | {'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '< 1.7.42'} |
CVE-2023-34603 | JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryFilterTableDictInfo at org.jeecg.modules.api.controller.SystemApiController. | https://github.com/jeecgboot/jeecg-boot/issues/4984 | 2023-06-07T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34316 | An attacker could bypass the latest Delta Electronics InfraSuite Device Master (versions prior to 1.0.7) patch, which could allow an attacker to retrieve file contents. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-01 | 2023-06-06T14:32:07.393Z | 2023-07-10T19:01:51.280Z | 2023-07-10T19:01:51.280Z | {'Vendor': 'Delta Electronics', 'Product': 'Infrasuite Device Master', 'Versions': '0'} |
CVE-2023-34195 | An issue was discovered in SystemFirmwareManagementRuntimeDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. The implementation of the GetImage method retrieves the value of a runtime variable named GetImageProgress, and later uses this value as a function pointer. This variable is wiped out by the same module near the end of the function. By setting this UEFI variable from the OS to point into custom code, an attacker could achieve arbitrary code execution in the DXE phase, before several chipset locks are set. | https://www.insyde.com/security-pledge | 2023-05-30T00:00:00 | 2023-09-18T00:00:00 | 2023-09-18T12:02:46.744601 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34194 | StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace. | https://sourceforge.net/p/tinyxml/git/ci/master/tree/tinyxmlparser.cpp | 2023-05-30T00:00:00 | 2023-12-13T00:00:00 | 2024-01-12T02:06:22.795816 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34878 | An issue was discovered in Ujcms v6.0.2 allows attackers to gain sensitive information via the dir parameter to /api/backend/core/web-file-html/download-zip. | https://github.com/ujcms/ujcms/issues/6 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34252 | Grav is a flat-file content management system. Prior to version 1.7.42, there is a logic flaw in the `GravExtension.filterFilter()` function whereby validation against a denylist of unsafe functions is only performed when the argument passed to filter is a string. However, passing an array as a callable argument allows the validation check to be skipped. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution. The vulnerability can be found in the `GravExtension.filterFilter()` function declared in `/system/src/Grav/Common/Twig/Extension/GravExtension.php`. Version 1.7.42 contains a patch for this issue. End users should also ensure that `twig.undefined_functions` and `twig.undefined_filters` properties in `/path/to/webroot/system/config/system.yaml` configuration file are set to `false` to disallow Twig from treating undefined filters/functions as PHP functions and executing them. | https://github.com/getgrav/grav/security/advisories/GHSA-96xv-rmwj-6p9w | 2023-05-31T13:51:51.174Z | 2023-06-14T21:38:48.358Z | 2023-06-14T22:17:06.852Z | {'Vendor': 'getgrav', 'Product': 'grav', 'Versions': '< 1.7.42'} |
CVE-2023-34602 | JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component queryTableDictItemsByCode at org.jeecg.modules.api.controller.SystemApiController. | https://github.com/jeecgboot/jeecg-boot/issues/4983 | 2023-06-07T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34317 | An improper input validation vulnerability exists in the OAS Engine User Creation functionality of Open Automation Software OAS Platform v18.00.0072. A specially crafted series of network requests can lead to unexpected data in the configuration. An attacker can send a sequence of requests to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1772 | 2023-06-13T17:03:40.750Z | 2023-09-05T16:15:04.162Z | 2023-09-05T16:15:04.162Z | {'Vendor': 'Open Automation Software', 'Product': 'OAS Platform', 'Versions': 'v18.00.0072'} |
CVE-2023-34747 | File upload vulnerability in ujcms 6.0.2 via /api/backend/core/web-file-upload/upload. | https://github.com/ujcms/ujcms/issues/4 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34439 | Pleasanter 1.3.47.0 and earlier contains a stored cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the user's web browser. | https://pleasanter.org/archives/vulnerability-update-202311 | 2023-10-31T01:54:12.452Z | 2023-12-06T08:40:53.373Z | 2023-12-06T08:40:53.373Z | {'Vendor': 'Implem Inc.', 'Product': 'Pleasanter', 'Versions': '1.3.47.0 and earlier'} |
CVE-2023-34985 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters. | https://fortiguard.com/psirt/FG-IR-23-141 | 2023-06-09T06:59:37.970Z | 2023-10-10T16:50:43.265Z | 2023-10-10T16:50:43.265Z | {'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'} |
CVE-2023-34086 | Improper input validation in some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html | 2023-06-09T03:00:03.485Z | 2023-08-11T02:37:27.980Z | 2023-08-11T02:37:27.980Z | {'Vendor': 'n/a', 'Product': 'Intel(R) NUC BIOS firmware', 'Versions': 'See references'} |
CVE-2023-34205 | In Moov signedxml through 1.0.0, parsing the raw XML (as received) can result in different output than parsing the canonicalized XML. Thus, signature validation can be bypassed via a Signature Wrapping attack (aka XSW). | https://github.com/moov-io/signedxml/issues/23 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34340 | Improper Authentication vulnerability in Apache Software Foundation Apache Accumulo.
This issue affects Apache Accumulo: 2.1.0.
Accumulo 2.1.0 contains a defect in the user authentication process that may succeed when invalid credentials are provided. Users are advised to upgrade to 2.1.1.
| https://lists.apache.org/thread/syy6jftvy9l6tlhn33o0rzwhh4rd0z4t | 2023-06-01T18:53:04.811Z | 2023-06-21T07:01:48.171Z | 2023-06-21T07:01:48.171Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Accumulo', 'Versions': '2.1.0'} |
CVE-2023-34585 | null | null | 2023-06-07T00:00:00 | null | 2023-06-14T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-34090 | Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. Decidim uses a third-party library named Ransack for filtering certain database collections (e.g., public meetings). By default, this library allows filtering on all data attributes and associations. This allows an unauthenticated remote attacker to exfiltrate non-public data from the underlying database of a Decidim instance (e.g., exfiltrating data from the user table). This issue may lead to Sensitive Data Disclosure. The problem was patched in version 0.27.3. | https://github.com/decidim/decidim/security/advisories/GHSA-jm79-9pm4-vrw9 | 2023-05-25T21:56:51.244Z | 2023-07-11T17:29:36.629Z | 2023-07-11T17:29:36.629Z | {'Vendor': 'decidim', 'Product': 'decidim', 'Versions': '>= 0.27.0, < 0.27.3'} |
CVE-2023-34993 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters. | https://fortiguard.com/psirt/FG-IR-23-140 | 2023-06-09T06:59:37.971Z | 2023-10-10T16:51:08.092Z | 2023-10-10T16:51:08.092Z | {'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'} |
CVE-2023-34839 | A Cross Site Request Forgery (CSRF) vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via a Custom CSRF exploit to create new user function in the application. | https://github.com/sahiloj/CVE-2023-34839/blob/main/README.md | 2023-06-07T00:00:00 | 2023-06-27T00:00:00 | 2023-06-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34213 | TN-5900 Series firmware versions v3.3 and prior are vulnerable to command-injection vulnerability. This vulnerability stems from insufficient input validation and improper authentication in the key-generation function, which could potentially allow malicious users to execute remote code on affected devices.
| https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230402-tn-5900-and-tn-4900-series-web-server-multiple-vulnerabilities | 2023-05-31T08:58:06.148Z | 2023-08-17T02:20:20.289Z | 2023-08-17T02:20:20.289Z | {'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'} |
CVE-2023-34356 | An OS command injection vulnerability exists in the data.cgi xfer_dns functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1778 | 2023-06-14T20:04:18.559Z | 2023-10-11T15:16:57.837Z | 2023-10-11T17:00:08.369Z | {'Vendor': 'Peplink', 'Product': 'Surf SOHO HW1', 'Versions': 'v6.3.5 (in QEMU)'} |
CVE-2023-34028 | Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WOLF – WordPress Posts Bulk Editor and Manager Professional plugin <= 1.0.7 versions. | https://patchstack.com/database/vulnerability/bulk-editor/wordpress-wolf-wordpress-posts-bulk-editor-and-manager-professional-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T12:13:20.690Z | 2023-06-22T14:21:00.258Z | 2023-06-22T14:21:00.258Z | {'Vendor': 'realmag777', 'Product': 'WOLF – WordPress Posts Bulk Editor and Manager Professional', 'Versions': 'n/a'} |
CVE-2023-34478 | Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.
Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
| https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk | 2023-06-07T18:50:06.956Z | 2023-07-24T18:24:45.619Z | 2023-07-24T18:24:45.619Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Shiro', 'Versions': '0, 0'} |
CVE-2023-34182 | Cross-Site Request Forgery (CSRF) vulnerability in Peter Shaw LH Password Changer plugin <= 1.55 versions. | https://patchstack.com/database/vulnerability/lh-password-changer/wordpress-lh-password-changer-plugin-1-55-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-29T13:52:39.505Z | 2023-11-09T19:01:04.963Z | 2023-11-09T19:01:04.963Z | {'Vendor': 'Peter Shaw', 'Product': 'LH Password Changer', 'Versions': 'n/a'} |
CVE-2023-34614 | An issue was discovered jmarsden/jsonij thru 0.5.2 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies. | https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34244 | GLPI is a free asset and IT management software package. Starting in version 9.4.0 and prior to version 10.0.8, a malicious link can be crafted by an unauthenticated user that can exploit a reflected XSS in case any authenticated user opens the crafted link. Users should upgrade to version 10.0.8 to receive a patch. | https://github.com/glpi-project/glpi/security/advisories/GHSA-p93p-pwg9-w95w | 2023-05-31T13:51:51.172Z | 2023-07-05T19:22:07.569Z | 2023-07-05T19:22:07.569Z | {'Vendor': 'glpi-project', 'Product': 'glpi', 'Versions': '>= 9.4.0, < 10.0.8'} |
CVE-2023-34751 | bloofox v0.5.2.1 was discovered to contain a SQL injection vulnerability via the gid parameter at admin/index.php?mode=user&page=groups&action=edit. | https://ndmcyb.hashnode.dev/bloofox-v0521-was-discovered-to-contain-many-sql-injection-vulnerability | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34116 | Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access.
| https://explore.zoom.us/en/trust/security/security-bulletin/ | 2023-05-25T22:01:29.097Z | 2023-07-11T16:56:16.132Z | 2023-07-11T16:56:16.132Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom Desktop Client for Windows', 'Versions': 'before 5.15.0'} |
CVE-2023-34053 | In Spring Framework versions 6.0.0 - 6.0.13, it is possible for a user to provide specially crafted HTTP requests that may cause a denial-of-service (DoS) condition.
Specifically, an application is vulnerable when all of the following are true:
* the application uses Spring MVC or Spring WebFlux
* io.micrometer:micrometer-core is on the classpath
* an ObservationRegistry is configured in the application to record observations
Typically, Spring Boot applications need the org.springframework.boot:spring-boot-actuator dependency to meet all conditions.
| https://spring.io/security/cve-2023-34053 | 2023-05-25T17:21:56.203Z | 2023-11-28T08:10:37.217Z | 2023-11-28T08:10:37.217Z | {'Vendor': 'Spring', 'Product': 'Spring Framework', 'Versions': '6.0.0'} |
CVE-2023-34395 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider.
In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution.
Starting version 4.0.0 driver can be set only from the hook constructor.
This issue affects Apache Airflow ODBC Provider: before 4.0.0.
| https://github.com/apache/airflow/pull/31713 | 2023-06-03T15:26:13.230Z | 2023-06-27T11:36:58.116Z | 2023-06-27T11:36:58.116Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow ODBC Provider', 'Versions': '0'} |
CVE-2023-34141 | A command injection vulnerability in the access point (AP) management feature of the Zyxel ATP series firmware versions 5.00 through 5.36 Patch 2, USG FLEX series firmware versions 5.00 through 5.36 Patch 2, USG FLEX 50(W) series firmware versions 5.00 through 5.36 Patch 2, USG20(W)-VPN series firmware versions 5.00 through 5.36 Patch 2, VPN series firmware versions 5.00 through 5.36 Patch 2, NXC2500 firmware versions 6.10(AAIG.0) through 6.10(AAIG.3), and NXC5500 firmware versions 6.10(AAOS.0) through 6.10(AAOS.4), could allow an unauthenticated, LAN-based attacker to execute some OS commands on an affected device if the attacker could trick an authorized administrator to add their IP address to the managed AP list in advance. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-wlan-controllers | 2023-05-26T03:44:51.339Z | 2023-07-17T17:56:26.818Z | 2023-07-17T17:56:26.818Z | {'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': '5.00 through 5.36 Patch 2'} |
CVE-2023-34842 | Remote Code Execution vulnerability in DedeCMS through 5.7.109 allows remote attackers to run arbitrary code via crafted POST request to /dede/tpl.php. | http://dedecms.com | 2023-06-07T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34454 | snappy-java is a fast compressor/decompressor for Java. Due to unchecked multiplications, an integer overflow may occur in versions prior to 1.1.10.1, causing an unrecoverable fatal error.
The function `compress(char[] input)` in the file `Snappy.java` receives an array of characters and compresses it. It does so by multiplying the length by 2 and passing it to the rawCompress` function.
Since the length is not tested, the multiplication by two can cause an integer overflow and become negative. The rawCompress function then uses the received length and passes it to the natively compiled maxCompressedLength function, using the returned value to allocate a byte array.
Since the maxCompressedLength function treats the length as an unsigned integer, it doesn’t care that it is negative, and it returns a valid value, which is casted to a signed integer by the Java engine. If the result is negative, a `java.lang.NegativeArraySizeException` exception will be raised while trying to allocate the array `buf`. On the other side, if the result is positive, the `buf` array will successfully be allocated, but its size might be too small to use for the compression, causing a fatal Access Violation error.
The same issue exists also when using the `compress` functions that receive double, float, int, long and short, each using a different multiplier that may cause the same issue. The issue most likely won’t occur when using a byte array, since creating a byte array of size 0x80000000 (or any other negative value) is impossible in the first place.
Version 1.1.10.1 contains a patch for this issue. | https://github.com/xerial/snappy-java/security/advisories/GHSA-fjpj-2g6w-x25r | 2023-06-06T16:16:53.559Z | 2023-06-15T16:27:45.467Z | 2023-06-15T16:27:45.467Z | {'Vendor': 'xerial', 'Product': 'snappy-java', 'Versions': '< 1.1.10.1'} |
CVE-2023-34004 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Box Office plugin <= 1.1.50 versions. | https://patchstack.com/database/vulnerability/woocommerce-box-office/wordpress-woocommerce-box-office-plugin-1-1-50-contributor-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-25T11:25:36.397Z | 2023-08-30T14:56:05.558Z | 2023-08-30T14:56:05.558Z | {'Vendor': 'WooCommerce', 'Product': 'WooCommerce Box Office', 'Versions': 'n/a'} |
CVE-2023-34157 | Vulnerability of HwWatchHealth being hijacked.Successful exploitation of this vulnerability may cause repeated pop-up windows of the app. | https://device.harmonyos.com/en/docs/security/update/security-bulletins-202306-0000001560777672 | 2023-05-29T09:03:29.116Z | 2023-06-16T06:55:57.262Z | 2023-06-16T06:55:57.262Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '2.0.0'} |
CVE-2023-34012 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Premium Addons for Elementor Premium Addons PRO plugin <= 2.8.24 versions. | https://patchstack.com/database/vulnerability/premium-addons-pro/wordpress-premium-addons-pro-plugin-2-8-24-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-25T11:25:36.399Z | 2023-06-23T11:24:51.803Z | 2023-06-23T11:24:51.803Z | {'Vendor': 'Premium Addons for Elementor', 'Product': 'Premium Addons PRO', 'Versions': 'n/a'} |
CVE-2023-34442 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Camel.This issue affects Apache Camel: from 3.X through <=3.14.8, from 3.18.X through <=3.18.7, from 3.20.X through <= 3.20.5, from 4.X through <= 4.0.0-M3.
Users should upgrade to 3.14.9, 3.18.8, 3.20.6 or 3.21.0 and for users on Camel 4.x update to 4.0.0-M1
| https://lists.apache.org/thread/x4vy2hhbltb1xrvy1g6m8hpjgj2k7wgh | 2023-06-06T15:08:25.142Z | 2023-07-10T09:31:05.286Z | 2023-07-10T09:31:05.286Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Camel JIRA', 'Versions': '3.x, 3.18.x, 3.20.x, 4.x'} |
CVE-2023-34100 | Contiki-NG is an open-source, cross-platform operating system for IoT devices. When reading the TCP MSS option value from an incoming packet, the Contiki-NG OS does not verify that certain buffer indices to read from are within the bounds of the IPv6 packet buffer, uip_buf. In particular, there is a 2-byte buffer read in the module os/net/ipv6/uip6.c. The buffer is indexed using 'UIP_IPTCPH_LEN + 2 + c' and 'UIP_IPTCPH_LEN + 3 + c', but the uip_buf buffer may not have enough data, resulting in a 2-byte read out of bounds. The problem has been patched in the "develop" branch of Contiki-NG, and is expected to be included in release 4.9. Users are advised to watch for the 4.9 release and to upgrade when it becomes available. There are no workarounds for this vulnerability aside from manually patching with the diff in commit `cde4e9839`. | https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-3v7c-jq9x-cmph | 2023-05-25T21:56:51.245Z | 2023-06-09T17:30:50.048Z | 2023-06-09T17:30:50.048Z | {'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'} |
CVE-2023-34415 | When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114. | https://bugzilla.mozilla.org/show_bug.cgi?id=1811999 | 2023-06-05T16:57:22.625Z | 2023-06-19T10:40:49.021Z | 2023-06-19T10:40:49.021Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-34045 | VMware Fusion(13.x prior to 13.5) contains a local privilege escalation vulnerability that occurs during
installation for the first time (the user needs to drag or copy the
application to a folder from the '.dmg' volume) or when installing an
upgrade. A malicious actor with local non-administrative user privileges may
exploit this vulnerability to escalate privileges to root on the system
where Fusion is installed or being installed for the first time. | https://www.vmware.com/security/advisories/VMSA-2023-0022.html | 2023-05-25T17:21:56.202Z | 2023-10-20T09:00:30.352Z | 2023-10-20T09:00:30.352Z | {'Vendor': 'VMware', 'Product': 'Fusion', 'Versions': '13.x'} |
CVE-2023-34229 | In JetBrains TeamCity before 2023.05 stored XSS in GitLab Connection page was possible | https://www.jetbrains.com/privacy-security/issues-fixed/ | 2023-05-31T12:49:35.320Z | 2023-05-31T13:03:17.292Z | 2023-05-31T13:03:17.292Z | {'Vendor': 'JetBrains', 'Product': 'TeamCity', 'Versions': '0'} |
CVE-2023-34383 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP Project Manager wedevs-project-manager allows SQL Injection.This issue affects WP Project Manager: from n/a through 2.6.0.
| https://patchstack.com/database/vulnerability/wedevs-project-manager/wordpress-wp-project-manager-task-team-and-project-management-plugin-featuring-kanban-board-and-gantt-charts-plugin-2-6-0-sql-injection-vulnerability?_s_id=cve | 2023-06-02T15:48:00.545Z | 2023-11-03T11:11:51.699Z | 2023-11-03T11:11:51.699Z | {'Vendor': 'weDevs', 'Product': 'WP Project Manager', 'Versions': 'n/a'} |
CVE-2023-34032 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pascal Casier bbPress Toolkit plugin <= 1.0.12 versions. | https://patchstack.com/database/vulnerability/bbp-toolkit/wordpress-bbpress-toolkit-plugin-1-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-25T12:13:20.691Z | 2023-08-30T14:19:23.198Z | 2023-08-30T14:19:23.198Z | {'Vendor': 'Pascal Casier', 'Product': 'bbPress Toolkit', 'Versions': 'n/a'} |
CVE-2023-34462 | Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final. | https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845 | 2023-06-06T16:16:53.560Z | 2023-06-22T23:00:12.104Z | 2023-06-22T23:00:12.104Z | {'Vendor': 'netty', 'Product': 'netty', 'Versions': '< 4.1.94.Final'} |
CVE-2023-34198 | In Stormshield Network Security (SNS) 1.0.0 through 3.7.36 before 3.7.37, 3.8.0 through 3.11.24 before 3.11.25, 4.0.0 through 4.3.18 before 4.3.19, 4.4.0 through 4.6.5 before 4.6.6, and 4.7.0 before 4.7.1, the usage of a Network object created from an inactive DHCP interface in the filtering slot results in the usage of an object of the :any" type, which may have unexpected results for access control. | https://advisories.stormshield.eu/2023-019 | 2023-05-30T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T19:37:15.762531 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34931 | A stack overflow in the EditWlanMacList function of H3C Magic B1STV100R012 allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | https://github.com/h4kuy4/vuln/blob/main/H3C_B1STW/CVE-2023-34931.md | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34177 | Cross-Site Request Forgery (CSRF) vulnerability in Kenth Hagström WP-Cache.Com plugin <= 1.1.1 versions. | https://patchstack.com/database/vulnerability/wp-cachecom/wordpress-wp-cache-com-plugin-1-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-29T13:52:11.724Z | 2023-11-09T19:11:12.978Z | 2023-11-09T19:11:12.978Z | {'Vendor': 'Kenth Hagström', 'Product': 'WP-Cache.com', 'Versions': 'n/a'} |
CVE-2023-34209 | Exposure of Sensitive System Information to an Unauthorized Control Sphere in create template function in EasyUse MailHunter Ultimate 2023 and earlier allow remote authenticated users to obtain the absolute path via unencrypted VIEWSTATE parameter. | https://zuso.ai/Advisory/ZA-2023-06 | 2023-05-30T09:41:32.477Z | 2023-10-17T04:00:28.128Z | 2023-10-17T04:00:28.128Z | {'Vendor': 'EasyUse Digital Technology', 'Product': 'MailHunter Ultimate', 'Versions': '0'} |
CVE-2023-34659 | jeecg-boot 3.5.0 and 3.5.1 have a SQL injection vulnerability the id parameter of the /jeecg-boot/jmreport/show interface. | https://github.com/jeecgboot/jeecg-boot/issues/4976 | 2023-06-07T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34966 | An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition. | https://access.redhat.com/errata/RHSA-2023:6667 | 2023-06-07T21:11:04.261Z | 2023-07-20T14:56:14.644Z | 2024-01-25T20:44:56.046Z | {'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.16.11, 4.17.10, 4.18.5'} |
CVE-2023-34570 | Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter devName at /goform/SetOnlineDevName. | https://hackmd.io/%400dayResearch/S1eI91_l2 | 2023-06-07T00:00:00 | 2023-06-08T00:00:00 | 2023-06-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34120 | Improper privilege management in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access. Users may potentially utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges. | https://explore.zoom.us/en/trust/security/security-bulletin/ | 2023-05-25T22:01:29.098Z | 2023-06-13T17:38:52.940Z | 2023-06-13T18:48:05.631Z | {'Vendor': 'Zoom Video Communications, Inc.', 'Product': 'Zoom for Windows Client', 'Versions': 'before 5.14.0'} |
CVE-2023-34989 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters. | https://fortiguard.com/psirt/FG-IR-23-141 | 2023-06-09T06:59:37.970Z | 2023-10-10T16:50:55.029Z | 2023-10-10T16:50:55.029Z | {'Vendor': 'Fortinet', 'Product': 'FortiWLM', 'Versions': '8.6.0, 8.5.0'} |
CVE-2023-34823 | fdkaac before 1.0.5 was discovered to contain a stack overflow in read_callback function in src/main.c. | https://github.com/nu774/fdkaac/issues/55 | 2023-06-07T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34970 | A local non-privileged user can make improper GPU processing operations to access a limited amount outside of buffer bounds or to exploit a software race condition. If the system’s memory is carefully prepared by the user, then this in turn could give them access to already freed memory
| https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities | 2023-06-08T02:45:25.666Z | 2023-10-03T16:44:14.509Z | 2023-10-03T16:44:14.509Z | {'Vendor': 'Arm Ltd', 'Product': 'Valhall GPU Kernel Driver', 'Versions': 'r44p0'} |
CVE-2023-34835 | A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter. | https://github.com/sahiloj/CVE-2023-34835/blob/main/README.md | 2023-06-07T00:00:00 | 2023-06-27T00:00:00 | 2023-06-27T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34136 | Vulnerability in SonicWall GMS and Analytics allows unauthenticated attacker to upload files to a restricted location not controlled by the attacker. This issue affects GMS: 9.3.2-SP1 and earlier versions; Analytics: 2.5.0.4-R7 and earlier versions. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010 | 2023-05-25T22:45:46.852Z | 2023-07-13T02:40:20.667Z | 2023-07-13T02:40:20.667Z | {'Vendor': 'SonicWall', 'Product': 'GMS', 'Versions': '9.3.2-SP1 and earlier versions'} |
CVE-2023-34566 | Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter time at /goform/saveParentControlInfo. | https://hackmd.io/%400dayResearch/rk8hQf5rh | 2023-06-07T00:00:00 | 2023-06-08T00:00:00 | 2023-06-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34927 | Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint /api/set-password. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL. | https://github.com/casdoor/casdoor/issues/1531 | 2023-06-07T00:00:00 | 2023-06-22T00:00:00 | 2023-06-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-34474 | A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service. | https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0 | 2023-06-07T00:00:00 | 2023-06-16T00:00:00 | 2023-08-31T02:07:20.128629 | {'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed in ImageMagick 7.1.1-10'} |
CVE-2023-34024 | Cross-Site Request Forgery (CSRF) vulnerability in Guillemant David WP Full Auto Tags Manager plugin <= 2.2 versions. | https://patchstack.com/database/vulnerability/wp-full-auto-tags-manager/wordpress-wp-full-auto-tags-manager-plugin-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-25T12:13:20.690Z | 2023-11-09T20:32:09.956Z | 2023-11-09T20:32:09.956Z | {'Vendor': 'Guillemant David', 'Product': 'WP Full Auto Tags Manager', 'Versions': 'n/a'} |
CVE-2023-34161 | nappropriate authorization vulnerability in the SettingsProvider module.Successful exploitation of this vulnerability may cause features to perform abnormally. | https://consumer.huawei.com/en/support/bulletin/2023/6/ | 2023-05-29T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0, 2.0.1, 2.0.0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.