wordpress — wordpress

A vulnerability, which was classified as problematic, was found in Subscribe to Comments Plugin up to 2.0.7. This affects an unknown part of the file subscribe-to-comments.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.8 is able to address this issue. The name of the patch is 9683bdf462fcac2f32b33be98f0b96497fbd1bb6. It is recommended to upgrade the affected component. The identifier VDB-222321 was assigned to this vulnerability. 2023-03-05 not yet calculated CVE-2006-10001
MISC
MISC
MISC
MISC email_registration — email_registration A vulnerability was found in Email Registration 5.x-2.1. It has been declared as critical. This vulnerability affects the function email_registration_user of the file email_registration.module. The manipulation of the argument namenew leads to sql injection. The attack can be initiated remotely. Upgrading to version 6.x-1.0 is able to address this issue. The name of the patch is 126c141b7db038c778a2dc931d38766aad8d1112. It is recommended to upgrade the affected component. VDB-222334 is the identifier assigned to this vulnerability. 2023-03-06 not yet calculated CVE-2008-10004
MISC
MISC
MISC
MISC wordpress — wordpress A vulnerability, which was classified as problematic, was found in MMDeveloper A Forms Plugin up to 1.4.2. This affects an unknown part of the file a-forms.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.4.3 is able to address this issue. The name of the patch is 3e693197bd69b7173cc16d8d2e0a7d501a2a0b06. It is recommended to upgrade the affected component. The identifier VDB-222609 was assigned to this vulnerability. 2023-03-10 not yet calculated CVE-2013-10020
MISC
MISC
MISC wordpress — wordpress A vulnerability was found in dd32 Debug Bar Plugin up to 0.8. It has been declared as problematic. Affected by this vulnerability is the function render of the file panels/class-debug-bar-queries.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.8.1 is able to address this issue. The name of the patch is 0842af8f8a556bc3e39b9ef758173b0a8a9ccbfc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222739. 2023-03-11 not yet calculated CVE-2013-10021
MISC
MISC
MISC
MISC wordpress — wordpress A vulnerability has been found in Ad Blocking Detector Plugin up to 1.2.1 and classified as problematic. This vulnerability affects unknown code of the file ad-blocking-detector.php. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 1.2.2 is able to address this issue. The name of the patch is 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94. It is recommended to upgrade the affected component. VDB-222610 is the identifier assigned to this vulnerability. 2023-03-10 not yet calculated CVE-2014-125093
MISC
MISC
MISC
MISC

ayttm — ayttm

A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The name of the patch is 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267. 2023-03-05 not yet calculated CVE-2015-10088
MISC
MISC
MISC
MISC

flame.js — flame.js

A vulnerability classified as problematic has been found in flame.js. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The name of the patch is e6c49b5f6179e31a534b7c3264e1d36aa99728ac. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222291. 2023-03-05 not yet calculated CVE-2015-10089
MISC
MISC
MISC
MISC

bywater_solutions — bywater-koha-xslt

A vulnerability has been found in ByWater Solutions bywater-koha-xslt and classified as critical. This vulnerability affects the function StringSearch of the file admin/systempreferences.pl. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The name of the patch is 9513b93c828dfbc4413f9e0df63647401aaf4e58. It is recommended to apply a patch to fix this issue. VDB-222322 is the identifier assigned to this vulnerability. 2023-03-06 not yet calculated CVE-2015-10091
MISC
MISC
MISC wordpress — wordpress A vulnerability was found in Fastly Plugin up to 0.97. It has been rated as problematic. Affected by this issue is the function post of the file lib/api.php. The manipulation of the argument url leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.98 is able to address this issue. The name of the patch is d7fe42538f4d4af500e3af9678b6b06fba731656. It is recommended to upgrade the affected component. VDB-222326 is the identifier assigned to this vulnerability. 2023-03-06 not yet calculated CVE-2015-10094
MISC
MISC
MISC
MISC wordpress — wordpress A vulnerability classified as problematic has been found in woo-popup Plugin up to 1.2.2. This affects an unknown part of the file admin/class-woo-popup-admin.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.3.0 is able to address this issue. The name of the patch is 7c76ac78f3e16015991b612ff4fa616af4ce9292. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222327. 2023-03-06 not yet calculated CVE-2015-10095
MISC
MISC
MISC
MISC

hgzojer — vocable_trainer

A vulnerability classified as critical was found in hgzojer Vocable Trainer up to 1.3.0. This vulnerability affects unknown code of the file src/at/hgz/vocabletrainer/VocableTrainerProvider.java. The manipulation leads to path traversal. Attacking locally is a requirement. Upgrading to version 1.3.1 is able to address this issue. The name of the patch is accf6838078f8eb105cfc7865aba5c705fb68426. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222328. 2023-03-07 not yet calculated CVE-2017-20181
MISC
MISC
MISC
MISC

mobile_vikings — django_ajax_utilities

A vulnerability was found in Mobile Vikings Django AJAX Utilities up to 1.2.1 and classified as problematic. This issue affects the function Pagination of the file django_ajax/static/ajax-utilities/js/pagination.js of the component Backslash Handler. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 329eb1dd1580ca1f9d4f95bc69939833226515c9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222611. 2023-03-10 not yet calculated CVE-2017-20182
MISC
MISC
MISC wordpress — wordpress The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to unauthorized back-up location changes in versions up to, and including 1.4.1 due to a lack of proper capability checking on the backup_guard_cloud_dropbox, backup_guard_cloud_gdrive, and backup_guard_cloud_oneDrive functions. This makes it possible for authenticated attackers, with minimal permissions, such as a subscriber to change to location of back-ups and potentially steal sensitive information from them. 2023-03-07 not yet calculated CVE-2020-36667
MISC
MISC wordpress — wordpress The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to sensitive information disclosure in versions up to, and including, 1.4.0 due to a lack of proper capability checking on the backup_guard_get_manual_modal function called via an AJAX action. This makes it possible for subscriber-level attackers, and above, to invoke the function and obtain database table information. 2023-03-07 not yet calculated CVE-2020-36668
MISC
MISC wordpress — wordpress The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.3.9. This is due to missing nonce validation on the backup_guard_get_import_backup() function. This makes it possible for unauthenticated attackers to upload arbitrary files to the vulnerable site’s server via a forged request, granted they can trick a site’s administrator into performing an action such as clicking on a link. 2023-03-07 not yet calculated CVE-2020-36669
MISC
MISC wordpress — wordpress The NEX-Forms. plugin for WordPress is vulnerable to unauthorized disclosure and modification of data in versions up to, and including 7.7.1 due to missing capability checks on several AJAX actions. This makes it possible for authenticated attackers with subscriber level permissions and above to invoke these functions which can be used to perform actions like modify form submission records, deleting files, sending test emails, modifying plugin settings, and more. 2023-03-07 not yet calculated CVE-2020-36670
MISC
MISC

ibm — financial_transactoin_manager

IBM Financial Transaction Manager 3.2.0 through 3.2.10 could allow an authenticated user to perform unauthorized actions due to improper validation. IBM X-Force ID: 192954. 2023-03-10 not yet calculated CVE-2020-5002
MISC
MISC

hclsoftware — verse

HCL Verse is susceptible to a Cross Site Scripting (XSS) vulnerability. By tricking a user into clicking a crafted URL, a remote unauthenticated attacker could execute script in a victim’s web browser to perform operations as the victim and/or steal the victim’s cookies, session tokens, or other sensitive information. 2023-03-10 not yet calculated CVE-2021-27788
MISC

wyomind — help_desk_magento_2

Cross Site Scripting Vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before and fixed in v.1.3.7 allows attackers to escalte privileges via a crafted payload in the ticket message field. 2023-03-08 not yet calculated CVE-2021-33351
MISC
MISC

wyomind — help_desk_magento_2

An issue in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via a phar file upload in the ticket message field. 2023-03-08 not yet calculated CVE-2021-33352
MISC
MISC

wyomind — help_desk_magento_2

Directory Traversal vulnerability in Wyomind Help Desk Magento 2 extension v.1.3.6 and before fixed in v.1.3.7 allows attacker to execute arbitrary code via the file attachment directory setting. 2023-03-08 not yet calculated CVE-2021-33353
MISC
MISC

gnuplot — gnuplot

An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s). 2023-03-10 not yet calculated CVE-2021-33360
MISC
MISC kernel — kernel REMAP cmd of SVM driver can be used to remap read only memory as read-write, then cause read only memory/file modified. 2023-03-08 not yet calculated CVE-2021-33639
MISC yuneec — mantis_q/px4-autopilot An issue discovered in Yuneec Mantis Q and PX4-Autopilot v 1.11.3 and below allow attacker to gain access to sensitive information via various nuttx commands. 2023-03-09 not yet calculated CVE-2021-34125
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC

vicidial — vicidial

Cross Site Scripting vulnerability found in VICIdial v2.14-610c and v.2.10-415c allows attackers execute arbitrary code via the /agc/vicidial.php, agc/vicidial-greay.php, and /vicidial/KHOMP_admin.php parameters. 2023-03-06 not yet calculated CVE-2021-35377
MISC
MISC

moodle — moodle

In Moodle, an SQL injection risk was identified in the library fetching a user’s enrolled courses. 2023-03-06 not yet calculated CVE-2021-36392
MISC

moodle — moodle

In Moodle, an SQL injection risk was identified in the library fetching a user’s recent courses. 2023-03-06 not yet calculated CVE-2021-36393
MISC

moodle — moodle

In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin. 2023-03-06 not yet calculated CVE-2021-36394
MISC

moodle — moodle

In Moodle, the file repository’s URL parsing required additional recursion handling to mitigate the risk of recursion denial of service. 2023-03-06 not yet calculated CVE-2021-36395
MISC

moodle — moodle

In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk. 2023-03-06 not yet calculated CVE-2021-36396
MISC

moodle — moodle

In Moodle, insufficient capability checks meant message deletions were not limited to the current user. 2023-03-06 not yet calculated CVE-2021-36397
MISC

moodle — moodle

In Moodle, ID numbers displayed in the web service token list required additional sanitizing to prevent a stored XSS risk. 2023-03-06 not yet calculated CVE-2021-36398
MISC

moodle — moodle

In Moodle, ID numbers displayed in the quiz override screens required additional sanitizing to prevent a stored XSS risk. 2023-03-06 not yet calculated CVE-2021-36399
MISC

moodle — moodle

In Moodle, insufficient capability checks made it possible to remove other users’ calendar URL subscriptions. 2023-03-06 not yet calculated CVE-2021-36400
MISC

moodle — moodle

In Moodle, ID numbers exported in HTML data formats required additional sanitizing to prevent a local stored XSS risk. 2023-03-06 not yet calculated CVE-2021-36401
MISC

moodle — moodle

In Moodle, Users’ names required additional sanitizing in the account confirmation email, to prevent a self-registration phishing risk. 2023-03-06 not yet calculated CVE-2021-36402
MISC

moodle — moodle

In Moodle, in some circumstances, email notifications of messages could have the link back to the original message hidden by HTML, which may pose a phishing risk. 2023-03-06 not yet calculated CVE-2021-36403
MISC jquery — jquery Cross Site Scripting (XSS) vulnerability in the DataTables plug-in 1.9.2 for jQuery allows attackers to run arbitrary code via the sBaseName parameter to function _fnCreateCookie. NOTE: 1.9.2 is a version from 2012. 2023-03-06 not yet calculated CVE-2021-36713
MISC
MISC json-logic-js — json-logic-js A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability. 2023-03-05 not yet calculated CVE-2021-4329
MISC
MISC
MISC
MISC wordpress — wordpress The Envato Elements & Download and Template Kit – Import plugins for WordPress are vulnerable to arbitrary file uploads due to insufficient validation of file type upon extracting uploaded Zip files in the installFreeTemplateKit and uploadTemplateKitZipFile functions. This makes it possible for attackers with contributor-lever permissions and above to upload arbitrary files and potentially gain remote code execution in versions up to and including 1.0.13 of Template Kit – Import and versions up to and including 2.0.10 of Envato Elements & Download. 2023-03-07 not yet calculated CVE-2021-4330
MISC
MISC wordpress — wordpress The Plus Addons for Elementor plugin for WordPress is vulnerable to privilege escalation in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin adds a registration form to the Elementor page builders functionality. As part of the registration form, users can choose which role to set as the default for users upon registration. This field is not hidden for lower-level users so any user with access to the Elementor page builder, such as contributors, can set the default role to administrator. Since contributors can not publish posts, only author+ users can elevate privileges without interaction via a site administrator (to approve a post). 2023-03-07 not yet calculated CVE-2021-4331
MISC
MISC wordpress — wordpress The Plus Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in versions up to, and including 4.1.9 (pro) and 2.0.6 (free). The plugin has a feature to add an “Info Box” to an Elementor created page. This Info Box can include an SVG image for the box. Unfortunately, the plugin used file_get_contents with no verification that the file being supplied was an SVG file, so any user with access to the Elementor page builder, such as contributors, could read arbitrary files on the WordPress installation. 2023-03-07 not yet calculated CVE-2021-4332
MISC
MISC wordpress — wordpress The WP Statistics plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 13.1.1. This is due to missing or incorrect nonce validation on the view() function. This makes it possible for unauthenticated attackers to activate and deactivate arbitrary plugins, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-07 not yet calculated CVE-2021-4333
MISC
MISC ubit_information_technologies — student_information management_system Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in UBIT Information Technologies Student Information Management System.This issue affects Student Information Management System: before 20211126. 2023-03-07 not yet calculated CVE-2021-44196
MISC ubit_information_technologies — student_information management_system Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in UBIT Information Technologies Student Information Management System.This issue affects Student Information Management System: before 20211126. 2023-03-07 not yet calculated CVE-2021-44197
MISC cisco — cisco enterprise_nfv infrastructure_ software A vulnerability in the upgrade signature verification of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, local attacker to provide an unauthentic upgrade file for upload. This vulnerability is due to insufficient cryptographic signature verification of upgrade files. An attacker could exploit this vulnerability by providing an administrator with an unauthentic upgrade file. A successful exploit could allow the attacker to fully compromise the Cisco NFVIS system. 2023-03-10 not yet calculated CVE-2022-20929
MISC qualcomm — snapdragon Information Disclosure in Graphics during GPU context switch. 2023-03-10 not yet calculated CVE-2022-22075
MISC fortinet — multiple_products An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiWeb version 6.4.0 through 6.4.1, FortiWeb version 6.3.0 through 6.3.17, FortiWeb all versions 6.2, FortiWeb all versions 6.1, FortiWeb all versions 6.0, FortiRecorder version 6.4.0 through 6.4.3, FortiRecorder all versions 6.0, FortiRecorder all versions 2.7 may allow an authenticated user to read arbitrary files via specially crafted command arguments. 2023-03-07 not yet calculated CVE-2022-22297
MISC qualcomm — snapdragon Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload. 2023-03-10 not yet calculated CVE-2022-25655
MISC qualcomm — snapdragon Memory corruption in Modem due to usage of Out-of-range pointer offset in UIM 2023-03-10 not yet calculated CVE-2022-25694
MISC qualcomm — snapdragon Memory corruption in modem due to integer overflow to buffer overflow while handling APDU response 2023-03-10 not yet calculated CVE-2022-25705
MISC qualcomm — snapdragon Memory corruption in modem due to use of out of range pointer offset while processing qmi msg 2023-03-10 not yet calculated CVE-2022-25709
MISC fortinet — multiple_products A exposure of sensitive information to an unauthorized actor in Fortinet FortiManager version 6.0.0 through 6.0.4, FortiAnalyzer version 6.0.0 through 6.0.4, FortiPortal version 6.0.0 through 6.0.9, 5.3.0 through 5.3.8, 5.2.x, 5.1.0, 5.0.x, 4.2.x, 4.1.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.x, 6.0.x allows an attacker which has obtained access to a restricted administrative account to obtain sensitive information via `diagnose debug` commands. 2023-03-07 not yet calculated CVE-2022-27490
MISC fortinet — fortimail A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiMail version 6.4.0, version 6.2.0 through 6.2.4 and before 6.0.9 allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form. 2023-03-09 not yet calculated CVE-2022-29056
MISC openstack-neutron — openstack-neutron An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user’s quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. 2023-03-06 not yet calculated CVE-2022-3277
MISC
MISC qualcomm — snapdragon Memory corruption in modem due to buffer overflow while processing a PPP packet 2023-03-10 not yet calculated CVE-2022-33213
MISC qualcomm — snapdragon Memory corruption due to improper authentication in Qualcomm IPC while loading unsigned lib in audio PD. 2023-03-10 not yet calculated CVE-2022-33242
MISC qualcomm — snapdragon Transient DOS due to reachable assertion in modem during MIB reception and SIB timeout 2023-03-10 not yet calculated CVE-2022-33244
MISC qualcomm — snapdragon Memory corruption in WLAN due to use after free 2023-03-10 not yet calculated CVE-2022-33245
MISC qualcomm — snapdragon Transient DOS due to reachable assertion in modem when network repeatedly sent invalid message container for NR to LTE handover. 2023-03-10 not yet calculated CVE-2022-33250
MISC qualcomm — snapdragon Transient DOS due to reachable assertion in Modem while processing SIB1 Message. 2023-03-10 not yet calculated CVE-2022-33254
MISC qualcomm — snapdragon Memory corruption due to improper validation of array index in Multi-mode call processor. 2023-03-10 not yet calculated CVE-2022-33256
MISC qualcomm — snapdragon Memory corruption in Core due to time-of-check time-of-use race condition during dump collection in trust zone. 2023-03-10 not yet calculated CVE-2022-33257
MISC qualcomm — snapdragon Memory corruption due to stack based buffer overflow in core while sending command from USB of large size. 2023-03-10 not yet calculated CVE-2022-33260
MISC qualcomm — snapdragon Transient DOS in modem due to reachable assertion. 2023-03-10 not yet calculated CVE-2022-33272
MISC qualcomm — snapdragon Memory corruption due to buffer copy without checking the size of input in HLOS when input message size is larger than the buffer capacity. 2023-03-10 not yet calculated CVE-2022-33278
MISC qualcomm — snapdragon Transient DOS due to buffer over-read in WLAN Firmware while parsing secure FTMR frame with size lesser than 39 Bytes. 2023-03-10 not yet calculated CVE-2022-33309
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 10.0 to 15.7.8, 15.8 prior to 15.8.4 and 15.9 prior to 15.9.2. A crafted URL could be used to redirect users to arbitrary sites 2023-03-09 not yet calculated CVE-2022-3381
CONFIRM
MISC
MISC linux — kernel A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system. 2023-03-06 not yet calculated CVE-2022-3424
MISC
MISC
MISC
MISC gitlab — gitlab A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system. 2023-03-06 not yet calculated CVE-2022-3707
MISC
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 15.5 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. Due to improper permissions checks an unauthorised user was able to read, add or edit a users private snippet. 2023-03-09 not yet calculated CVE-2022-3758
MISC
MISC
CONFIRM mia_technology — mia-med Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Mia Technology Mia-Med.This issue affects Mia-Med: before 1.0.0.58. 2023-03-07 not yet calculated CVE-2022-3760
MISC gitlab — dast Missing validation in DAST analyzer affecting all versions from 1.11.0 prior to 3.0.32, allows custom request headers to be sent with every request, regardless of the host. 2023-03-09 not yet calculated CVE-2022-3767
CONFIRM
MISC hewlett_packard_enterprise — hpe_flex/hpe_flex_280 A potential security vulnerability has been identified in HPE Superdome Flex and Superdome Flex 280 servers. The vulnerability could be locally exploited to allow disclosure of information. HPE has made the following software to resolve the vulnerability in HPE Superdome Flex Servers v3.65.8 and Superdome Flex 280 Servers v1.45.8. 2023-03-10 not yet calculated CVE-2022-37939
MISC ceph — ceph A flaw was found in Ceph, relating to the URL processing on RGW backends. An attacker can exploit the URL processing by providing a null URL to crash the RGW, causing a denial of service. 2023-03-06 not yet calculated CVE-2022-3854
MISC libpng — libpng A flaw was found in libpng 1.6.38. A crafted PNG image can lead to a segmentation fault and denial of service in png_setup_paeth_row() function. 2023-03-06 not yet calculated CVE-2022-3857
MISC fortinet — fortiweb A improper neutralization of special elements used in an os command (‘os command injection’) in Fortinet FortiWeb version 7.0.0 through 7.0.2, FortiWeb version 6.3.6 through 6.3.20, FortiWeb 6.4 all versions allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests. 2023-03-07 not yet calculated CVE-2022-39951
MISC fortinet — fortinac A improper privilege management in Fortinet FortiNAC version 9.4.0 through 9.4.1, FortiNAC version 9.2.0 through 9.2.6, FortiNAC version 9.1.0 through 9.1.8, FortiNAC all versions 8.8, FortiNAC all versions 8.7, FortiNAC all versions 8.6, FortiNAC all versions 8.5, FortiNAC version 8.3.7 allows attacker to escalation of privilege via specially crafted commands. 2023-03-07 not yet calculated CVE-2022-39953
MISC gitlab — gitlab A issue has been discovered in GitLab CE/EE affecting all versions from 15.3 prior to 15.7.8, version 15.8 prior to 15.8.4, and version 15.9 prior to 15.9.2 A cross-site scripting vulnerability was found in the title field of work items that allowed attackers to perform arbitrary actions on behalf of victims at client side. 2023-03-08 not yet calculated CVE-2022-4007
CONFIRM
MISC
MISC qualcomm — snapdragon Memory corruption in Video due to double free while playing 3gp clip with invalid metadata atoms. 2023-03-10 not yet calculated CVE-2022-40515
MISC qualcomm — snapdragon Transient DOS due to reachable assertion in WLAN while processing PEER ID populated by TQM. 2023-03-10 not yet calculated CVE-2022-40527
MISC qualcomm — snapdragon Memory corruption in WLAN due to integer overflow to buffer overflow in WLAN during initialization phase. 2023-03-10 not yet calculated CVE-2022-40530
MISC qualcomm — snapdragon
  Memory corruption in WLAN due to incorrect type cast while sending WMI_SCAN_SCH_PRIO_TBL_CMDID message. 2023-03-10 not yet calculated CVE-2022-40531
MISC qualcomm — snapdragon Transient DOS due to buffer over-read in WLAN while sending a packet to device. 2023-03-10 not yet calculated CVE-2022-40535
MISC qualcomm — snapdragon Memory corruption in Bluetooth HOST while processing the AVRC_PDU_GET_PLAYER_APP_VALUE_TEXT AVRCP response. 2023-03-10 not yet calculated CVE-2022-40537
MISC qualcomm — snapdragon Memory corruption in Automotive Android OS due to improper validation of array index. 2023-03-10 not yet calculated CVE-2022-40539
MISC qualcomm — snapdragon Memory corruption due to buffer copy without checking the size of input while loading firmware in Linux Kernel. 2023-03-10 not yet calculated CVE-2022-40540
MISC fortinet — fortinac A improper neutralization of input during web page generation (‘cross-site scripting’) in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.8, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 allows attacker to execute unauthorized code or commands via specially crafted http requests. 2023-03-07 not yet calculated CVE-2022-40676
MISC fortinet — fortios A improper limitation of a pathname to a restricted directory vulnerability (‘path traversal’) [CWE-22] in Fortinet FortiOS version 7.2.0 through 7.2.3, 7.0.0 through 7.0.9 and before 6.4.11 allows a privileged attacker to read and write files on the underlying Linux system via crafted CLI commands. 2023-03-07 not yet calculated CVE-2022-41328
MISC fortinet — multiple_products An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiProxy version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.7, FortiOS version 7.2.0 through 7.2.3 and 7.0.0 through 7.0.9 allows an unauthenticated attackers to obtain sensitive logging informations on the device via crafted HTTP GET requests. 2023-03-07 not yet calculated CVE-2022-41329
MISC fortinet — fortirecorder An uncontrolled resource consumption vulnerability [CWE-400] in FortiRecorder version 6.4.3 and below, 6.0.11 and below login authentication mechanism may allow an unauthenticated attacker to make the device unavailable via crafted GET requests. 2023-03-07 not yet calculated CVE-2022-41333
MISC

openstack — glance

A flaw was found in openstack-glance. This issue could allow a remote, authenticated attacker to tamper with images, compromising the integrity of virtual machines created using these modified images. 2023-03-06 not yet calculated CVE-2022-4134
MISC
MISC
MISC qlik — qlikview QlikView 12.60.2 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the QvsViewClient functionality. 2023-03-06 not yet calculated CVE-2022-42248
MISC
MISC fortinet — fortios A relative path traversal vulnerability [CWE-23] in Fortinet FortiOS version 7.2.0 through 7.2.2, 7.0.0 through 7.0.8 and before 6.4.11, FortiProxy version 7.2.0 through 7.2.2 and 7.0.0 through 7.0.8 allows privileged VDOM administrators to escalate their privileges to super admin of the box via crafted CLI requests. 2023-03-07 not yet calculated CVE-2022-42476
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 15.3 before 15.7.8, versions of 15.8 before 15.8.4, and version 15.9 before 15.9.2. Google IAP details in Prometheus integration were not hidden, could be leaked from instance, group, or project settings to other users. 2023-03-09 not yet calculated CVE-2022-4289
MISC
MISC
CONFIRM gitlab — dast An issue has been discovered in GitLab DAST analyzer affecting all versions starting from 2.0 before 3.0.55, which sends custom request headers with every request on the authentication page. 2023-03-08 not yet calculated CVE-2022-4315
CONFIRM
MISC
MISC gitlab — dast An issue has been discovered in GitLab DAST analyzer affecting all versions starting from 1.47 before 3.0.51, which sends custom request headers in redirects. 2023-03-09 not yet calculated CVE-2022-4317
CONFIRM
MISC
MISC gitlab — gitlab An issue has been discovered in GitLab EE affecting all versions starting from 15.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. If a group with SAML SSO enabled is transferred to a new namespace as a child group, it’s possible previously removed malicious maintainer or owner of the child group can still gain access to the group via SSO or a SCIM token to perform actions on the group. 2023-03-09 not yet calculated CVE-2022-4331
MISC
MISC
CONFIRM ibm — mq IBM MQ 9.2 CD, 9.2 LTS, 9.3 CD, and 9.3 LTS is vulnerable to a denial of service attack caused by specially crafted PCF or MQSC messages. IBM X-Force ID: 240832. 2023-03-10 not yet calculated CVE-2022-43902
MISC
MISC ivanti — avalanche An improper authentication vulnerability exists in Avalanche version 6.3.x and below allows unauthenticated attacker to modify properties on specific port. 2023-03-10 not yet calculated CVE-2022-44574
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 12.8 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. This vulnerability could allow a user to unmask the Discord Webhook URL through viewing the raw API response. 2023-03-09 not yet calculated CVE-2022-4462
MISC
CONFIRM
MISC kioware — kioware KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code. 2023-03-06 not yet calculated CVE-2022-44875
MISC
MISC samba — active_directory Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96). 2023-03-06 not yet calculated CVE-2022-45141
MISC heimdal — heimdal The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding “!= 0” comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted. 2023-03-06 not yet calculated CVE-2022-45142
MISC fortinet — multiple_products An access of uninitialized pointer vulnerability [CWE-824] in the SSL VPN portal of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.9 and before 6.4.11 and FortiProxy version 7.2.0 through 7.2.1, version 7.0.0 through 7.0.7 and before 2.0.11 allows a remote authenticated attacker to crash the sslvpn daemon via an HTTP GET request. 2023-03-07 not yet calculated CVE-2022-45861
MISC github — github_enterprise_server An information disclosure vulnerability was identified in GitHub Enterprise Server that allowed private repositories to be added to a GitHub Actions runner group via the API by a user who did not have access to those repositories, resulting in the repository names being shown in the UI. To exploit this vulnerability, an attacker would need access to the GHES instance, permissions to modify GitHub Actions runner groups, and successfully guess the obfuscated ID of private repositories. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.7 and was fixed in versions 3.3.17, 3.4.12, 3.5.9, 3.6.5. This vulnerability was reported via the GitHub Bug Bounty program. 2023-03-07 not yet calculated CVE-2022-46257
MISC
MISC
MISC
MISC arm — arm_mali An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r39p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0. 2023-03-08 not yet calculated CVE-2022-46394
MISC
MISC arm — arm_mali An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Midgard r0p0 through r32p0, Bifrost r0p0 through r41p0 before r42p0, Valhall r19p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0. 2023-03-06 not yet calculated CVE-2022-46395
CONFIRM
MISC dell — bios Dell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service. 2023-03-08 not yet calculated CVE-2022-46752
MISC unisoc_technologies — multiple_products In wcn service, there is a possible missing params check. This could lead to local denial of service in wcn service. 2023-03-10 not yet calculated CVE-2022-47453
MISC unisoc_technologies — multiple_products In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. 2023-03-10 not yet calculated CVE-2022-47454
MISC unisoc_technologies — multiple_products In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. 2023-03-10 not yet calculated CVE-2022-47455
MISC unisoc_technologies — multiple_products In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. 2023-03-10 not yet calculated CVE-2022-47456
MISC unisoc_technologies — multiple_products In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. 2023-03-10 not yet calculated CVE-2022-47457
MISC unisoc_technologies — multiple_products In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. 2023-03-10 not yet calculated CVE-2022-47458
MISC unisoc_technologies — multiple_products In wlan driver, there is a possible missing params check. This could lead to local denial of service in wlan services. 2023-03-10 not yet calculated CVE-2022-47459
MISC unisoc_technologies — multiple_products In gpu device, there is a memory corruption due to a use after free. This could lead to local denial of service in kernel. 2023-03-10 not yet calculated CVE-2022-47460
MISC unisoc_technologies — multiple_products In telephone service, there is a missing permission check. This could lead to local escalation of privilege with system execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47461
MISC unisoc_technologies — multiple_products In telephone service, there is a missing permission check. This could lead to local escalation of privilege with system execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47462
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47471
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47472
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47473
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47474
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47475
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47476
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47477
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47478
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47479
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47480
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47481
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47482
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47483
MISC unisoc_technologies — multiple_products In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed. 2023-03-10 not yet calculated CVE-2022-47484
MISC sipe — yarix A cross-site scripting (XSS) vulnerability in the check_login function of SIPE s.r.l WI400 between version 8 and 11 included allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the f parameter. 2023-03-10 not yet calculated CVE-2022-48111
MISC
MISC
MISC c-ares — c-ares A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity. 2023-03-06 not yet calculated CVE-2022-4904
MISC
MISC
FEDORA ualbertalib — neosdiscovery A vulnerability was found in ualbertalib NEOSDiscovery 1.0.70 and classified as problematic. This issue affects some unknown processing of the file app/views/bookmarks/_refworks.html.erb. The manipulation leads to use of web link to untrusted target with window.opener access. The attack may be initiated remotely. Upgrading to version 1.0.71 is able to address this issue. The name of the patch is abe9f57123e0c278ae190cd7402a623d66c51375. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222287. 2023-03-05 not yet calculated CVE-2022-4927
MISC
MISC
MISC
MISC
MISC icplayer — icplayer A vulnerability was found in icplayer up to 0.819. It has been declared as problematic. Affected by this vulnerability is the function AddonText_Selection_create of the file addons/Text_Selection/src/presenter.js. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.820 is able to address this issue. The name of the patch is 2223628e6db1df73f6d633d2c0422d995990f0a3. It is recommended to upgrade the affected component. The identifier VDB-222289 was assigned to this vulnerability. 2023-03-06 not yet calculated CVE-2022-4928
MISC
MISC
MISC
MISC
MISC icplayer — icplayer A vulnerability was found in icplayer up to 0.818. It has been rated as problematic. Affected by this issue is some unknown functionality of the file addons/Commons/src/tts-utils.js. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 0.819 is able to address this issue. The name of the patch is fa785969f213c76384f1fe67d47b17d57fcc60c8. It is recommended to upgrade the affected component. VDB-222290 is the identifier assigned to this vulnerability. 2023-03-06 not yet calculated CVE-2022-4929
MISC
MISC
MISC
MISC
MISC syspass — syspass A vulnerability classified as problematic was found in nuxsmin sysPass up to 3.2.4. Affected by this vulnerability is an unknown functionality of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.5 is able to address this issue. The name of the patch is 4da4d031732ecca67519851fd0c34597dbb8ee55. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222319. 2023-03-06 not yet calculated CVE-2022-4930
MISC
MISC
MISC
MISC
MISC wordpress — wordpress The BackupWordPress plugin for WordPress is vulnerable to information disclosure in versions up to, and including 3.12. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up. 2023-03-07 not yet calculated CVE-2022-4931
MISC
MISC wordpress — wordpress The Total Upkeep plugin for WordPress is vulnerable to information disclosure in versions up to, and including 1.14.13. This is due to missing authorization on the heartbeat_received() function that triggers on WordPress heartbeat. This makes it possible for authenticated attackers, with subscriber-level permissions and above to retrieve back-up paths that can subsequently be used to download the back-up. 2023-03-07 not yet calculated CVE-2022-4932
MISC
MISC linux — kernel A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system. 2023-03-08 not yet calculated CVE-2023-0030
MISC
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 13.7 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A specially crafted Kroki diagram could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. 2023-03-09 not yet calculated CVE-2023-0050
CONFIRM
MISC
MISC wordpress — wordpress The eVision Responsive Column Layout Shortcodes WordPress plugin through 2.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. 2023-03-06 not yet calculated CVE-2023-0064
MISC wordpress — wordpress The Product GTIN (EAN, UPC, ISBN) for WooCommerce WordPress plugin through 1.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. 2023-03-06 not yet calculated CVE-2023-0068
MISC openharmony — openharmy The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, OpenHarmony-v3.0.7 and prior versions has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash. 2023-03-10 not yet calculated CVE-2023-0083
MISC proofpoint — enterprise_protection The webutils in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows an authenticated user to execute remote code through ‘eval injection’. This affects all versions 8.20.0 and below. 2023-03-08 not yet calculated CVE-2023-0089
MISC proofpoint — enterprise_protection The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through ‘eval injection’. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below. 2023-03-08 not yet calculated CVE-2023-0090
MISC okta — advanced_server_access_client Okta Advanced Server Access Client versions 1.13.1 through 1.65.0 are vulnerable to command injection due to the third party library webbrowser. An outdated library, webbrowser, used by the ASA client was found to be vulnerable to command injection. To exploit this issue, an attacker would need to phish the user to enter an attacker controlled server URL during enrollment. 2023-03-06 not yet calculated CVE-2023-0093
MISC nvidia — cuda_toolkit_sdk NVIDIA CUDA Toolkit SDK contains a vulnerability in cuobjdump, where a local user running the tool against a malicious binary may cause an out-of-bounds read, which may result in a limited denial of service and limited information disclosure. 2023-03-10 not yet calculated CVE-2023-0193
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 15.5 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. Non-project members could retrieve release descriptions via the API, even if the release visibility is restricted to project members only in the project settings. 2023-03-09 not yet calculated CVE-2023-0223
CONFIRM
MISC
MISC qemu — qemu A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free. 2023-03-06 not yet calculated CVE-2023-0330
MISC wordpress — wordpress The Scriptless Social Sharing WordPress plugin before 3.2.2 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. 2023-03-06 not yet calculated CVE-2023-0377
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 12.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible for a project maintainer to extract a Datadog integration API key by modifying the site. 2023-03-09 not yet calculated CVE-2023-0483
CONFIRM
MISC
MISC gigamon — gigavue-fm/gigavue-os The help page in GigaVUE-FM, when using GigaVUE-OS software version 5.0 202, does not require an authenticated user. An attacker could enforce a user into inserting malicious JavaScript code into the URI, that could lead to a Reflected Cross site Scripting. 2023-03-10 not yet calculated CVE-2023-0746
CONFIRM promis_process_company — inscada Improper Protection for Outbound Error Messages and Alert Signals vulnerability in ProMIS Process Co. InSCADA allows Account Footprinting.This issue affects inSCADA: before 20230115-1. 2023-03-06 not yet calculated CVE-2023-0839
MISC hashicorp — consul/consul_enterprise Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5. 2023-03-09 not yet calculated CVE-2023-0845
MISC meddata_informatics — meddatapacs Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in MedData Informatics MedDataPACS.This issue affects MedDataPACS : before 2023-03-03. 2023-03-06 not yet calculated CVE-2023-0979
MISC typora — typora A vulnerability, which was classified as critical, was found in Typora up to 1.5.5. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736. 2023-03-07 not yet calculated CVE-2023-1003
MISC
MISC
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 9.0 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible to trigger a resource depletion attack due to improper filtering for number of requests to read commits details. 2023-03-09 not yet calculated CVE-2023-1072
MISC
CONFIRM gitlab — gitlab_ce/ee An issue has been discovered in GitLab CE/EE affecting all versions before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A malicious project Maintainer may create a Project Access Token with Owner level privileges using a crafted request. 2023-03-09 not yet calculated CVE-2023-1084
MISC
MISC
CONFIRM alpata — licensed_warehousing_automation_system Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Alpata Licensed Warehousing Automation System allows Command Line Execution through SQL Injection.This issue affects Licensed Warehousing Automation System: through 2023.1.01. 2023-03-10 not yet calculated CVE-2023-1091
MISC wireshark — wireshark ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file 2023-03-06 not yet calculated CVE-2023-1161
CONFIRM
MISC
MISC ecshop — ecshop A vulnerability, which was classified as problematic, has been found in ECshop up to 4.1.8. Affected by this issue is some unknown functionality of the file admin/database.php of the component Backup Database Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222356. 2023-03-06 not yet calculated CVE-2023-1184
MISC
MISC
MISC ecshop — ecshop A vulnerability, which was classified as problematic, was found in ECshop up to 4.1.8. This affects an unknown part of the component New Product Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222357 was assigned to this vulnerability. 2023-03-06 not yet calculated CVE-2023-1185
MISC
MISC
MISC wisecleaner — wise_folder_hider A vulnerability was found in WiseCleaner Wise Folder Hider 4.4.3.202. It has been declared as problematic. Affected by this vulnerability is an unknown functionality in the library WiseFs64.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-222361 was assigned to this vulnerability. 2023-03-06 not yet calculated CVE-2023-1189
MISC
MISC
MISC saysis — starcities Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Saysis Starcities allows SQL Injection.This issue affects Starcities: through 1.3. 2023-03-10 not yet calculated CVE-2023-1198
MISC devolutions — server Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains. 2023-03-10 not yet calculated CVE-2023-1201
MISC devolutions — remote_desktop_manager_powershell_module Improper removal of sensitive data in the entry edit feature of Hub Business submodule in Devolutions Remote Desktop Manager PowerShell Module 2022.3.1.5 and earlier allows an authenticated user to access sensitive data on entries that were edited using the affected submodule. 2023-03-10 not yet calculated CVE-2023-1203
MISC netgear — nighthawk_wifi6_router NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 is vulnerable to cross-site request forgery attacks on all endpoints due to improperly implemented CSRF protections. 2023-03-10 not yet calculated CVE-2023-1205
MISC answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1237
CONFIRM
MISC answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1238
CONFIRM
MISC answerdev — answer Cross-site Scripting (XSS) – Reflected in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1239
MISC
CONFIRM answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1240
CONFIRM
MISC answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1241
CONFIRM
MISC answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1242
MISC
CONFIRM answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1243
MISC
CONFIRM answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1244
MISC
CONFIRM answerdev — answer Cross-site Scripting (XSS) – Stored in GitHub repository answerdev/answer prior to 1.0.6. 2023-03-07 not yet calculated CVE-2023-1245
CONFIRM
MISC saysis — starcities Files or Directories Accessible to External Parties vulnerability in Saysis Starcities allows Collect Data from Common Resource Locations.This issue affects Starcities: through 1.3. 2023-03-10 not yet calculated CVE-2023-1246
MISC pimcore — pimcore Cross-site Scripting (XSS) – Reflected in GitHub repository pimcore/pimcore prior to 11.0.0. 2023-03-07 not yet calculated CVE-2023-1247
MISC
CONFIRM akinsoft — wolvox Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Akinsoft Wolvox. This issue affects Wolvox: before 8.02.03. 2023-03-09 not yet calculated CVE-2023-1251
MISC sourcecodester — health_center_patient_record_management_system A vulnerability, which was classified as critical, was found in SourceCodester Health Center Patient Record Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222483. 2023-03-07 not yet calculated CVE-2023-1253
MISC
MISC
MISC sourcecodester — health_center_patient_record_management_system A vulnerability has been found in SourceCodester Health Center Patient Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file birthing_print.php. The manipulation of the argument birth_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222484. 2023-03-07 not yet calculated CVE-2023-1254
MISC
MISC
MISC moxa — uc_series An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system. 2023-03-07 not yet calculated CVE-2023-1257
MISC wordpress — wordpress The CMP – Coming Soon & Maintenance plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 4.1.6 via the cmp_get_post_detail function. This can allow unauthenticated individuals to obtain the contents of any non-password-protected, published post or page even when maintenance mode is enabled. 2023-03-07 not yet calculated CVE-2023-1263
MISC
MISC vim — vim NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1392. 2023-03-07 not yet calculated CVE-2023-1264
CONFIRM
MISC ulkem — pttem_kart Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Ulkem Company PtteM Kart.This issue affects PtteM Kart: before 2.1. 2023-03-08 not yet calculated CVE-2023-1267
MISC easyappointment — easyappointment Use of Hard-coded Credentials in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-03-08 not yet calculated CVE-2023-1269
CONFIRM
MISC btcpayserver — btcpayserver Command Injection in GitHub repository btcpayserver/btcpayserver prior to 1.8.3. 2023-03-08 not yet calculated CVE-2023-1270
MISC
CONFIRM sourcecodester — phone_shop_sales_managements_system A vulnerability classified as problematic was found in SourceCodester Phone Shop Sales Managements System 1.0. This vulnerability affects unknown code of the file /osms/assets/plugins/jquery-validation-1.11.1/demo/captcha/index.php of the component CAPTCHA Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222598 is the identifier assigned to this vulnerability. 2023-03-08 not yet calculated CVE-2023-1275
MISC
MISC
MISC sul1ss_shop — sul1ss_shop A vulnerability, which was classified as critical, has been found in SUL1SS_shop. This issue affects some unknown processing of the file applicationmerchcontrollerOrder.php. The manipulation of the argument keyword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222599. 2023-03-08 not yet calculated CVE-2023-1276
MISC
MISC
MISC kylin — kylin-system-updater A vulnerability, which was classified as critical, was found in kylin-system-updater up to 1.4.20kord. Affected is the function InstallSnap of the component Update Handler. The manipulation leads to command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222600. 2023-03-08 not yet calculated CVE-2023-1277
MISC
MISC
MISC ibos — ibos A vulnerability, which was classified as problematic, has been found in IBOS up to 4.5.5. Affected by this issue is some unknown functionality of the file mobil/index.php. The manipulation of the argument accesstoken leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-222608. 2023-03-08 not yet calculated CVE-2023-1278
MISC
MISC
MISC qwik — qwik Code Injection in GitHub repository builderio/qwik prior to 0.21.0. 2023-03-08 not yet calculated CVE-2023-1283
CONFIRM
MISC pimcore — pimcore Cross-site Scripting (XSS) – Stored in GitHub repository pimcore/pimcore prior to 10.5.19. 2023-03-09 not yet calculated CVE-2023-1286
CONFIRM
MISC dassault_systèmes — enovia_live_collaboration An XSL template vulnerability in ENOVIA Live Collaboration V6R2013xE allows Remote Code Execution. 2023-03-09 not yet calculated CVE-2023-1287
MISC dassault_systèmes — enovia_live_collaboration An XML External Entity injection (XXE) vulnerability in ENOVIA Live Collaboration V6R2013xE allows Remote File inclusions. 2023-03-09 not yet calculated CVE-2023-1288
MISC sourcecodester — sales_tracker_management_system A vulnerability, which was classified as critical, has been found in SourceCodester Sales Tracker Management System 1.0. Affected by this issue is some unknown functionality of the file admin/clients/view_client.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222644. 2023-03-09 not yet calculated CVE-2023-1290
MISC
MISC
MISC sourcecodester — sales_tracker_management_system A vulnerability, which was classified as critical, was found in SourceCodester Sales Tracker Management System 1.0. This affects an unknown part of the file admin/clients/manage_client.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222645 was assigned to this vulnerability. 2023-03-09 not yet calculated CVE-2023-1291
MISC
MISC
MISC sourcecodester — sales_tracker_management_system A vulnerability has been found in SourceCodester Sales Tracker Management System 1.0 and classified as critical. This vulnerability affects the function delete_client of the file classes/Master.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222646 is the identifier assigned to this vulnerability. 2023-03-09 not yet calculated CVE-2023-1292
MISC
MISC
MISC sourcecodester — online_graduate_tracer_system A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects the function mysqli_query of the file admin_cs.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222647. 2023-03-09 not yet calculated CVE-2023-1293
MISC
MISC
MISC dester — file_tracker_manager_system A vulnerability was found in SourceCodester File Tracker Manager System 1.0. It has been classified as critical. Affected is an unknown function of the file /file_manager/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222648. 2023-03-09 not yet calculated CVE-2023-1294
MISC
MISC
MISC sourcecodester — covid_19_testing_management_system A vulnerability classified as critical was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file patient-report.php of the component POST Parameter Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222661 was assigned to this vulnerability. 2023-03-09 not yet calculated CVE-2023-1300
MISC
MISC
MISC sourcecodester — friendly_island_pizza_website_and_ordering_system A vulnerability, which was classified as critical, has been found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this issue is some unknown functionality of the file deleteorder.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222662 is the identifier assigned to this vulnerability. 2023-03-09 not yet calculated CVE-2023-1301
MISC
MISC
MISC sourcecodester — file_tracker_management_system A vulnerability, which was classified as problematic, was found in SourceCodester File Tracker Manager System 1.0. This affects an unknown part of the file normal/borrow1.php. The manipulation of the argument id with the input 1″><script>alert(1111)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222663. 2023-03-09 not yet calculated CVE-2023-1302
MISC
MISC
MISC ucms — ucms A vulnerability was found in UCMS 1.6 and classified as critical. This issue affects some unknown processing of the file sadmin/fileedit.php of the component System File Management Module. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-222683. 2023-03-09 not yet calculated CVE-2023-1303
MISC
MISC
MISC froxlor — froxlor Authentication Bypass by Primary Weakness in GitHub repository froxlor/froxlor prior to 2.0.13. 2023-03-10 not yet calculated CVE-2023-1307
MISC
CONFIRM sourcecodester — online_graduate_tracer_system A vulnerability classified as critical has been found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/adminlog.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222696. 2023-03-10 not yet calculated CVE-2023-1308
MISC
MISC
MISC sourcecodester — online_graduate_tracer_system A vulnerability classified as critical was found in SourceCodester Online Graduate Tracer System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/search_it.php. The manipulation of the argument input leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222697 was assigned to this vulnerability. 2023-03-10 not yet calculated CVE-2023-1309
MISC
MISC
MISC sourcecodester — online_graduate_tracer_system A vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. Affected by this issue is some unknown functionality of the file admin/prof.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222698 is the identifier assigned to this vulnerability. 2023-03-10 not yet calculated CVE-2023-1310
MISC
MISC
MISC sourcecodester — friendly_island_pizza_website_and_ordering_system A vulnerability, which was classified as critical, was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. This affects an unknown part of the file large.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222699. 2023-03-10 not yet calculated CVE-2023-1311
MISC
MISC
MISC pimcore — pimcore Cross-site Scripting (XSS) – Reflected in GitHub repository pimcore/pimcore prior to 10.5.19. 2023-03-10 not yet calculated CVE-2023-1312
CONFIRM
MISC cockpit-hq — cockpit Unrestricted Upload of File with Dangerous Type in GitHub repository cockpit-hq/cockpit prior to 2.4.1. 2023-03-10 not yet calculated CVE-2023-1313
CONFIRM
MISC lmxcms — lmxcms A vulnerability has been found in lmxcms 1.41 and classified as critical. Affected by this vulnerability is the function update of the file AcquisiAction.class.php. The manipulation of the argument id with the input -1 and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222727. 2023-03-10 not yet calculated CVE-2023-1321
MISC
MISC lmxcms — lmxcms A vulnerability was found in lmxcms 1.41 and classified as critical. Affected by this issue is the function reply of the file BookAction.class.php. The manipulation of the argument id with the input 1) and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222728. 2023-03-10 not yet calculated CVE-2023-1322
MISC
MISC guizhou — 115cms A vulnerability was found in Guizhou 115cms 4.2. It has been classified as problematic. Affected is an unknown function of the file /admin/content/index. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222738 is the identifier assigned to this vulnerability. 2023-03-10 not yet calculated CVE-2023-1328
MISC
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_page_cache function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete the plugin’s cache. 2023-03-10 not yet calculated CVE-2023-1333
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the queue_posts function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify the plugin’s cache. 2023-03-10 not yet calculated CVE-2023-1334
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the ucss_connect function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to connect a new license key to the site. 2023-03-10 not yet calculated CVE-2023-1335
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check on the ajax_deactivate function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to disable caching. 2023-03-10 not yet calculated CVE-2023-1336
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files. 2023-03-10 not yet calculated CVE-2023-1337
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the attach_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify cache rules. 2023-03-10 not yet calculated CVE-2023-1338
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check on the uucss_update_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to update caching rules. 2023-03-10 not yet calculated CVE-2023-1339
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_uucss_logs function. This makes it possible for unauthenticated attackers to clear plugin logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-10 not yet calculated CVE-2023-1340
MISC
MISC wordpress — wordpress
  The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ajax_deactivate function. This makes it possible for unauthenticated attackers to turn off caching via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-10 not yet calculated CVE-2023-1341
MISC
MISC wordpress — wordpress
  The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ucss_connect function. This makes it possible for unauthenticated attackers to connect the site to a new license key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-10 not yet calculated CVE-2023-1342
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the attach_rule function. This makes it possible for unauthenticated attackers to modify the plugin’s cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-10 not yet calculated CVE-2023-1343
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the uucss_update_rule function. This makes it possible for unauthenticated attackers to modify the plugin’s cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-10 not yet calculated CVE-2023-1344
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the queue_posts function. This makes it possible for unauthenticated attackers to modify the plugin’s cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-10 not yet calculated CVE-2023-1345
MISC
MISC wordpress — wordpress The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_page_cache function. This makes it possible for unauthenticated attackers to clear the plugin’s cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. 2023-03-10 not yet calculated CVE-2023-1346
MISC
MISC hsycms — hsycms A vulnerability, which was classified as problematic, has been found in Hsycms 3.1. Affected by this issue is some unknown functionality of the file controllercate.php of the component Add Category Module. The manipulation of the argument title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222842 is the identifier assigned to this vulnerability. 2023-03-11 not yet calculated CVE-2023-1349
MISC
MISC
MISC

liferea — liferea

A vulnerability was found in liferea. It has been rated as critical. Affected by this issue is the function update_job_run of the file src/update.c of the component Feed Enrichment. The manipulation of the argument source with the input |date &gt;/tmp/bad-item-link.txt leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222848. 2023-03-11 not yet calculated CVE-2023-1350
MISC
MISC
MISC

sourcecodester — computer_parts_sales_and_inventory_system

A vulnerability classified as critical has been found in SourceCodester Computer Parts Sales and Inventory System 1.0. This affects an unknown part of the file cust_transac.php. The manipulation of the argument phonenumber leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222849 was assigned to this vulnerability. 2023-03-11 not yet calculated CVE-2023-1351
MISC
MISC
MISC

sourcecodester — design_and_implementation_of_covid_19_directory_on_vaccination_system

A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851. 2023-03-11 not yet calculated CVE-2023-1352
MISC
MISC
MISC

sourcecodester — design_and_implementation_of_covid_19_directory_on_vaccination_system

A vulnerability, which was classified as problematic, was found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. Affected is an unknown function of the file verification.php. The manipulation of the argument txtvaccinationID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222852. 2023-03-11 not yet calculated CVE-2023-1353
MISC
MISC
MISC

sourcecodester — design_and_implementation_of_covid_19_directory_on_vaccination_system

A vulnerability has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file register.php. The manipulation of the argument txtfullname/txtage/txtaddress/txtphone leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222853 was assigned to this vulnerability. 2023-03-11 not yet calculated CVE-2023-1354
MISC
MISC
MISC

vim — vim

NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1402. 2023-03-11 not yet calculated CVE-2023-1355
MISC
CONFIRM

cisco — ios_xr_software_for_asr9000_series_routers

A vulnerability in the bidirectional forwarding detection (BFD) hardware offload feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of malformed BFD packets that are received on line cards where the BFD hardware offload feature is enabled. An attacker could exploit this vulnerability by sending a crafted IPv4 BFD packet to an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset, resulting in loss of traffic over that line card while the line card reloads. 2023-03-09 not yet calculated CVE-2023-20049
CISCO

cisco — ios_xr_software

A vulnerability in the GRand Unified Bootloader (GRUB) for Cisco IOS XR Software could allow an unauthenticated attacker with physical access to the device to view sensitive files on the console using the GRUB bootloader command line. This vulnerability is due to the inclusion of unnecessary commands within the GRUB environment that allow sensitive files to be viewed. An attacker could exploit this vulnerability by being connected to the console port of the Cisco IOS XR device when the device is power-cycled. A successful exploit could allow the attacker to view sensitive files that could be used to conduct additional attacks against the device. 2023-03-09 not yet calculated CVE-2023-20064
CISCO

openharmony — openharmony

The kernel subsystem hmdfs within OpenHarmony-v3.1.5 and prior versions has an arbitrary memory accessing vulnerability which network attackers can launch a remote attack to obtain kernel memory data of the target system. 2023-03-10 not yet calculated CVE-2023-22301
MISC

dos_company_limited — ss1/rakuraku_pc_cloud_agent

Improper access control vulnerability in SS1 Ver.13.0.0.40 and earlier and Rakuraku PC Cloud Agent Ver.2.1.8 and earlier allows a remote attacker to bypass access restriction and download an arbitrary file of the directory where the product runs. As a result of exploiting this vulnerability with CVE-2023-22336 and CVE-2023-22344 vulnerabilities together, it may allow a remote attacker to execute an arbitrary code with SYSTEM privileges by sending a specially crafted script to the affected device. 2023-03-06 not yet calculated CVE-2023-22335
MISC
MISC

dos_company_limited — ss1/rakuraku_pc_cloud_agent

Path traversal vulnerability in SS1 Ver.13.0.0.40 and earlier and Rakuraku PC Cloud Agent Ver.2.1.8 and earlier allows a remote attacker to upload a specially crafted file to an arbitrary directory. As a result of exploiting this vulnerability with CVE-2023-22335 and CVE-2023-22344 vulnerabilities together, it may allow a remote attacker to execute an arbitrary code with SYSTEM privileges by sending a specially crafted script to the affected device. 2023-03-06 not yet calculated CVE-2023-22336
MISC
MISC

dos_company_limited — ss1/rakuraku_pc_cloud_agent

Use of hard-coded credentials vulnerability in SS1 Ver.13.0.0.40 and earlier and Rakuraku PC Cloud Agent Ver.2.1.8 and earlier allows a remote attacker to obtain the password of the debug tool and execute it. As a result of exploiting this vulnerability with CVE-2023-22335 and CVE-2023-22336 vulnerabilities together, it may allow a remote attacker to execute an arbitrary code with SYSTEM privileges by sending a specially crafted script to the affected device. 2023-03-06 not yet calculated CVE-2023-22344
MISC
MISC jtekt_electronics_corporation — kostac_plc_programming_software Out-of-bounds read vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.9.0 and earlier. When processing a comment block in stage information, the end of data cannot be verified and out-of-bounds read occurs. As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution. 2023-03-06 not yet calculated CVE-2023-22419
MISC
MISC
MISC jtekt_electronics_corporation — kostac_plc_programming_software Out-of-bounds read vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.9.0 and earlier. The insufficient buffer size for the PLC program instructions leads to out-of-bounds read. As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution. 2023-03-06 not yet calculated CVE-2023-22421
MISC
MISC
MISC jtekt_electronics_corporation — kostac_plc_programming_software Use-after-free vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.9.0 and earlier. With the abnormal value given as the maximum number of columns for the PLC program, the process accesses the freed memory. As a result, opening a specially crafted project file may lead to information disclosure and/or arbitrary code execution. 2023-03-06 not yet calculated CVE-2023-22424
MISC
MISC
MISC

web2py — web2py

Open redirect vulnerability exists in web2py versions prior to 2.23.1. When using the tool, a web2py user may be redirected to an arbitrary website by accessing a specially crafted URL. As a result, the user may become a victim of a phishing attack. 2023-03-06 not yet calculated CVE-2023-22432
MISC
MISC
MISC

openharmony — openharmony

The kernel subsystem function check_permission_for_set_tokenid within OpenHarmony-v3.1.5 and prior versions has an UAF vulnerability which local attackers can exploit this vulnerability to escalate the privilege to root. 2023-03-10 not yet calculated CVE-2023-22436
MISC

ec_cube — 4_series

Cross-site scripting vulnerability in Contents Management of EC-CUBE 4 series (EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0), EC-CUBE 3 series (EC-CUBE 3.0.0 to 3.0.18-p5), and EC-CUBE 2 series (EC-CUBE 2.11.0 to 2.11.5, EC-CUBE 2.12.0 to 2.12.6, EC-CUBE 2.13.0 to 2.13.5, and EC-CUBE 2.17.0 to 2.17.2) allows a remote authenticated attacker to inject an arbitrary script. 2023-03-06 not yet calculated CVE-2023-22438
MISC
MISC
MISC
MISC

freshrss — freshrss

FreshRSS is a self-hosted RSS feed aggregator. When using the greader API, the provided password is logged in clear in `users/_/log_api.txt` in the case where the authentication fails. The issues occurs in `authorizationToUser()` in `greader.php`. If there is an issue with the request or the credentials, `unauthorized()` or `badRequest()` is called. Both these functions are printing the return of `debugInfo()` in the logs. `debugInfo()` will return the content of the request. By default, this will be saved in `users/_/log_api.txt` and if the const `COPY_LOG_TO_SYSLOG` is true, in syslogs as well. Exploiting this issue requires having access to logs produced by FreshRSS. Using the information from the logs, a malicious individual could get users’ API keys (would be displayed if the users fills in a bad username) or passwords. 2023-03-06 not yet calculated CVE-2023-22481
MISC
MISC

ec_cube — 4_series

Cross-site scripting vulnerability in Product List Screen and Product Detail Screen of EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0 allows a remote authenticated attacker to inject an arbitrary script. 2023-03-06 not yet calculated CVE-2023-22838
MISC
MISC

pg_ivm — pg_ivm

Information disclosure vulnerability exists in pg_ivm versions prior to 1.5.1. An Incrementally Maintainable Materialized View (IMMV) created by pg_ivm may reflect rows with Row-Level Security that the owner of the IMMV should not have access to. As a result, information in tables protected by Row-Level Security may be retrieved by a user who is not authorized to access it. 2023-03-07 not yet calculated CVE-2023-22847
MISC
MISC
MISC

blog_engine.net — blog_engine.net

An Improper Access Control vulnerability in BlogEngine.NET 3.3.8.0, allows unauthenticated visitors to access the files of unpublished blogs. 2023-03-06 not yet calculated CVE-2023-22858
MISC

smartbear — zephr_enterprise

SmartBear Zephyr Enterprise through 7.15.0 mishandles user-defined input during report generation. This could lead to remote code execution by unauthenticated users. 2023-03-08 not yet calculated CVE-2023-22889
MISC

smartbear — zephr_enterprise

SmartBear Zephyr Enterprise through 7.15.0 allows unauthenticated users to upload large files, which could exhaust the local drive space, causing a denial of service condition. 2023-03-08 not yet calculated CVE-2023-22890
MISC

smartbear — zephr_enterprise

There exists a privilege escalation vulnerability in SmartBear Zephyr Enterprise through 7.15.0 that could be exploited by authorized users to reset passwords for other accounts. 2023-03-08 not yet calculated CVE-2023-22891
MISC

smartbear — zephr_enterprise

There exists an information disclosure vulnerability in SmartBear Zephyr Enterprise through 7.15.0 that could be exploited by unauthenticated users to read arbitrary files from Zephyr instances. 2023-03-08 not yet calculated CVE-2023-22892
MISC

avantfax — avantfax

A Stored Cross-Site Scripting (XSS) vulnerability exists in AvantFAX 3.3.7. An authenticated low privilege user can inject arbitrary Javascript into their e-mail address which is executed when an administrator logs into AvantFAX to view the admin dashboard. This may result in stealing an administrator’s session cookie and hijacking their session. 2023-03-10 not yet calculated CVE-2023-23326
MISC
MISC

avantfax — avantfax

An Information Disclosure vulnerability exists in AvantFAX 3.3.7. Backups of the AvantFAX sent/received faxes, and database backups are stored using the current date as the filename and hosted on the web server without access controls. 2023-03-10 not yet calculated CVE-2023-23327
MISC
MISC

avantfax — avantfax

A File Upload vulnerability exists in AvantFAX 3.3.7. An authenticated user can bypass PHP file type validation in FileUpload.php by uploading a specially crafted PHP file. 2023-03-10 not yet calculated CVE-2023-23328
MISC
MISC

pg_ivm — pg_ivm

Uncontrolled search path element vulnerability exists in pg_ivm versions prior to 1.5.1. When refreshing an IMMV, pg_ivm executes functions without specifying schema names. Under certain conditions, pg_ivm may be tricked to execute unexpected functions from other schemas with the IMMV owner’s privilege. If this vulnerability is exploited, an unexpected function provided by an attacker may be executed with the privilege of the materialized view owner. 2023-03-07 not yet calculated CVE-2023-23554
MISC
MISC
MISC apache — dubbo A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions. 2023-03-08 not yet calculated CVE-2023-23638
MISC github — enterprise_server A path traversal vulnerability was identified in GitHub Enterprise Server that allowed remote code execution when building a GitHub Pages site. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to versions 3.8 and was fixed in versions 3.7.7, 3.6.10, 3.5.14, and 3.4.17. This vulnerability was reported via the GitHub Bug Bounty program. 2023-03-08 not yet calculated CVE-2023-23760
MISC
MISC
MISC
MISC fortinet — fortianalyzer An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4 and 6.4.0 through 6.4.10 may allow a remote authenticated attacker to read the client machine password in plain text in a heartbeat response when a log-fetch request is made from the FortiAnalyzer 2023-03-07 not yet calculated CVE-2023-23776
MISC rocket.chat — rocket.chat An improper access control vulnerability exists prior to v6 that could allow an attacker to break the E2E encryption of a chat room by a user changing the group key of a chat room. 2023-03-10 not yet calculated CVE-2023-23911
MISC azure — setup-kubectl Azure/setup-kubectl is a GitHub Action for installing Kubectl. This vulnerability only impacts versions before version 3. An insecure temporary creation of a file allows other actors on the Actions runner to replace the Kubectl binary created by this action because it is world writable. This Kubectl tool installer runs `fs.chmodSync(kubectlPath, 777)` to set permissions on the Kubectl binary, however, this allows any local user to replace the Kubectl binary. This allows privilege escalation to the user that can also run kubectl, most likely root. This attack is only possible if an attacker somehow breached the GitHub actions runner or if a user is utilizing an Action that maliciously executes this attack. This has been fixed and released in all versions `v3` and later. 775 permissions are used instead. Users are advised to upgrade. There are no known workarounds for this issue. 2023-03-06 not yet calculated CVE-2023-23939
MISC
MISC agilebio — electronic_lab_notebook AgileBio Electronic Lab Notebook v4.234 was discovered to contain a local file inclusion vulnerability. 2023-03-06 not yet calculated CVE-2023-24217
MISC
MISC poly/hp — trio An arbitrary file upload vulnerability in Poly Trio 8800 7.2.2.1094 allows attackers to execute arbitrary code via a crafted ringtone file. 2023-03-08 not yet calculated CVE-2023-24282
MISC
MISC openharmony — openharmony Communication Wi-Fi subsystem within OpenHarmony-v3.1.4 and prior versions, OpenHarmony-v3.0.7 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause the current application to crash. 2023-03-10 not yet calculated CVE-2023-24465
MISC go — p256 The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh. 2023-03-08 not yet calculated CVE-2023-24532
MISC
MISC
MISC
MISC go — p256 Multiplication of certain unreduced P-256 scalars produce incorrect results. There are no protocols known at this time that can be attacked due to this. 2023-03-08 not yet calculated CVE-2023-24533
MISC
MISC
MISC phpipam — phpipam phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php. 2023-03-08 not yet calculated CVE-2023-24657
MISC pmb — pmb PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950_new.php. 2023-03-06 not yet calculated CVE-2023-24733
MISC pmb — pmb An arbitrary file upload vulnerability in the camera_upload.php component of PMB v7.4.6 allows attackers to execute arbitrary code via a crafted image file. 2023-03-06 not yet calculated CVE-2023-24734
MISC pmb — pmb PMB v7.4.6 was discovered to contain an open redirect vulnerability via the component /opac_css/pmb.php. This vulnerability allows attackers to redirect victim users to an external domain via a crafted URL. 2023-03-06 not yet calculated CVE-2023-24735
MISC pmb — pmb PMB v7.4.6 was discovered to contain a remote code execution (RCE) vulnerability via the component /sauvegarde/restaure_act.php. 2023-03-06 not yet calculated CVE-2023-24736
MISC pmb — pmb PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950.php. 2023-03-06 not yet calculated CVE-2023-24737
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/list. 2023-03-08 not yet calculated CVE-2023-24773
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at controllerauthAuth.php. 2023-03-10 not yet calculated CVE-2023-24774
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at memberMember.php. 2023-03-07 not yet calculated CVE-2023-24775
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component controllerAddon.php. 2023-03-06 not yet calculated CVE-2023-24776
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/list. 2023-03-08 not yet calculated CVE-2023-24777
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/table/columns. 2023-03-08 not yet calculated CVE-2023-24780
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the selectFields parameter at memberMemberLevel.php. 2023-03-07 not yet calculated CVE-2023-24781
MISC funadmin — funadmin Funadmin v3.2.0 was discovered to contain a SQL injection vulnerability via the id parameter at /databases/database/edit. 2023-03-08 not yet calculated CVE-2023-24782
MISC ibm — spectrum_symphony IBM Spectrum Symphony 7.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 247030. 2023-03-10 not yet calculated CVE-2023-24975
MISC
MISC hashicorp — vault/vault_enterprise HashiCorp Vault and Vault Enterprise’s approle auth method allowed any authenticated user with access to an approle destroy endpoint to destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability is fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above. 2023-03-11 not yet calculated CVE-2023-24999
MISC ec-cube — 4_series Cross-site scripting vulnerability in Authentication Key Settings of EC-CUBE 4.0.0 to 4.0.6-p2, EC-CUBE 4.1.0 to 4.1.2-p1, and EC-CUBE 4.2.0 allows a remote authenticated attacker to inject an arbitrary script. 2023-03-06 not yet calculated CVE-2023-25077
MISC
MISC trend_micro — apex_one_server An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products. 2023-03-10 not yet calculated CVE-2023-25143
MISC trend_micro — apex_one An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership. 2023-03-10 not yet calculated CVE-2023-25144
MISC
MISC trend_micro — apex_one A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. 2023-03-10 not yet calculated CVE-2023-25145
MISC
MISC trend_micro — apex_one A security agent link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to quarantine a file, delete the original folder and replace with a junction to an arbitrary location, ultimately leading to an arbitrary file dropped to an arbitrary location. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. 2023-03-10 not yet calculated CVE-2023-25146
MISC
MISC trend_micro — apex_one An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process. Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this. 2023-03-10 not yet calculated CVE-2023-25147
MISC trend_micro — apex_one A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. 2023-03-10 not yet calculated CVE-2023-25148
MISC
MISC discourse — discourse-yearly-review discourse-yearly-review is a discourse plugin which publishes an automated Year in Review topic. In affected versions a user present in a yearly review topic that is then anonymised will still have some data linked to its original account. This issue has been patched in commit `b3ab33bbf7` which is included in the latest version of the Discourse Yearly Review plugin. Users are advised to upgrade. Users unable to upgrade may disable the `yearly_review_enabled` setting to fully mitigate the issue. Also, it’s possible to edit the anonymised user’s old data in the yearly review topics manually. 2023-03-06 not yet calculated CVE-2023-25169
MISC
MISC crmeb — crmeb CRMEB <=1.3.4 is vulnerable to SQL Injection via /api/admin/user/list. 2023-03-07 not yet calculated CVE-2023-25223
MISC loonflow — loonflow loonflow r2.0.14 is vulnerable to server-side request forgery (SSRF). 2023-03-07 not yet calculated CVE-2023-25230
MISC prism_launcher — prism_launcher Prism Launcher <= 6.1 is vulnerable to Directory Traversal. 2023-03-06 not yet calculated CVE-2023-25304
MISC totolink — a7100ru TOTOlink A7100RU V7.4cu.2313_B20191024 router has a command injection vulnerability. 2023-03-08 not yet calculated CVE-2023-25395
MISC metersphere — metersphere metersphere is an open source continuous testing platform. In affected versions an improper access control vulnerability exists in `/api/jmeter/download/files`, which allows any user to download any file without authentication. This issue may expose all files available to the running process. This issue has been addressed in version 1.20.20 lts and 2.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-03-09 not yet calculated CVE-2023-25573
MISC fortinet — fortisoar A improper access control vulnerability in Fortinet FortiSOAR 7.3.0 – 7.3.1 allows an attacker authenticated on the administrative interface to perform unauthorized actions via crafted HTTP requests. 2023-03-07 not yet calculated CVE-2023-25605
MISC fortinet — fortianalyzer A improper neutralization of formula elements in a CSV file vulnerability in Fortinet FortiAnalyzer 6.4.0 – 6.4.9, 7.0.0 – 7.0.5, and 7.2.0 – 7.2.1 allows local attacker to execute unauthorized code or commands via inserting spreadsheet formulas in macro names. 2023-03-07 not yet calculated CVE-2023-25611
MISC apache — http_server Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule “^/here/(.*)” “http://example.com:8080/elsewhere?$1”; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server. 2023-03-07 not yet calculated CVE-2023-25690
MISC metersphere — metersphere metersphere is an open source continuous testing platform. In versions prior to 2.7.1 a user who has permission to create a resource file through UI operations is able to append a path to their submission query which will be read by the system and displayed to the user. This allows a users of the system to read arbitrary files on the filesystem of the server so long as the server process itself has permission to read the requested files. This issue has been addressed in version 2.7.1. All users are advised to upgrade. There are no known workarounds for this issue. 2023-03-09 not yet calculated CVE-2023-25814
MISC openharmony — openharmony The bundle management subsystem within OpenHarmony-v3.1.4 and prior versions has a null pointer reference vulnerability which local attackers can exploit this vulnerability to cause a DoS attack to the system when installing a malicious HAP package. 2023-03-10 not yet calculated CVE-2023-25947
MISC docker — buildkit BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In affected versions when the user sends a build request that contains a Git URL that contains credentials and the build creates a provenance attestation describing that build, these credentials could be visible from the provenance attestation. Git URL can be passed in two ways: 1) Invoking build directly from a URL with credentials. 2) If the client sends additional version control system (VCS) info hint parameters on builds from a local source. Usually, that would mean reading the origin URL from `.git/config` file. When a build is performed under specific conditions where credentials were passed to BuildKit they may be visible to everyone who has access to provenance attestation. Provenance attestations and VCS info hints were added in version v0.11.0. Previous versions are not vulnerable. In v0.10, when building directly from Git URL, the same URL could be visible in `BuildInfo` structure that is a predecessor of Provenance attestations. Previous versions are not vulnerable. This bug has been fixed in v0.11.4. Users are advised to upgrade. Users unable to upgrade may disable VCS info hints by setting `BUILDX_GIT_INFO=0`. `buildctl` does not set VCS hints based on `.git` directory, and values would need to be passed manually with `–opt`. 2023-03-06 not yet calculated CVE-2023-26054
MISC
MISC samsung — multiple_products An issue was discovered in Samsung Mobile Chipset and Baseband Modem Chipset for Exynos 850, Exynos 980, Exynos 1080, Exynos 1280, Exynos 2200, Exynos Modem 5123, Exynos Modem 5300, Exynos Auto T5123, and Exynos W920. An intra-object overflow in the 5G MM message codec can occur due to insufficient parameter validation when decoding the Service Area List. 2023-03-10 not yet calculated CVE-2023-26075
MISC
MISC
MISC snyk — snyk All versions of the package node-bluetooth-serial-port are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation. 2023-03-09 not yet calculated CVE-2023-26109
MISC snyk — snyk All versions of the package node-bluetooth are vulnerable to Buffer Overflow via the findSerialPortChannel method due to improper user input length validation. 2023-03-09 not yet calculated CVE-2023-26110
MISC fortinet — multiple_products A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiAuthenticator 6.4.x and before allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form. 2023-03-09 not yet calculated CVE-2023-26208
MISC fortinet — multiple_products A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiDeceptor 3.1.x and before allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form. 2023-03-09 not yet calculated CVE-2023-26209
MISC ubika — waap gateway/cloud In UBIKA WAAP Gateway/Cloud through 6.10, a blind XPath injection leads to an authentication bypass by stealing the session of another connected user. The fixed versions are WAAP Gateway & Cloud 6.11.0 and 6.5.6-patch15. 2023-03-08 not yet calculated CVE-2023-26261
MISC
MISC go — gosaml2
  gosaml2 is a Pure Go implementation of SAML 2.0. SAML Service Providers using this library for SAML authentication support are likely susceptible to Denial of Service attacks. A bug in this library enables attackers to craft a `deflate`-compressed request which will consume significantly more memory during processing than the size of the original request. This may eventually lead to memory exhaustion and the process being killed. The maximum compression ratio achievable with `deflate` is 1032:1, so by limiting the size of bodies passed to gosaml2, limiting the rate and concurrency of calls, and ensuring that lots of memory is available to the process it _may_ be possible to help Go’s garbage collector “keep up”. Implementors are encouraged not to rely on this. This issue is fixed in version 0.9.0. 2023-03-03 not yet calculated CVE-2023-26483
MISC
MISC
MISC
MISC wasmtime — wasmtime wasmtime is a fast and secure runtime for WebAssembly. In affected versions wasmtime’s code generator, Cranelift, has a bug on x86_64 targets where address-mode computation mistakenly would calculate a 35-bit effective address instead of WebAssembly’s defined 33-bit effective address. This bug means that, with default codegen settings, a wasm-controlled load/store operation could read/write addresses up to 35 bits away from the base of linear memory. Due to this bug, however, addresses up to `0xffffffff * 8 + 0x7ffffffc = 36507222004 = ~34G` bytes away from the base of linear memory are possible from guest code. This means that the virtual memory 6G away from the base of linear memory up to ~34G away can be read/written by a malicious module. A guest module can, without the knowledge of the embedder, read/write memory in this region. The memory may belong to other WebAssembly instances when using the pooling allocator, for example. Affected embedders are recommended to analyze preexisting wasm modules to see if they’re affected by the incorrect codegen rules and possibly correlate that with an anomalous number of traps during historical execution to locate possibly suspicious modules. The specific bug in Cranelift’s x86_64 backend is that a WebAssembly address which is left-shifted by a constant amount from 1 to 3 will get folded into x86_64’s addressing modes which perform shifts. For example `(i32.load (i32.shl (local.get 0) (i32.const 3)))` loads from the WebAssembly address `$local0 << 3`. When translated to Cranelift the `$local0 << 3` computation, a 32-bit value, is zero-extended to a 64-bit value and then added to the base address of linear memory. Cranelift would generate an instruction of the form `movl (%base, %local0, 8), %dst` which calculates `%base + %local0 << 3`. The bug here, however, is that the address computation happens with 64-bit values, where the `$local0 << 3` computation was supposed to be truncated to a a 32-bit value. This means that `%local0`, which can use up to 32-bits for an address, gets 3 extra bits of address space to be accessible via this `movl` instruction. The fix in Cranelift is to remove the erroneous lowering rules in the backend which handle these zero-extended expression. The above example is then translated to `movl %local0, %temp; shl $3, %temp; movl (%base, %temp), %dst` which correctly truncates the intermediate computation of `%local0 << 3` to 32-bits inside the `%temp` register which is then added to the `%base` value. Wasmtime version 4.0.1, 5.0.1, and 6.0.1 have been released and have all been patched to no longer contain the erroneous lowering rules. While updating Wasmtime is recommended, there are a number of possible workarounds that embedders can employ to mitigate this issue if updating is not possible. Note that none of these workarounds are on-by-default and require explicit configuration: 1. The `Config::static_memory_maximum_size(0)` option can be used to force all accesses to linear memory to be explicitly bounds-checked. This will perform a bounds check separately from the address-mode computation which correctly calculates the effective address of a load/store. Note that this can have a large impact on the execution performance of WebAssembly modules. 2. The `Config::static_memory_guard_size(1 << 36)` option can be used to greatly increase the guard pages placed after linear memory. This will guarantee that memory accesses up-to-34G away are guaranteed to be semantically correct by reserving unmapped memory for the instance. Note that this reserves a very large amount of virtual memory per-instances and can greatly reduce the maximum number of concurrent instances being run. 3. If using a non-x86_64 host is possible, then that will also work around this bug. This bug does not affect Wasmtime’s or Cranelift’s AArch64 backend, for example. 2023-03-08 not yet calculated CVE-2023-26489
MISC
MISC
MISC
MISC
MISC rsshub — rsshub RSSHub is an open source and extensible RSS feed generator. When the URL parameters contain certain special characters, it returns an error page that does not properly handle XSS vulnerabilities, allowing for the execution of arbitrary JavaScript code. Users who access the deliberately constructed URL are affected. This vulnerability was fixed in version c910c4d28717fb860fbe064736641f379fab2c91. Please upgrade to this or a later version, there are no known workarounds. 2023-03-03 not yet calculated CVE-2023-26491
MISC
MISC zoho — multiple_products ManageEngine ServiceDesk Plus through 14104, ServiceDesk Plus MSP through 14000, Support Center Plus through 14000, and Asset Explorer through 6987 allow privilege escalation via query reports. 2023-03-06 not yet calculated CVE-2023-26600
MISC
MISC zoho — multiple_products Zoho ManageEngine ServiceDesk Plus through 14104, Asset Explorer through 6987, ServiceDesk Plus MSP before 14000, and Support Center Plus before 14000 allow Denial-of-Service (DoS). 2023-03-06 not yet calculated CVE-2023-26601
MISC
MISC shopex — ecshop An arbitrary file upload vulnerability in the /admin/template.php component of shopEx EcShop v4.1.5 allows attackers to execute arbitrary code via a crafted PHP file. 2023-03-07 not yet calculated CVE-2023-26823
MISC variscite — matrix_gui SQL injection vulnerability found in Variscite matrix-gui v.2 allows a remote attacker to execute arbitrary code via the shell_exect parameter to the wwwpagesmatrix-gui-2.0 endpoint. 2023-03-08 not yet calculated CVE-2023-26922
MISC onekeyadmin — onekeyadmin onekeyadmin v1.3.9 was discovered to contain an arbitrary file read vulnerability via the component /admin1/file/download. 2023-03-09 not yet calculated CVE-2023-26948
MISC onekeyadmin — onekeyadmin An arbitrary file upload vulnerability in the component /admin1/config/update of onekeyadmin v1.3.9 allows attackers to execute arbitrary code via a crafted PHP file. 2023-03-06 not yet calculated CVE-2023-26949
MISC onekeyadmin — onekeyadmin onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Administrator module. 2023-03-07 not yet calculated CVE-2023-26953
MISC onekeyadmin — onekeyadmin onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the User Group module. 2023-03-07 not yet calculated CVE-2023-26954
MISC onekeyadmin — onekeyadmin
  onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Admin Group module. 2023-03-07 not yet calculated CVE-2023-26955
MISC onekeyadmin — onekeyadmin onekeyadmin v1.3.9 was discovered to contain an arbitrary file read vulnerability via the component /admin1/curd/code. 2023-03-08 not yet calculated CVE-2023-26956
MISC onekeyadmin — onekeyadmin onekeyadmin v1.3.9 was discovered to contain an arbitrary file delete vulnerability via the component admincontrollerplugins. 2023-03-09 not yet calculated CVE-2023-26957
MISC indexcontroller.java — indexcontroller.java feiqu-opensource Background Vertical authorization vulnerability exists in IndexController.java. demo users with low permission can perform operations within the permission of the admin super administrator and can use this vulnerability to change the blacklist IP address in the system at will. 2023-03-08 not yet calculated CVE-2023-27088
MISC radare — radare2 radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c. 2023-03-10 not yet calculated CVE-2023-27114
MISC
MISC webassembly — webassembly WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::cat_compute_size. 2023-03-10 not yet calculated CVE-2023-27115
MISC
MISC webassembly — webassembly WebAssembly v1.0.29 discovered to contain an abort in CWriter::MangleType. 2023-03-10 not yet calculated CVE-2023-27116
MISC webassembly — webassembly WebAssembly v1.0.29 was discovered to contain a heap overflow via the component component wabt::Node::operator. 2023-03-10 not yet calculated CVE-2023-27117
MISC webassembly — webassembly WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::Decompiler::WrapChild. 2023-03-10 not yet calculated CVE-2023-27119
MISC jellyfin — multiple_products Jellyfin up to v10.7.7 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /Repositories. This vulnerability allows attackers to access network resources and sensitive information via a crafted POST request. 2023-03-10 not yet calculated CVE-2023-27161
MISC
MISC
MISC halo — multiple_products An arbitrary file upload vulnerability in Halo up to v1.6.1 allows attackers to execute arbitrary code via a crafted .md file. 2023-03-10 not yet calculated CVE-2023-27164
MISC
MISC
MISC ibm — instana Docker based datastores for IBM Instana (IBM Observability with Instana 239-0 through 239-2, 241-0 through 241-2, and 243-0) do not currently require authentication. Due to this, an attacker within the network could access the datastores with read/write access. IBM X-Force ID: 248737. 2023-03-03 not yet calculated CVE-2023-27290
MISC
MISC directus — directus Directus is a real-time API and App dashboard for managing SQL database content. Instances relying on an allow-listed reset URL are vulnerable to an HTML injection attack through the use of query parameters in the reset URL. An attacker could exploit this to email users urls to the servers domain but which may contain malicious code. The problem has been resolved and released under version 9.23.0. People relying on a custom password reset URL should upgrade to 9.23.0 or later, or remove the custom reset url from the configured allow list. Users are advised to upgrade. Users unable to upgrade may disable the custom reset URL allow list as a workaround. 2023-03-06 not yet calculated CVE-2023-27474
MISC
MISC
MISC go — goutil Goutil is a collection of miscellaneous functionality for the go language. In versions prior to 0.6.0 when users use fsutil.Unzip to unzip zip files from a malicious attacker, they may be vulnerable to path traversal. This vulnerability is known as a ZipSlip. This issue has been fixed in version 0.6.0, users are advised to upgrade. There are no known workarounds for this issue. 2023-03-07 not yet calculated CVE-2023-27475
MISC
MISC owslib — owslib OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib’s XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. All users are advised to upgrade. The only known workaround is to patch the library manually. See `GHSA-8h9c-r582-mggc` for details. 2023-03-08 not yet calculated CVE-2023-27476
MISC
MISC
MISC wasmtime — wasmtime wasmtime is a fast and secure runtime for WebAssembly. Wasmtime’s code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided to the instruction and some of the selected indices are greater than 16. There is an off-by-one error in the calculation of the mask to the `pshufb` instruction which causes incorrect results to be returned if lanes are selected from the second vector. This codegen bug has been fixed in Wasmtiem 6.0.1, 5.0.1, and 4.0.1. Users are recommended to upgrade to these updated versions. If upgrading is not an option for you at this time, you can avoid this miscompilation by disabling the Wasm simd proposal. Additionally the bug is only present on x86_64 hosts. Other platforms such as AArch64 and s390x are not affected. 2023-03-08 not yet calculated CVE-2023-27477
MISC
MISC
MISC
MISC
MISC libmemcached — libmemcached libmemcached-awesome is an open source C/C++ client library and tools for the memcached server. `libmemcached` could return data for a previously requested key, if that previous request timed out due to a low `POLL_TIMEOUT`. This issue has been addressed in version 1.1.4. Users are advised to upgrade. There are several ways to workaround or lower the probability of this bug affecting a given deployment. 1: use a reasonably high `POLL_TIMEOUT` setting, like the default. 2: use separate libmemcached connections for unrelated data. 3: do not re-use libmemcached connections in an unknown state. 2023-03-07 not yet calculated CVE-2023-27478
MISC
MISC
MISC
MISC xwiki_platform — xwiki_platform XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of UIX parameters. A proof of concept exploit is to log in, add an `XWiki.UIExtensionClass` xobject to the user profile page, with an Extension Parameters content containing `label={{/html}} {{async async=”true” cached=”false” context=”doc.reference”}}{{groovy}}println(“Hello ” + “from groovy!”){{/groovy}}{{/async}}`. Then, navigating to `PanelsCode.ApplicationsPanelConfigurationSheet` (i.e., `<xwiki-host>/xwiki/bin/view/PanelsCode/ApplicationsPanelConfigurationSheet` where `<xwiki-host>` is the URL of your XWiki installation) should not execute the Groovy script. If it does, you will see `Hello from groovy!` displayed on the screen. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. For users unable to upgrade the issue can be fixed by editing the `PanelsCode.ApplicationsPanelConfigurationSheet` wiki page and making the same modifications as shown in commit `6de5442f3c`. 2023-03-07 not yet calculated CVE-2023-27479
MISC
MISC
MISC xwiki_platform — xwiki_platform XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit rights on a document can trigger an XAR import on a forged XAR file, leading to the ability to display the content of any file on the XWiki server host. This vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10-rc-1. Users are advised to upgrade. Users unable to upgrade may apply the patch `e3527b98fd` manually. 2023-03-07 not yet calculated CVE-2023-27480
MISC
MISC
MISC directus — directus Directus is a real-time API and App dashboard for managing SQL database content. In versions prior to 9.16.0 users with read access to the `password` field in `directus_users` can extract the argon2 password hashes by brute forcing the export functionality combined with a `_starts_with` filter. This allows the user to enumerate the password hashes. Accounts cannot be taken over unless the hashes can be reversed which is unlikely with current hardware. This problem has been patched by preventing any hashed/concealed field to be filtered against with the `_starts_with` or other string operator in version 9.16.0. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by ensuring that no user has `read` access to the `password` field in `directus_users`. 2023-03-07 not yet calculated CVE-2023-27481
MISC
MISC
MISC homeassistant — homeassistant homeassistant is an open source home automation tool. A remotely exploitable vulnerability bypassing authentication for accessing the Supervisor API through Home Assistant has been discovered. This impacts all Home Assistant installation types that use the Supervisor 2023.01.1 or older. Installation types, like Home Assistant Container (for example Docker), or Home Assistant Core manually in a Python environment, are not affected. The issue has been mitigated and closed in Supervisor version 2023.03.1, which has been rolled out to all affected installations via the auto-update feature of the Supervisor. This rollout has been completed at the time of publication of this advisory. Home Assistant Core 2023.3.0 included mitigation for this vulnerability. Upgrading to at least that version is thus advised. In case one is not able to upgrade the Home Assistant Supervisor or the Home Assistant Core application at this time, it is advised to not expose your Home Assistant instance to the internet. 2023-03-08 not yet calculated CVE-2023-27482
MISC
MISC crossplane — crossplane crossplane-runtime is a set of go libraries used to build Kubernetes controllers in Crossplane and its related stacks. An out of memory panic vulnerability has been discovered in affected versions. Applications that use the `Paved` type’s `SetValue` method with user provided input without proper validation might use excessive amounts of memory and cause an out of memory panic. In the fieldpath package, the Paved.SetValue method sets a value on the Paved object according to the provided path, without any validation. This allows setting values in slices at any provided index, which grows the target array up to the requested index, the index is currently capped at max uint32 (4294967295) given how indexes are parsed, but that is still an unnecessarily large value. If callers are not validating paths’ indexes on their own, which most probably are not going to do, given that the input is parsed directly in the SetValue method, this could allow users to consume arbitrary amounts of memory. Applications that do not use the `Paved` type’s `SetValue` method are not affected. This issue has been addressed in versions 0.16.1 and 0.19.2. Users are advised to upgrade. Users unable to upgrade can parse and validate the path before passing it to the `SetValue` method of the `Paved` type, constraining the index size as deemed appropriate. 2023-03-09 not yet calculated CVE-2023-27483
MISC
MISC crossplane — crossplane crossplane-runtime is a set of go libraries used to build Kubernetes controllers in Crossplane and its related stacks. In affected versions an already highly privileged user able to create or update Compositions can specify an arbitrarily high index in a patch’s `ToFieldPath`, which could lead to excessive memory usage once such Composition is selected for a Composite resource. Compositions allow users to specify patches inserting elements into arrays at an arbitrary index. When a Composition is selected for a Composite Resource, patches are evaluated and if a specified index is greater than the current size of the target slice, Crossplane will grow that slice up to the specified index, which could lead to an excessive amount of memory usage and therefore the Pod being OOM-Killed. The index is already capped to the maximum value for a uint32 (4294967295) when parsed, but that is still an unnecessarily large value. This issue has been addressed in versions 1.11.2, 1.10.3, and 1.9.2. Users are advised to upgrade. Users unable to upgrade can restrict write privileges on Compositions to only admin users as a workaround. 2023-03-09 not yet calculated CVE-2023-27484
MISC fbs-core — fbs-core thmmniii/fbs-core is an open source feedback system for students. In versions prior to 1.5.3 when querying `subresults`, it is possible to query `subresults` from other users due to insufficient authorisation. This is only possible for logged-in users and it is not possible to associate the subresults with a specific user. This bug was fixed in commit `f1ae67d8bb2`and released with version 1.5.3. Users are advised to upgrade. There are no known workarounds for this issue. 2023-03-07 not yet calculated CVE-2023-27485
MISC
MISC
MISC
MISC xcat — xcat xCAT is a toolkit for deployment and administration of computer clusters. In versions prior to 2.16.5 if zones are configured as a mechanism to secure clusters in XCAT, it is possible for a local root user from one node to obtain credentials to SSH to any node in any zone, except the management node of the default zone. XCAT zones are not enabled by default. Only users that use the optional zone feature are impacted. All versions of xCAT prior to xCAT 2.16.5 are vulnerable. This problem has been fixed in xCAT 2.16.5. Users making use of zones should upgrade to 2.16.5. Users unable to upgrade may mitigate the issue by disabling zones or patching the management node with the fix contained in commit `85149c37f49`. 2023-03-08 not yet calculated CVE-2023-27486
MISC
MISC
MISC
MISC next.js — next.js NextAuth.js is an open source authentication solution for Next.js applications. `next-auth` applications using OAuth provider versions before `v4.20.1` have been found to be subject to an authentication vulnerability. A bad actor who can read traffic on the victim’s network or who is able to social engineer the victim to click a manipulated login link could intercept and tamper with the authorization URL to **log in as the victim**, bypassing the CSRF protection. This is due to a partial failure during a compromised OAuth session where a session code is erroneously generated. This issue has been addressed in version 4.20.1. Users are advised to upgrade. Users unable to upgrade may using Advanced Initialization, manually check the callback request for state, pkce, and nonce against the provider configuration to prevent this issue. See the linked GHSA for details. 2023-03-09 not yet calculated CVE-2023-27490
MISC
MISC
MISC
MISC
MISC
MISC apache_software_foundation — http_server HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client. 2023-03-07 not yet calculated CVE-2023-27522
MISC rack — rack A DoS vulnerability exists in Rack <v3.0.4.2, <v2.2.6.3, <v2.1.4.3 and <v2.0.9.3 within in the Multipart MIME parsing code in which could allow an attacker to craft requests that can be abuse to cause multipart parsing to take longer than expected. 2023-03-10 not yet calculated CVE-2023-27530
MISC veeam — backup_&_replication Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts. 2023-03-10 not yet calculated CVE-2023-27532
MISC shadowocks — x-ng ShadowsocksX-NG 1.10.0 signs with com.apple.security.get-task-allow entitlements because of CODE_SIGNING_INJECT_BASE_ENTITLEMENTS. 2023-03-03 not yet calculated CVE-2023-27574
MISC
MISC flarum — flarum flarum is a forum software package for building communities. In versions prior to 1.7.0 an admin account which has already been compromised by an attacker may use a vulnerability in the `LESS` parser which can be exploited to read sensitive files on the server through the use of path traversal techniques. An attacker can achieve this by providing an absolute path to a sensitive file in the custom `LESS` setting, which the `LESS` parser will then read. For example, an attacker could use the following code to read the contents of the `/etc/passwd` file on a linux machine. The scope of what files are vulnerable will depend on the permissions given to the running flarum process. The vulnerability has been addressed in version `1.7`. Users should upgrade to this version to mitigate the vulnerability. Users unable to upgrade may mitigate the vulnerability by ensuring that their admin accounts are secured with strong passwords and follow other best practices for account security. Additionally, users can limit the exposure of sensitive files on the server by implementing appropriate file permissions and access controls at the operating system level. 2023-03-10 not yet calculated CVE-2023-27577
MISC
MISC debian-goodies — debian-goodies debmany in debian-goodies 0.88.1 allows attackers to execute arbitrary shell commands (because of an eval call) via a crafted .deb file. (The path is shown to the user before execution.) 2023-03-05 not yet calculated CVE-2023-27635
MISC l-soft — listserv The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL. 2023-03-05 not yet calculated CVE-2023-27641
MISC netgear — nighthawk_wifi6 NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that allows users with access to this feature to access arbitrary files on the device. 2023-03-10 not yet calculated CVE-2023-27850
MISC netgear — nighthawk_wifi6 NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that unintentionally allows users with upload permissions to execute arbitrary code on the device. 2023-03-10 not yet calculated CVE-2023-27851
MISC netgear — nighthawk_wifi6 NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a buffer overflow vulnerability in various CGI mechanisms that could allow an attacker to execute arbitrary code on the device. 2023-03-10 not yet calculated CVE-2023-27852
MISC netgear — nighthawk_wifi6 NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a format string vulnerability in a SOAP service that could allow an attacker to execute arbitrary code on the device. 2023-03-10 not yet calculated CVE-2023-27853
MISC pretix — pretix rami.io pretix before 4.17.1 allows OAuth application authorization from a logged-out session. The fixed versions are 4.15.1, 4.16.1, and 4.17.1. 2023-03-06 not yet calculated CVE-2023-27891
MISC jenkins_project — jenkins Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide plugins to the configured update sites and have this message shown by Jenkins instances. 2023-03-10 not yet calculated CVE-2023-27898
MISC jenkins_project — jenkins Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a plugin for installation, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used, potentially resulting in arbitrary code execution. 2023-03-10 not yet calculated CVE-2023-27899
MISC jenkins_project — jenkins Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service. 2023-03-10 not yet calculated CVE-2023-27900
MISC jenkins_project — jenkins Jenkins 2.393 and earlier, LTS 2.375.3 and earlier uses the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service. 2023-03-10 not yet calculated CVE-2023-27901
MISC jenkins_project — jenkins Jenkins 2.393 and earlier, LTS 2.375.3 and earlier shows temporary directories related to job workspaces, which allows attackers with Item/Workspace permission to access their contents. 2023-03-10 not yet calculated CVE-2023-27902
MISC jenkins_project — jenkins Jenkins 2.393 and earlier, LTS 2.375.3 and earlier creates a temporary file in the default temporary directory with the default permissions for newly created files when uploading a file parameter through the CLI, potentially allowing attackers with access to the Jenkins controller file system to read and write the file before it is used. 2023-03-10 not yet calculated CVE-2023-27903
MISC jenkins_project — jenkins Jenkins 2.393 and earlier, LTS 2.375.3 and earlier prints an error stack trace on agent-related pages when agent connections are broken, potentially revealing information about Jenkins configuration that is otherwise inaccessible to attackers. 2023-03-10 not yet calculated CVE-2023-27904
MISC jenkins_project — jenkins Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting. 2023-03-10 not yet calculated CVE-2023-27905
MISC emacs — emacsclient-mail.desktop emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. 2023-03-09 not yet calculated CVE-2023-27985
MISC
MISC
MISC
MLIST emacs — emacsclient-mail.desktop emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. 2023-03-09 not yet calculated CVE-2023-27986
MISC
MISC
MLIST