markdown_edit — markdown_edit
  Cross Site Scripting vulnerability found in Markdown Edit allows a remote attacker to execute arbitrary code via the edit parameter of the webpage. 2023-03-16 not yet calculated CVE-2020-19947
MISC depositgame — depositgame
  An issue found in DepositGame v.1.0 allows an attacker to gain sensitive information via the GetBonusWithdraw and withdraw functions. 2023-03-16 not yet calculated CVE-2020-22647
MISC ibm — financial_transaction_manager
  IBM Financial Transaction Manager for High Value Payments for Multi-Platform 3.2.0 through 3.2.10 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 183329. 2023-03-15 not yet calculated CVE-2020-4556
MISC
MISC dell — multiple_products
  Dell EMC Unisphere for PowerMax versions before 9.1.0.27, Dell EMC Unisphere for PowerMax Virtual Appliance versions before 9.1.0.27, and PowerMax OS Release 5978 contain an improper certificate validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to carry out a man-in-the-middle attack by supplying a crafted certificate and intercepting the victim’s traffic to view or modify a victim’s data in transit. 2023-03-17 not yet calculated CVE-2021-21548
MISC uwamp.exe — uwamp.exe
  An issue found in UwAmp v.1.1, 1.2, 1.3, 2.0, 2.1, 2.2, 2.2.1, 3.0.0, 3.0.1, 3.0.2 allows a remote attacker to execute arbitrary code via a crafted DLL. 2023-03-16 not yet calculated CVE-2021-31637
MISC wordpress — wordpress
  Unauth. Stored Cross-Site Scripting (XSS) vulnerability in WPMU DEV Forminator – Contact Form, Payment Form & Custom Form Builder plugin <= 1.14.11 versions. 2023-03-16 not yet calculated CVE-2021-36821
MISC pev — pev
  A Buffer Overflow vulnerabilityexists in Pev 0.81 via the pe_exports function from exports.c.. The array offsets_to_Names is dynamically allocated on the stack using exp->NumberOfFunctions as its size. However, the loop uses exp->NumberOfNames to iterate over it and set its components value. Therefore, the loop code assumes that exp->NumberOfFunctions is greater than ordinal at each iteration. This can lead to arbitrary code execution. 2023-03-13 not yet calculated CVE-2021-45423
MISC jackson-databind — jackson-databind
  jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. 2023-03-18 not yet calculated CVE-2021-46877
MISC
MISC octopus_deploy — octopus_server
  In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items 2023-03-13 not yet calculated CVE-2022-2258
MISC octopus_deploy — octopus_server
  In affected versions of Octopus Deploy it is possible for a user to view Workerpools without being explicitly assigned permissions to view these items 2023-03-13 not yet calculated CVE-2022-2259
MISC abb — multiple_products
  Use of Insufficiently Random Values vulnerability in ABB Pulsar Plus System Controller NE843_S, ABB Infinity DC Power Plant.This issue affects Pulsar Plus System Controller NE843_S : comcode 150042936; Infinity DC Power Plant: H5692448 G104 G842 G224L G630-4 G451C(2) G461(2) – comcode 150047415. 2023-03-16 not yet calculated CVE-2022-26080
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34406
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34407
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34408
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34409
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34410
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34411
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34412
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34413
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34414
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34415
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34416
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34417
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34418
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34419
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34420
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34421
MISC dell — bios_for_poweredge_and_precision Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34422
MISC dell — bios_for_poweredge_and_precision
  Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service. 2023-03-16 not yet calculated CVE-2022-34423
MISC wordpress — wordpress
  Cross-Site Request Forgery (CSRF) vulnerability in Social Login WP plugin <= 5.0.0.0 versions. 2023-03-16 not yet calculated CVE-2022-38063
MISC wordpress — wordpress
  Stored Cross-Site Scripting (XSS) vulnerability in ThemeKraft Post Form – Registration Form – Profile Form for User Profiles and Content Forms for User Submissions plugin <= 2.7.5 versions. 2023-03-16 not yet calculated CVE-2022-38971
MISC octopus_deploy — octopus_server
  In affected versions of Octopus Deploy it is possible for a user to introduce code via offline package creation 2023-03-16 not yet calculated CVE-2022-4009
MISC wordpress — wordpress
  Cross-Site Scripting (XSS) vulnerability in Dario Curvino Yasr – Yet Another Stars Rating plugin <= 3.1.2 versions. 2023-03-16 not yet calculated CVE-2022-40699
MISC wordpress — wordpress
  Stored Cross-Site Scripting (XSS) vulnerability in John West Slideshow SE plugin <= 2.5.5 versions. 2023-03-16 not yet calculated CVE-2022-41554
MISC tenable — multiple_products
  A vulnerability was reported where through modifying the scan variables, an authenticated user in Tenable products, that has Scan Policy Configuration roles, could manipulate audit policy variables to execute arbitrary commands on credentialed scan targets. 2023-03-15 not yet calculated CVE-2022-4313
MISC ghost — node-sqlite3
  A code execution vulnerability exists in the Statement Bindings functionality of Ghost Foundation node-sqlite3 5.1.1. A specially-crafted Javascript file can lead to arbitrary code execution. An attacker can provide malicious input to trigger this vulnerability. 2023-03-16 not yet calculated CVE-2022-43441
MISC
MISC wordpress — wordpress
  Stored Cross-Site Scripting (XSS) vulnerability in John West Slideshow SE plugin <= 2.5.5 versions. 2023-03-17 not yet calculated CVE-2022-43461
MISC eip_stack_group_opener — eip_stack_group_opener 
  An out-of-bounds write vulnerability exists in the GetAttributeList attribute_count_request functionality of EIP Stack Group OpENer development commit 58ee13c. A specially crafted EtherNet/IP request can lead to an out-of-bounds write, potentially causing the server to crash or allow for remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. 2023-03-16 not yet calculated CVE-2022-43604
MISC eip_stack_group_opener — eip_stack_group_opener 
  An out-of-bounds write vulnerability exists in the SetAttributeList attribute_count_request functionality of EIP Stack Group OpENer development commit 58ee13c. A specially crafted EtherNet/IP request can lead to an out of bounds write, potentially causing the server to crash or allow for remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. 2023-03-16 not yet calculated CVE-2022-43605
MISC eip_stack_group_opener — eip_stack_group_opener 
  A use-of-uninitialized-pointer vulnerability exists in the Forward Open connection_management_entry functionality of EIP Stack Group OpENer development commit 58ee13c. A specially-crafted EtherNet/IP request can lead to use of a null pointer, causing the server to crash. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. 2023-03-16 not yet calculated CVE-2022-43606
MISC suse — opensuse_factory
  An Improper Handling of Exceptional Conditions vulnerability in obs-service-go_modules of openSUSE Factory allows attackers that can influence the call to the service to delete files and directories on the system of the victim. This issue affects: SUSE openSUSE Factory obs-service-go_modules versions prior to 0.6.1. 2023-03-15 not yet calculated CVE-2022-45155
CONFIRM wordpress — wordpress
  Stored Cross-Site Scripting (XSS) vulnerability in Fabian von Allmen WP Calendar plugin <= 1.5.3 versions. 2023-03-17 not yet calculated CVE-2022-45814
MISC wordpress — wordpress
  Cross-Site Scripting (XSS) vulnerability in Erin Garscadden GC Testimonials plugin <= 1.3.2 versions. 2023-03-17 not yet calculated CVE-2022-45817
MISC wordpress — wordpress
  Cross-Site Request Forgery (CSRF) vulnerability in Obox Themes Launchpad – Coming Soon & Maintenance Mode plugin <= 1.0.13 versions. 2023-03-17 not yet calculated CVE-2022-46854
MISC wordpress — wordpress
  Cross-Site Request Forgery (CSRF) vulnerability in Chasil Universal Star Rating plugin <= 2.1.0 version. 2023-03-17 not yet calculated CVE-2022-46867
MISC rockwell_automation — modbus_tcp_server_add_on_instructions
  Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information. 2023-03-17 not yet calculated CVE-2023-0027
MISC eclipse_foundation — business_intelligence_reporting_tool
  In Eclipse BIRT, starting from version 2.6.2, the default configuration allowed to retrieve a report from the same host using an absolute HTTP path for the report parameter (e.g. __report=http://xyz.com/report.rptdesign). If the host indicated in the __report parameter matched the HTTP Host header value, the report would be retrieved. However, the Host header can be tampered with on some configurations where no virtual hosts are put in place (e.g. in the default configuration of Apache Tomcat) or when the default host points to the BIRT server. This vulnerability was patched on Eclipse BIRT 4.13. 2023-03-15 not yet calculated CVE-2023-0100
CONFIRM general_electric_digital — proficy_ifix
  GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software. 2023-03-16 not yet calculated CVE-2023-0598
MISC
MISC omron — multiple_products
  Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program. 2023-03-16 not yet calculated CVE-2023-0811
MISC
MISC steptools — v18sp1_ifcmesh_library
  STEPTools v18SP1 ifcmesh library (v18.1) is affected due to a null pointer dereference, which could allow an attacker to deny application usage when reading a specially constructed file, resulting in an application crash. 2023-03-13 not yet calculated CVE-2023-0973
MISC utarit_information_technologies — persolus
  Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Utarit Information Technologies Persolus allows SQL Injection. This issue affects Persolus: before 2.03.93. 2023-03-17 not yet calculated CVE-2023-1152
MISC wordpress — wordpress
  The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 2023-03-17 not yet calculated CVE-2023-1172
MISC
MISC aveva — plant_scada/telemetry_server
  The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit which could allow an unauthenticated user to remotely read data, cause denial of service, and tamper with alarm states. 2023-03-16 not yet calculated CVE-2023-1256
MISC netgear — rax30_(ax2400)
  Netgear RAX30 (AX2400), prior to version 1.0.6.74, was affected by an authentication bypass vulnerability, allowing an unauthenticated attacker to gain administrative access to the device’s web management interface by resetting the admin password. 2023-03-14 not yet calculated CVE-2023-1327
MISC sourcecodester — friendly_island_pizza_website_and_ordering_system
  A vulnerability was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file addmem.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223127. 2023-03-15 not yet calculated CVE-2023-1379
MISC
MISC
MISC tp-link — archer_ax21_(ax1800)_firmware
  TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request. 2023-03-15 not yet calculated CVE-2023-1389
MISC linux — kernel
  A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. 2023-03-16 not yet calculated CVE-2023-1390
MISC
MISC
MISC simple_art_gallery — simple_art_gallery
  A vulnerability classified as critical has been found in Simple Art Gallery 1.0. Affected is an unknown function of the file adminHome.php. The manipulation of the argument social_facebook leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223128. 2023-03-15 not yet calculated CVE-2023-1416
MISC
MISC
MISC sourcecodester — friendly_island_pizza_website_and_ordering_system
  A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability. 2023-03-15 not yet calculated CVE-2023-1418
MISC
MISC
MISC mattermost — mattermost
  A reflected cross-site scripting vulnerability in the OAuth flow completion endpoints in Mattermost allows an attacker to send AJAX requests on behalf of the victim via sharing a crafted link with a malicious state parameter. 2023-03-15 not yet calculated CVE-2023-1421
MISC pimcore — pimcore
  Cross-site Scripting (XSS) – Reflected in GitHub repository pimcore/pimcore prior to 10.5.19. 2023-03-16 not yet calculated CVE-2023-1429
CONFIRM
MISC wordpress — wordpress
  The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more. 2023-03-16 not yet calculated CVE-2023-1431
MISC
MISC sourcecodester — online_food_ordering_system
  A vulnerability was found in SourceCodester Online Food Ordering System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /fos/admin/ajax.php?action=save_settings of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be launched remotely. VDB-223214 is the identifier assigned to this vulnerability. 2023-03-16 not yet calculated CVE-2023-1432
MISC
MISC sourcecodester — gadget_works_online_ordering_system
  A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/products/controller.php?action=add of the component Products Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223215. 2023-03-16 not yet calculated CVE-2023-1433
MISC
MISC
MISC sourcecodester — medicine_tracker_system
  A vulnerability, which was classified as critical, has been found in SourceCodester Medicine Tracker System 1.0. This issue affects some unknown processing of the file medicines/view_details.php of the component GET Parameter Handler. The manipulation of the argument GET leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223283. 2023-03-17 not yet calculated CVE-2023-1439
MISC
MISC
MISC sourcecodester — automatic_question_paper_generator_system
  A vulnerability, which was classified as critical, was found in SourceCodester Automatic Question Paper Generator System 1.0. Affected is an unknown function of the file users/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223284. 2023-03-17 not yet calculated CVE-2023-1440
MISC
MISC
MISC sourcecodester — automatic_question_paper_generator_system
  A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin/courses/view_course.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223285 was assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1441
MISC
MISC
MISC qykcms — qykcms
  A vulnerability was found in Meizhou Qingyunke QYKCMS 4.3.0. It has been classified as problematic. This affects an unknown part of the file /admin_system/api.php of the component Update Handler. The manipulation of the argument downurl leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223287. 2023-03-17 not yet calculated CVE-2023-1442
MISC
MISC
MISC filseclab — twister_antivirus_8
  A vulnerability was found in Filseclab Twister Antivirus 8. It has been declared as problematic. This vulnerability affects unknown code in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223288. 2023-03-17 not yet calculated CVE-2023-1443
MISC
MISC
MISC
MISC filseclab — twister_antivirus_8
  A vulnerability was found in Filseclab Twister Antivirus 8. It has been rated as critical. This issue affects some unknown processing in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223289 was assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1444
MISC
MISC
MISC
MISC filseclab — twister_antivirus_8
  A vulnerability classified as problematic has been found in Filseclab Twister Antivirus 8. Affected is an unknown function in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-223290 is the identifier assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1445
MISC
MISC
MISC
MISC watchdog — anti-virus
  A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is an unknown functionality in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223291. 2023-03-17 not yet calculated CVE-2023-1446
MISC
MISC
MISC
MISC sourcecodester — medicine_tracker_system
  A vulnerability, which was classified as problematic, has been found in SourceCodester Medicine Tracker System 1.0. Affected by this issue is some unknown functionality of the file app/?page=medicines/manage_medicine.They. The manipulation of the argument name/description with the input <script>alert(‘2’)</script> leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-223292. 2023-03-17 not yet calculated CVE-2023-1447
MISC
MISC gpac — gpac
  A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1448
MISC
MISC
MISC
MISC gpac — gpac
  A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1449
MISC
MISC
MISC
MISC mp4v2_trackdump — mp4v2_trackdump
  A vulnerability was found in MP4v2 2.1.2 and classified as problematic. This issue affects the function DumpTrack of the file mp4trackdump.cpp. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223295. 2023-03-17 not yet calculated CVE-2023-1450
MISC
MISC
MISC
MISC mp4v2_trackdump — mp4v2_trackdump
  A vulnerability was found in MP4v2 2.1.2. It has been classified as problematic. Affected is the function mp4v2::impl::MP4Track::GetSampleFileOffset of the file mp4track.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223296. 2023-03-17 not yet calculated CVE-2023-1451
MISC
MISC
MISC
MISC gpac — gpac
  A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1452
MISC
MISC
MISC
MISC watchdog — watchdog_antivirus
  A vulnerability was found in Watchdog Anti-Virus 1.4.214.0. It has been rated as critical. Affected by this issue is some unknown functionality in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-223298 is the identifier assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1453
MISC
MISC
MISC
MISC jeecg_boot_sqli — jeecg_boot_sqli
  A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299. 2023-03-17 not yet calculated CVE-2023-1454
MISC
MISC
MISC sourcecodester — online_pizza_ordering_system
  A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file admin/ajax.php?action=login2 of the component Login Page. The manipulation of the argument email with the input abc%40qq.com’ AND (SELECT 9110 FROM (SELECT(SLEEP(5)))XSlc) AND ‘jFNl’=’jFNl leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223300. 2023-03-17 not yet calculated CVE-2023-1455
MISC
MISC sourcecodester — canteen_management_system
  A vulnerability was found in SourceCodester Canteen Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file changeUsername.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223304. 2023-03-17 not yet calculated CVE-2023-1459
MISC
MISC
MISC sourcecoderster — online_pizza_ordering_system
  A vulnerability was found in SourceCodester Online Pizza Ordering System 1.0. It has been classified as critical. This affects an unknown part of the file admin/ajax.php?action=save_user of the component Password Change Handler. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The identifier VDB-223305 was assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1460
MISC
MISC sourcecodester — canteen_management_system
  A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been declared as critical. This vulnerability affects the function query of the file createCategories.php. The manipulation of the argument categoriesStatus leads to sql injection. The attack can be initiated remotely. VDB-223306 is the identifier assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1461
MISC
MISC
MISC teampass — teampass
  Improper Authorization in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23. 2023-03-17 not yet calculated CVE-2023-1463
CONFIRM
MISC sourcecodester — medicine_tracker_system
  A vulnerability, which was classified as critical, was found in SourceCodester Medicine Tracker System 1.0. This affects an unknown part of the file Users.php?f=save_user. The manipulation of the argument firstname/middlename/lastname/username/password leads to improper authentication. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223311. 2023-03-17 not yet calculated CVE-2023-1464
MISC
MISC sourcecodester — student_study_center_desk_management_system
  A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3′ AND (SELECT 2100 FROM (SELECT(SLEEP(5)))FWlC) AND ‘butz’=’butz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223325 was assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1466
MISC
MISC sourcecodester — student_study_center_desk_management_system
  A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223326 is the identifier assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1467
MISC
MISC sourcecodester — student_study_center_desk_management_system
  A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipulation of the argument date_from/date_to leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-223327. 2023-03-17 not yet calculated CVE-2023-1468
MISC
MISC wordpress — wordpress
  The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This can potentially be exploited by lower-privileged users if the `Admin Dashboard Access Permission` setting it set for those users to access the dashboard. 2023-03-17 not yet calculated CVE-2023-1469
MISC
MISC wordpress — wordpress
  The eCommerce Product Catalog plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. 2023-03-17 not yet calculated CVE-2023-1470
MISC
MISC wordpress — wordpress
  The WP Popup Banners plugin for WordPress is vulnerable to SQL Injection via the ‘banner_id’ parameter in versions up to, and including, 1.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with minimal permissions, such as a subscrber, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. 2023-03-17 not yet calculated CVE-2023-1471
MISC
MISC
MISC wordpress — wordpress
  The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to invoke those functions, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. Actions include resetting the API key, accessing or deleting log files, and deleting cache among others. 2023-03-17 not yet calculated CVE-2023-1472
MISC
MISC sourcecodester — automatic_question_paper_generator_system
  A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file users/question_papers/manage_question_paper.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223336. 2023-03-17 not yet calculated CVE-2023-1474
MISC
MISC
MISC sourcecodester — canteen_management_system
  A vulnerability, which was classified as critical, has been found in SourceCodester Canteen Management System 1.0. This issue affects the function query of the file createuser.php. The manipulation of the argument uemail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223337 was assigned to this vulnerability. 2023-03-17 not yet calculated CVE-2023-1475
MISC
MISC
MISC sourcecodester — monitoring_of_students_cyber_accounts_system
  A vulnerability classified as critical has been found in SourceCodester Simple Music Player 1.0. Affected is an unknown function of the file save_music.php. The manipulation of the argument filename leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223362 is the identifier assigned to this vulnerability. 2023-03-18 not yet calculated CVE-2023-1479
MISC
MISC
MISC sourcecodester — monitoring_of_students_cyber_accounts_system
  A vulnerability classified as critical was found in SourceCodester Monitoring of Students Cyber Accounts System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component POST Parameter Handler. The manipulation of the argument un leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223363. 2023-03-18 not yet calculated CVE-2023-1480
MISC
MISC
MISC sourcecodester — monitoring_of_students_cyber_accounts_system
  A vulnerability, which was classified as problematic, has been found in SourceCodester Monitoring of Students Cyber Accounts System 1.0. Affected by this issue is some unknown functionality of the file modules/balance/index.php?view=balancelist of the component POST Parameter Handler. The manipulation of the argument id with the input “><script>alert(111)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223364. 2023-03-18 not yet calculated CVE-2023-1481
MISC
MISC
MISC hkcms — hkcms
  A vulnerability, which was classified as problematic, was found in HkCms 2.2.4.230206. This affects an unknown part of the file /admin.php/appcenter/local.html?type=addon of the component External Plugin Handler. The manipulation leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223365 was assigned to this vulnerability. 2023-03-18 not yet calculated CVE-2023-1482
MISC
MISC
MISC xiaobingby — teacms
  A vulnerability has been found in XiaoBingBy TeaCMS up to 2.0.2 and classified as critical. This vulnerability affects unknown code of the file /admin/getallarticleinfo. The manipulation of the argument searchInfo leads to sql injection. The attack can be initiated remotely. VDB-223366 is the identifier assigned to this vulnerability. 2023-03-18 not yet calculated CVE-2023-1483
MISC
MISC
MISC xzjie — cms
  A vulnerability was found in xzjie cms up to 1.0.3 and classified as critical. This issue affects some unknown processing of the file /api/upload. The manipulation of the argument uploadFile leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-223367. 2023-03-18 not yet calculated CVE-2023-1484
MISC
MISC
MISC sourcecodester — young_entrepreneur_e-negosyo_system
  A vulnerability classified as problematic has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. This affects an unknown part of the file /bsenordering/index.php of the component GET Parameter Handler. The manipulation of the argument category with the input <script>alert(222)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223371. 2023-03-18 not yet calculated CVE-2023-1485
MISC
MISC
MISC lespeed — wisecleaner_wise_force_deleter
  A vulnerability classified as problematic was found in Lespeed WiseCleaner Wise Force Deleter 1.5.3.54. This vulnerability affects unknown code in the library WiseUnlock64.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223372. 2023-03-18 not yet calculated CVE-2023-1486
MISC
MISC
MISC
MISC lespeed — wisecleaner_wise_system_monitor
  A vulnerability, which was classified as problematic, has been found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54. This issue affects some unknown processing in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-223373 was assigned to this vulnerability. 2023-03-18 not yet calculated CVE-2023-1487
MISC
MISC
MISC
MISC lespeed — wisecleaner_wise_system_monitor
  A vulnerability, which was classified as problematic, was found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54. Affected is an unknown function in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-223374 is the identifier assigned to this vulnerability. 2023-03-18 not yet calculated CVE-2023-1488
MISC
MISC
MISC
MISC lespeed — wisecleaner_wise_system_monitor
  A vulnerability has been found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54 and classified as critical. Affected by this vulnerability is an unknown functionality in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to improper access controls. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223375. 2023-03-18 not yet calculated CVE-2023-1489
MISC
MISC
MISC
MISC max_secure — anti_virus_plus
  A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1 and classified as critical. Affected by this issue is some unknown functionality in the library SDActMon.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223376. 2023-03-18 not yet calculated CVE-2023-1490
MISC
MISC
MISC
MISC max_secure — anti_virus_plus
  A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been classified as critical. This affects an unknown part in the library MaxCryptMon.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-223377 was assigned to this vulnerability. 2023-03-18 not yet calculated CVE-2023-1491
MISC
MISC
MISC
MISC max_secure — anti_virus_plus
  A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been declared as problematic. This vulnerability affects unknown code in the library MaxProc64.sys of the component IoControlCode Handler. The manipulation of the argument SystemBuffer leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-223378 is the identifier assigned to this vulnerability. 2023-03-18 not yet calculated CVE-2023-1492
MISC
MISC
MISC
MISC max_secure — anti_virus_plus
  A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been rated as problematic. This issue affects some unknown processing in the library MaxProctetor64.sys of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223379. 2023-03-18 not yet calculated CVE-2023-1493
MISC
MISC
MISC
MISC ibos — ibos
  A vulnerability classified as critical has been found in IBOS 4.5.5. Affected is an unknown function of the file ApiController.php. The manipulation of the argument emailids leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223380. 2023-03-18 not yet calculated CVE-2023-1494
MISC
MISC
MISC samsung_mobile — multiple_mobile_devices
  Improper access control vulnerability in Call application prior to SMR Mar-2023 Release 1 allows local attackers to access sensitive information without proper permission. 2023-03-16 not yet calculated CVE-2023-21449
MISC samsung_mobile — multiple_mobile_devices
  Improper usage of implicit intent in Bluetooth prior to SMR Mar-2023 Release 1 allows attacker to get MAC address of connected device. 2023-03-16 not yet calculated CVE-2023-21452
MISC samsung_mobile — multiple_mobile_devices
  Improper input validation vulnerability in SoftSim TA prior to SMR Mar-2023 Release 1 allows local attackers access to protected data. 2023-03-16 not yet calculated CVE-2023-21453
MISC samsung_mobile — multiple_mobile_devices
  Improper authorization in Samsung Keyboard prior to SMR Mar-2023 Release 1 allows physical attacker to access users text history on the lockscreen. 2023-03-16 not yet calculated CVE-2023-21454
MISC samsung_mobile — exynos 
  Improper authorization implementation in Exynos baseband prior to SMR Mar-2023 Release 1 allows incorrect handling of unencrypted message. 2023-03-16 not yet calculated CVE-2023-21455
MISC samsung_mobile  — multiple_mobile_devices
  Path traversal vulnerability in Galaxy Themes Service prior to SMR Mar-2023 Release 1 allows attacker to access arbitrary file with system uid. 2023-03-16 not yet calculated CVE-2023-21456
MISC samsung_mobile  — multiple_mobile_devices
  Improper access control vulnerability in Bluetooth prior to SMR Mar-2023 Release 1 allows attackers to send file via Bluetooth without related permission. 2023-03-16 not yet calculated CVE-2023-21457
MISC samsung_mobile — multiple_mobile_devices
  Improper privilege management vulnerability in PhoneStatusBarPolicy in System UI prior to SMR Mar-2023 Release 1 allows attacker to turn off Do not disturb via unprotected intent. 2023-03-16 not yet calculated CVE-2023-21458
MISC samsung_mobile  — multiple_mobile_devices
  Use after free vulnerability in decon driver prior to SMR Mar-2023 Release 1 allows attackers to cause memory access fault. 2023-03-16 not yet calculated CVE-2023-21459
MISC samsung_mobile  — multiple_mobile_devices
  Improper authentication in SecSettings prior to SMR Mar-2023 Release 1 allows attacker to reset the setting. 2023-03-16 not yet calculated CVE-2023-21460
MISC samsung_mobile — multiple_mobile_devices
  Improper authorization vulnerability in AutoPowerOnOffConfirmDialog in Settings prior to SMR Mar-2023 Release 1 allows local attacker to turn device off via unprotected activity. 2023-03-16 not yet calculated CVE-2023-21461
MISC samsung_mobile — multiple_mobile_devices
  The sensitive information exposure vulnerability in Quick Share Agent prior to versions 3.5.14.18 in Android 12 and 3.5.16.20 in Android 13 allows to local attacker to access MAC address without related permission. 2023-03-16 not yet calculated CVE-2023-21462
MISC samsung_mobile — multiple_mobile_devices
  Improper access control vulnerability in MyFiles application prior to versions 12.2.09.0 in Android 11, 13.1.03.501 in Android 12 and 14.1.03.0 in Android 13 allows local attacker to get sensitive information of secret mode in Samsung Internet application with specific conditions. 2023-03-16 not yet calculated CVE-2023-21463
MISC samsung_mobile — multiple_mobile_devices
  Improper access control in Samsung Calendar prior to versions 12.4.02.9000 in Android 13 and 12.3.08.2000 in Android 12 allows local attacker to configure improper status. 2023-03-16 not yet calculated CVE-2023-21464
MISC samsung_mobile — bixby_touch
  Improper access control vulnerability in BixbyTouch prior to version 3.2.02.5 in China models allows untrusted applications access local files. 2023-03-16 not yet calculated CVE-2023-21465
MISC zoom_video_communications — multiple_products
  Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. A recent update to the Microsoft Edge WebView2 runtime used by the affected Zoom clients, transmitted text to Microsoft’s online Spellcheck service instead of the local Windows Spellcheck. Updating Zoom remediates this vulnerability by disabling the feature. Updating Microsoft Edge WebView2 Runtime to at least version 109.0.1481.0 and restarting Zoom remediates this vulnerability by updating Microsoft’s telemetry behavior. 2023-03-16 not yet calculated CVE-2023-22880
MISC zoom_video_communications — zoom
  Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service. 2023-03-16 not yet calculated CVE-2023-22881
MISC zoom_video_communications — zoom
  Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. A malicious actor could send specially crafted UDP traffic to a victim Zoom client to remotely cause the client to crash, causing a denial of service. 2023-03-16 not yet calculated CVE-2023-22882
MISC zoom_video_communications — zoom
  Zoom Client for IT Admin Windows installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to the SYSTEM user. 2023-03-16 not yet calculated CVE-2023-22883
MISC seamax — sa-wr915nd
  SA-WR915ND router firmware v17.35.1 was discovered to be vulnerable to code execution. 2023-03-16 not yet calculated CVE-2023-23150
MISC
MISC discourse — discourse
  Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, the count of topics displayed for a tag is a count of all regular topics regardless of whether the topic is in a read restricted category or not. As a result, any users can technically poll a sensitive tag to determine if a new topic is created in a category which the user does not have excess to. In version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, the count of topics displayed for a tag defaults to only counting regular topics which are not in read restricted categories. Staff users will continue to see a count of all topics regardless of the topic’s category read restrictions. 2023-03-17 not yet calculated CVE-2023-23622
MISC
MISC
MISC
MISC
MISC discourse — discourse
  Discourse is an open-source messaging platform. In versions 3.0.1 and prior on the `stable` branch and versions 3.1.0.beta2 and prior on the `beta` and `tests-passed` branches, the count of personal messages displayed for a tag is a count of all personal messages regardless of whether the personal message is visible to a given user. As a result, any users can technically poll a sensitive tag to determine if a new personal message is created even if the user does not have access to the personal message. In the patched versions, the count of personal messages tagged with a given tag is hidden by default. To revert to the old behaviour of displaying the count of personal messages for a given tag, an admin may enable the `display_personal_messages_tag_counts` site setting. 2023-03-16 not yet calculated CVE-2023-23935
MISC
MISC census — squidex
  Squidex before 7.4.0 was discovered to contain a squid.svg cross-site scripting (XSS) vulnerability. 2023-03-18 not yet calculated CVE-2023-24278
MISC
MISC temenos — t24
  Incorrect access control in Temenos T24 Release 20 allows attackers to gain unauthorized access to sensitive information via a crafted POST request to HELPTEXT.MAINMENU. 2023-03-13 not yet calculated CVE-2023-24368
MISC dell — bios
  Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with administrator privileges could potentially exploit this vulnerability to perform arbitrary code execution. 2023-03-16 not yet calculated CVE-2023-24571
MISC mcafee — total_protection
  McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys. This could enable a user with lower privileges to execute unauthorized tasks. 2023-03-13 not yet calculated CVE-2023-24577
MISC
MISC mcafee — total_protection
  McAfee Total Protection prior to 16.0.49 allows attackers to elevate user privileges due to DLL sideloading. This could enable a user with lower privileges to execute unauthorized tasks. 2023-03-13 not yet calculated CVE-2023-24578
MISC
MISC mcafee — total_protection
  McAfee Total Protection prior to 16.0.51 allows attackers to trick a victim into uninstalling the application via the command prompt. 2023-03-13 not yet calculated CVE-2023-24579
MISC
MISC vx_search — vx_search
  VX Search v13.8 and v14.7 was discovered to contain an unquoted service path vulnerability which allows attackers to execute arbitrary commands at elevated privileges via a crafted executable file. 2023-03-16 not yet calculated CVE-2023-24671
MISC
MISC centralite — pearl_thermostat
  A vulnerability in Centralite Pearl Thermostat 0x04075010 allows attackers to cause a Denial of Service (DoS) via a crafted Zigbee message. 2023-03-17 not yet calculated CVE-2023-24678
MISC
MISC ofcms — ofcms
  An issue found in Ofcms v.1.1.4 allows a remote attacker to to escalate privileges via the respwd method in SysUserController. 2023-03-16 not yet calculated CVE-2023-24760
MISC
MISC jcg-cn — jhr-n916r
  Command execution vulnerability was discovered in JHR-N916R router firmware version<=21.11.1.1483. 2023-03-16 not yet calculated CVE-2023-24795
MISC prestashop — prestashop
  PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1. 2023-03-13 not yet calculated CVE-2023-25170
MISC discourse — discourse
  Discourse is an open-source discussion platform. Prior to version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches, a maliciously crafted URL can be included in a user’s full name field to to carry out cross-site scripting attacks on sites with a disabled or overly permissive CSP (Content Security Policy). Discourse’s default CSP prevents this vulnerability. The vulnerability is patched in version 3.0.1 of the `stable` branch and version 3.1.0.beta2 of the `beta` and `tests-passed` branches. As a workaround, enable and/or restore your site’s CSP to the default one provided with Discourse. 2023-03-17 not yet calculated CVE-2023-25172
MISC
MISC
MISC
MISC
MISC gfi — kerio_connect
  An issue was discovered in GFI Kerio Connect 9.4.1 patch 1 (fixed in 10.0.0). There is a stack-based Buffer Overflow in the webmail component’s 2FASetup function via an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI. 2023-03-15 not yet calculated CVE-2023-25267
MISC
MISC d-link — dir820la1_fw105b03
  OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp. 2023-03-16 not yet calculated CVE-2023-25280
MISC
MISC d-link — dir820la1_fw105b03
  A stack overflow vulnerability exists in pingV4Msg component in D-Link DIR820LA1_FW105B03, allows attackers to cause a denial of service via the nextPage parameter to ping.ccp. 2023-03-16 not yet calculated CVE-2023-25281
MISC
MISC roxy-wi — roxy-wi
  Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don’t correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a server. Version 6.3.6.0 has a patch for this issue. 2023-03-13 not yet calculated CVE-2023-25802
MISC
MISC roxy-wi — roxy-wi
  Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a directory traversal vulnerability that allows the inclusion of server-side files. This issue is fixed in version 6.3.5.0. 2023-03-13 not yet calculated CVE-2023-25803
MISC discourse — discourse
  Discourse is an open-source discussion platform. Between versions 3.1.0.beta2 and 3.1.0.beta3 of the `tests-passed` branch, editing or responding to a chat message containing malicious content could lead to a cross-site scripting attack. This issue is patched in version 3.1.0.beta3 of the `tests-passed` branch. There are no known workarounds. 2023-03-17 not yet calculated CVE-2023-26040
MISC
MISC arm-software — aarch64cryptolib
  The armv8_dec_aes_gcm_full() API of Arm AArch64cryptolib before 86065c6 fails to the verify the authentication tag of AES-GCM protected data, leading to a man-in-the-middle attack. This occurs because of an improperly initialized variable. 2023-03-15 not yet calculated CVE-2023-26084
MISC collection.js — collection.js
  Versions of the package collection.js before 6.8.1 are vulnerable to Prototype Pollution via the extend function in Collection.js/dist/node/iterators/extend.js. 2023-03-18 not yet calculated CVE-2023-26113
MISC
MISC
MISC
MISC
MISC sitecore_xp/xm — sitecore_xp/xm
  An issue was discovered in Sitecore XP/XM 10.3. As an authenticated Sitecore user, a unrestricted language file upload vulnerability exists the can lead to direct code execution on the content management (CM) server. 2023-03-14 not yet calculated CVE-2023-26262
MISC
MISC sap_se — netweaver_as for abap and abap_platform
  Due to improper input controls In SAP NetWeaver AS for ABAP and ABAP Platform – versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, an attacker authenticated as a non-administrative user can craft a request which will trigger the application server to send a request to an arbitrary URL which can reveal, modify or make unavailable non-sensitive information, leading to low impact on Confidentiality, Integrity and Availability. 2023-03-14 not yet calculated CVE-2023-26459
MISC
MISC sap_se — netweaver_application_server_for_java
  Cache Management Service in SAP NetWeaver Application Server for Java – version 7.50, does not perform any authentication checks for functionalities that require user identity 2023-03-14 not yet calculated CVE-2023-26460
MISC
MISC sap_se — netweaver
  SAP NetWeaver allows (SAP Enterprise Portal) – version 7.50, allows an authenticated attacker with sufficient privileges to access the XML parser which can submit a crafted XML file which when parsed will enable them to access but not modify sensitive files and data. It allows the attacker to view sensitive data which is owned by certain privileges. 2023-03-14 not yet calculated CVE-2023-26461
MISC
MISC kubevirt — kubevirt
  KubeVirt is a virtual machine management add-on for Kubernetes. In versions 0.59.0 and prior, if a malicious user has taken over a Kubernetes node where virt-handler (the KubeVirt node-daemon) is running, the virt-handler service account can be used to modify all node specs. This can be misused to lure-in system-level-privileged components which can, for instance, read all secrets on the cluster, or can exec into pods on other nodes. This way, a compromised node can be used to elevate privileges beyond the node until potentially having full privileged access to the whole cluster. The simplest way to exploit this, once a user could compromise a specific node, is to set with the virt-handler service account all other nodes to unschedulable and simply wait until system-critical components with high privileges appear on its node. No patches are available as of time of publication. As a workaround, gatekeeper users can add a webhook which will block the `virt-handler` service account to modify the spec of a node. 2023-03-15 not yet calculated CVE-2023-26484
MISC
MISC propius_machineselector — propius_machineselector
  A Hard Coded Admin Credentials issue in the Web-UI Admin Panel in Propius MachineSelector 6.6.0 and 6.6.1 allows remote attackers to gain access to the admin panel Propiusadmin.php, which allows taking control of the affected system. 2023-03-14 not yet calculated CVE-2023-26511
MISC liblouis — liblouis
  Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint. 2023-03-16 not yet calculated CVE-2023-26767
MISC
MISC liblouis — liblouis
  Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions. 2023-03-16 not yet calculated CVE-2023-26768
MISC
MISC liblouis — liblouis
  Buffer Overflow vulnerability found in Liblouis Lou_Trace v.3.24.0 allows a remote attacker to cause a denial of service via the resolveSubtable function at compileTranslationTabel.c. 2023-03-16 not yet calculated CVE-2023-26769
MISC
MISC
MISC kirin — fortress_machine
  SQL Injection vulnerability found in Kirin Fortress Machine v.1.7-2020-0610 allows attackers to execute arbitrary code via the /admin.php?controller=admin_commonuser parameter. 2023-03-16 not yet calculated CVE-2023-26784
MISC
MISC onekeyadmin — onekeyadmin
  onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Member List module. 2023-03-16 not yet calculated CVE-2023-26951
MISC wondershare_dr.fone — wondershare_dr.fone
  Wondershare Dr.Fone v12.9.6 was discovered to contain weak permissions for the service WsDrvInst. This vulnerability allows attackers to escalate privileges via modifying or overwriting the executable. 2023-03-13 not yet calculated CVE-2023-27010
MISC
MISC qibosoft — qibocms
  Qibosoft QiboCMS v7 was discovered to contain a remote code execution (RCE) vulnerability via the Get_Title function at label_set_rs.php 2023-03-16 not yet calculated CVE-2023-27037
MISC simple_image_gallery — simple_image_gallery
  Simple Image Gallery v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the username parameter. 2023-03-16 not yet calculated CVE-2023-27040
MISC school_registration_and_fee_system — school_registration_and_fee_system
  School Registration and Fee System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at/bilal final/edit_user.php. 2023-03-16 not yet calculated CVE-2023-27041
MISC churchcrm — churchcrm
  A cross-site scripting (XSS) vulnerability in the Edit Group function of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit Group Name text field. 2023-03-16 not yet calculated CVE-2023-27059
MISC dreamer_cms — dreamer_cms
  Permissions vulnerability found in isoftforce Dreamer CMS v.4.0.1 allows local attackers to obtain sensitive information via the AttachmentController parameter. 2023-03-16 not yet calculated CVE-2023-27084
MISC
MISC hippo4j — hippo4j
  Insecure Permissions vulnerability found in OpenGoofy Hippo4j v.1.4.3 allows attacker toescalate privileges via the AddUser method of the UserController function in Tenant Management module. 2023-03-16 not yet calculated CVE-2023-27095
MISC libde265 — libde265
  Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc. 2023-03-15 not yet calculated CVE-2023-27102
MISC typecho — typecho
  Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via an arbitrarily supplied URL parameter. 2023-03-16 not yet calculated CVE-2023-27130
MISC
MISC typecho — typecho
  Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code viathe Post Editorparameter. 2023-03-16 not yet calculated CVE-2023-27131
MISC jizhicms — jizhicms
  A Cross-Site Request Forgery (CSRF) in /Sys/index.html of Jizhicms v2.4.5 allows attackers to arbitrarily make configuration changes within the application. 2023-03-15 not yet calculated CVE-2023-27234
MISC tenda — ax3
  Tenda AX3 V16.03.12.11 was discovered to contain a stack overflow via the shareSpeed parameter at /goform/WifiGuestSet. 2023-03-15 not yet calculated CVE-2023-27239
MISC tenda — ax3
  Tenda AX3 V16.03.12.11 was discovered to contain a command injection vulnerability via the lanip parameter at /goform/AdvSetLanip. 2023-03-15 not yet calculated CVE-2023-27240
MISC online_book_store_project — online_book_store_project
  Online Book Store Project v1.0 is vulnerable to SQL Injection via /bookstore/bookPerPub.php. 2023-03-16 not yet calculated CVE-2023-27250
MISC netgate — pfsense
  A command injection vulnerability in the function restore_rrddata() of Netgate pfSense v2.7.0 allows authenticated attackers to execute arbitrary commands via manipulating the contents of an XML file supplied to the component config.xml. 2023-03-17 not yet calculated CVE-2023-27253
MISC
MISC sap — netweaver_as_java
  SAP NetWeaver AS Java (Object Analyzing Service) – version 7.50, does not perform necessary authorization checks, allowing an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access a service which will enable them to access but not modify server settings and data with no effect on availability., resulting in escalation of privileges. 2023-03-14 not yet calculated CVE-2023-27268
MISC
MISC sap — netweaver_application_server
  SAP NetWeaver Application Server for ABAP and ABAP Platform – versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, allows an attacker with non-administrative authorizations to exploit a directory traversal flaw in an available service to overwrite the system files. In this attack, no data can be read but potentially critical OS files can be overwritten making the system unavailable. 2023-03-14 not yet calculated CVE-2023-27269
MISC
MISC sap — netweaver_application_server
  SAP NetWeaver Application Server for ABAP and ABAP Platform – versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, has multiple vulnerabilities in a class for test purposes in which an attacker authenticated as a non-administrative user can craft a request with certain parameters, which will consume the server’s resources sufficiently to make it unavailable. There is no ability to view or modify any information. 2023-03-14 not yet calculated CVE-2023-27270
MISC
MISC sap — businessobjects_business_intelligence_platform
  In SAP BusinessObjects Business Intelligence Platform (Web Services) – versions 420, 430, an attacker can control a malicious BOE server, forcing the application server to connect to its own admintools, leading to a high impact on availability. 2023-03-14 not yet calculated CVE-2023-27271
MISC
MISC streamlit — streamlit
  Streamlit, software for turning data scripts into web applications, had a cross-site scripting (XSS) vulnerability in versions 0.63.0 through 0.80.0. Users of hosted Streamlit app(s) were vulnerable to a reflected XSS vulnerability. An attacker could craft a malicious URL with Javascript payloads to a Streamlit app. The attacker could then trick the user into visiting the malicious URL and, if successful, the server would render the malicious javascript payload as-is, leading to XSS. Version 0.81.0 contains a patch for this vulnerability. 2023-03-16 not yet calculated CVE-2023-27494
MISC
MISC sap — host_agent
  SAP Host Agent (SAPOSCOL) – version 7.22, allows an unauthenticated attacker with network access to a server port assigned to the SAP Start Service to submit a crafted request which results in a memory corruption error. This error can be used to reveal but not modify any technical information about the server. It can also make a particular service temporarily unavailable 2023-03-14 not yet calculated CVE-2023-27498
MISC
MISC sap — saprsbro
  An attacker with non-administrative authorizations can exploit a directory traversal flaw in program SAPRSBRO to over-write system files. In this attack, no data can be read but potentially critical OS files can be over-written making the system unavailable. 2023-03-14 not yet calculated CVE-2023-27500
MISC
MISC codeigniter — shield
  CodeIgniter Shield provides authentication and authorization for the CodeIgniter 4 PHP framework. An improper implementation was found in the password storage process. All hashed passwords stored in Shield v1.0.0-beta.3 or earlier are easier to crack than expected due to the vulnerability. Therefore, they should be removed as soon as possible. If an attacker gets (1) the user’s hashed password by Shield, and (2) the hashed password (SHA-384 hash without salt) from somewhere, the attacker may easily crack the user’s password. Upgrade to Shield v1.0.0-beta.4 or later to fix this issue. After upgrading, all users’ hashed passwords should be updated (saved to the database). There are no known workarounds. 2023-03-13 not yet calculated CVE-2023-27580
MISC
MISC
MISC
MISC
MISC
MISC pjsip — pjsip
  PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.13 and prior affects applications that use PJSIP DNS resolver. It doesn’t affect PJSIP users who do not utilise PJSIP DNS resolver. This vulnerability is related to CVE-2022-24793. A patch is available as commit `d1c5e4d` in the `master` branch. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an external resolver implementation instead. 2023-03-14 not yet calculated CVE-2023-27585
MISC
MISC
MISC
MISC hasura — graphql_engine
  Hasura is an open-source product that provides users GraphQL or REST APIs. A path traversal vulnerability has been discovered within Hasura GraphQL Engine prior to versions 1.3.4, 2.55.1, 2.20.1, and 2.21.0-beta1. Projects running on Hasura Cloud were not vulnerable. Self-hosted Hasura Projects with deployments that are publicly exposed and not protected by a WAF or other HTTP protection layer should be upgraded to version 1.3.4, 2.55.1, 2.20.1, or 2.21.0-beta1 to receive a patch. 2023-03-14 not yet calculated CVE-2023-27588
MISC
MISC
MISC
MISC
MISC
MISC minio — minio
  Minio is a Multi-Cloud Object Storage framework. Starting with RELEASE.2020-12-23T02-24-12Z and prior to RELEASE.2023-03-13T19-46-17Z, a user with `consoleAdmin` permissions can potentially create a user that matches the root credential `accessKey`. Once this user is created successfully, the root credential ceases to work appropriately. The issue is patched in RELEASE.2023-03-13T19-46-17Z. There are ways to work around this via adding higher privileges to the disabled root user via `mc admin policy set`. 2023-03-14 not yet calculated CVE-2023-27589
MISC
MISC rizin — rizin
  Rizin is a UNIX-like reverse engineering framework and command-line toolset. In version 0.5.1 and prior, converting a GDB registers profile file into a Rizin register profile can result in a stack-based buffer overflow when the `name`, `type`, or `groups` fields have longer values than expected. Users opening untrusted GDB registers files (e.g. with the `drpg` or `arpg` commands) are affected by this flaw. Commit d6196703d89c84467b600ba2692534579dc25ed4 contains a patch for this issue. As a workaround, review the GDB register profiles before loading them with `drpg`/`arpg` commands. 2023-03-14 not yet calculated CVE-2023-27590
MISC
MISC
MISC
MISC
MISC miniflux — miniflux
  Miniflux is a feed reader. Prior to version 2.0.43, an unauthenticated user can retrieve Prometheus metrics from a publicly reachable Miniflux instance where the `METRICS_COLLECTOR` configuration option is enabled and `METRICS_ALLOWED_NETWORKS` is set to `127.0.0.1/8` (the default). A patch is available in Miniflux 2.0.43. As a workaround, set `METRICS_COLLECTOR` to `false` (default) or run Miniflux behind a trusted reverse-proxy. 2023-03-17 not yet calculated CVE-2023-27591
MISC
MISC
MISC
MISC miniflux — miniflux
  Miniflux is a feed reader. Since v2.0.25, Miniflux will automatically proxy images served over HTTP to prevent mixed content errors. When an outbound request made by the Go HTTP client fails, the `html.ServerError` is returned unescaped without the expected Content Security Policy header added to valid responses. By creating an RSS feed item with the inline description containing an `<img>` tag with a `srcset` attribute pointing to an invalid URL like `http:a<script>alert(1)</script>`, we can coerce the proxy handler into an error condition where the invalid URL is returned unescaped and in full. This results in JavaScript execution on the Miniflux instance as soon as the user is convinced (e.g. by a message in the alt text) to open the broken image. An attacker can execute arbitrary JavaScript in the context of a victim Miniflux user when they open a broken image in a crafted RSS feed. This can be used to perform actions on the Miniflux instance as that user and gain administrative access to the Miniflux instance if it is reachable and the victim is an administrator. A patch is available in version 2.0.43. As a workaround sisable image proxy; default value is `http-only`. 2023-03-17 not yet calculated CVE-2023-27592
MISC
MISC
MISC
MISC
MISC
MISC
MISC cilium — cilium
  Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, an attacker with access to a Cilium agent pod can write to `/opt/cni/bin` due to a `hostPath` mount of that directory in the agent pod. By replacing the CNI binary with their own malicious binary and waiting for the creation of a new pod on the node, the attacker can gain access to the underlying node. The issue has been fixed and the fix is available on versions 1.11.15, 1.12.8, and 1.13.1. Some workarounds are available. Kubernetes RBAC should be used to deny users and service accounts `exec` access to Cilium agent pods. In cases where a user requires `exec` access to Cilium agent pods, but should not have access to the underlying node, no workaround is possible. 2023-03-17 not yet calculated CVE-2023-27593
MISC
MISC
MISC
MISC
MISC
MISC cilium — cilium
  Cilium is a networking, observability, and security solution with an eBPF-based dataplane. Prior to versions 1.11.15, 1.12.8, and 1.13.1, under specific conditions, Cilium may misattribute the source IP address of traffic to a cluster, identifying external traffic as coming from the host on which Cilium is running. As a consequence, network policies for that cluster might be bypassed, depending on the specific network policies enabled. This issue only manifests when Cilium is routing IPv6 traffic and NodePorts are used to route traffic to pods. IPv6 and endpoint routes are both disabled by default. The problem has been fixed and is available on versions 1.11.15, 1.12.8, and 1.13.1. As a workaround, disable IPv6 routing. 2023-03-17 not yet calculated CVE-2023-27594
MISC
MISC
MISC
MISC cilium — cilium
  Cilium is a networking, observability, and security solution with an eBPF-based dataplane. In version 1.13.0, when Cilium is started, there is a short period when Cilium eBPF programs are not attached to the host. During this period, the host does not implement any of Cilium’s featureset. This can cause disruption to newly established connections during this period due to the lack of Load Balancing, or can cause Network Policy bypass due to the lack of Network Policy enforcement during the window. This vulnerability impacts any Cilium-managed endpoints on the node (such as Kubernetes Pods), as well as the host network namespace (including Host Firewall). This vulnerability is fixed in Cilium 1.13.1 or later. Cilium releases 1.12.x, 1.11.x, and earlier are not affected. There are no known workarounds. 2023-03-17 not yet calculated CVE-2023-27595
MISC
MISC
MISC opensips — opensips
  OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.8 and 3.2.5, OpenSIPS crashes when a malformed SDP body is sent multiple times to an OpenSIPS configuration that makes use of the `stream_process` function. This issue was discovered during coverage guided fuzzing of the function `codec_delete_except_re`. By abusing this vulnerability, an attacker is able to crash the server. It affects configurations containing functions that rely on the affected code, such as the function `codec_delete_except_re`. This issue has been fixed in version 3.1.8 and 3.2.5. 2023-03-15 not yet calculated CVE-2023-27596
MISC
MISC opensips — opensips
  OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.8 and 3.2.5, when a specially crafted SIP message is processed by the function `rewrite_ruri`, a crash occurs due to a segmentation fault. This issue causes the server to crash. It affects configurations containing functions that make use of the affected code, such as the function `setport`. This issue has been fixed in version 3.1.8 and 3.2.5. 2023-03-15 not yet calculated CVE-2023-27597
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, sending a malformed `Via` header to OpenSIPS triggers a segmentation fault when the function `calc_tag_suffix` is called. A specially crafted `Via` header, which is deemed correct by the parser, will pass uninitialized strings to the function `MD5StringArray` which leads to the crash. Abuse of this vulnerability leads to Denial of Service due to a crash. Since the uninitialized string points to memory location `0x0`, no further exploitation appears to be possible. No special network privileges are required to perform this attack, as long as the OpenSIPS configuration makes use of functions such as `sl_send_reply` or `sl_gen_totag` that trigger the vulnerable code. This issue has been fixed in versions 3.1.7 and 3.2.4. 2023-03-15 not yet calculated CVE-2023-27598
MISC
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, when the function `append_hf` handles a SIP message with a malformed To header, a call to the function `abort()` is performed, resulting in a crash. This is due to the following check in `data_lump.c:399` in the function `anchor_lump`. An attacker abusing this vulnerability will crash OpenSIPS leading to Denial of Service. It affects configurations containing functions that make use of the affected code, such as the function `append_hf`. This issue has been fixed in versions 3.1.7 and 3.2.4. 2023-03-15 not yet calculated CVE-2023-27599
MISC
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, OpenSIPS crashes when a malformed SDP body is received and is processed by the `delete_sdp_line` function in the sipmsgops module. This issue can be reproduced by calling the function with an SDP body that does not terminate by a line feed (i.e. `n`). The vulnerability was found while performing black-box fuzzing against an OpenSIPS server running a configuration that made use of the functions `codec_delete_except_re` and `codec_delete_re`. The same issue was also discovered while performing coverage guided fuzzing on the function `codec_delete_except_re`. The crash happens because the function `delete_sdp_line` expects that an SDP line is terminated by a line feed (`n`). By abusing this vulnerability, an attacker is able to crash the server. It affects configurations containing functions that rely on the affected code, such as the function `codec_delete_except_re`. Due to the sanity check that is performed in the `del_lump` function, exploitation of this issue will generate an `abort` in the lumps processing function, resulting in a Denial of Service. This issue is patched in versions 3.1.7 and 3.2.4. 2023-03-15 not yet calculated CVE-2023-27600
MISC
MISC
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, OpenSIPS crashes when a malformed SDP body is received and is processed by the `delete_sdp_line` function in the sipmsgops module. This issue can be reproduced by calling the function with an SDP body that does not terminate by a line feed (i.e. `n`). The vulnerability was found while performing black-box fuzzing against an OpenSIPS server running a configuration that made use of the functions `codec_delete_except_re` and `codec_delete_re`. The same issue was also discovered while performing coverage guided fuzzing on the function `codec_delete_except_re`. The crash happens because the function `delete_sdp_line` expects that an SDP line is terminated by a line feed (`n`): By abusing this vulnerability, an attacker is able to crash the server. It affects configurations containing functions that rely on the affected code, such as the function `codec_delete_except_re`. Due to the sanity check that is performed in the `del_lump` function, exploitation of this issue will generate an `abort` in the lumps processing function, resulting in a Denial of Service. This issue has been fixed in versions 3.1.7 and 3.2.4. 2023-03-15 not yet calculated CVE-2023-27601
MISC
MISC
MISC
MISC dedecms — dedecms SQL injection vulnerability found in DedeCMS v.5.7.106 allows a remote attacker to execute arbitrary code via the rank_* parameter in the /dede/group_store.php endpoint. 2023-03-16 not yet calculated CVE-2023-27707
MISC dedecms — dedecms SQL injection vulnerability found in DedeCMS v.5.7.106 allows a remote attacker to execute arbitrary code via the rank_* parameter in the /dedestory_catalog.php endpoint. 2023-03-16 not yet calculated CVE-2023-27709
MISC typecho — typecho Cross Site Scripting vulnerability found in Typecho v.1.2.0 allows a remote attacker to execute arbitrary code via the Comment Manager /admin/manage-comments.php component. 2023-03-16 not yet calculated CVE-2023-27711
MISC
MISC tcpreplay — tcprewrite An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c. 2023-03-16 not yet calculated CVE-2023-27783
MISC
MISC tcpreplay — tcpreplay An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause a denial of service via the read_hexstring function at the utils.c:309 endpoint. 2023-03-16 not yet calculated CVE-2023-27784
MISC tcpreplay — tcpprep An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse endpoints function. 2023-03-16 not yet calculated CVE-2023-27785
MISC tcpprep — tcpprep An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function. 2023-03-16 not yet calculated CVE-2023-27786
MISC
MISC tcpprep — tcpprep An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint. 2023-03-16 not yet calculated CVE-2023-27787
MISC tcpreplay — tcprewrite An issue found in TCPrewrite v.4.4.3 allows a remote attacker to cause a denial of service via the ports2PORT function at the portmap.c:69 endpoint. 2023-03-16 not yet calculated CVE-2023-27788
MISC tcpprep — tcpprep An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the cidr2cidr function at the cidr.c:178 endpoint. 2023-03-16 not yet calculated CVE-2023-27789
MISC
MISC ibm — aspera_faspex IBM Aspera Faspex 5.0.4 could allow an authenticated user to change other user’s credentials due to improper access controls. IBM X-Force ID: 249847. 2023-03-16 not yet calculated CVE-2023-27875
MISC
MISC sap — solution_manager_and_abap_managed_systems An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) – versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable. 2023-03-14 not yet calculated CVE-2023-27893
MISC
MISC sap — businessobjects_business_intelligence_platform SAP BusinessObjects Business Intelligence Platform (Web Services) – versions 420, 430, allows an attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to execute malicious requests, resulting in sensitive information disclosure. This causes limited impact on confidentiality of data. 2023-03-14 not yet calculated CVE-2023-27894
MISC
MISC sap — authenticator_for_android SAP Authenticator for Android – version 1.3.0, allows the screen to be captured, if an authorized attacker installs a malicious app on the mobile device. The attacker could extract the currently views of the OTP and the secret OTP alphanumeric token during the token setup. On successful exploitation, an attacker can read some sensitive information but cannot modify and delete the data. 2023-03-14 not yet calculated CVE-2023-27895
MISC
MISC sap — businessobjects_business_intelligence_platform In SAP BusinessObjects Business Intelligence Platform – version 420, 430, an attacker can control a malicious BOE server, forcing the application server to connect to its own CMS, leading to a high impact on availability. 2023-03-14 not yet calculated CVE-2023-27896
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Versions prior to 3.1.7 and 3.2.4 have a potential issue in `msg_translator.c:2628` which might lead to a server crash. This issue was found while fuzzing the function `build_res_buf_from_sip_req` but could not be reproduced against a running instance of OpenSIPS. This issue could not be exploited against a running instance of OpenSIPS since no public function was found to make use of this vulnerable code. Even in the case of exploitation through unknown vectors, it is highly unlikely that this issue would lead to anything other than Denial of Service. This issue has been fixed in versions 3.1.7 and 3.2.4. 2023-03-15 not yet calculated CVE-2023-28095
MISC
MISC
MISC opensips — opensips OpenSIPS, a Session Initiation Protocol (SIP) server implementation, has a memory leak starting in the 2.3 branch and priot to versions 3.1.8 and 3.2.5. The memory leak was detected in the function `parse_mi_request` while performing coverage-guided fuzzing. This issue can be reproduced by sending multiple requests of the form `{“jsonrpc”: “2.0”,”method”: “log_le`. This malformed message was tested against an instance of OpenSIPS via FIFO transport layer and was found to increase the memory consumption over time. To abuse this memory leak, attackers need to reach the management interface (MI) which typically should only be exposed on trusted interfaces. In cases where the MI is exposed to the internet without authentication, abuse of this issue will lead to memory exhaustion which may affect the underlying system’s availability. No authentication is typically required to reproduce this issue. On the other hand, memory leaks may occur in other areas of OpenSIPS where the cJSON library is used for parsing JSON objects. The issue has been fixed in versions 3.1.8 and 3.2.5. 2023-03-15 not yet calculated CVE-2023-28096
MISC
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.9 and 3.2.6, a malformed SIP message containing a large _Content-Length_ value and a specially crafted Request-URI causes a segmentation fault in OpenSIPS. This issue occurs when a large amount of shared memory using the `-m` flag was allocated to OpenSIPS, such as 10 GB of RAM. On the test system, this issue occurred when shared memory was set to `2362` or higher. This issue is fixed in versions 3.1.9 and 3.2.6. The only workaround is to guarantee that the Content-Length value of input messages is never larger than `2147483647`. 2023-03-15 not yet calculated CVE-2023-28097
MISC
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.7 and 3.2.4, a specially crafted Authorization header causes OpenSIPS to crash or behave in an unexpected way due to a bug in the function `parse_param_name()` . This issue was discovered while performing coverage guided fuzzing of the function parse_msg. The AddressSanitizer identified that the issue occurred in the function `q_memchr()` which is being called by the function `parse_param_name()`. This issue may cause erratic program behaviour or a server crash. It affects configurations containing functions that make use of the affected code, such as the function `www_authorize()` . Versions 3.1.7 and 3.2.4 contain a fix. 2023-03-15 not yet calculated CVE-2023-28098
MISC
MISC
MISC opensips — opensips OpenSIPS is a Session Initiation Protocol (SIP) server implementation. Prior to versions 3.1.9 and 3.2.6, if `ds_is_in_list()` is used with an invalid IP address string (`NULL` is illegal input), OpenSIPS will attempt to print a string from a random address (stack garbage), which could lead to a crash. All users of `ds_is_in_list()` without the `$si` variable as 1st parameter could be affected by this vulnerability to a larger, lesser or no extent at all, depending if the data passed to the function is a valid IPv4 or IPv6 address string or not. Fixes will are available starting with the 3.1.9 and 3.2.6 minor releases. There are no known workarounds. 2023-03-15 not yet calculated CVE-2023-28099
MISC
MISC
MISC flatpak — flatpak Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4 contain a vulnerability similar to CVE-2017-5226, but using the `TIOCLINUX` ioctl command instead of `TIOCSTI`. If a Flatpak app is run on a Linux virtual console such as `/dev/tty1`, it can copy text from the virtual console and paste it into the command buffer, from which the command might be run after the Flatpak app has exited. Ordinary graphical terminal emulators like xterm, gnome-terminal and Konsole are unaffected. This vulnerability is specific to the Linux virtual consoles `/dev/tty1`, `/dev/tty2` and so on. A patch is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, don’t run Flatpak on a Linux virtual console. Flatpak is primarily designed to be used in a Wayland or X11 graphical environment. 2023-03-16 not yet calculated CVE-2023-28100
MISC
MISC
MISC flatpak — flatpak
  Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4, if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. A fix is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, use a GUI like GNOME Software rather than the command-line interface, or only install apps whose maintainers you trust. 2023-03-16 not yet calculated CVE-2023-28101
MISC
MISC
MISC
MISC silverstripe — silverstripe_graphql
  `silverstripe/graphql` serves Silverstripe data as GraphQL representations. In versions 4.2.2 and 4.1.1, an attacker could use a specially crafted graphql query to execute a denial of service attack against a website which has a publicly exposed graphql endpoint. This mostly affects websites with particularly large/complex graphql schemas. Users should upgrade to `silverstripe/graphql` 4.2.3 or 4.1.2 to remedy the vulnerability. 2023-03-16 not yet calculated CVE-2023-28104
MISC
MISC
MISC
MISC go-used-util — go-used-util
  go-used-util has commonly used utility functions for Go. Versions prior to 0.0.34 have a ZipSlip issue when using fsutil package to unzip files. When users use `zip.Unzip` to unzip zip files from a malicious attacker, they may be vulnerable to path traversal. The issue has been fixed in version 0.0.34. There are no known workarounds. 2023-03-16 not yet calculated CVE-2023-28105
MISC
MISC pimcore — pimcore
  Pimcore is an open source data and experience management platform. Prior to version 10.5.19, an attacker can use cross-site scripting to send a malicious script to an unsuspecting user. Users may upgrade to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually. 2023-03-16 not yet calculated CVE-2023-28106
MISC
MISC
MISC
MISC discourse — discourse
  Discourse is an open-source discussion platform. Prior to version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches, a user logged as an administrator can request backups multiple times, which will eat up all the connections to the DB. If this is done on a site using multisite, then it can affect the whole cluster. The vulnerability is patched in version 3.0.2 of the `stable` branch and version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds. 2023-03-17 not yet calculated CVE-2023-28107
MISC
MISC
MISC
MISC
MISC pimcore — pimcore
  Pimcore is an open source data and experience management platform. Prior to version 10.5.19, quoting is not done properly in UUID DAO model. There is the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the DAO class. Users should update to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually. 2023-03-16 not yet calculated CVE-2023-28108
MISC
MISC
MISC docker — docker
  Play With Docker is a browser-based Docker playground. Versions 0.0.2 and prior are vulnerable to domain hijacking. Because CORS configuration was not correct, an attacker could use `play-with-docker.com` as an example and set the origin header in an http request as `evil-play-with-docker.com`. The domain would echo in response header, which successfully bypassed the CORS policy and retrieved basic user information. This issue has been fixed in commit ed82247c9ab7990ad76ec2bf1498c2b2830b6f1a. There are no known workarounds. 2023-03-16 not yet calculated CVE-2023-28109
MISC
MISC jumpserver — jumpserver
  Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco’s SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes cluster through Koko can result in the execution of dangerous commands that may disrupt the Koko container environment and affect normal usage. The vulnerability has been fixed in v2.28.8. 2023-03-16 not yet calculated CVE-2023-28110
MISC
MISC discourse — discourse
  Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, attackers are able to bypass Discourse’s server-side request forgery (SSRF) protection for private IPv4 addresses by using a IPv4-mapped IPv6 address. The issue is patched in the latest beta and tests-passed version of Discourse. version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds. 2023-03-17 not yet calculated CVE-2023-28111
MISC
MISC
MISC discourse — discourse
  Discourse is an open-source discussion platform. Prior to version 3.1.0.beta3 of the `beta` and `tests-passed` branches, some user provided URLs were being passed to FastImage without SSRF protection. Insufficient protections could enable attackers to trigger outbound network connections from the Discourse server to private IP addresses. This affects any site running the `tests-passed` or `beta` branches versions 3.1.0.beta2 and prior. This issue is patched in version 3.1.0.beta3 of the `beta` and `tests-passed` branches. There are no known workarounds. 2023-03-17 not yet calculated CVE-2023-28112
MISC
MISC
MISC warp-tech — russh
  russh is a Rust SSH client and server library. Starting in version 0.34.0 and prior to versions 0.36.2 and 0.37.1, Diffie-Hellman key validation is insufficient, which can lead to insecure shared secrets and therefore breaks confidentiality. Connections between a russh client and server or those of a russh peer with some other misbehaving peer are most likely to be problematic. These may vulnerable to eavesdropping. Most other implementations reject such keys, so this is mainly an interoperability issue in such a case. This issue is fixed in versions 0.36.2 and 0.37.1 2023-03-16 not yet calculated CVE-2023-28113
MISC
MISC
MISC
CONFIRM
MISC
MISC knp_labs — snappy
  Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2. 2023-03-17 not yet calculated CVE-2023-28115
MISC
MISC
MISC
MISC
MISC
MISC contiki-ng — contiki-ng
  Contiki-NG is an open-source, cross-platform operating system for internet of things (IoT) devices. In versions 4.8 and prior, an out-of-bounds write can occur in the BLE L2CAP module of the Contiki-NG operating system. The network stack of Contiki-NG uses a global buffer (packetbuf) for processing of packets, with the size of PACKETBUF_SIZE. In particular, when using the BLE L2CAP module with the default configuration, the PACKETBUF_SIZE value becomes larger then the actual size of the packetbuf. When large packets are processed by the L2CAP module, a buffer overflow can therefore occur when copying the packet data to the packetbuf. The vulnerability has been patched in the “develop” branch of Contiki-NG, and will be included in release 4.9. The problem can be worked around by applying the patch manually. 2023-03-17 not yet calculated CVE-2023-28116
MISC
MISC kdab — hotspot KDAB Hotspot 1.3.x and 1.4.x through 1.4.1, in a non-default configuration, allows privilege escalation because of race conditions involving symlinks and elevate_perf_privileges.sh chown calls. 2023-03-14 not yet calculated CVE-2023-28144
MISC
MISC netgear — nighthawk_wifi6_(rax30)
  When uploading a firmware image to a Netgear Nighthawk Wifi6 Router (RAX30), a hidden “forceFWUpdate” parameter may be provided to force the upgrade to complete and bypass certain validation checks. End users can use this to upload modified, unofficial, and potentially malicious firmware to the device. 2023-03-15 not yet calculated CVE-2023-28337
MISC netgear — nighthawk_wifi6_(rax30)
  Any request send to a Netgear Nighthawk Wifi6 Router (RAX30)’s web service containing a “Content-Type” of “multipartboundary=” will result in the request body being written to “/tmp/mulipartFile” on the device itself. A sufficiently large file will cause device resources to be exhausted, resulting in the device becoming unusable until it is rebooted. 2023-03-15 not yet calculated CVE-2023-28338
MISC openbsd — opendoas
  OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege escalation because of sharing a terminal with the original session. NOTE: TIOCSTI is unavailable in OpenBSD 6.0 and later, and can be made unavailable in the Linux kernel 6.2 and later. 2023-03-14 not yet calculated CVE-2023-28339
MISC altenergy_power_systems — control_software_c1.2.5
  OS command injection affects Altenergy Power Control Software C1.2.5 via shell metacharacters in the index.php/management/set_timezone timezone parameter, because of set_timezone in models/management_model.php. 2023-03-14 not yet calculated CVE-2023-28343
MISC
MISC stellarium — stellarium
  In Stellarium through 1.2, attackers can write to files that are typically unintended, such as ones with absolute pathnames or .. directory traversal. 2023-03-15 not yet calculated CVE-2023-28371
MISC
MISC
MISC dnsmasq_by_simon_kelley — dnsmasq
  An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020. 2023-03-15 not yet calculated CVE-2023-28450
MISC
MISC
MISC
MISC array_networks — apv_products
  A command injection vulnerability was discovered in Array Networks APV products. A remote attacker can send a crafted packet after logging into the affected appliance as an administrator, resulting in arbitrary shell code execution. This is fixed in 8.6.1.262 or newer and 10.4.2.93 or newer. 2023-03-15 not yet calculated CVE-2023-28460
MISC array_networks — ag_series_and_vxag
  Array Networks Array AG Series and vxAG (9.4.0.481 and earlier) allow remote code execution. An attacker can browse the filesystem on the SSL VPN gateway using a flags attribute in an HTTP header without authentication. The product could then be exploited through a vulnerable URL. The 2023-03-09 vendor advisory stated “a new Array AG release with the fix will be available soon.” 2023-03-15 not yet calculated CVE-2023-28461
MISC linux — kernel
  do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). 2023-03-16 not yet calculated CVE-2023-28466
MISC sudo — sudo
  Sudo before 1.9.13 does not escape control characters in log messages. 2023-03-16 not yet calculated CVE-2023-28486
MISC
MISC sudo — sudo
  Sudo before 1.9.13 does not escape control characters in sudoreplay output. 2023-03-16 not yet calculated CVE-2023-28487
MISC
MISC openssh — openssh
  ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. 2023-03-17 not yet calculated CVE-2023-28531
MISC misp — misp
  js/event-graph.js in MISP before 2.4.169 allows XSS via event-graph node tooltips. 2023-03-18 not yet calculated CVE-2023-28606
MISC
MISC misp — misp
  js/event-graph.js in MISP before 2.4.169 allows XSS via the event-graph relationship tooltip. 2023-03-18 not yet calculated CVE-2023-28607
MISC
MISC ansible_semaphore — ansible_semaphore
  api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication. 2023-03-18 not yet calculated CVE-2023-28609
MISC
MISC