bestwebsoft — contact_form A vulnerability was found in BestWebSoft Contact Form 3.21. It has been classified as problematic. This affects the function cntctfrm_settings_page of the file contact_form.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 3.22 is able to address this issue. The name of the patch is 8398d96ff0fe45ec9267d7259961c2ef89ed8005. It is recommended to upgrade the affected component. The identifier VDB-225321 was assigned to this vulnerability. 2023-04-09 not yet calculated CVE-2012-10010
MISC
MISC
MISC wordpress — wordpress
  A vulnerability was found in Editorial Calendar Plugin up to 2.6. It has been declared as critical. Affected by this vulnerability is the function edcal_filter_where of the file edcal.php. The manipulation of the argument edcal_startDate/edcal_endDate leads to sql injection. The attack can be launched remotely. Upgrading to version 2.7 is able to address this issue. The name of the patch is a9277f13781187daee760b4dfd052b1b68e101cc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-225151. 2023-04-08 not yet calculated CVE-2013-10023
MISC
MISC
MISC
MISC wordpress — wordpress
  A vulnerability has been found in Exit Strategy Plugin 1.55 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The name of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability. 2023-04-08 not yet calculated CVE-2013-10024
MISC
MISC
MISC wordpress — wordpress
  A vulnerability was found in Exit Strategy Plugin 1.55 and classified as problematic. Affected by this issue is the function exitpageadmin of the file exitpage.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 1.59 is able to address this issue. The name of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. VDB-225266 is the identifier assigned to this vulnerability. 2023-04-08 not yet calculated CVE-2013-10025
MISC
MISC
MISC bestwebsoft — contact_form
  A vulnerability was found in BestWebSoft Contact Form Plugin 1.3.4 and classified as problematic. Affected by this issue is the function bws_add_menu_render of the file bws_menu/bws_menu.php. The manipulation of the argument bwsmn_form_email leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The name of the patch is 4d531f74b4a801c805dc80360d4ea1312e9a278f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225320. 2023-04-09 not yet calculated CVE-2014-125095
MISC
MISC
MISC wordpress — wordpress
  A vulnerability was found in Broken Link Checker Plugin up to 1.10.5. It has been rated as problematic. Affected by this issue is the function print_module_list/show_warnings_section_notice/status_text/ui_get_action_links. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.10.6 is able to address this issue. The name of the patch is f30638869e281461b87548e40b517738b4350e47. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-225152. 2023-04-08 not yet calculated CVE-2015-10098
MISC
MISC
MISC
MISC wordpress — wordpress
  A vulnerability classified as critical has been found in CP Appointment Calendar Plugin up to 1.1.5. This affects the function dex_process_ready_to_go_appointment of the file dex_appointments.php. The manipulation of the argument itemnumber leads to sql injection. It is possible to initiate the attack remotely. The name of the patch is e29a9cdbcb0f37d887dd302a05b9e8bf213da01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225351. 2023-04-10 not yet calculated CVE-2015-10099
MISC
MISC
MISC wordpress — wordpress
  A vulnerability classified as problematic was found in Google Analytics Top Content Widget Plugin up to 1.5.6 on WordPress. Affected by this vulnerability is an unknown functionality of the file class-tgm-plugin-activation.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.7 is able to address this issue. The name of the patch is 25bb1dea113716200a6f0f3135801d84a7a65540. It is recommended to upgrade the affected component. The identifier VDB-226117 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2015-10101
MISC
MISC
MISC gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. The diff formatter using rouge can block for a long time in Sidekiq jobs without any timeout. 2023-04-15 not yet calculated CVE-2018-15472
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Remote attackers could obtain sensitive information about issues, comments, and project titles via events API insecure direct object reference. 2023-04-15 not yet calculated CVE-2018-17449
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Server-Side Request Forgery (SSRF) via the Kubernetes integration, leading (for example) to disclosure of a GCP service token. 2023-04-15 not yet calculated CVE-2018-17450
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Cross Site Request Forgery (CSRF) in the Slack integration for issuing slash commands. 2023-04-15 not yet calculated CVE-2018-17451
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Server-Side Request Forgery (SSRF) via a loopback address to the validate_localhost function in url_blocker.rb. 2023-04-15 not yet calculated CVE-2018-17452
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Attackers may have been able to obtain sensitive access-token data from Sentry logs via the GRPC::Unknown exception. 2023-04-15 not yet calculated CVE-2018-17453
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is stored XSS on the issue details screen. 2023-04-15 not yet calculated CVE-2018-17454
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Attackers could obtain sensitive information about group names, avatars, LDAP settings, and descriptions via an insecure direct object reference to the “merge request approvals” feature. 2023-04-15 not yet calculated CVE-2018-17455
MISC
CONFIRM gitlab — community/enterprise_edition
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is stored XSS on the merge request page via project import. 2023-04-15 not yet calculated CVE-2018-17536
MISC
CONFIRM lilypond — lilypond
  LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used. 2023-04-15 not yet calculated CVE-2020-17354
MISC
MISC
MISC
CONFIRM
MISC
MISC milken — doyocms
  File Upload vulnerability found in Milken DoyoCMS v.2.3 allows a remote attacker to execute arbitrary code via the upload file type parameter. 2023-04-11 not yet calculated CVE-2020-19802
MISC milken — doyocms
  Cross Site Request Forgery vulnerability found in Milken DoyoCMS v.2.3 allows a remote attacker to execute arbitrary code via the background system settings. 2023-04-11 not yet calculated CVE-2020-19803
MISC
MISC sqlite3 — sqlite3
  Buffer Overflow vulnerability found in SQLite3 v.3.27.1 and before allows a local attacker to cause a denial of service via a crafted script. 2023-04-11 not yet calculated CVE-2020-24736
MISC score — score
  The Score extension through 0.3.0 for MediaWiki has a remote code execution vulnerability due to improper sandboxing of the GNU LilyPond executable. This allows any user with an ability to edit articles (potentially including unauthenticated anonymous users) to execute arbitrary Scheme or shell code by using crafted {{Image data to generate musical scores containing malicious code. 2023-04-15 not yet calculated CVE-2020-29007
MISC
MISC
MISC
MISC
MISC tailor_mangement_system — tailor_mangement_system
  SQL injection vulnerability found in Tailor Mangement System v.1 allows a remote attacker to execute arbitrary code via the customer parameter of the orderadd.php file 2023-04-10 not yet calculated CVE-2020-36077
MISC
MISC cs-cart — shipstation
  The ShipStation.com plugin 1.1 and earlier for CS-Cart allows remote attackers to insert arbitrary information into the database (via action=shipnotify) because access to this endpoint is completely unchecked. The attacker must guess an order number. 2023-04-11 not yet calculated CVE-2020-9009
MISC
MISC visualeditor — visualeditor
  An issue was discovered in the VisualEditor extension in MediaWiki before 1.31.13, and 1.32.x through 1.35.x before 1.35.2. . When using VisualEditor to edit a MediaWiki user page belonging to an existing, but hidden, user, VisualEditor will disclose that the user exists. (It shouldn’t because they are hidden.) This is related to ApiVisualEditor. 2023-04-15 not yet calculated CVE-2021-30153
CONFIRM
CONFIRM
MISC mailman_core — mailman_core
  An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces. 2023-04-15 not yet calculated CVE-2021-34337
MISC
MISC
MISC openbmc — openbmc
  In OpenBMC 2.9, crafted IPMI messages allow an attacker to cause a denial of service to the BMC via the netipmid (IPMI lan+) interface. 2023-04-15 not yet calculated CVE-2021-39295
MISC
MISC
CONFIRM
MISC
MISC
MISC  lldpd — lldpd
  In lldpd before 1.0.13, when decoding SONMP packets in the sonmp_decode function, it’s possible to trigger an out-of-bounds heap read via short SONMP packets. 2023-04-15 not yet calculated CVE-2021-43612
MISC
CONFIRM
CONFIRM kvmtool — kvmtool
  kvmtool through 39181fc allows an out-of-bounds write, related to virtio/balloon.c and virtio/pci.c. This allows a guest OS user to execute arbitrary code on the host machine. 2023-04-15 not yet calculated CVE-2021-45464
MISC
MISC
MISC
MISC fluent — treasure_data_fluent_bit
  An issue was discovered in Treasure Data Fluent Bit 1.7.1, erroneous parsing in flb_pack_msgpack_to_json_format leads to type confusion bug that interprets whatever is on the stack as msgpack maps and arrays, leading to use-after-free. This can be used by an attacker to craft a specially craft file and trick the victim opening it using the affect software, triggering use-after-free and execute arbitrary code on the target system. 2023-04-11 not yet calculated CVE-2021-46878
MISC
MISC fluent — treasure_data_fluent_bit
  An issue was discovered in Treasure Data Fluent Bit 1.7.1, a wrong variable is used to get the msgpack data resulting in a heap overflow in flb_msgpack_gelf_value_ext. An attacker can craft a malicious file and tick the victim to open the file with the software, triggering a heap overflow and execute arbitrary code on the target system. 2023-04-11 not yet calculated CVE-2021-46879
MISC
MISC libressl/openbsd — libressl/openbsd
  x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded. 2023-04-15 not yet calculated CVE-2021-46880
MISC
MISC
MISC insyde — kernel
  An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. Specially formatted buffer contents used for software SMI could cause SMRAM corruption, leading to escalation of privilege. 2023-04-12 not yet calculated CVE-2022-24350
MISC
MISC calibre-web — calibre-web
  Improper Restriction of Excessive Authentication Attempts in GitHub repository janeczku/calibre-web prior to 0.6.20. 2023-04-15 not yet calculated CVE-2022-2525
CONFIRM
MISC qualcomm — snapdragon
  Memory correction in modem due to buffer overwrite during coap connection 2023-04-13 not yet calculated CVE-2022-25678
MISC qualcomm — snapdragon
  Information disclosure in modem data due to array out of bound access while handling the incoming DNS response packet 2023-04-13 not yet calculated CVE-2022-25726
MISC qualcomm — snapdragon
  Information disclosure in modem due to improper check of IP type while processing DNS server query 2023-04-13 not yet calculated CVE-2022-25730
MISC qualcomm — snapdragon
  Information disclosure in modem due to buffer over-read while processing packets from DNS server 2023-04-13 not yet calculated CVE-2022-25731
MISC qualcomm — snapdragon
  Information disclosure in modem due to missing NULL check while reading packets received from local network 2023-04-13 not yet calculated CVE-2022-25737
MISC qualcomm — snapdragon
  Denial of service in modem due to missing null check while processing the ipv6 packet received during ECM call 2023-04-13 not yet calculated CVE-2022-25739
MISC qualcomm — snapdragon
  Memory corruption in modem due to buffer overwrite while building an IPv6 multicast address based on the MAC address of the iface 2023-04-13 not yet calculated CVE-2022-25740
MISC qualcomm — snapdragon
  Memory corruption in modem due to improper input validation while handling the incoming CoAP message 2023-04-13 not yet calculated CVE-2022-25745
MISC qualcomm — snapdragon
  Information disclosure in modem due to improper input validation during parsing of upcoming CoAP message 2023-04-13 not yet calculated CVE-2022-25747
MISC fortinet — fortisandbox
  A improper neutralization of special elements used in an sql command (‘sql injection’) vulnerability [CWE-89] in Fortinet FortiSandbox version 4.2.0, 4.0.0 through 4.0.2, 3.2.0 through 3.2.3, 3.1.x and 3.0.x allows a remote and authenticated attacker with read permission to retrieve arbitrary files from the underlying Linux system via a crafted HTTP request. 2023-04-11 not yet calculated CVE-2022-27485
MISC fortinet — fortisandbox
  A improper privilege management in Fortinet FortiSandbox version 4.2.0 through 4.2.2, 4.0.0 through 4.0.2 and before 3.2.3 and FortiDeceptor version 4.1.0, 4.0.0 through 4.0.2 and before 3.3.3 allows a remote authenticated attacker to perform unauthorized API calls via crafted HTTP or HTTPS requests. 2023-04-11 not yet calculated CVE-2022-27487
MISC qualcomm — snapdragon
  memory corruption in modem due to improper check while calculating size of serialized CoAP message 2023-04-13 not yet calculated CVE-2022-33211
MISC qualcomm — snapdragon
  Information disclosure due to buffer over-read while parsing DNS response packets in Modem. 2023-04-13 not yet calculated CVE-2022-33222
MISC qualcomm — snapdragon
  Transient DOS in Modem due to null pointer dereference while processing the incoming packet with http chunked encoding. 2023-04-13 not yet calculated CVE-2022-33223
MISC qualcomm — snapdragon
  Information disclosure sue to buffer over-read in modem while processing ipv6 packet with hop-by-hop or destination option in header. 2023-04-13 not yet calculated CVE-2022-33228
MISC qualcomm — snapdragon
  Memory corruption due to double free in core while initializing the encryption key. 2023-04-13 not yet calculated CVE-2022-33231
MISC qualcomm — snapdragon
  Information disclosure due to buffer over-read in modem while reading configuration parameters. 2023-04-13 not yet calculated CVE-2022-33258
MISC qualcomm — snapdragon
  Memory corruption due to buffer copy without checking the size of input in modem while decoding raw SMS received. 2023-04-13 not yet calculated CVE-2022-33259
MISC qualcomm — snapdragon
  Memory corruption due to integer overflow or wraparound in Core while DDR memory assignment. 2023-04-13 not yet calculated CVE-2022-33269
MISC qualcomm — snapdragon
  Transient DOS due to time-of-check time-of-use race condition in Modem while processing RRC Reconfiguration message. 2023-04-13 not yet calculated CVE-2022-33270
MISC qualcomm — snapdragon
  Memory corruption in Automotive Multimedia due to integer overflow to buffer overflow during IOCTL calls in video playback. 2023-04-13 not yet calculated CVE-2022-33282
MISC qualcomm — snapdragon
  Information disclosure in Modem due to buffer over-read while getting length of Unfragmented headers in an IPv6 packet. 2023-04-13 not yet calculated CVE-2022-33287
MISC qualcomm — snapdragon
  Memory corruption due to buffer copy without checking the size of input in Core while sending SCM command to get write protection information. 2023-04-13 not yet calculated CVE-2022-33288
MISC qualcomm — snapdragon
  Memory corruption occurs in Modem due to improper validation of array index when malformed APDU is sent from card. 2023-04-13 not yet calculated CVE-2022-33289
MISC qualcomm — snapdragon
  Information disclosure in Modem due to buffer over-read while receiving a IP header with malformed length. 2023-04-13 not yet calculated CVE-2022-33291
MISC qualcomm — snapdragon
  Transient DOS in Modem due to NULL pointer dereference while receiving response of lwm2m registration/update/bootstrap request message. 2023-04-13 not yet calculated CVE-2022-33294
MISC qualcomm — snapdragon
  Information disclosure in Modem due to buffer over-read while parsing the wms message received given the buffer and its length. 2023-04-13 not yet calculated CVE-2022-33295
MISC qualcomm — snapdragon
  Memory corruption due to integer overflow to buffer overflow in Modem while parsing Traffic Channel Neighbor List Update message. 2023-04-13 not yet calculated CVE-2022-33296
MISC qualcomm — snapdragon
  Information disclosure due to buffer overread in Linux sensors 2023-04-13 not yet calculated CVE-2022-33297
MISC qualcomm — snapdragon
  Memory corruption due to use after free in Modem while modem initialization. 2023-04-13 not yet calculated CVE-2022-33298
MISC qualcomm — snapdragon
  Memory corruption due to incorrect type conversion or cast in audio while using audio playback/capture when crafted address is sent from AGM IPC to AGM. 2023-04-13 not yet calculated CVE-2022-33301
MISC qualcomm — snapdragon
  Memory corruption due to improper validation of array index in User Identity Module when APN TLV length is greater than command length. 2023-04-13 not yet calculated CVE-2022-33302
MISC fortinet — fortiauthenticator
  An improper neutralization of script-related HTML tags in a web page vulnerability [CWE-80] in FortiAuthenticator versions 6.4.0 through 6.4.4, 6.3.0 through 6.3.3, all versions of 6.2 and 6.1 may allow a remote unauthenticated attacker to trigger a reflected cross site scripting (XSS) attack via the “reset-password” page. 2023-04-11 not yet calculated CVE-2022-35850
MISC hitachi_vantara — pentaho_business_analytics_server
  Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.3.0.0, 9.2.0.4 and 8.3.0.27 allow a malicious URL to inject content into a dashboard when the CDE plugin is present.    2023-04-11 not yet calculated CVE-2022-3695
MISC upstream_works — agent_desktop_for_cisco_finesse
  A stored Cross-Site Scripting (XSS) vulnerability in the Chat gadget in Upstream Works Agent Desktop for Cisco Finesse through 4.2.12 and 5.0 allows remote attackers to inject arbitrary web script or HTML via AttachmentId in the file-upload details. 2023-04-10 not yet calculated CVE-2022-37462
MISC
MISC forgerock_inc — access_management
  Improper Authorization vulnerability in ForgeRock Inc. Access Management allows Authentication Bypass.This issue affects Access Management: from 6.5.0 through 7.2.0. 2023-04-14 not yet calculated CVE-2022-3748
MISC
MISC
MISC qualcomm — snapdragon
  Information disclosure due to buffer over-read in Bluetooth Host while A2DP streaming. 2023-04-13 not yet calculated CVE-2022-40503
MISC qualcomm — snapdragon
  Memory corruption due to integer overflow or wraparound in WLAN while sending WMI cmd from host to target. 2023-04-13 not yet calculated CVE-2022-40532
MISC fortinet — fortiadc/fortiddos
  An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiADC 5.x all versions, 6.0 all versions, 6.1 all versions, 6.2.0 through 6.2.4, 7.0.0 through 7.0.3, 7.1.0; FortiDDoS 4.x all versions, 5.0 all versions, 5.1 all versions, 5.2 all versions, 5.3 all versions, 5.4 all versions, 5.5 all versions, 5.6 all versions and FortiDDoS-F 6.4.0, 6.3.0 through 6.3.3, 6.2.0 through 6.2.2, 6.1.0 through 6.1.4 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. 2023-04-11 not yet calculated CVE-2022-40679
MISC fortinet — forticlient_for_windows
  A incorrect authorization in Fortinet FortiClient (Windows) 7.0.0 – 7.0.7, 6.4.0 – 6.4.9, 6.2.0 – 6.2.9 and 6.0.0 – 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe. 2023-04-11 not yet calculated CVE-2022-40682
MISC fortinet — fortios/fortiproxy
  An improper neutralization of input during web page generation vulnerability (‘Cross-site Scripting’) [CWE-79] in Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.9, version 6.4.0 through 6.4.11 and before 6.2.12 and FortiProxy version 7.2.0 through 7.2.1 and before 7.0.7 allows an unauthenticated attacker to perform an XSS attack via crafted HTTP GET requests. 2023-04-11 not yet calculated CVE-2022-41330
MISC fortinet — fortipresence
  A missing authentication for critical function vulnerability [CWE-306] in FortiPresence infrastructure server before version 1.2.1 allows a remote, unauthenticated attacker to access the Redis and MongoDB instances via crafted authentication requests. 2023-04-11 not yet calculated CVE-2022-41331
MISC fortinet — fortigate
  A permissive list of allowed inputs vulnerability [CWE-183] in FortiGate version 7.2.3 and below, version 7.0.9 and below Policy-based NGFW Mode may allow an authenticated SSL-VPN user to bypass the policy via bookmarks in the web portal. 2023-04-11 not yet calculated CVE-2022-42469
MISC fortinet — forticlient_for_windows
  A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 – 7.0.7, 6.4.0 – 6.4.9, 6.2.0 – 6.2.9 and 6.0.0 – 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe. 2023-04-11 not yet calculated CVE-2022-42470
MISC fortinet — fortianalyzer
  An improper input validation vulnerability [CWE-20] in FortiAnalyzer version 7.2.1 and below, version 7.0.6 and below, 6.4 all versions may allow an authenticated attacker to disclose file system information via custom dataset SQL queries. 2023-04-11 not yet calculated CVE-2022-42477
MISC supermicro — x11sl-cf_hw
  Supermicro X11SSL-CF HW Rev 1.01, BMC firmware v1.63 was discovered to contain insecure permissions. 2023-04-07 not yet calculated CVE-2022-43309
MISC
MISC
MISC open-xchange — ox_app_suite
  OX App Suite before 7.10.6-rev20 allows XSS via upsell ads. 2023-04-15 not yet calculated CVE-2022-43696
MISC
MISC open-xchange — ox_app_suite
  OX App Suite before 7.10.6-rev30 allows XSS via an activity tracking adapter defined by jslob. 2023-04-15 not yet calculated CVE-2022-43697
MISC
MISC open-xchange — ox_app_suite
  OX App Suite before 7.10.6-rev30 allows SSRF because changing a POP3 account disregards the deny-list. 2023-04-15 not yet calculated CVE-2022-43698
MISC
MISC open-xchange — ox_app_suite
  OX App Suite before 7.10.6-rev30 allows SSRF because e-mail account discovery disregards the deny-list and thus can be attacked by an adversary who controls the DNS records of an external domain (found in the host part of an e-mail address). 2023-04-15 not yet calculated CVE-2022-43699
MISC
MISC hitachi_vantara — pentaho_business_analytics_server
  Hitachi Vantara Pentaho Business Analytics Server versions before 9.3.0.0, 9.2.0.4 and 8.3.0.27 does not correctly perform an authorization check in the dashboard editor plugin API.    2023-04-11 not yet calculated CVE-2022-43770
MISC fortinet — forticlient_for_windows
  Multiple vulnerabilities including an incorrect permission assignment for critical resource [CWE-732] vulnerability and a time-of-check time-of-use (TOCTOU) race condition [CWE-367] vulnerability in Fortinet FortiClientWindows before 7.0.7 allows attackers on the same file sharing network to execute commands via writing data into a windows pipe. 2023-04-11 not yet calculated CVE-2022-43946
MISC fortinet — fortios/fortiproxy
  An improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiOS version 7.2.0 through 7.2.3 and before 7.0.10, FortiProxy version 7.2.0 through 7.2.2 and before 7.0.8 administrative interface allows an attacker with a valid user account to perform brute-force attacks on other user accounts via injecting valid login sessions. 2023-04-11 not yet calculated CVE-2022-43947
MISC fortinet — fortiadc/fortiweb
  A improper neutralization of special elements used in an os command (‘os command injection’) in Fortinet FortiWeb version 7.0.0 through 7.0.3, FortiADC version 7.1.0 through 7.1.1, FortiADC version 7.0.0 through 7.0.3, FortiADC 6.2 all versions, FortiADC 6.1 all versions, FortiADC 6.0 all versions, FortiADC 5.4 all versions, FortiADC 5.3 all versions, FortiADC 5.2 all versions, FortiADC 5.1 all versions allows attacker to execute unauthorized code or commands via specifically crafted arguments to existing commands. 2023-04-11 not yet calculated CVE-2022-43948
MISC fortinet — fortinac
  An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.11 and below, 8.7.6 and below may allow an unauthenticated attacker to access sensitive information via crafted HTTP requests. 2023-04-11 not yet calculated CVE-2022-43951
MISC fortinet — fortiadc
  An improper neutralization of input during web page generation (‘Cross-site Scripting’) vulnerability [CWE-79] in FortiADC version 7.1.1 and below, version 7.0.3 and below, version 6.2.5 and below may allow an authenticated attacker to perform a cross-site scripting attack via crafted HTTP requests. 2023-04-11 not yet calculated CVE-2022-43952
MISC fortinet — fortiweb
  An improper neutralization of input during web page generation [CWE-79] in the FortiWeb web interface 7.0.0 through 7.0.3, 6.3.0 through 6.3.21, 6.4 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow an unauthenticated and remote attacker to perform a reflected cross site scripting attack (XSS) via injecting malicious payload in log entries used to build report. 2023-04-11 not yet calculated CVE-2022-43955
MISC wordpress — wordpress
  Auth. (admin+) Stored Cross-Site Scripting’) vulnerability in Zephilou Cyklodev WP Notify plugin <= 1.2.1 versions. 2023-04-13 not yet calculated CVE-2022-44625
MISC rconfig — rconfig
  A SQL injection vulnerability in rConfig 3.9.7 exists via lib/ajaxHandlers/ajaxCompareGetCmdDates.php?command= (this may interact with secure-file-priv). 2023-04-15 not yet calculated CVE-2022-45030
MISC
MISC oracle — apache_sling_engine
  The SlingRequestDispatcher doesn’t correctly implement the RequestDispatcher API resulting in a generic type of include-based cross-site scripting issues on the Apache Sling level. The vulnerability is exploitable by an attacker that is able to include a resource with specific content-type and control the include path (i.e. writing content). The impact of a successful attack is privilege escalation to administrative power. Please update to Apache Sling Engine >= 2.14.0 and enable the “Check Content-Type overrides” configuration option. 2023-04-13 not yet calculated CVE-2022-45064
MISC livebox — collaboration_vdesk
  An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Cryptographic Issue can occur under the /api/v1/vencrypt/decrypt/file endpoint. A malicious user, logged into a victim’s account, is able to decipher a file without knowing the key set by the user. 2023-04-14 not yet calculated CVE-2022-45170
MISC livebox — collaboration_vdesk
  An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication can occur under the /api/v1/vdeskintegration/challenge endpoint. Because only the client-side verifies whether a check was successful, an attacker can modify the response, and fool the application into concluding that the TOTP was correct. 2023-04-14 not yet calculated CVE-2022-45173
MISC livebox — collaboration_vdesk
  An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication for SAML Users can occur under the /login/backup_code endpoint and the /api/v1/vdeskintegration/challenge endpoint. The correctness of the TOTP is not checked properly, and can be bypassed by passing any string as the backup code. 2023-04-14 not yet calculated CVE-2022-45174
MISC livebox — collaboration_vdesk
  An issue was discovered in LIVEBOX Collaboration vDesk through v018. An Insecure Direct Object Reference can occur under the 5.6.5-3/doc/{ID-FILE]/c/{N]/{C]/websocket endpoint. A malicious unauthenticated user can access cached files in the OnlyOffice backend of other users by guessing the file ID of a target file. 2023-04-14 not yet calculated CVE-2022-45175
MISC livebox — collaboration_vdesk
  An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdeskintegration/saml/user/createorupdate endpoint, the /settings/guest-settings endpoint, the /settings/samlusers-settings endpoint, and the /settings/users-settings endpoint. A malicious user (already logged in as a SAML User) is able to achieve privilege escalation from a low-privilege user (FGM user) to an administrative user (GGU user), including the administrator, or create new users even without an admin role. 2023-04-14 not yet calculated CVE-2022-45178
MISC livebox — collaboration_vdesk
  An issue was discovered in LIVEBOX Collaboration vDesk through v018. Broken Access Control exists under the /api/v1/vdesk_{DOMAIN]/export endpoint. A malicious user, authenticated to the product without any specific privilege, can use the API for exporting information about all users of the system (an operation intended to only be available to the system administrator). 2023-04-14 not yet calculated CVE-2022-45180
MISC wordpress — wordpress
  Auth. (subscriber+) Reflected Cross-Site Scripting (XSS) vulnerability in Silkalns Activello theme <= 1.4.4 versions. 2023-04-13 not yet calculated CVE-2022-45358
MISC arm — mali_kernel
  An issue was discovered in the Arm Mali Kernel Driver. A non-privileged user can make improper GPU memory processing operations to access a limited amount outside of buffer bounds. This affects Valhall r29p0 through r41p0 before r42p0 and Avalon r41p0 before r42p0. 2023-04-11 not yet calculated CVE-2022-46396
MISC servicenow — servicenow
  There exists an open redirect within the response list update functionality of ServiceNow. This allows attackers to redirect users to arbitrary domains when clicking on a URL within a service-now domain. 2023-04-14 not yet calculated CVE-2022-46886
MISC timmystudios — fast_typing_keyboard
  Timmystudios Fast Typing Keyboard v1.275.1.162 allows unauthorized apps to overwrite arbitrary files in its internal storage via a dictionary traversal vulnerability and achieve arbitrary code execution. 2023-04-14 not yet calculated CVE-2022-47027
MISC
MISC
MISC dnn_corp — dotnetnuke
  An arbitrary file upload vulnerability in the Digital Assets Manager module of DNN Corp DotNetNuke v7.0.0 to v9.10.2 allows attackers to execute arbitrary code via a crafted SVG file. 2023-04-12 not yet calculated CVE-2022-47053
MISC
MISC oracle — apache_ofbiz
  Arbitrary file reading vulnerability in Apache Software Foundation Apache OFBiz when using the Solr plugin. This is a  pre-authentication attack. This issue affects Apache OFBiz: before 18.12.07. 2023-04-14 not yet calculated CVE-2022-47501
MISC
MISC
MISC ieee_802.11 — ieee_802.11
  The IEEE 802.11 specifications through 802.11ax allow physically proximate attackers to intercept (possibly cleartext) target-destined frames by spoofing a target’s MAC address, sending Power Save frames to the access point, and then sending other frames to the access point (such as authentication frames or re-association frames) to remove the target’s original security context. This behavior occurs because the specifications do not require an access point to purge its transmit queue before removing a client’s pairwise encryption key. 2023-04-15 not yet calculated CVE-2022-47522
MISC
MISC
MISC wordpress — wordpress
  Auth. SQL Injection’) vulnerability in Kunal Nagar Custom 404 Pro plugin <= 3.7.0 versions. 2023-04-12 not yet calculated CVE-2022-47605
MISC x2crm_open_source_sales_crm — x2crm_open_source_sales_crm
  X2CRM Open Source Sales CRM 6.6 and 6.9 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the adin/importModels Import Records Model field (model parameter). This vulnerability allows attackers to create malicious JavaScript that will be executed by the victim user’s browser. 2023-04-15 not yet calculated CVE-2022-48177
MISC
MISC x2crm_open_source_sales_crm — x2crm_open_source_sales_crm
  X2CRM Open Source Sales CRM 6.6 and 6.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Create Action function, aka an index.php/actions/update URI. 2023-04-15 not yet calculated CVE-2022-48178
MISC
MISC libressl/openbsd — libressl/openbsd
  An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate. 2023-04-12 not yet calculated CVE-2022-48437
MISC
MISC
MISC protobuf-c — protobuf-c
  protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member. 2023-04-13 not yet calculated CVE-2022-48468
MISC
MISC
MISC
MISC palo_alto_networks — pan-os
  A local file deletion vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to delete files from the local file system with elevated privileges. These files can include logs and system components that impact the integrity and availability of PAN-OS software. 2023-04-12 not yet calculated CVE-2023-0004
MISC palo_alto_networks — pan-os A vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys. 2023-04-12 not yet calculated CVE-2023-0005
MISC palo_alto_networks — globalprotect
  A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition. 2023-04-12 not yet calculated CVE-2023-0006
MISC libjxl — libjxl
  An out of bounds read exists in libjxl. An attacker using a specifically crafted file could cause an out of bounds read in the exif handler. We recommend upgrading to version 0.8.1 or past commit  https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 2023-04-11 not yet calculated CVE-2023-0645
MISC
MISC mitsubishi_electric_india — gc-enet-com
  Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are “16” allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit. 2023-04-14 not yet calculated CVE-2023-1285
MISC
MISC canonical_ltd — apport_for_linux
  A privilege escalation attack was found in apport-cli 2.26.0 and earlier which is similar to CVE-2023-26604. If a system is specially configured to allow unprivileged users to run sudo apport-cli, less is configured as the pager, and the terminal size can be set: a local attacker can escalate privilege. It is extremely unlikely that a system administrator would configure sudo to allow unprivileged users to perform this class of exploit. 2023-04-13 not yet calculated CVE-2023-1326
MISC ge_gas_power — toolboxst
  ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user’s context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors.  Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power’s Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user.  2023-04-11 not yet calculated CVE-2023-1552
MISC b&r_ industrial_automation — b&r_vc4
  Improper Authentication vulnerability in B&R Industrial Automation B&R VC4 (VNC-Server modules).  This vulnerability may allow an unauthenticated network-based attacker to bypass the authentication mechanism of the VC4 visualization on affected devices. The impact of this vulnerability depends on the functionality provided in the visualization. This issue affects B&R VC4: from 3.* through 3.96.7, from 4.0* through 4.06.7, from 4.1* through 4.16.3, from 4.2* through 4.26.8, from 4.3* through 4.34.6, from 4.4* through 4.45.1, from 4.5* through 4.45.3, from 4.7* through 4.72.9. 2023-04-14 not yet calculated CVE-2023-1617
MISC openvswitch — openvswitch
  A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. 2023-04-10 not yet calculated CVE-2023-1668
MISC
MISC
DEBIAN linux — kernel
  A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. 2023-04-12 not yet calculated CVE-2023-1829
MISC
MISC linux — kernel
  A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. 2023-04-12 not yet calculated CVE-2023-1872
MISC
MISC wordpress — wordpress
  The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the ‘wpda_role[]’ parameter during a profile update. This requires the ‘Enable role management’ setting to be enabled for the site. 2023-04-12 not yet calculated CVE-2023-1874
MISC
MISC
MISC
MISC
MISC imagemagick — magickcore
  A heap-based buffer overflow issue was discovered in ImageMagick’s ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service. 2023-04-12 not yet calculated CVE-2023-1906
MISC
MISC
MISC
MISC
MISC tiffcrop — libtiff A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x. 2023-04-10 not yet calculated CVE-2023-1916
MISC
MISC devolutions — remote_desktop_manager
  No access control for the OTP key on OTP entries in Devolutions Remote Desktop Manager Windows 2022.3.33.0 and prior versions and Remote Desktop Manager Linux 2022.3.2.0 and prior versions allows non admin users to see OTP keys via the user interface. 2023-04-11 not yet calculated CVE-2023-1939
MISC sourcecodester — survey_application_system
  A vulnerability was found in SourceCodester Survey Application System 1.0 and classified as problematic. This issue affects some unknown processing of the component Add New Handler. The manipulation of the argument Title with the input <script>prompt(document.domain)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225329 was assigned to this vulnerability. 2023-04-07 not yet calculated CVE-2023-1946
MISC
MISC tao_interactive– taocms
  A vulnerability was found in taoCMS 3.0.2. It has been classified as critical. Affected is an unknown function of the file /admin/admin.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225330 is the identifier assigned to this vulnerability. 2023-04-07 not yet calculated CVE-2023-1947
MISC
MISC
MISC phpgurukul — bp_monitoring_management_system
  A vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335. 2023-04-08 not yet calculated CVE-2023-1948
MISC
MISC
MISC phpgurukul — bp_monitoring_management_system
  A vulnerability, which was classified as critical, was found in PHPGurukul BP Monitoring Management System 1.0. Affected is an unknown function of the file change-password.php of the component Change Password Handler. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225336. 2023-04-08 not yet calculated CVE-2023-1949
MISC
MISC
MISC phpgurukul — bp_monitoring_management_system
  A vulnerability has been found in PHPGurukul BP Monitoring Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file password-recovery.php of the component Password Recovery. The manipulation of the argument emailid/contactno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225337 was assigned to this vulnerability. 2023-04-08 not yet calculated CVE-2023-1950
MISC
MISC
MISC sourcecodester — online_computer_and_laptop_store
  A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/?page=system_info. The manipulation of the argument System Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225348. 2023-04-08 not yet calculated CVE-2023-1961
MISC
MISC
MISC sourcecodester — best_online_news_portal
  A vulnerability classified as critical was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225361 was assigned to this vulnerability. 2023-04-09 not yet calculated CVE-2023-1962
MISC
MISC
MISC phpgurukul — bp_monitoring_management_system
  A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php of the component Search. The manipulation of the argument searchinput leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225359. 2023-04-09 not yet calculated CVE-2023-1963
MISC
MISC
MISC phpgurukul — bp_monitoring_management_system
  A vulnerability classified as critical has been found in PHPGurukul Bank Locker Management System 1.0. Affected is an unknown function of the file recovery.php of the component Password Reset. The manipulation of the argument uname/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225360. 2023-04-09 not yet calculated CVE-2023-1964
MISC
MISC
MISC answerdev — answer
  Exposure of Sensitive Information Through Metadata in GitHub repository answerdev/answer prior to 1.0.8. 2023-04-11 not yet calculated CVE-2023-1974
MISC
CONFIRM answerdev — answer
  Insertion of Sensitive Information Into Sent Data in GitHub repository answerdev/answer prior to 1.0.8. 2023-04-11 not yet calculated CVE-2023-1975
MISC
CONFIRM answerdev — answer
  Password Aging with Long Expiration in GitHub repository answerdev/answer prior to 1.0.6. 2023-04-11 not yet calculated CVE-2023-1976
MISC
CONFIRM devolutions — remote_desktop_manager
  Two factor authentication bypass on login in Devolutions Remote Desktop Manager 2022.3.35 and earlier allow user to cancel the two factor authentication via the application user interface and open entries. 2023-04-11 not yet calculated CVE-2023-1980
MISC sourcecodester — sales_tracker_management_system
  A vulnerability was found in SourceCodester Sales Tracker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/products/manage_product.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225530 is the identifier assigned to this vulnerability. 2023-04-11 not yet calculated CVE-2023-1983
MISC
MISC
MISC sourcecodester — complaint_management_system
  A vulnerability classified as critical was found in SourceCodester Complaint Management System 1.0. This vulnerability affects unknown code of the file /users/check_availability.php of the component POST Parameter Handler. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225532. 2023-04-11 not yet calculated CVE-2023-1984
MISC
MISC
MISC linux — kernel
  A use-after-free flaw was found in btsdio_remove in driversbluetoothbtsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices. 2023-04-11 not yet calculated CVE-2023-1989
MISC linux — kernel
  A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem. 2023-04-12 not yet calculated CVE-2023-1990
MISC wireshark_foundation — wireshark
  RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file 2023-04-12 not yet calculated CVE-2023-1992
MISC
CONFIRM
MISC wireshark_foundation — wireshark
  LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file 2023-04-12 not yet calculated CVE-2023-1993
MISC
CONFIRM
MISC wireshark_foundation — wireshark
  GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file 2023-04-12 not yet calculated CVE-2023-1994
CONFIRM
MISC
MISC freetype — freetype
  An integer overflow vulnerability was discovered in Freetype in tt_hvadvance_adjust() function in src/truetype/ttgxvar.c. 2023-04-14 not yet calculated CVE-2023-2004
MISC
MISC
MISC
MISC
FEDORA linux — kernel
  A flaw was found in the Linux kernel’s udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. 2023-04-14 not yet calculated CVE-2023-2008
MISC
MISC
MISC cisco — small_business_routers
  A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device. Cisco has not and will not release software updates that address this vulnerability. 2023-04-13 not yet calculated CVE-2023-20118
MISC microweber — microweber
  Cross-site Scripting (XSS) – Generic in GitHub repository microweber/microweber prior to 1.3.3. 2023-04-13 not yet calculated CVE-2023-2014
CONFIRM
MISC nilsteampassnet — teampass
  Cross-site Scripting (XSS) – Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.3. 2023-04-13 not yet calculated CVE-2023-2021
MISC
CONFIRM wordpress — wordpress
  The ZM Ajax Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.2. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. 2023-04-15 not yet calculated CVE-2023-2027
MISC
MISC google — chrome
  Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) 2023-04-14 not yet calculated CVE-2023-2033
MISC
MISC
MISC froxlor — froxlor
  Unrestricted Upload of File with Dangerous Type in GitHub repository froxlor/froxlor prior to 2.0.14. 2023-04-14 not yet calculated CVE-2023-2034
MISC
CONFIRM campcodes — video_sharing_website
  A vulnerability has been found in Campcodes Video Sharing Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file signup.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225913 was assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2035
MISC
MISC
MISC campcodes — video_sharing_website
  A vulnerability was found in Campcodes Video Sharing Website 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file upload.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225914 is the identifier assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2036
MISC
MISC
MISC campcodes — video_sharing_website
  A vulnerability was found in Campcodes Video Sharing Website 1.0. It has been classified as critical. This affects an unknown part of the file watch.php. The manipulation of the argument code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225915. 2023-04-14 not yet calculated CVE-2023-2037
MISC
MISC
MISC campcodes — video_sharing_website
  A vulnerability was found in Campcodes Video Sharing Website 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin_class.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225916. 2023-04-14 not yet calculated CVE-2023-2038
MISC
MISC
MISC novel-plus — novel-plus
  A vulnerability was found in novel-plus 3.6.2. It has been rated as critical. This issue affects some unknown processing of the file /author/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225917 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-04-14 not yet calculated CVE-2023-2039
MISC
MISC
MISC novel-plus — novel-plus
  A vulnerability classified as critical has been found in novel-plus 3.6.2. Affected is an unknown function of the file /news/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225918 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-04-14 not yet calculated CVE-2023-2040
MISC
MISC
MISC novel-plus — novel-plus
  A vulnerability classified as critical was found in novel-plus 3.6.2. Affected by this vulnerability is an unknown functionality of the file /category/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-04-14 not yet calculated CVE-2023-2041
MISC
MISC
MISC datagear — datagear
  A vulnerability, which was classified as problematic, has been found in DataGear up to 4.5.1. Affected by this issue is some unknown functionality of the component JDBC Server Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225920. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-04-14 not yet calculated CVE-2023-2042
MISC
MISC
MISC control_id — control_id
  A vulnerability, which was classified as problematic, was found in Control iD 23.3.19.0. This affects an unknown part of the file /v2/customerdb/operator.svc/a of the component Edit Handler. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-225921 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-04-14 not yet calculated CVE-2023-2043
MISC
MISC control_id – id_secure
  A vulnerability has been found in Control iD iDSecure 4.7.29.1 and classified as problematic. This vulnerability affects unknown code of the component Dispositivos Page. The manipulation of the argument IP-DNS leads to cross site scripting. The attack can be initiated remotely. VDB-225922 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-04-14 not yet calculated CVE-2023-2044
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability was found in Campcodes Advanced Online Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument voter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225932. 2023-04-14 not yet calculated CVE-2023-2047
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/voters_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225933 was assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2048
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ballot_up.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-225934 is the identifier assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2049
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/positions_add.php. The manipulation of the argument description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225935. 2023-04-14 not yet calculated CVE-2023-2050
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability classified as critical has been found in Campcodes Advanced Online Voting System 1.0. Affected is an unknown function of the file /admin/positions_row.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225936. 2023-04-14 not yet calculated CVE-2023-2051
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability classified as critical was found in Campcodes Advanced Online Voting System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ballot_down.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225937 was assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2052
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability, which was classified as critical, has been found in Campcodes Advanced Online Voting System 1.0. Affected by this issue is some unknown functionality of the file /admin/candidates_row.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225938 is the identifier assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2053
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability, which was classified as critical, was found in Campcodes Advanced Online Voting System 1.0. This affects an unknown part of the file /admin/positions_delete.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225939. 2023-04-14 not yet calculated CVE-2023-2054
MISC
MISC
MISC campcodes — advanced_online_voting_system
  A vulnerability has been found in Campcodes Advanced Online Voting System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/config_save.php. The manipulation of the argument title leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225940. 2023-04-14 not yet calculated CVE-2023-2055
MISC
MISC
MISC dedecms — dedecms
  A vulnerability was found in DedeCMS up to 5.7.87 and classified as critical. This issue affects the function GetSystemFile of the file module_main.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225941 was assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2056
MISC
MISC
MISC eyoucms — eyoucms
  A vulnerability was found in EyouCms 1.5.4. It has been classified as problematic. Affected is an unknown function of the file login.php?m=admin&c=Arctype&a=edit of the component New Picture Handler. The manipulation of the argument litpic_loca leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225942 is the identifier assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2057
MISC
MISC
MISC eyoucms — eyoucms
  A vulnerability was found in EyouCms up to 1.6.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /yxcms/index.php?r=admin/extendfield/mesedit&tabid=12&id=4 of the component HTTP POST Request Handler. The manipulation of the argument web_ico leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225943. 2023-04-14 not yet calculated CVE-2023-2058
MISC
MISC
MISC dedecms — dedecms
  A vulnerability was found in DedeCMS 5.7.87. It has been rated as problematic. Affected by this issue is some unknown functionality of the file uploads/include/dialog/select_templets.php. The manipulation leads to path traversal: ‘..filedir’. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225944. 2023-04-14 not yet calculated CVE-2023-2059
MISC
MISC
MISC campcodes — online_traffic_offense_management_system A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Login.php. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226051. 2023-04-14 not yet calculated CVE-2023-2073
MISC
MISC
MISC campcodes — online_traffic_offense_management_system
  A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226052. 2023-04-14 not yet calculated CVE-2023-2074
MISC
MISC
MISC campcodes — online_traffic_offense_management_system
  A vulnerability classified as critical has been found in Campcodes Online Traffic Offense Management System 1.0. This affects an unknown part of the file /admin/offenses/view_details.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226053 was assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2075
MISC
MISC
MISC campcodes — online_traffic_offense_management_system
  A vulnerability classified as problematic was found in Campcodes Online Traffic Offense Management System 1.0. This vulnerability affects unknown code of the file /classes/Users.phpp. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226054 is the identifier assigned to this vulnerability. 2023-04-14 not yet calculated CVE-2023-2076
MISC
MISC
MISC campcodes — online_traffic_offense_management_system
  A vulnerability, which was classified as problematic, has been found in Campcodes Online Traffic Offense Management System 1.0. This issue affects some unknown processing of the file /admin/offenses/view_details.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226055. 2023-04-14 not yet calculated CVE-2023-2077
MISC
MISC
MISC spring — framework
  In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition. 2023-04-13 not yet calculated CVE-2023-20863
MISC spring — session
  In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver. 2023-04-13 not yet calculated CVE-2023-20866
MISC sourcecodester — complaint_management_system
  A vulnerability was found in SourceCodester Complaint Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/userprofile.php of the component GET Parameter Handler. The manipulation of the argument uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226097 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2089
MISC
MISC
MISC sourcecodester — employee_and_visitor_gate_pass_logging_system
  A vulnerability classified as critical has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is an unknown function of the file /admin/maintenance/view_designation.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226098 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2090
MISC
MISC
MISC kylinsoft — youker-assistant
  A vulnerability classified as critical was found in KylinSoft youker-assistant. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099. 2023-04-15 not yet calculated CVE-2023-2091
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability, which was classified as critical, has been found in SourceCodester Vehicle Service Management System 1.0. Affected by this issue is some unknown functionality of the file view_service.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226100. 2023-04-15 not yet calculated CVE-2023-2092
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability, which was classified as critical, was found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226101 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2093
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability has been found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/mechanics/manage_mechanic.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226102 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2094
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability was found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226103. 2023-04-15 not yet calculated CVE-2023-2095
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/service_requests/manage_inventory.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226104. 2023-04-15 not yet calculated CVE-2023-2096
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226105 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2097
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /inc/topBarNav.php. The manipulation of the argument search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226106 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2098
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability classified as problematic has been found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226107. 2023-04-15 not yet calculated CVE-2023-2099
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability classified as problematic was found in SourceCodester Vehicle Service Management System 1.0. This vulnerability affects unknown code of the file /admin/report/index.php. The manipulation of the argument date_end leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226108. 2023-04-15 not yet calculated CVE-2023-2100
MISC
MISC
MISC mogu_blog — mogu_blog
  A vulnerability, which was classified as problematic, has been found in moxi624 Mogu Blog v2 up to 5.2. This issue affects the function uploadPictureByUrl of the file /mogu-picture/file/uploadPicsByUrl. The manipulation of the argument urlList leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226109 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2101
MISC
MISC
MISC
MISC easyappointments — easyappointments
  Cross-site Scripting (XSS) – Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-04-15 not yet calculated CVE-2023-2102
CONFIRM
MISC easyappointments — easyappointments
  Cross-site Scripting (XSS) – Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-04-15 not yet calculated CVE-2023-2103
MISC
CONFIRM easyappointments — easyappointments
  Improper Access Control in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-04-15 not yet calculated CVE-2023-2104
CONFIRM
MISC easyappointments — easyappointments
  Session Fixation in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-04-15 not yet calculated CVE-2023-2105
MISC
CONFIRM calibre-web — calibre-web
  Weak Password Requirements in GitHub repository janeczku/calibre-web prior to 0.6.20. 2023-04-15 not yet calculated CVE-2023-2106
CONFIRM
MISC ibos — ibos
  A vulnerability, which was classified as critical, was found in IBOS 4.5.5. Affected is an unknown function of the file file/personal/del&op=recycle. The manipulation of the argument fids leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226110 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2107
MISC
MISC
MISC qualcom — snapdragon
  Memory Corruption in Multimedia Framework due to integer overflow when synx bind is called along with synx signal. 2023-04-13 not yet calculated CVE-2023-21630
MISC elecom — wab-mat
  WAB-MAT Ver.5.0.0.8 and earlier starts another program with an unquoted file path. Since a registered Windows service path contains spaces and are unquoted, if a malicious executable is placed on a certain path, the executable may be executed with the privilege of the Windows service. 2023-04-11 not yet calculated CVE-2023-22282
MISC
MISC wolt — wolt_delivery
  Android App ‘Wolt Delivery: Food and more’ version 4.27.2 and earlier uses hard-coded credentials (API key for an external service), which may allow a local attacker to obtain the hard-coded API key via reverse-engineering the application binary. 2023-04-11 not yet calculated CVE-2023-22429
MISC
MISC insyde — insydeh2o
  An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. A malicious host OS can invoke an Insyde SMI handler with malformed arguments, resulting in memory corruption in SMM. 2023-04-11 not yet calculated CVE-2023-22612
MISC
MISC
MISC insyde — insydeh2o
  An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. It is possible to write to an attacker-controlled address. An attacker could invoke an SMI handler with a malformed pointer in RCX that overlaps SMRAM, resulting in SMM memory corruption. 2023-04-11 not yet calculated CVE-2023-22613
MISC
MISC
MISC insyde — insydeh2o
  An issue was discovered in ChipsetSvcSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There is insufficient input validation in BIOS Guard updates. An attacker can induce memory corruption in SMM by supplying malformed inputs to the BIOS Guard SMI handler. 2023-04-11 not yet calculated CVE-2023-22614
MISC
MISC
MISC insyde — insydeh2o
  An issue was discovered in IhisiSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. IHISI subfunction execution may corrupt SMRAM. An attacker can pass an address in the RCX save state register that overlaps SMRAM, thereby coercing an IHISI subfunction handler to overwrite private SMRAM. 2023-04-11 not yet calculated CVE-2023-22615
MISC
MISC insyde — insydeh2o
  An issue was discovered in Insyde InsydeH2O with kernel 5.2 through 5.5. The Save State register is not checked before use. The IhisiSmm driver does not check the value of a save state register before use. Due to insufficient input validation, an attacker can corrupt SMRAM. 2023-04-12 not yet calculated CVE-2023-22616
MISC
MISC
MISC securepoint — utm
  An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall’s endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device’s authentication and get access to the administrative interface. 2023-04-12 not yet calculated CVE-2023-22620
MISC
MISC fortinet — forticlientmac
  A download of code without Integrity check vulnerability [CWE-494] in FortiClientMac version 7.0.0 through 7.0.7, 6.4 all versions, 6.2 all versions, 6.0 all versions, 5.6 all versions, 5.4 all versions, 5.2 all versions, 5.0 all versions and 4.0 all versions may allow a local attacker to escalate their privileges via modifying the installer upon upgrade. 2023-04-11 not yet calculated CVE-2023-22635
MISC fortinet — fortios/fortiproxy
  A url redirection to untrusted site (‘open redirect’) in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.9, FortiOS versions 6.4.0 through 6.4.12, FortiOS all versions 6.2, FortiOS all versions 6.0, FortiProxy version 7.2.0 through 7.2.2, FortiProxy version 7.0.0 through 7.0.8, FortiProxy all versions 2.0, FortiProxy all versions 1.2, FortiProxy all versions 1.1, FortiProxy all versions 1.0 allows an authenticated attacker to execute unauthorized code or commands via specially crafted requests. 2023-04-11 not yet calculated CVE-2023-22641
MISC fortinet — fortianalyzer/fortimanager
  An improper certificate validation vulnerability [CWE-295] in FortiAnalyzer and FortiManager 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4.8 through 6.4.10 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and the remote FortiGuard server hosting outbreakalert ressources. 2023-04-11 not yet calculated CVE-2023-22642
MISC open_design_alliance — drawings_sdk
  Parsing of DWG files in Open Design Alliance Drawings SDK before 2023.6 lacks proper validation of the length of user-supplied XRecord data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. 2023-04-15 not yet calculated CVE-2023-22669
MISC open_design_alliance — drawings_sdk
  A heap-based buffer overflow exists in the DXF file reading procedure in Open Design Alliance Drawings SDK before 2023.6. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of the length of user-supplied XRecord data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. 2023-04-15 not yet calculated CVE-2023-22670
MISC arm — mali_gpu_kernel
  An issue was discovered in the Arm Android Gralloc Module. A non-privileged user can read a small portion of the allocator process memory. This affects Bifrost r24p0 through r41p0 before r42p0, Valhall r24p0 through r41p0 before r42p0, and Avalon r41p0 before r42p0. 2023-04-11 not yet calculated CVE-2023-22808
MISC securepoint — utm
  An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall’s endpoint at /spcgi.cgi allows information disclosure of memory contents to be achieved by an authenticated user. Essentially, uninitialized data can be retrieved via an approach in which a sessionid is obtained but not used. 2023-04-12 not yet calculated CVE-2023-22897
MISC
MISC tigergraph — enterprise_free_edition
  An issue was discovered in TigerGraph Enterprise Free Edition 3.x. There is unsecured read access to an SSH private key. Any code that runs as the tigergraph user is able to read the SSH private key. With this, an attacker is granted password-less SSH access to all machines in the TigerGraph cluster. 2023-04-13 not yet calculated CVE-2023-22948
MISC
MISC tigergraph — enterprise_free_edition
  An issue was discovered in TigerGraph Enterprise Free Edition 3.x. There is logging of user credentials. All authenticated GSQL access requests are logged by TigerGraph in multiple places. Each request includes both the username and password of the user in an easily decodable base64 form. That could allow a TigerGraph administrator to effectively harvest usernames/passwords. 2023-04-14 not yet calculated CVE-2023-22949
MISC
MISC tigergraph — enterprise_free_edition
  An issue was discovered in TigerGraph Enterprise Free Edition 3.x. Data loading jobs in gsql_server, created by any user with designer permissions, can read sensitive data from arbitrary locations. 2023-04-13 not yet calculated CVE-2023-22950
MISC
MISC tigergraph — enterprise_free_edition
  An issue was discovered in TigerGraph Enterprise Free Edition 3.x. It creates an authentication token for internal systems use. This token can be read from the configuration file. Using this token on the REST API provides an attacker with anonymous admin-level privileges on all REST API endpoints. 2023-04-13 not yet calculated CVE-2023-22951
MISC
MISC snippet_box — snippet_box
  Snippet-box 1.0.0 is vulnerable to Cross Site Scripting (XSS). Remote attackers can render arbitrary web script or HTML from the “Snippet code” form field. 2023-04-11 not yet calculated CVE-2023-23277
MISC
MISC
MISC seiko_espon — multiple_products
  Cross-site scripting vulnerability in SEIKO EPSON printers/network interface Web Config allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. [Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers/network interface via a web browser. According to SEIKO EPSON CORPORATION, it is also called as Remote Manager in some products. Web Config is pre-installed in some printers/network interface provided by SEIKO EPSON CORPORATION. For the details of the affected product names/model numbers, refer to the information provided by the vendor. 2023-04-11 not yet calculated CVE-2023-23572
MISC
MISC contec –conprosys_iot_gateway_products
  Improper access control vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker to bypass access restriction and access Network Maintenance page, which may result in obtaining the network information of the product. The affected products and versions are as follows: M2M Gateway with the firmware Ver.3.7.10 and earlier (CPS-MG341-ADSC1-111, CPS-MG341-ADSC1-931, CPS-MG341G-ADSC1-111, CPS-MG341G-ADSC1-930, and CPS-MG341G5-ADSC1-931), M2M Controller Integrated Type with firmware Ver.3.7.6 and earlier versions (CPS-MC341-ADSC1-111, CPS-MC341-ADSC1-931, CPS-MC341-ADSC2-111, CPS-MC341G-ADSC1-110, CPS-MC341Q-ADSC1-111, CPS-MC341-DS1-111, CPS-MC341-DS11-111, CPS-MC341-DS2-911, and CPS-MC341-A1-111), and M2M Controller Configurable Type with firmware Ver.3.8.8 and earlier versions (CPS-MCS341-DS1-111, CPS-MCS341-DS1-131, CPS-MCS341G-DS1-130, CPS-MCS341G5-DS1-130, and CPS-MCS341Q-DS1-131). 2023-04-11 not yet calculated CVE-2023-23575
MISC
MISC
MISC
MISC
MISC terminalfour — terminalfour
  The Logback component in Terminalfour before 8.3.14.1 allows OS administrators to obtain sensitive information from application server logs when debug logging is enabled. The fixed versions are 8.2.18.7, 8.2.18.2.2, 8.3.11.1, and 8.3.14.1. 2023-04-12 not yet calculated CVE-2023-23591
MISC
MISC lucl  — lucl 
  LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component /system/sshkeys.js. 2023-04-11 not yet calculated CVE-2023-24182
MISC
MISC
MISC
MISC buffalo — bs_gs_series
  Stored-cross-site scripting vulnerability in Buffalo network devices allows an attacker with access to the web management console of the product to execute arbitrary JavaScript on a legitimate user’s web browser. The affected products and versions are as follows: BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier 2023-04-11 not yet calculated CVE-2023-24464
MISC
MISC arista — eos
  On affected modular platforms running Arista EOS equipped with both redundant supervisor modules and having the redundancy protocol configured with RPR or SSO, an existing unprivileged user can login to the standby supervisor as a root user, leading to a privilege escalation. Valid user credentials are required in order to exploit this vulnerability. 2023-04-13 not yet calculated CVE-2023-24509
MISC arista — eos
  On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system. 2023-04-12 not yet calculated CVE-2023-24511
MISC arista — cloudeos
  On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic. 2023-04-12 not yet calculated CVE-2023-24513
MISC buffalo — bs_gs_series
  Improper access control vulnerability in Buffalo network devices allows a network-adjacent attacker to obtain specific files of the product. As a result, the product settings may be altered. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier 2023-04-11 not yet calculated CVE-2023-24544
MISC
MISC arista — cloudeos
  On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic. 2023-04-12 not yet calculated CVE-2023-24545
MISC qt — qt
  Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3. 2023-04-15 not yet calculated CVE-2023-24607
MISC
MISC
MISC
MISC
MISC
MISC
MISC aten — pe8108
  Aten PE8108 2.4.232 is vulnerable to Incorrect Access Control. Restricted users have access to other users’ outlets. 2023-04-11 not yet calculated CVE-2023-25409
MISC mitel — micollab
  A vulnerability in the web conferencing component of Mitel MiCollab through 9.6.2.9 could allow an unauthenticated attacker to download a shared file via a crafted request – including the exact path and filename – due to improper authentication control. A successful exploit could allow access to sensitive information. 2023-04-14 not yet calculated CVE-2023-25597
CONFIRM jtekt_electronics_corporation — screen_creator_advance_2
  Screen Creator Advance 2 Ver.0.1.1.4 Build01A and earlier is vulnerable to improper restriction of operations within the bounds of a memory buffer (CWE-119) due to improper check of its data size when processing a project file. If a user of Screen Creator Advance 2 opens a specially crafted project file, information may be disclosed and/or arbitrary code may be executed. 2023-04-11 not yet calculated CVE-2023-25755
MISC
MISC haproxy — haproxy
  HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user’s request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition. 2023-04-11 not yet calculated CVE-2023-25950
MISC
MISC
MISC kyocera — mobile_print
  KYOCERA Mobile Print’ v3.2.0.230119 and earlier, ‘UTAX/TA MobilePrint’ v3.2.0.230119 and earlier, and ‘Olivetti Mobile Print’ v3.2.0.230119 and earlier are vulnerable to improper intent handling. When a malicious app is installed on the victim user’s Android device, the app may send an intent and direct the affected app to download malicious files or apps to the device without notification. 2023-04-13 not yet calculated CVE-2023-25954
MISC
MISC
MISC
MISC
MISC ministry_of land_infrastructure_transport_and_tourism_japan — national_land_numerical _information_data_conversion
  National land numerical information data conversion tool all versions improperly restricts XML external entity references (XXE). By processing a specially crafted XML file, arbitrary files on the PC may be accessed by an attacker. 2023-04-11 not yet calculated CVE-2023-25955
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 access a Resource By Using an Incompatible Type. 2023-04-10 not yet calculated CVE-2023-26063
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 have an Out-of-bounds Write. 2023-04-10 not yet calculated CVE-2023-26064
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 have an Integer Overflow. 2023-04-10 not yet calculated CVE-2023-26065
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 have Improper Validation of an Array Index. 2023-04-10 not yet calculated CVE-2023-26066
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4). 2023-04-10 not yet calculated CVE-2023-26067
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 2 of 4). 2023-04-10 not yet calculated CVE-2023-26068
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 3 of 4). 2023-04-10 not yet calculated CVE-2023-26069
MISC
MISC lexmark — multiple_products
  Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 4 of 4). 2023-04-10 not yet calculated CVE-2023-26070
MISC
MISC xxl-job-admin — xxl-job-admin
  This affects all versions of the package com.xuxueli:xxl-job. HTML uploaded payload executed successfully through /xxl-job-admin/user/add and /xxl-job-admin/user/update. 2023-04-10 not yet calculated CVE-2023-26120
MISC safe-eval — safe-eval
  All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution (“RCE”). **Vulnerable functions:** __defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf(). 2023-04-11 not yet calculated CVE-2023-26122
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC raylib_for_web_platform  — raylib_for_web_platform 
  Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ‘ character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function. **Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected. 2023-04-14 not yet calculated CVE-2023-26123
MISC
MISC
MISC
MISC oxid_esales — eshop
  OXID eShop 6.2.x before 6.4.4 and 6.5.x before 6.5.2 allows session hijacking, leading to partial access of a customer’s account by an attacker, due to an improper check of the user agent. 2023-04-11 not yet calculated CVE-2023-26260
MISC talend — data_catalog
  All versions of Talend Data Catalog before 8.0-20230110 are potentially vulnerable to XML External Entity (XXE) attacks in the /MIMBWebServices/license endpoint of the remote harvesting server. 2023-04-13 not yet calculated CVE-2023-26263
MISC
MISC talend — data_catalog
  All versions of Talend Data Catalog before 8.0-20220907 are potentially vulnerable to XML External Entity (XXE) attacks in the license parsing code. 2023-04-13 not yet calculated CVE-2023-26264
MISC
MISC strongswan — strongswan
  strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named “public” for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer dereference. One attack vector is sending an untrusted client certificate during EAP-TLS. A server is affected only if it loads plugins that implement TLS-based EAP methods (EAP-TLS, EAP-TTLS, EAP-PEAP, or EAP-TNC). This is fixed in 5.9.10. 2023-04-15 not yet calculated CVE-2023-26463
MISC
MISC pegasystems — rpa_synchronization_engine
  A man in the middle can redirect traffic to a malicious server in a compromised configuration. 2023-04-10 not yet calculated CVE-2023-26467
MISC libntp/mstolfp.c — libntp/mstolfp.c
  mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp<cpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. 2023-04-11 not yet calculated CVE-2023-26551
MISC
MISC libntp/mstolfp.c — libntp/mstolfp.c
  mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. 2023-04-11 not yet calculated CVE-2023-26552
MISC
MISC libntp/mstolfp.c — libntp/mstolfp.c
  mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. 2023-04-11 not yet calculated CVE-2023-26553
MISC
MISC libntp/mstolfp.c — libntp/mstolfp.c
  mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a ‘’ character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. 2023-04-11 not yet calculated CVE-2023-26554
MISC
MISC ntpd/refclock_palisade.c — ntpd/refclock_palisade.c
  praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver. 2023-04-11 not yet calculated CVE-2023-26555
MISC
MISC oxygen — xml_web_author
  A directory traversal vulnerability in Oxygen XML Web Author before 25.0.0.3 build 2023021715 and Oxygen Content Fusion before 5.0.3 build 2023022015 allows an attacker to read files from a WEB-INF directory via a crafted HTTP request. (XML Web Author 24.1.0.3 build 2023021714 and 23.1.1.4 build 2023021715 are also fixed versions.) 2023-04-14 not yet calculated CVE-2023-26559
MISC
MISC buffalo — bs_gsl_and _bs_gs_series
  Use of hard-coded credentials vulnerability in Buffalo network devices allows an attacker to access the debug function of the product. The affected products and versions are as follows: BS-GSL2024 firmware Ver. 1.10-0.03 and earlier, BS-GSL2016P firmware Ver. 1.10-0.03 and earlier, BS-GSL2016 firmware Ver. 1.10-0.03 and earlier, BS-GS2008 firmware Ver. 1.0.10.01 and earlier, BS-GS2016 firmware Ver. 1.0.10.01 and earlier, BS-GS2024 firmware Ver. 1.0.10.01 and earlier, BS-GS2048 firmware Ver. 1.0.10.01 and earlier, BS-GS2008P firmware Ver. 1.0.10.01 and earlier, BS-GS2016P firmware Ver. 1.0.10.01 and earlier, and BS-GS2024P firmware Ver. 1.0.10.01 and earlier 2023-04-11 not yet calculated CVE-2023-26588
MISC
MISC yokogawa_electric_corporation — centun_series
  CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later 2023-04-11 not yet calculated CVE-2023-26593
MISC
MISC revive — adserver
  The login page of Revive Adserver v5.4.1 is vulnerable to brute force attacks. 2023-04-14 not yet calculated CVE-2023-26756
MISC
MISC sourcecodester — sales_tracker_management_system
  An issue found in Sales Tracker Management System v.1.0 allows a remote attacker to access sensitive information via sales.php component of the admin/reports endpoint. 2023-04-10 not yet calculated CVE-2023-26774
MISC
MISC
MISC
MISC textpattern — textpattern
  An arbitrary file upload vulnerability in the upload plugin of Textpattern v4.8.8 and below allows attackers to execute arbitrary code by uploading a crafted PHP file. 2023-04-12 not yet calculated CVE-2023-26852
MISC
MISC
MISC libyang — libyang
  libyang from v2.0.164 to v2.1.30 was discovered to contain a NULL pointer dereference via the function lysp_stmt_validate_value at lys_parse_mem.c. 2023-04-11 not yet calculated CVE-2023-26917
MISC diasoft — file_replication_pro
  Diasoft File Replication Pro 7.5.0 allows attackers to escalate privileges by replacing a legitimate file with a Trojan horse that will be executed as LocalSystem. This occurs because %ProgramFiles%FileReplicationPro allows Everyone:(F) access. 2023-04-14 not yet calculated CVE-2023-26918
MISC
MISC hyper_http2_rst_stream_frames — hyper_http2_rst_stream_frames
  An issue was discovered in hyper v0.13.7. h2-0.2.4 Stream stacking occurs when the H2 component processes HTTP2 RST_STREAM frames. As a result, the memory and CPU usage are high which can lead to a Denial of Service (DoS). 2023-04-11 not yet calculated CVE-2023-26964
MISC atropim — atropim
  Atropim 1.5.26 is vulnerable to Directory Traversal. 2023-04-14 not yet calculated CVE-2023-26969
MISC pax_technology –pax_a920_prodroid
  PAX Technology PAX A920 Pro PayDroid 8.1suffers from a Race Condition vulnerability, which allows attackers to bypass the payment software and force the OS to boot directly to Android during the boot process. 2023-04-14 not yet calculated CVE-2023-26980
MISC
MISC
MISC pretashop — advancedpopupcreator
  Prestashop advancedpopupcreator v1.1.21 to v1.1.24 was discovered to contain a SQL injection vulnerability via the component AdvancedPopup::getPopups(). 2023-04-12 not yet calculated CVE-2023-27032
MISC
MISC gdidees — cms
  GDidees CMS v3.9.1 and lower was discovered to contain an arbitrary file download vulenrability via the filename parameter at /_admin/imgdownload.php. 2023-04-11 not yet calculated CVE-2023-27179
MISC
MISC
MISC dualspace — super_security
  An issue found in DUALSPACE Super Security v.2.3.7 allows an attacker to cause a denial of service via the key_wifi_safe_net_check_url, KEY_Cirus_scan_whitelist and KEY_AD_NEW_USER_AVOID_TIME parameters. 2023-04-11 not yet calculated CVE-2023-27192
MISC
MISC
MISC dualspace — dualspace
  An issue found in DUALSPACE v.1.1.3 allows a local attacker to gain privileges via the key_ad_new_user_avoid_time field. 2023-04-14 not yet calculated CVE-2023-27193
MISC
MISC
MISC d-link — dsl-3782
  An issue found in D-Link DSL-3782 v.1.03 allows remote authenticated users to execute arbitrary code as root via the network settings page. 2023-04-12 not yet calculated CVE-2023-27216
MISC
MISC
MISC contec –conprosys_iot_gateway_products
  Inadequate encryption strength vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker with an administrative privilege to apply a specially crafted Firmware update file, alter the information, cause a denial-of-service (DoS) condition, and/or execute arbitrary code. The affected products and versions are as follows: M2M Gateway with the firmware Ver.3.7.10 and earlier (CPS-MG341-ADSC1-111, CPS-MG341-ADSC1-931, CPS-MG341G-ADSC1-111, CPS-MG341G-ADSC1-930, and CPS-MG341G5-ADSC1-931), M2M Controller Integrated Type with firmware Ver.3.7.6 and earlier versions (CPS-MC341-ADSC1-111, CPS-MC341-ADSC1-931, CPS-MC341-ADSC2-111, CPS-MC341G-ADSC1-110, CPS-MC341Q-ADSC1-111, CPS-MC341-DS1-111, CPS-MC341-DS11-111, CPS-MC341-DS2-911, and CPS-MC341-A1-111), and M2M Controller Configurable Type with firmware Ver.3.8.8 and earlier versions (CPS-MCS341-DS1-111, CPS-MCS341-DS1-131, CPS-MCS341G-DS1-130, CPS-MCS341G5-DS1-130, and CPS-MCS341Q-DS1-131). 2023-04-11 not yet calculated CVE-2023-27389
MISC
MISC
MISC
MISC
MISC sap — solution_manager_diagnostics_agent
  Due to missing authentication and input sanitization of code the EventLogServiceCollector of SAP Diagnostics Agent – version 720, allows an attacker to execute malicious scripts on all connected Diagnostics Agents running on Windows. On successful exploitation, the attacker can completely compromise confidentiality, integrity and availability of the system. 2023-04-11 not yet calculated CVE-2023-27497
MISC
MISC sap — gui_for_html
  SAP GUI for HTML – versions KERNEL 7.22, 7.53, 7.54, 7.77, 7.81, 7.85, 7.89, 7.91, KRNL64UC, 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT does not sufficiently encode user-controlled inputs, resulting in a reflected Cross-Site Scripting (XSS) vulnerability. An attacker could craft a malicious URL and lure the victim to click, the script supplied by the attacker will execute in the victim user’s browser. The information from the victim’s web browser can either be modified or read and sent to the attacker. 2023-04-11 not yet calculated CVE-2023-27499
MISC
MISC seiko_epson — multiple_products
  Cross-site request forgery (CSRF) vulnerability in SEIKO EPSON printers/network interface Web Config allows a remote unauthenticated attacker to hijack the authentication and perform unintended operations by having a logged-in user view a malicious page. [Note] Web Config is the software that allows users to check the status and change the settings of SEIKO EPSON printers/network interface via a web browser. According to SEIKO EPSON CORPORATION, it is also called as Remote Manager in some products. Web Config is pre-installed in some printers/network interface provided by SEIKO EPSON CORPORATION. For the details of the affected product names/model numbers, refer to the information provided by the vendor. 2023-04-11 not yet calculated CVE-2023-27520
MISC
MISC commscope_arris — dg3450
  An issue was discovered in DG3450 Cable Gateway AR01.02.056.18_041520_711.NCS.10. The troubleshooting_logs_download.php log file download functionality does not check the session cookie. Thus, an attacker can download all log files. 2023-04-15 not yet calculated CVE-2023-27571
MISC
MISC
MISC commscope_arris — dg3450
  An issue was discovered in CommScope Arris DG3450 Cable Gateway AR01.02.056.18_041520_711.NCS.10. A reflected XSS vulnerability was discovered in the https_redirect.php web page via the page parameter. 2023-04-15 not yet calculated CVE-2023-27572
MISC
MISC
MISC poweramp — audioplayer
  An issue found in POWERAMP 925-bundle-play and Poweramp 954-uni allows a remote attacker to cause a denial of service via the Rescan button in Queue and Select Folders button in Library 2023-04-14 not yet calculated CVE-2023-27643
MISC
MISC
MISC poweramp — audioplayer
  An issue found in POWERAMP audioplayer build 925 bundle play and build 954 allows a remote attacker to gain privileges via the reverb and EQ preset parameters. 2023-04-11 not yet calculated CVE-2023-27645
MISC
MISC
MISC dualspace — lock_master
  An issue found in DUALSPACE Lock Master v.2.2.4 allows a local attacker to cause a denial of service or gain sensitive information via the com.ludashi.superlock.util.pref.SharedPrefProviderEntryMethod: insert of the android.net.Uri.insert method. 2023-04-14 not yet calculated CVE-2023-27647
MISC
MISC
MISC t-me studios — change_color_of_keypad
  Directory Traversal vulnerability found in T-ME Studios Change Color of Keypad v.1.275.1.277 allows a remote attacker to execute arbitrary code via the dex file in the internal storage. 2023-04-14 not yet calculated CVE-2023-27648
MISC
MISC
MISC trusted_tools — free_music
  SQL injection vulnerability found in Trusted Tools Free Music v.2.1.0.47, v.2.0.0.46, v.1.9.1.45, v.1.8.2.43 allows a remote attacker to cause a denial of service via the search history table 2023-04-14 not yet calculated CVE-2023-27649
MISC
MISC
MISC ego_studio — superclean
  An issue found in Ego Studio SuperClean v.1.1.9 and v.1.1.5 allows an attacker to gain privileges via the update_info field of the _default_.xml file. 2023-04-14 not yet calculated CVE-2023-27651
MISC
MISC
MISC who_app — who_app
  An issue found in WHOv.1.0.28, v.1.0.30, v.1.0.32 allows an attacker to cause a denial of service via the SharedPreference files. 2023-04-14 not yet calculated CVE-2023-27653
MISC
MISC
MISC who_app — who_app
  An issue found in WHOv.1.0.28, v.1.0.30, v.1.0.32 allows an attacker to cause a escalation of privileges via the TTMultiProvider component. 2023-04-14 not yet calculated CVE-2023-27654
MISC
MISC
MISC sourcecodester — auto_dealer_management_system
  Auto Dealer Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the name parameter at /classes/SystemSettings.php?f=update_settings. 2023-04-14 not yet calculated CVE-2023-27666
MISC
MISC
MISC sourcecodester — auto_dealer_management_system
  Auto Dealer Management System v1.0 was discovered to contain a SQL injection vulnerability. 2023-04-13 not yet calculated CVE-2023-27667
MISC
MISC
MISC pikpak_for_android — pikpak_for_android
  The Android version of pikpak v1.29.2 was discovered to contain an information leak via the debug interface. 2023-04-12 not yet calculated CVE-2023-27703
MISC
MISC void_tools — void_tools
  Void Tools Everything lower than v1.4.1.1022 was discovered to contain a Regular Expression Denial of Service (ReDoS). 2023-04-12 not yet calculated CVE-2023-27704
MISC
MISC
MISC d-link — dir878
  D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_498308 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. 2023-04-09 not yet calculated CVE-2023-27718
MISC
MISC d-link — dir878
  D-Link DIR878 1.30B08 was discovered to contain a stack overflow in the sub_478360 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. 2023-04-09 not yet calculated CVE-2023-27719
MISC
MISC nginx — njs
  Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h. 2023-04-09 not yet calculated CVE-2023-27727
MISC nginx — njs
  Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c. 2023-04-09 not yet calculated CVE-2023-27728
MISC nginx — njs
  Nginx NJS v0.7.10 was discovered to contain an illegal memcpy via the function njs_vmcode_return at src/njs_vmcode.c. 2023-04-09 not yet calculated CVE-2023-27729
MISC nginx — njs
  Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c. 2023-04-09 not yet calculated CVE-2023-27730
MISC blackvue — dr750-2ch
  BlackVue DR750-2CH LTE v.1.012_2022.10.26 was discovered to contain a weak default passphrase which can be easily cracked via a brute force attack if the WPA2 handshake is intercepted. 2023-04-13 not yet calculated CVE-2023-27746
MISC
MISC
MISC
MISC blackvue — dr750-2ch
  BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authentication in its web server. This vulnerability allows attackers to access sensitive information such as configurations and recordings. 2023-04-13 not yet calculated CVE-2023-27747
MISC
MISC
MISC
MISC blackvue — dr750-2ch
  BlackVue DR750-2CH LTE v.1.012_2022.10.26 does not employ authenticity check for uploaded firmware. This can allow attackers to upload crafted firmware which contains backdoors and enables arbitrary code execution. 2023-04-13 not yet calculated CVE-2023-27748
MISC
MISC
MISC
MISC libiec61850 — libiec61850
  libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c. 2023-04-13 not yet calculated CVE-2023-27772
MISC
MISC liveaction — livesp
  A stored HTML injection vulnerability in LiveAction LiveSP v21.1.2 allows attackers to execute arbitrary code via a crafted payload. 2023-04-12 not yet calculated CVE-2023-27775
MISC
MISC
MISC alo — am_presencia
  AM Presencia v3.7.3 was discovered to contain a SQL injection vulnerability via the user parameter in the login form. 2023-04-13 not yet calculated CVE-2023-27779
MISC
MISC
MISC
MISC bloofox — bloofox
  bloofox v0.5.2 was discovered to contain an arbitrary file deletion vulnerability via the delete_file() function. 2023-04-13 not yet calculated CVE-2023-27812
MISC
MISC
MISC
MISC seowonintech — multiple_products
  SeowonIntech SWC 5100W WIMAX Bootloader 1.18.19.0, HW 0.0.7.0, and FW 1.11.0.1, 1.9.9.4 are vulnerable to OS Command Injection. which allows attackers to take over the system with root privilege by abusing doSystem() function. 2023-04-12 not yet calculated CVE-2023-27826
MISC
MISC
MISC tightvnc — tightvnc
  TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account. 2023-04-12 not yet calculated CVE-2023-27830
MISC
MISC
MISC autodesk — autocad
  A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code in the context of the current process. 2023-04-14 not yet calculated CVE-2023-27912
MISC autodesk — autocad
  A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to cause an Integer Overflow. A malicious actor can leverage this vulnerability to cause a crash or read sensitive data, or execute arbitrary code in the context of the current process. 2023-04-14 not yet calculated CVE-2023-27913
MISC autodesk — autocad
  A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 can be used to write beyond the allocated buffer causing a Stack Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code in the context of the current process. 2023-04-14 not yet calculated CVE-2023-27914
MISC autodesk — autocad
  A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. 2023-04-14 not yet calculated CVE-2023-27915
MISC contec –conprosys_iot_gateway_products
  OS command injection vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker who can access Network Maintenance page to execute arbitrary OS commands with a root privilege. The affected products and versions are as follows: M2M Gateway with the firmware Ver.3.7.10 and earlier (CPS-MG341-ADSC1-111, CPS-MG341-ADSC1-931, CPS-MG341G-ADSC1-111, CPS-MG341G-ADSC1-930, and CPS-MG341G5-ADSC1-931), M2M Controller Integrated Type with firmware Ver.3.7.6 and earlier versions (CPS-MC341-ADSC1-111, CPS-MC341-ADSC1-931, CPS-MC341-ADSC2-111, CPS-MC341G-ADSC1-110, CPS-MC341Q-ADSC1-111, CPS-MC341-DS1-111, CPS-MC341-DS11-111, CPS-MC341-DS2-911, and CPS-MC341-A1-111), and M2M Controller Configurable Type with firmware Ver.3.8.8 and earlier versions (CPS-MCS341-DS1-111, CPS-MCS341-DS1-131, CPS-MCS341G-DS1-130, CPS-MCS341G5-DS1-130, and CPS-MCS341Q-DS1-131). 2023-04-11 not yet calculated CVE-2023-27917
MISC
MISC
MISC
MISC
MISC fortinet — fortisoar
  A improper neutralization of special elements used in a template engine vulnerability in Fortinet FortiSOAR 7.3.0 through 7.3.1 allows an authenticated, remote attacker to execute arbitrary code via a crafted payload. 2023-04-11 not yet calculated CVE-2023-27995
MISC dell — ppdm
  Dell PPDM versions 19.12, 19.11 and 19.10, contain an improper access control vulnerability. A remote authenticated malicious user with low privileges could potentially exploit this vulnerability to bypass intended access restrictions and perform unauthorized actions. 2023-04-11 not yet calculated CVE-2023-28062
MISC hewlett_packard_enterprise — oneview_global_dashboard
  An HPE OneView Global Dashboard (OVGD) appliance dump may expose OVGD user account credentials 2023-04-14 not yet calculated CVE-2023-28085
MISC hewlett_packard_enterprise — oneview_virtual_appliance
  HPE OneView virtual appliance “Migrate server hardware” option may expose sensitive information in an HPE OneView support dump 2023-04-14 not yet calculated CVE-2023-28091
MISC pegasystems — rpa:_synchronization_engine
  A user with a compromised configuration can start an unsigned binary as a service. 2023-04-10 not yet calculated CVE-2023-28093
MISC wordpress — wordpress
  An issue in WooCommerce Payments plugin for WordPress (versions 5.6.1 and lower) allows an unauthenticated attacker to send requests on behalf of an elevated user, like administrator. This allows a remote, unauthenticated attacker to gain admin access on a site that has the affected version of the plugin activated. 2023-04-12 not yet calculated CVE-2023-28121
MISC tp-link_corporation_limited — t2600g-28sq
  TP-Link L2 switch T2600G-28SQ firmware versions prior to ‘T2600G-28SQ(UN)_V1_1.0.6 Build 20230227’ uses vulnerable SSH host keys. A fake device may be prepared to spoof the affected device with the vulnerable host key.If the administrator may be tricked to login to the fake device, the credential information for the affected device may be obtained. 2023-04-11 not yet calculated CVE-2023-28368
MISC
MISC connman — connman
  client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process. 2023-04-12 not yet calculated CVE-2023-28488
MISC
MISC hikvision — hybrid_san/cluster_storage_products
  Some Hikvision Hybrid SAN/Cluster Storage products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices. 2023-04-11 not yet calculated CVE-2023-28808
MISC flask-appbuilder — flask-appbuilder
  Flask-AppBuilder versions before 4.3.0 lack rate limiting which can allow an attacker to brute-force user credentials. Version 4.3.0 includes the ability to enable rate limiting using `AUTH_RATE_LIMITED = True`, `RATELIMIT_ENABLED = True`, and setting an `AUTH_RATE_LIMIT`. 2023-04-10 not yet calculated CVE-2023-29005
MISC
MISC go — go
  Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer for deploying microservices. There is a vulnerability in Go when parsing the HTTP headers, which impacts Traefik. HTTP header parsing could allocate substantially more memory than required to hold the parsed headers. This behavior could be exploited to cause a denial of service. This issue has been patched in versions 2.9.10 and 2.10.0-rc2. 2023-04-14 not yet calculated CVE-2023-29013
MISC
MISC
MISC
MISC open-feature — open-feature-operator
  The OpenFeature Operator allows users to expose feature flags to applications. Assuming the pre-existence of a vulnerability that allows for arbitrary code execution, an attacker could leverage the lax permissions configured on `open-feature-operator-controller-manager` to escalate the privileges of any SA in the cluster. The increased privileges could be used to modify cluster state, leading to DoS, or read sensitive data, including secrets. Version 0.2.32 mitigates this issue by restricting the resources the `open-feature-operator-controller-manager` can modify. 2023-04-14 not yet calculated CVE-2023-29018
MISC
MISC autodesk — autocad A maliciously crafted X_B file when parsed through Autodesk® AutoCAD® 2023 could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. 2023-04-14 not yet calculated CVE-2023-29067
MISC zoho — manageengine_admanager_plus
  Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to exploit command injection via Proxy settings. 2023-04-13 not yet calculated CVE-2023-29084
MISC
MISC exynos — multiple_products
  An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP status line. 2023-04-14 not yet calculated CVE-2023-29085
MISC exynos — multiple_products
  An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Min-SE header. 2023-04-14 not yet calculated CVE-2023-29086
MISC exynos — multiple_products
  An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Retry-After header. 2023-04-14 not yet calculated CVE-2023-29087
MISC exynos — multiple_products
  An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Session-Expires header. 2023-04-14 not yet calculated CVE-2023-29088
MISC exynos — multiple_products
  An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding SIP multipart messages. 2023-04-14 not yet calculated CVE-2023-29089
MISC exynos — multiple_products
  An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Via header. 2023-04-14 not yet calculated CVE-2023-29090
MISC exynos — multiple_products
  An issue was discovered in Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP URI. 2023-04-14 not yet calculated CVE-2023-29091
MISC sap — abap_platform/sap_web_dispatcher
  The IP filter in ABAP Platform and SAP Web Dispatcher – versions WEBDISP 7.85, 7.89, KERNEL 7.85, 7.89, 7.91, may be vulnerable by erroneous IP netmask handling. This may enable access to backend applications from unwanted sources. 2023-04-11 not yet calculated CVE-2023-29108
MISC
MISC sap — application_interface_framework
  The SAP Application Interface Framework (Message Dashboard) – versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application. 2023-04-11 not yet calculated CVE-2023-29109
MISC
MISC sap — application_interface_framework
  The SAP Application Interface (Message Dashboard) – versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application. 2023-04-11 not yet calculated CVE-2023-29110
MISC
MISC sap — application_interface_framework
  The SAP AIF (ODATA service) – versions 755, 756, discloses more detailed information than is required. An authorized attacker can use the collected information possibly to exploit the component. As a result, an attacker can cause a low impact on the confidentiality of the application. 2023-04-11 not yet calculated CVE-2023-29111
MISC
MISC sap — application_interface_framework
  The SAP Application Interface (Message Monitoring) – versions 600, 700, allows an authorized attacker to input links or headings with custom CSS classes into a comment. The comment will render links and custom CSS classes as HTML objects. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application. 2023-04-11 not yet calculated CVE-2023-29112
MISC
MISC irssi — irssi
  Irssi 1.3.x and 1.4.x before 1.4.4 has a use-after-free because of use of a stale special collector reference. This occurs when printing of a non-formatted line is concurrent with printing of a formatted line. 2023-04-14 not yet calculated CVE-2023-29132
MISC
MISC sap — netweaver_as_for_abap
  SAP NetWeaver AS for ABAP (Business Server Pages) – versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an attacker authenticated as a non-administrative user to craft a request with certain parameters in certain circumstances which can consume the server’s resources sufficiently to make it unavailable over the network without any user interaction. 2023-04-11 not yet calculated CVE-2023-29185
MISC
MISC sap — netweaver
  In SAP NetWeaver (BI CONT ADDON) – versions 707, 737, 747, 757, an attacker can exploit a directory traversal flaw in a report to upload and overwrite files on the SAP server. Data cannot be read but if a remote attacker has sufficient (administrative) privileges then potentially critical OS files can be overwritten making the system unavailable. 2023-04-11 not yet calculated CVE-2023-29186
MISC
MISC sap — sapsetup
  A Windows user with basic user authorization can exploit a DLL hijacking attack in SapSetup (Software Installation Program) – version 9.0, resulting in a privilege escalation running code as administrator of the very same Windows PC. A successful attack depends on various preconditions beyond the attacker’s control. 2023-04-11 not yet calculated CVE-2023-29187
MISC
MISC sap — crm
  SAP CRM (WebClient UI) – versions S4FND 102, 103, 104, 105, 106, 107, WEBCUIF, 700, 701, 731, 730, 746, 747, 748, 800, 801, allows an authenticated attacker to modify HTTP verbs used in requests to the web server. This application is exposed over the network and successful exploitation can lead to exposure of form fields 2023-04-11 not yet calculated CVE-2023-29189
MISC
MISC spicedb — spicedb
  SpiceDB is an open source, Google Zanzibar-inspired, database system for creating and managing security-critical application permissions. The `spicedb serve` command contains a flag named `–grpc-preshared-key` which is used to protect the gRPC API from being accessed by unauthorized requests. The values of this flag are to be considered sensitive, secret data. The `/debug/pprof/cmdline` endpoint served by the metrics service (defaulting running on port `9090`) reveals the command-line flags provided for debugging purposes. If a password is set via the `–grpc-preshared-key` then the key is revealed by this endpoint along with any other flags provided to the SpiceDB binary. This issue has been fixed in version 1.19.1. ### Impact All deployments abiding by the recommended best practices for production usage are **NOT affected**: – Authzed’s SpiceDB Serverless – Authzed’s SpiceDB Dedicated – SpiceDB Operator Users configuring SpiceDB via environment variables are **NOT affected**. Users **MAY be affected** if they expose their metrics port to an untrusted network and are configuring `–grpc-preshared-key` via command-line flag. ### Patches TODO ### Workarounds To workaround this issue you can do one of the following: – Configure the preshared key via an environment variable (e.g. `SPICEDB_GRPC_PRESHARED_KEY=yoursecret spicedb serve`) – Reconfigure the `–metrics-addr` flag to bind to a trusted network (e.g. `–metrics-addr=localhost:9090`) – Disable the metrics service via the flag (e.g. `–metrics-enabled=false`) – Adopt one of the recommended deployment models: [Authzed’s managed services](https://authzed.com/pricing) or the [SpiceDB Operator](https://github.com/authzed/spicedb-operator) ### References – [GitHub Security Advisory issued for SpiceDB](https://github.com/authzed/spicedb/security/advisories/GHSA-cjr9-mr35-7xh6) – [Go issue #22085](https://github.com/golang/go/issues/22085) for documenting the risks of exposing pprof to the internet – [Go issue #42834](https://github.com/golang/go/issues/42834) discusses preventing pprof registration to the default serve mux – [semgrep rule go.lang.security.audit.net.pprof.pprof-debug-exposure](https://semgrep.dev/r?q=go.lang.security.audit.net.pprof) checks for a variation of this issue ### Credit We’d like to thank Amit Laish, a security researcher at GE Vernova for responsibly disclosing this vulnerability. 2023-04-14 not yet calculated CVE-2023-29193
MISC
MISC
MISC vitessio — vitess
  Vitess is a database clustering system for horizontal scaling of MySQL. Users can either intentionally or inadvertently create a keyspace containing `/` characters such that from that point on, anyone who tries to view keyspaces from VTAdmin will receive an error. Trying to list all the keyspaces using `vtctldclient GetKeyspaces` will also return an error. Note that all other keyspaces can still be administered using the CLI (vtctldclient). This issue is fixed in version 16.0.1. As a workaround, delete the offending keyspace using a CLI client (vtctldclient). 2023-04-14 not yet calculated CVE-2023-29194
MISC
MISC
MISC vm2_project — vm2
  There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`. 2023-04-14 not yet calculated CVE-2023-29199
MISC
MISC
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. The “restricted” mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1, only escaped `<script>` and `<style>`-tags but neither attributes that can be used to inject scripts nor other dangerous HTML tags like `<iframe>`. As a consequence, any code relying on this “restricted” mode for security is vulnerable to JavaScript injection (“cross-site scripting”/XSS). When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. This problem has been patched in XWiki 14.6 RC1 with the introduction of a filter with allowed HTML elements and attributes that is enabled in restricted mode. There are no known workarounds apart from upgrading to a version including the fix. 2023-04-15 not yet calculated CVE-2023-29201
MISC
MISC
MISC
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. The RSS macro that is bundled in XWiki included the content of the feed items without any cleaning in the HTML output when the parameter `content` was set to `true`. This allowed arbitrary HTML and in particular also JavaScript injection and thus cross-site scripting (XSS) by specifying an RSS feed with malicious content. With the interaction of a user with programming rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content and sabotaging the wiki. The issue has been patched in XWiki 14.6 RC1, the content of the feed is now properly cleaned before being displayed. As a workaround, if the RSS macro isn’t used in the wiki, the macro can be uninstalled by deleting `WEB-INF/lib/xwiki-platform-rendering-macro-rss-XX.jar`, where `XX` is XWiki’s version, in the web application’s directory. 2023-04-15 not yet calculated CVE-2023-29202
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. It’s possible to list some users who are normally not viewable from subwiki by requesting users on a subwiki which allows only global users with `uorgsuggest.vm`. This issue only concerns hidden users from main wiki. Note that the disclosed information are the username and the first and last name of users, no other information is leaked. The problem has been patched on XWiki 13.10.8, 14.4.3 and 14.7RC1. 2023-04-15 not yet calculated CVE-2023-29203
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1. 2023-04-15 not yet calculated CVE-2023-29204
MISC
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. The HTML macro does not systematically perform a proper neutralization of script-related html tags. As a result, any user able to use the html macro in XWiki, is able to introduce an XSS attack. This can be particularly dangerous since in a standard wiki, any user is able to use the html macro directly in their own user profile page. The problem has been patched in XWiki 14.8RC1. The patch involves the HTML macros and are systematically cleaned up whenever the user does not have the script correct. 2023-04-15 not yet calculated CVE-2023-29205
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights. This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script rights. 2023-04-15 not yet calculated CVE-2023-29206
MISC
MISC
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. The Livetable Macro wasn’t properly sanitizing column names, thus allowing the insertion of raw HTML code including JavaScript. This vulnerability was also exploitable via the Documents Macro that is included since XWiki 3.5M1 and doesn’t require script rights, this can be demonstrated with the syntax `{{documents id=”example” count=”5″ actions=”false” columns=”doc.title, before<script>alert(1)</script>after”/}}`. Therefore, this can also be exploited by users without script right and in comments. With the interaction of a user with more rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10. 2023-04-15 not yet calculated CVE-2023-29207
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. Rights added to a document are not taken into account for viewing it once it’s deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked. The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it. 2023-04-15 not yet calculated CVE-2023-29208
MISC
MISC
MISC xwiki — xwiki_platform XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the legacy notification activity macro. This macro is installed by default in XWiki. The vulnerability can be exploited via every wiki page that is editable including the user’s profile, but also with just view rights using the HTMLConverter that is part of the CKEditor integration which is bundled with XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10. 2023-04-15 not yet calculated CVE-2023-29209
MISC
MISC
MISC xwiki — xwiki_platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the notification preferences macros can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the user parameter of the macro that provide the notification filters. These macros are used in the user profiles and thus installed by default in XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10. 2023-04-15 not yet calculated CVE-2023-29210
MISC
MISC
MISC shadow — shadow
  In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that “cat /etc/passwd” shows a rogue user account. 2023-04-14 not yet calculated CVE-2023-29383
MISC
MISC
MISC
MISC ncurses — ncurses
  ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable. 2023-04-14 not yet calculated CVE-2023-29491
MISC
MISC
MISC novi_survey — novi_survey
  Novi Survey before 8.9.43676 allows remote attackers to execute arbitrary code on the server in the context of the service account. This does not provide access to stored survey or response data. 2023-04-11 not yet calculated CVE-2023-29492
CONFIRM matrix_org — matrix_js_sdk
  matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. An attacker present in a room where an MSC3401 group call is taking place can eavesdrop on the video and audio of participants using matrix-js-sdk, without their knowledge. To affected matrix-js-sdk users, the attacker will not appear to be participating in the call. This attack is possible because matrix-js-sdk’s group call implementation accepts incoming direct calls from other users, even if they have not yet declared intent to participate in the group call, as a means of resolving a race condition in call setup. Affected versions do not restrict access to the user’s outbound media in this case. Legacy 1:1 calls are unaffected. This is fixed in matrix-js-sdk 24.1.0. As a workaround, users may hold group calls in private rooms where only the exact users who are expected to participate in the call are present. 2023-04-14 not yet calculated CVE-2023-29529
MISC
MISC
MISC cesanta_mjs — cesanta_mjs
  Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via ffi_cb_impl_wpwwwww at src/mjs_ffi.c. This vulnerability can lead to a Denial of Service (DoS). 2023-04-14 not yet calculated CVE-2023-29569
MISC
MISC cesanta_mjs — cesanta_mjs
  Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via gc_sweep at src/mjs_gc.c. This vulnerability can lead to a Denial of Service (DoS). 2023-04-12 not yet calculated CVE-2023-29571
MISC
MISC bento — bento
  Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component. 2023-04-13 not yet calculated CVE-2023-29573
MISC
MISC bento — bento
  Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component. 2023-04-12 not yet calculated CVE-2023-29574
MISC
MISC bento — bento
  Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h. 2023-04-11 not yet calculated CVE-2023-29576
MISC
MISC yasm — yasm
  yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the component yasm_expr_create at /libyasm/expr.c. 2023-04-12 not yet calculated CVE-2023-29580
MISC
MISC yasm — yasm
  yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function delete_Token at /nasm/nasm-pp.c. 2023-04-12 not yet calculated CVE-2023-29581
MISC
MISC mp4v2 — mp4v2
  mp4v2 v2.0.0 was discovered to contain a heap buffer overflow via the MP4GetVideoProfileLevel function at /src/mp4.cpp. 2023-04-14 not yet calculated CVE-2023-29584
MISC
MISC bloofox — bloofox
  bloofox v0.5.2 was discovered to contain a SQL injection vulnerability via the component /index.php?mode=content&page=pages&action=edit&eid=1. 2023-04-13 not yet calculated CVE-2023-29597
MISC lmxcms — lmxcms
  lmxcms v1.4.1 was discovered to contain a SQL injection vulnerability via the setbook parameter at index.php. 2023-04-13 not yet calculated CVE-2023-29598
MISC purchase_order_management — purchase_order_management
  Purchase Order Management v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server. 2023-04-14 not yet calculated CVE-2023-29621
MISC
MISC purchase_order_management — purchase_order_management
  Purchase Order Management v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /purchase_order/admin/login.php. 2023-04-14 not yet calculated CVE-2023-29622
MISC
MISC purchase_order_management — purchase_order_management
  Purchase Order Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the password parameter at /purchase_order/classes/login.php. 2023-04-14 not yet calculated CVE-2023-29623
MISC
MISC employee_performance_evaluation_system — employee_performance_evaluation_system
  Employee Performance Evaluation System v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server. 2023-04-14 not yet calculated CVE-2023-29625
MISC sourcecodester — yoga_class_registration_system
  Yoga Class Registration System 1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at /admin/login.php. 2023-04-14 not yet calculated CVE-2023-29626
MISC sourcecodester — online_pizza_ordering Online Pizza Ordering v1.0 was discovered to contain an arbitrary file upload vulnerability which allows attackers to execute arbitrary code via a crafted file uploaded to the server. 2023-04-14 not yet calculated CVE-2023-29627
MISC
MISC totolink — x18 TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the command parameter in the setTracerouteCfg function. 2023-04-14 not yet calculated CVE-2023-29798
MISC totolink — x18
  TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the hostname parameter in the setOpModeCfg function. 2023-04-14 not yet calculated CVE-2023-29799
MISC totolink — x18
  TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the FileName parameter in the UploadFirmwareFile function. 2023-04-14 not yet calculated CVE-2023-29800
MISC totolink — x18 TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain multiple command injection vulnerabilities via the rtLogEnabled and rtLogServer parameters in the setSyslogCfg function. 2023-04-14 not yet calculated CVE-2023-29801
MISC totolink — x18
  TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the ip parameter in the setDiagnosisCfg function. 2023-04-14 not yet calculated CVE-2023-29802
MISC totolink — x18
  TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the pid parameter in the disconnectVPN function. 2023-04-14 not yet calculated CVE-2023-29803
MISC iodata — wfs-sr03 WFS-SR03 v1.0.3 was discovered to contain a command injection vulnerability via the sys_smb_pwdmod function. 2023-04-14 not yet calculated CVE-2023-29804
MISC iodata — wfs-sr03
  WFS-SR03 v1.0.3 was discovered to contain a command injection vulnerability via the pro_stor_canceltrans_handler_part_19 function. 2023-04-14 not yet calculated CVE-2023-29805
MISC aerocms — aerocms AeroCMS v0.0.1 was discovered to contain multiple stored cross-site scripting (XSS) vulnerabilities via the comment_author and comment_content parameters at /post.php. These vulnerabilities allow attackers to execute arbitrary web scripts or HTML via a crafted payload. 2023-04-14 not yet calculated CVE-2023-29847
MISC slims — bulian
  SENAYAN Library Management System (SLiMS) Bulian v9.5.2 does not strip exif data from uploaded images. This allows attackers to obtain information such as the user’s geolocation and device information. 2023-04-14 not yet calculated CVE-2023-29850
MISC redpanda — rpk rpk in Redpanda before 23.1.2 mishandles the redpanda.rpc_server_tls field, leading to (for example) situations in which there is a data type mismatch that cannot be automatically fixed by rpk, and instead a user must reconfigure (while a cluster is turned off) in order to have TLS on broker RPC ports. NOTE: the fix was also backported to the 22.2 and 22.3 branches. 2023-04-08 not yet calculated CVE-2023-30450
MISC
MISC
MISC
MISC
MISC smartptt — scada
  SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default). 2023-04-14 not yet calculated CVE-2023-30459
MISC
MISC apache — inlong Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.5.0. By manipulating the “orderType” parameter and the ordering of the returned content using an SQL injection attack, an attacker can extract the username of the   user with ID 1 from the “user” table, one character at a time.  Users are advised to upgrade to Apache InLong’s 1.6.0 or cherry-pick [1] to solve it. https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html [1] https://github.com/apache/inlong/issues/7529 https://github.com/apache/inlong/issues/7529 2023-04-11 not yet calculated CVE-2023-30465
MISC
MISC cubefs — cubefs
  CubeFS through 3.2.1 allows Kubernetes cluster-level privilege escalation. This occurs because DaemonSet has cfs-csi-cluster-role and can thus list all secrets, including the admin secret. 2023-04-12 not yet calculated CVE-2023-30512
MISC jenkins — kubernetes_plugin
  Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. 2023-04-12 not yet calculated CVE-2023-30513
MISC
MISC jenkins — azure_key_vault_plugin
  Jenkins Azure Key Vault Plugin 187.va_cd5fecd198a_ and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. 2023-04-12 not yet calculated CVE-2023-30514
MISC
MISC jenkins — thycotic_devops_secrets_vault_plugin
  Jenkins Thycotic DevOps Secrets Vault Plugin 1.0.0 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. 2023-04-12 not yet calculated CVE-2023-30515
MISC
MISC jenkins — image_tag_parameter_plugin Jenkins Image Tag Parameter Plugin 2.0 improperly introduces an option to opt out of SSL/TLS certificate validation when connecting to Docker registries, resulting in job configurations using Image Tag Parameters that were created before 2.0 having SSL/TLS certificate validation disabled by default. 2023-04-12 not yet calculated CVE-2023-30516
MISC
MISC jenkins — neuvector_vulnerability_scanner_plugin
  Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server. 2023-04-12 not yet calculated CVE-2023-30517
MISC
MISC jenkins — thycotic_secret_server_plugin
  A missing permission check in Jenkins Thycotic Secret Server Plugin 1.0.2 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. 2023-04-12 not yet calculated CVE-2023-30518
MISC
MISC jenkins — quay.io_trigger_plugin A missing permission check in Jenkins Quay.io trigger Plugin 0.1 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository. 2023-04-12 not yet calculated CVE-2023-30519
MISC
MISC jenkins — quay.io_trigger_plugin Jenkins Quay.io trigger Plugin 0.1 and earlier does not limit URL schemes for repository homepage URLs submitted via Quay.io trigger webhooks, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted Quay.io trigger webhook payloads. 2023-04-12 not yet calculated CVE-2023-30520
MISC
MISC jenkins — assembla_merge_request_builder_plugin A missing permission check in Jenkins Assembla merge request builder Plugin 1.1.13 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository. 2023-04-12 not yet calculated CVE-2023-30521
MISC
MISC jenkins — fogbugz_plugin A missing permission check in Jenkins Fogbugz Plugin 2.2.17 and earlier allows attackers with Item/Read permission to trigger builds of jobs specified in a ‘jobname’ request parameter. 2023-04-12 not yet calculated CVE-2023-30522
MISC
MISC jenkins — report_portal_plugin Jenkins Report Portal Plugin 0.5 and earlier stores ReportPortal access tokens unencrypted in job config.xml files on the Jenkins controller as part of its configuration where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. 2023-04-12 not yet calculated CVE-2023-30523
MISC
MISC jenkins — report_portal_plugin Jenkins Report Portal Plugin 0.5 and earlier does not mask ReportPortal access tokens displayed on the configuration form, increasing the potential for attackers to observe and capture them. 2023-04-12 not yet calculated CVE-2023-30524
MISC
MISC jenkins — report_portal_plugin A cross-site request forgery (CSRF) vulnerability in Jenkins Report Portal Plugin 0.5 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified bearer token authentication. 2023-04-12 not yet calculated CVE-2023-30525
MISC
MISC jenkins — report_portal_plugin A missing permission check in Jenkins Report Portal Plugin 0.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication. 2023-04-12 not yet calculated CVE-2023-30526
MISC
MISC jenkins — wso2_oauth_plugin
  Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. 2023-04-12 not yet calculated CVE-2023-30527
MISC
MISC jenkins — wso2_oauth_plugin
  Jenkins WSO2 Oauth Plugin 1.0 and earlier does not mask the WSO2 Oauth client secret on the global configuration form, increasing the potential for attackers to observe and capture it. 2023-04-12 not yet calculated CVE-2023-30528
MISC
MISC jenkins — lucene_serach_plugin
  Jenkins Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require POST requests for an HTTP endpoint, allowing attackers to reindex the database. 2023-04-12 not yet calculated CVE-2023-30529
MISC
MISC jenkins — consul_kv_builder_plugin Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. 2023-04-12 not yet calculated CVE-2023-30530
MISC
MISC jenkins — consul_kv_builder_plugin Jenkins Consul KV Builder Plugin 2.0.13 and earlier does not mask the HashiCorp Consul ACL Token on the global configuration form, increasing the potential for attackers to observe and capture it. 2023-04-12 not yet calculated CVE-2023-30531
MISC
MISC jenkins — turboscript_plugin
  A missing permission check in Jenkins TurboScript Plugin 1.3 and earlier allows attackers with Item/Read permission to trigger builds of jobs corresponding to the attacker-specified repository. 2023-04-12 not yet calculated CVE-2023-30532
MISC
MISC snowflake_jdbc — snowflake_jdbc
  Snowflake JDBC provides a JDBC type 4 driver that supports core functionality, allowing Java program to connect to Snowflake. Users of the Snowflake JDBC driver were vulnerable to a command injection vulnerability. An attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. The vulnerability was patched on March 17, 2023 as part of Snowflake JDBC driver Version 3.13.29. All users should immediately upgrade the Snowflake JDBC driver to the latest version: 3.13.29. 2023-04-14 not yet calculated CVE-2023-30535
MISC
MISC dmidecode — dmidecode
  Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. 2023-04-13 not yet calculated CVE-2023-30630
MISC
MISC
MISC
MISC tikv — tikv
  TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error) upon an attempt to get a timestamp from the Placement Driver. 2023-04-13 not yet calculated CVE-2023-30635
MISC tikv — tikv
  TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error, with RpcStatus UNAVAILABLE for “not leader”) upon an attempt to start a node in a situation where the context deadline is exceeded 2023-04-13 not yet calculated CVE-2023-30636
MISC baidu — braft
  Baidu braft 1.1.2 has a memory leak related to use of the new operator in example/atomic/atomic_server. NOTE: installations with brpc-0.14.0 and later are unaffected. 2023-04-13 not yet calculated CVE-2023-30637
MISC atos — unify_openscape_sbc
  Atos Unify OpenScape SBC 10 before 10R3.1.3, OpenScape Branch 10 before 10R3.1.2, and OpenScape BCF 10 before 10R10.7.0 allow remote authenticated admins to inject commands. 2023-04-14 not yet calculated CVE-2023-30638
MISC
MISC