wordpress — wordpress
  A vulnerability has been found in I Recommend This Plugin up to 3.7.2 on WordPress and classified as critical. Affected by this vulnerability is an unknown functionality of the file dot-irecommendthis.php. The manipulation leads to sql injection. The attack can be launched remotely. Upgrading to version 3.7.3 is able to address this issue. The name of the patch is 058b3ef5c7577bf557557904a53ecc8599b13649. It is recommended to upgrade the affected component. The identifier VDB-226309 was assigned to this vulnerability. 2023-04-20 not yet calculated CVE-2014-125099
MISC
MISC
MISC
MISC wordpress — wordpress
  A vulnerability classified as problematic was found in Google Analytics Top Content Widget Plugin up to 1.5.6 on WordPress. Affected by this vulnerability is an unknown functionality of the file class-tgm-plugin-activation.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.5.7 is able to address this issue. The name of the patch is 25bb1dea113716200a6f0f3135801d84a7a65540. It is recommended to upgrade the affected component. The identifier VDB-226117 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2015-10101
MISC
MISC
MISC wordpress — wordpress
  A vulnerability, which was classified as critical, has been found in Freshdesk Plugin 1.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to open redirect. The attack may be launched remotely. Upgrading to version 1.8 is able to address this issue. The name of the patch is 2aaecd4e0c7c6c1dc4e6a593163d5f7aa0fa5d5b. It is recommended to upgrade the affected component. VDB-226118 is the identifier assigned to this vulnerability. 2023-04-17 not yet calculated CVE-2015-10102
MISC
MISC
MISC forget_it — forget_it
  A vulnerability, which was classified as problematic, was found in InternalError503 Forget It up to 1.3. This affects an unknown part of the file js/settings.js. The manipulation of the argument setForgetTime with the input 0 leads to infinite loop. It is possible to launch the attack on the local host. Upgrading to version 1.4 is able to address this issue. The name of the patch is adf0c7fd59b9c935b4fd675c556265620124999c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226119. 2023-04-17 not yet calculated CVE-2015-10103
MISC
MISC
MISC
MISC gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. The diff formatter using rouge can block for a long time in Sidekiq jobs without any timeout. 2023-04-15 not yet calculated CVE-2018-15472
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Remote attackers could obtain sensitive information about issues, comments, and project titles via events API insecure direct object reference. 2023-04-15 not yet calculated CVE-2018-17449
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Server-Side Request Forgery (SSRF) via the Kubernetes integration, leading (for example) to disclosure of a GCP service token. 2023-04-15 not yet calculated CVE-2018-17450
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Cross Site Request Forgery (CSRF) in the Slack integration for issuing slash commands. 2023-04-15 not yet calculated CVE-2018-17451
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is Server-Side Request Forgery (SSRF) via a loopback address to the validate_localhost function in url_blocker.rb. 2023-04-15 not yet calculated CVE-2018-17452
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Attackers may have been able to obtain sensitive access-token data from Sentry logs via the GRPC::Unknown exception. 2023-04-15 not yet calculated CVE-2018-17453
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is stored XSS on the issue details screen. 2023-04-15 not yet calculated CVE-2018-17454
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Attackers could obtain sensitive information about group names, avatars, LDAP settings, and descriptions via an insecure direct object reference to the “merge request approvals” feature. 2023-04-15 not yet calculated CVE-2018-17455
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is stored XSS on the merge request page via project import. 2023-04-15 not yet calculated CVE-2018-17536
MISC
CONFIRM gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. blog-viewer has stored XSS during repository browsing, if package.json exists. 2023-04-16 not yet calculated CVE-2018-17537
MISC
CONFIRM open_ticket_request_system — open_ticket_request_system
  An issue was discovered in Open Ticket Request System (OTRS) 6.0.x before 6.0.12. An attacker could send an e-mail message with a malicious link to an OTRS system or an agent. If a logged-in agent opens this link, it could cause the execution of JavaScript in the context of OTRS. 2023-04-16 not yet calculated CVE-2018-17883
CONFIRM
MISC gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.11.8, 12 before 12.0.6, and 12.1 before 12.1.6. Cookies for GitLab Pages (which have access control) could be sent over cleartext HTTP. 2023-04-16 not yet calculated CVE-2019-14942
CONFIRM
MISC
MISC gitlab — community/enterprise
  An issue was discovered in GitLab Community and Enterprise Edition before 11.11.8, 12 before 12.0.6, and 12.1 before 12.1.6. Gitaly allows injection of command-line flags. This sometimes leads to privilege escalation or remote code execution. 2023-04-16 not yet calculated CVE-2019-14944
MISC
CONFIRM
MISC
MISC lilypond — lilypond
  LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used. 2023-04-15 not yet calculated CVE-2020-17354
MISC
MISC
MISC
CONFIRM
MISC
MISC libdwarf — libdwarf
  libdwarf before 20201017 has a one-byte out-of-bounds read because of an invalid pointer dereference via an invalid line table in a crafted object. 2023-04-16 not yet calculated CVE-2020-27545
MISC
MISC
MISC
MISC
MISC libdwarf — libdwarf
  libdwarf before 20201201 allows a dwarf_print_lines.c NULL pointer dereference and application crash via a DWARF5 line-table header that has an invalid FORM for a pathname. 2023-04-16 not yet calculated CVE-2020-28163
MISC
MISC
MISC
MISC mediawiki — score
  The Score extension through 0.3.0 for MediaWiki has a remote code execution vulnerability due to improper sandboxing of the GNU LilyPond executable. This allows any user with an ability to edit articles (potentially including unauthenticated anonymous users) to execute arbitrary Scheme or shell code by using crafted {{Image data to generate musical scores containing malicious code. 2023-04-15 not yet calculated CVE-2020-29007
MISC
MISC
MISC
MISC
MISC google — android
  In PVRSRVBridgeRGXKickVRDM of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270401229 2023-04-19 not yet calculated CVE-2021-0872
MISC google — android
  In PVRSRVBridgeRGXKickRS of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270392711 2023-04-19 not yet calculated CVE-2021-0873
MISC google — android
  In PVRSRVBridgeDevicememHistorySparseChange of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270399633 2023-04-19 not yet calculated CVE-2021-0874
MISC google — android
  In PVRSRVBridgeChangeSparseMem of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270400061 2023-04-19 not yet calculated CVE-2021-0875
MISC google — android
  In PVRSRVBridgePhysmemNewRamBackedLockedPMR of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270400229 2023-04-19 not yet calculated CVE-2021-0876
MISC google — android
  In PVRSRVBridgeServerSyncGetStatus of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270399153 2023-04-19 not yet calculated CVE-2021-0878
MISC google — android
  In PVRSRVBridgeRGXTDMSubmitTransfer of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270397970 2023-04-19 not yet calculated CVE-2021-0879
MISC google — android
  In PVRSRVBridgeRGXKickTA3D of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270396792 2023-04-19 not yet calculated CVE-2021-0880
MISC google — android
  In PVRSRVBridgeRGXKickCDM of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270396350 2023-04-19 not yet calculated CVE-2021-0881
MISC google — android
  In PVRSRVBridgeRGXKickSync of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270395803 2023-04-19 not yet calculated CVE-2021-0882
MISC google — android
  In PVRSRVBridgeCacheOpQueue of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270395013 2023-04-19 not yet calculated CVE-2021-0883
MISC google — android
  In PVRSRVBridgePhysmemImportSparseDmaBuf of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270393454 2023-04-19 not yet calculated CVE-2021-0884
MISC google — android
  In PVRSRVBridgeSyncPrimOpTake of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270401914 2023-04-19 not yet calculated CVE-2021-0885
MISC laravel — laravel
  A deserialization vulnerability in the destruct() function of Laravel v8.5.9 allows attackers to execute arbitrary commands. 2023-04-19 not yet calculated CVE-2021-28254
MISC mediawiki — visualeditor
  An issue was discovered in the VisualEditor extension in MediaWiki before 1.31.13, and 1.32.x through 1.35.x before 1.35.2.  When using VisualEditor to edit a MediaWiki user page belonging to an existing, but hidden, user, VisualEditor will disclose that the user exists. (It shouldn’t because they are hidden.) This is related to ApiVisualEditor. 2023-04-15 not yet calculated CVE-2021-30153
CONFIRM
CONFIRM
MISC ribose_rnp — ribose_rnp
  Ribose RNP before 0.15.1 does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than on the tin of the algorithm. 2023-04-21 not yet calculated CVE-2021-33589
MISC
MISC mujs — mujs
  Buffer-overflow in jsdtoa.c in Artifex MuJS in versions 1.0.1 to 1.1.1. An integer overflow happens when js_strtod() reads in floating point exponent, which leads to a buffer overflow in the pointer *d. 2023-04-17 not yet calculated CVE-2021-33797
MISC
MISC qihoo_360 — chrome
  Buffer Overflow vulnerability in Qihoo 360 Chrome v13.0.2170.0 allows attacker to escalate privileges. 2023-04-19 not yet calculated CVE-2021-33970
MISC
MISC
MISC qihoo_360 — safeguard/total_security
  Qihoo 360 (https://www.360.cn/) Qihoo 360 Safeguard (https://www.360.cn/) Qihoo 360 Total Security (http://www.360totalsecurity.com/) is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: This is a set of vulnerabilities affecting popular software, “360 Safeguard(12.1.0.1004,12.1.0.1005,13.1.0.1001)”, “360 Total Security(10.8.0.1060,10.8.0.1213)”, “360 Safe Browser & 360 Chrome(13.0.2170.0)”. The attack vector is: On the browser vulnerability, just open a link to complete the vulnerability exploitation remotely; on the client software, you need to locally execute the vulnerability exploitation program, which of course can be achieved with the full chain of browser vulnerability. ¶¶ This is a set of the most serious vulnerabilities that exist on Qihoo 360’s PC client a variety of popular software, remote vulnerabilities can be completed by opening a link to arbitrary code execution on both security browsers, with the use of local vulnerabilities, not only help the vulnerability code constitutes an escalation of privileges, er can make the spyware persistent without being scanned permanently resides on the target PC computer (because local vulnerability against Qihoo 360 company’s antivirus kernel flaws); this group of remote and local vulnerability of the perfect match, to achieve an information security fallacy, in Qihoo 360’s antivirus vulnerability, not only cannot be scanned out of the virus, but will help the virus persistently control the target computer, while Qihoo 360 claims to be a safe browser, which exists in the kernel vulnerability but helped the composition of the remote vulnerability. (Security expert “Memory Corruptor” have reported this set of vulnerabilities to the corresponding vendor, all vulnerabilities have been fixed and the vendor rewarded thousands of dollars to the security experts) 2023-04-19 not yet calculated CVE-2021-33971
MISC
MISC
MISC qihoo_360 — safe_browser
  Buffer Overflow vulnerability in Qihoo 360 Safe Browser v13.0.2170.0 allows attacker to escalate privileges. 2023-04-19 not yet calculated CVE-2021-33972
MISC
MISC
MISC qihoo_360 — safeguard
  Buffer Overflow vulnerability in Qihoo 360 Safeguard v12.1.0.1004, v12.1.0.1005, v13.1.0.1001 allows attacker to escalate privileges. 2023-04-19 not yet calculated CVE-2021-33973
MISC
MISC
MISC qihoo_360 — safeguard/chrome
  Qihoo 360 (https://www.360.cn/) Qihoo 360 Safeguard (https://www.360.cn/) Qihoo 360 Chrome (https://browser.360.cn/ee/) is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: This is a set of vulnerabilities affecting popular software, and the installation packages correspond to versions “360 Safeguard(12.1.0.1004,12.1.0.1005,13.1.0.1001)”, “360 Total Security(10.8.0.1060,10.8.0.1213)”, “360 Safe Browser & 360 Chrome 12. The attack vector is: On the browser vulnerability, just open a link to complete the vulnerability exploitation remotely; on the client software, you need to locally execute the vulnerability exploitation program, which of course can be achieved with the full chain of browser vulnerability. ¶¶ This is a set of the most serious vulnerabilities that exist on Qihoo 360’s PC client multiple popular software, remote vulnerabilities can be accomplished by opening a link to arbitrary code execution on both security browsers, in conjunction with the exploitation of local vulnerabilities that allow spyware to persist without being scanned to permanently reside on the target PC computer (because local vulnerabilities target Qihoo 360 company’s antivirus software kernel flaws); this set of remote and local vulnerabilities in perfect coordination, to achieve an information security fallacy, on Qihoo 360’s antivirus software vulnerability, not only cannot be scanned out of the virus, but will help the virus persistently control the target computer, while Qihoo 360 claims to be a secure browser, which exists in the kernel vulnerability but help the composition of the remote vulnerability.(Security expert “Memory Corruptor” have reported this set of vulnerabilities to the corresponding vendor, all vulnerabilities have been fixed and the vendor rewarded thousands of dollars to this security expert) 2023-04-19 not yet calculated CVE-2021-33974
MISC
CONFIRM qihoo_360 — total_security
  Buffer Overflow vulnerability in Qihoo 360 Total Security v10.8.0.1060 and v10.8.0.1213 allows attacker to escalate privileges. 2023-04-19 not yet calculated CVE-2021-33975
MISC
MISC
MISC liferay — portal
  Liferay Portal 6.2.5 allows Command=FileUpload&Type=File&CurrentFolder=/ requests when frmfolders.html exists. 2023-04-16 not yet calculated CVE-2021-33990
MISC
MISC cloud_init — cloud_init
  When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user. 2023-04-19 not yet calculated CVE-2021-3429
MISC gnu_mailman — core
  An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST API could use timing attacks to determine the value of the configured REST API password and then make arbitrary REST API calls. The REST API is bound to localhost by default, limiting the ability for attackers to exploit this, but can optionally be made to listen on other interfaces. 2023-04-15 not yet calculated CVE-2021-34337
MISC
MISC
MISC credit_unions –mobicint_backend
  An issue in Mobicint Backend for Credit Unions v3 allows attackers to retrieve partial email addresses and user entered information via submission to the forgotten-password endpoint. 2023-04-20 not yet calculated CVE-2021-36436
MISC i-tech — trainsmart
  A SQL injection vulnerability in I-Tech Trainsmart r1044 exists via a evaluation/assign-evaluation?id= URI. 2023-04-16 not yet calculated CVE-2021-36520
MISC
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. In IntentManager, the install-requested intent (which causes an exception) remains in pendingMap (in memory) forever. Deletion is possible neither by a user nor by the intermittent Intent Cleanup process. 2023-04-20 not yet calculated CVE-2021-38363
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of flow rules installed by intents. A remote attacker can install or remove a new intent, and consequently modify or delete the existing flow rules related to other intents. 2023-04-20 not yet calculated CVE-2021-38364
MISC
MISC openbmc — openbmc
  In OpenBMC 2.9, crafted IPMI messages allow an attacker to cause a denial of service to the BMC via the netipmid (IPMI lan+) interface. 2023-04-15 not yet calculated CVE-2021-39295
MISC
MISC
CONFIRM
MISC
MISC
MISC openrisc — or1200
  An issue was discovered in the ALU unit of the OR1200 (aka OpenRISC 1200) processor 2011-09-10 through 2015-11-11. The overflow flag is not being updated for the msb and mac instructions, which results in an incorrect value in the overflow flag. Any software that relies on this flag may experience corruption in execution. 2023-04-18 not yet calculated CVE-2021-40506
MISC
MISC openrisc — or1200
  An issue was discovered in the ALU unit of the OR1200 (aka OpenRISC 1200) processor 2011-09-10 through 2015-11-11. The overflow flag is not being updated correctly for the subtract instruction, which results in an incorrect value in the overflow flag. Any software that relies on this flag may experience corruption in execution. 2023-04-18 not yet calculated CVE-2021-40507
MISC
MISC openrisc — or1200
  An issue was discovered in the ALU unit of the OpenRISC mor1kx processor. The carry flag is not being updated correctly for the subtract instruction, which results in an incorrect value of the carry flag. Any software that relies on this flag may experience corruption in execution. 2023-04-18 not yet calculated CVE-2021-41612
MISC
MISC openrisc — or1200
  An issue was discovered in the controller unit of the OpenRISC mor1kx processor. The write logic of Exception Effective Address Register (EEAR) is not implemented correctly. User programs from authorized privilege levels will be unable to write to EEAR. 2023-04-18 not yet calculated CVE-2021-41613
MISC
MISC openrisc — or1200
  An issue was discovered in the controller unit of the OpenRISC mor1kx processor. The read/write access permissions to the Exception Program Counter Register (EPCR) are not implemented correctly. User programs from an unauthorized privilege level can make read/write accesses to EPCR. 2023-04-18 not yet calculated CVE-2021-41614
MISC
MISC lldpd — lldpd
  In lldpd before 1.0.13, when decoding SONMP packets in the sonmp_decode function, it’s possible to trigger an out-of-bounds heap read via short SONMP packets. 2023-04-15 not yet calculated CVE-2021-43612
MISC
CONFIRM
CONFIRM
FEDORA
FEDORA
FEDORA minecraft — stargate-bukkit
  Stargate-Bukkit is a mod for the minecraft video game which adds a portal focused environment. In affected versions Minecarts with chests will drop their items when teleporting through a portal; when they reappear, they will still have their items impacting the integrity of the game world. The teleport code has since been rewritten and is available in release `0.11.5.1`. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-19 not yet calculated CVE-2021-43819
MISC kvmtool — kvmtool
  kvmtool through 39181fc allows an out-of-bounds write, related to virtio/balloon.c and virtio/pci.c. This allows a guest OS user to execute arbitrary code on the host machine. 2023-04-15 not yet calculated CVE-2021-45464
MISC
MISC
MISC
MISC cloud_init — cloud_init
  Sensitive data could be exposed in world readable logs of cloud-init before version 22.3 when schema failures are reported. This leak could include hashed passwords. 2023-04-19 not yet calculated CVE-2022-2084
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. The purge-requested intent remains on the list, but it does not respond to changes in topology (e.g., link failure). In combination with other applications, it could lead to a failure of network management. 2023-04-20 not yet calculated CVE-2022-24035
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. To attack an intent installed by a normal user, a remote attacker can install a duplicate intent with a different key, and then remove the duplicate one. This will remove the flow rules of the intent, even though the intent still exists in the controller. 2023-04-20 not yet calculated CVE-2022-24109
MISC
MISC octopus — deploy
  In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage 2023-04-19 not yet calculated CVE-2022-2507
MISC calibre-web — calibre-web
  Improper Restriction of Excessive Authentication Attempts in GitHub repository janeczku/calibre-web prior to 0.6.20. 2023-04-15 not yet calculated CVE-2022-2525
CONFIRM
MISC mybb — mybb
  In the External Redirect Warning Plugin 1.3 for MyBB, the redirect URL (aka external.php?url=) is vulnerable to XSS. 2023-04-16 not yet calculated CVE-2022-28353
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. An intent with an uppercase letter in a device ID shows the CORRUPT state, which is misleading to a network operator. Improper handling of case sensitivity causes inconsistency between intent and flow rules in the network. 2023-04-20 not yet calculated CVE-2022-29604
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. IntentManager attempts to install the IPv6 flow rules of an intent into an OpenFlow 1.0 switch that does not support IPv6. Improper handling of the difference in capabilities of the intent and switch is misleading to a network operator. 2023-04-20 not yet calculated CVE-2022-29605
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. An intent with a large port number shows the CORRUPT state, which is misleading to a network operator. Improper handling of such port numbers causes inconsistency between intent and flow rules in the network. 2023-04-20 not yet calculated CVE-2022-29606
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. Modification of an existing intent to have the same source and destination shows the INSTALLED state without any flow rule. Improper handling of such an intent is misleading to a network operator. 2023-04-20 not yet calculated CVE-2022-29607
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. An intent with a port that is an intermediate point of its path installs an invalid flow rule, causing a network loop. 2023-04-20 not yet calculated CVE-2022-29608
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. An intent with the same source and destination shows the INSTALLING state, indicating that its flow rules are installing. Improper handling of such an intent is misleading to a network operator. 2023-04-20 not yet calculated CVE-2022-29609
MISC
MISC open_networking_foundation — onos
  An issue was discovered in ONOS 2.5.1. There is an incorrect comparison of paths installed by intents. An existing intent does not redirect to a new path, even if a new intent that shares the path with higher priority is installed. 2023-04-20 not yet calculated CVE-2022-29944
MISC
MISC entab — erp
  ENTAB ERP 1.0 allows attackers to discover users’ full names via a brute force attack with a series of student usernames such as s10000 through s20000. There is no rate limiting. 2023-04-16 not yet calculated CVE-2022-30076
MISC glpi — glpi
  front/icon.send.php in the CMDB plugin before 3.0.3 for GLPI allows attackers to gain read access to sensitive information via a _log/ pathname in the file parameter. 2023-04-16 not yet calculated CVE-2022-34125
MISC
MISC
MISC glpi — glpi
  The Activity plugin before 3.1.1 for GLPI allows reading local files via directory traversal in the front/cra.send.php file parameter. 2023-04-16 not yet calculated CVE-2022-34126
MISC
MISC
MISC glpi — glpi
  The Managentities plugin before 4.0.2 for GLPI allows reading local files via directory traversal in the inc/cri.class.php file parameter. 2023-04-16 not yet calculated CVE-2022-34127
MISC
MISC
MISC glpi — glpi
  The Cartography (aka positions) plugin before 6.0.1 for GLPI allows remote code execution via PHP code in the POST data to front/upload.php. 2023-04-16 not yet calculated CVE-2022-34128
MISC
MISC
MISC schneider_electric — easergy_builder
  A CWE-427 – Uncontrolled Search Path Element vulnerability exists that could allow an attacker with a local privileged account to place a specially crafted file on the target machine, which may give the attacker the ability to execute arbitrary code during the installation process initiated by a valid user. Affected Products: Easergy Builder Installer (1.7.23 and prior) 2023-04-18 not yet calculated CVE-2022-34755
MISC slic3r — multiple_products
  A heap-based buffer overflow vulnerability exists in the TriangleMesh clone functionality of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. A specially crafted STL file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. 2023-04-20 not yet calculated CVE-2022-36788
MISC solarwinds — platform
  The SolarWinds Platform was susceptible to the Command Injection Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform admin account to execute arbitrary commands. 2023-04-21 not yet calculated CVE-2022-36963
MISC
MISC lemonldap::ng — lemonldap::ng
  In LemonLDAP::NG before 2.0.15. some sessions are not deleted when they are supposed to be deleted according to the timeout Activity setting. This can occur when there are at least two servers, and a session is manually removed before the time at which it would have been removed automatically. 2023-04-16 not yet calculated CVE-2022-37186
MISC
MISC
MISC
CONFIRM amanda — amanda
  Amanda 3.5.1 allows privilege escalation from the regular user backup to root. The SUID binary located at /lib/amanda/rundump will execute /usr/sbin/dump as root with controlled arguments from the attacker which may lead to escalation of privileges, denial of service, and information disclosure. 2023-04-16 not yet calculated CVE-2022-37704
MISC
MISC
MISC
MISC amanda — amanda
  A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equal sign is also supported), 2023-04-16 not yet calculated CVE-2022-37705
MISC
MISC
MISC
MISC
MISC secomea — sitemanager
  Improper Restriction of Communication Channel to Intended Endpoints vulnerability in Secomea SiteManager (FTP Agent modules) allows Exploiting Trust in Client. 2023-04-19 not yet calculated CVE-2022-38125
MISC güralp — man-eam
  cgi-bin/xmlstatus.cgi in Güralp MAN-EAM-0003 3.2.4 is vulnerable to an XML External Entity (XXE) issue via XML file upload, which leads to local file disclosure. 2023-04-16 not yet calculated CVE-2022-38840
MISC
MISC secomea — gatemanager
  Plaintext Storage of a Password vulnerability in Secomea GateManager (USB wizard) allows Authentication abuse on SiteManager, if the generated file is leaked. 2023-04-19 not yet calculated CVE-2022-4308
MISC dreamer_cms — dreamer_cms 
  Dreamer CMS 4.0.1 allows SQL injection via ArchivesMapper.xml. 2023-04-16 not yet calculated CVE-2022-43128
MISC
MISC schneider_electric — netbotz
  A CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability exists that could cause code and session manipulation when malicious code is inserted into the browser. Affected Products: NetBotz 4 – 355/450/455/550/570 (V4.7.0 and prior) 2023-04-18 not yet calculated CVE-2022-43376
MISC schneider_electric — netbotz
  A CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that could cause account takeover when a brute force attack is performed on the account. Affected Products: NetBotz 4 – 355/450/455/550/570 (V4.7.0 and prior) 2023-04-18 not yet calculated CVE-2022-43377
MISC schneider_electric — netbotz
  A CWE-1021: Improper Restriction of Rendered UI Layers or Frames vulnerability exists that could cause the user to be tricked into performing unintended actions when external address frames are not properly restricted. Affected Products: NetBotz 4 – 355/450/455/550/570 (V4.7.0 and prior) 2023-04-18 not yet calculated CVE-2022-43378
MISC wordpress — wordpress
  Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Denis Buka Content Repeater – Custom Posts Simplified plugin <= 1.1.13 versions. 2023-04-18 not yet calculated CVE-2022-44632
MISC touchdown — timesheet_tracking_for_jira
  The TouchDown Timesheet tracking component 4.1.4 for Jira allows XSS in the calendar view. 2023-04-17 not yet calculated CVE-2022-44726
MISC wordpress — wordpress
  Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gus Sevilla WP Clictracker plugin <= 1.0.5 versions. 2023-04-18 not yet calculated CVE-2022-44735
MISC wordpress — wordpress
  Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in W3 Eden, Inc. Download Manager plugin <= 3.2.59 versions. 2023-04-18 not yet calculated CVE-2022-45836
MISC wordpress — wordpress
  Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Repute InfoSystems ARForms Form Builder plugin <= 1.5.5 versions. 2023-04-18 not yet calculated CVE-2022-45838
MISC wordpress — wordpress
  Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WHA WHA Puzzle plugin <= 1.0.9 versions. 2023-04-18 not yet calculated CVE-2022-45839
MISC tribe29 — checkmk
  Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29’s Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host. 2023-04-20 not yet calculated CVE-2022-46302
MISC servicenow — multiple_products
  There exists a reflected XSS within the logout functionality of ServiceNow versions lower than Quebec Patch 10 Hotfix 11b, Rome Patch 10 Hotfix 3b, San Diego Patch 9, Tokyo Patch 4, and Utah GA. This enables an unauthenticated remote attacker to execute arbitrary JavaScript code in the browser-based web console. 2023-04-17 not yet calculated CVE-2022-46389
MISC nanoleaf — desktop_app
  Nanoleaf Desktop App before v1.3.1 was discovered to contain a command injection vulnerability which is exploited via a crafted HTTP request. 2023-04-18 not yet calculated CVE-2022-46640
MISC servicenow – response_list_update
  There exists an open redirect within the response list update functionality of ServiceNow. This allows attackers to redirect users to arbitrary domains when clicking on a URL within a service-now domain. 2023-04-14 not yet calculated CVE-2022-46886
MISC apache_software_foundation — apache_ofbiz
  Arbitrary file reading vulnerability in Apache Software Foundation Apache OFBiz when using the Solr plugin. This is a pre-authentication attack. This issue affects Apache OFBiz: before 18.12.07. 2023-04-14 not yet calculated CVE-2022-47501
MISC
MISC
MISC
MISC
MISC
MISC
MISC solarwinds — platform
  The SolarWinds Platform was susceptible to the Local Privilege Escalation Vulnerability. This vulnerability allows a local adversary with a valid system user account to escalate local privileges. 2023-04-21 not yet calculated CVE-2022-47505
MISC
MISC solarwinds — platform
  The SolarWinds Platform was susceptible to the Incorrect Input Neutralization Vulnerability. This vulnerability allows a remote adversary with a valid SolarWinds Platform account to append URL parameters to inject HTML. 2023-04-21 not yet calculated CVE-2022-47509
MISC
MISC io_finnet — tss-lib
  An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past. 2023-04-21 not yet calculated CVE-2022-47930
MISC
MISC shopware — shopware
  Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the recovery/install/ URI. 2023-04-21 not yet calculated CVE-2022-48150
MISC huawei — hwpcassistant 
  The HwPCAssistant module has the out-of-bounds read/write vulnerability. Successful exploitation of this vulnerability may affect confidentiality and integrity. 2023-04-16 not yet calculated CVE-2022-48312
MISC
MISC huawei — harmonyos
  The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality. 2023-04-16 not yet calculated CVE-2022-48313
MISC
MISC huawei — harmonyos
  The Bluetooth module has a vulnerability of bypassing the user confirmation in the pairing process. Successful exploitation of this vulnerability may affect confidentiality. 2023-04-16 not yet calculated CVE-2022-48314
MISC
MISC mportuga — eslint-detailed-reporter 
  A vulnerability was found in mportuga eslint-detailed-reporter up to 0.9.0 and classified as problematic. Affected by this issue is the function renderIssue in the library lib/template-generator.js. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The name of the patch is 505c190efd4905990db6207863bdcbd9b1d7e1bd. It is recommended to apply a patch to fix this issue. VDB-226310 is the identifier assigned to this vulnerability. 2023-04-20 not yet calculated CVE-2022-4942
MISC
MISC
MISC
MISC kalcaddle — kodexplorer
  A vulnerability, which was classified as problematic, has been found in kalcaddle KodExplorer up to 4.49. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.50 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227000. 2023-04-22 not yet calculated CVE-2022-4944
MISC
MISC
MISC
MISC
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler which may lead to denial of service, escalation of privileges, information disclosure, and data tampering. 2023-04-22 not yet calculated CVE-2023-0184
MISC nvidia — gpu_display_driver
  NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service. 2023-04-22 not yet calculated CVE-2023-0190
MISC nvidia — gpu_dispay_driver
  NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering. 2023-04-22 not yet calculated CVE-2023-0199
MISC nvidia — dgx-2
  NVIDIA DGX-2 contains a vulnerability in OFBD where a user with high privileges and a pre-conditioned heap can cause an access beyond a buffers end, which may lead to code execution, escalation of privileges, denial of service, and information disclosure. 2023-04-22 not yet calculated CVE-2023-0200
MISC nvidia — dgx-2
  NVIDIA DGX-2 SBIOS contains a vulnerability in Bds, where a user with high privileges can cause a write beyond the bounds of an indexable resource, which may lead to code execution, denial of service, compromised integrity, and information disclosure. 2023-04-22 not yet calculated CVE-2023-0201
MISC nvidia — dgx_a100
  NVIDIA DGX A100 SBIOS contains a vulnerability where an attacker may modify arbitrary memory of SMRAM by exploiting the GenericSio and LegacySmmSredir SMM APIs. A successful exploit of this vulnerability may lead to denial of service, escalation of privileges, and information disclosure. 2023-04-22 not yet calculated CVE-2023-0202
MISC nvidia — connectx
  NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can exploit insufficient granularity of access control, which may lead to denial of service. 2023-04-22 not yet calculated CVE-2023-0203
MISC nvidia — connectx
  NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can cause improper handling of exceptional conditions, which may lead to denial of service. 2023-04-22 not yet calculated CVE-2023-0204
MISC nvidia — connectx
  NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can exploit insufficient granularity of access control, which may lead to denial of service. 2023-04-22 not yet calculated CVE-2023-0205
MISC nvidia — dgx_a100
  NVIDIA DGX A100 SBIOS contains a vulnerability where an attacker may modify arbitrary memory of SMRAM by exploiting the NVME SMM API. A successful exploit of this vulnerability may lead to denial of service, escalation of privileges, and information disclosure. 2023-04-22 not yet calculated CVE-2023-0206
MISC nvidia — dgx-2
  NVIDIA DGX-2 SBIOS contains a vulnerability where an attacker may modify the ServerSetup NVRAM variable at runtime by executing privileged code. A successful exploit of this vulnerability may lead to denial of service. 2023-04-22 not yet calculated CVE-2023-0207
MISC nvidia — dgx-1
  NVIDIA DGX-1 SBIOS contains a vulnerability in the Uncore PEI module, where authentication of the code executed by SSA is missing, which may lead to arbitrary code execution, denial of service, escalation of privileges assisted by a firmware implant, information disclosure assisted by a firmware implant, data tampering, and SecureBoot bypass. 2023-04-22 not yet calculated CVE-2023-0209
MISC wordpress — wordpress
  The WC Fields Factory WordPress plugin through 4.1.5 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin 2023-04-17 not yet calculated CVE-2023-0277
MISC
MISC secomea — gatemanager
  Unprotected Alternate Channel vulnerability in debug console of GateManager allows system administrator to obtain sensitive information. 2023-04-19 not yet calculated CVE-2023-0317
MISC wordpress — wordpress
  The Pricing Tables For WPBakery Page Builder (formerly Visual Composer) WordPress plugin before 3.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks 2023-04-17 not yet calculated CVE-2023-0367
MISC m-files — m-files_server
  User-controlled operations could have allowed Denial of Service in M-Files Server before 23.4.12528.1 due to uncontrolled memory consumption. 2023-04-20 not yet calculated CVE-2023-0383
MISC m-files — m-files_server
  User-controlled operations could have allowed Denial of Service in M-Files Server before 23.4.12528.1 due to uncontrolled memory consumption for a scheduled job. 2023-04-20 not yet calculated CVE-2023-0384
MISC wordpress — wordpress
  The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not perform proper sanitization of gallery information, leading to a Stored Cross-Site Scription vulnerability. The attacker must have at least the privileges of the Author role. 2023-04-17 not yet calculated CVE-2023-0764
MISC wordpress — wordpress
  The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not properly escape values used in SQL queries, leading to a Blind SQL Injection vulnerability. The attacker must have at least the privileges of an Author, and the vendor’s Slider plugin (https://wordpress.org/plugins/slider-bws/) must also be installed for this vulnerability to be exploitable. 2023-04-17 not yet calculated CVE-2023-0765
MISC wordpress — wordpress
  Themeflection Numbers WordPress plugin before 2.0.1 does not have authorisation and CSRF check in an AJAX action and does not ensure that the options to be updated belong to the plugin. As a result, it could allow any authenticated users, such as subscriber, to update arbitrary blog options, such as enabling registration and set the default role to administrator. 2023-04-17 not yet calculated CVE-2023-0889
MISC opensll — opensll
  Issue summary: The AES-XTS cipher decryption implementation for 64-bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64-bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64-bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16-byte blocks, e.g., 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one. 2023-04-20 not yet calculated CVE-2023-1255
MISC
MISC
MISC wordpress — wordpress
  The Pricing Tables For WPBakery Page Builder (formerly Visual Composer) WordPress plugin before 3.0 does not validate some shortcode attributes before using them to generate paths passed to include function/s, allowing any authenticated users such as subscriber to perform LFI attacks 2023-04-17 not yet calculated CVE-2023-1274
MISC wordpress — wordpress
  The Drag and Drop Multiple File Upload PRO – Contact Form 7 Standard WordPress plugin before 2.11.1 and Drag and Drop Multiple File Upload PRO – Contact Form 7 with Remote Storage Integrations WordPress plugin before 5.0.6.4 do not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admins. 2023-04-17 not yet calculated CVE-2023-1282
MISC
MISC wordpress — wordpress
  The Easy Forms for Mailchimp WordPress plugin before 6.8.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks 2023-04-17 not yet calculated CVE-2023-1325
MISC wordpress — wordpress
  The Redirection WordPress plugin before 1.1.5 does not have CSRF checks in the uninstall action, which could allow attackers to make logged in admins delete all the redirections through a CSRF attack. 2023-04-17 not yet calculated CVE-2023-1331
MISC linux — kernel
  A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel. 2023-04-19 not yet calculated CVE-2023-1382
MISC wordpress — wordpress
  The WP VR WordPress plugin before 8.2.9 does not sanitize and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin 2023-04-17 not yet calculated CVE-2023-1413
MISC wordpress — wordpress
  – The Photo Gallery by 10Web WordPress plugin before 1.8.15 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images anywhere in the filesystem via a path traversal vector. 2023-04-17 not yet calculated CVE-2023-1427
MISC wordpress — wordpress
  The Slider, Gallery, and Carousel by MetaSlider WordPress plugin 3.29.0 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin 2023-04-17 not yet calculated CVE-2023-1473
MISC schneider_electric — ecostruxure_control_expert
  A CWE-269: Improper Privilege Management vulnerability exists that could cause a local user to perform a denial of service through the console server service that is part of EcoStruxure Control Expert. Affected Products: EcoStruxure Control Expert (V15.1 and above) 2023-04-18 not yet calculated CVE-2023-1548
MISC multiple_vendors — antivirus_for_windows
  Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later. 2023-04-19 not yet calculated CVE-2023-1585
MISC multiple_vendors — antivirus_for_windows
  Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11 2023-04-19 not yet calculated CVE-2023-1586
MISC multiple_vendors — antivirus_for_windows
  Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11 2023-04-19 not yet calculated CVE-2023-1587
MISC snyk_advisor — snyk_advisor
  The Snyk Advisor website (https://snyk.io/advisor/) was vulnerable to a stored XSS prior to 28th March 2023. A feature of Snyk Advisor is to display the contents of a scanned package’s Readme on its package health page. An attacker could create a package in NPM with an associated markdown README file containing XSS-able HTML tags. Upon Snyk Advisor importing the package, the XSS would run each time an end user browsed to the package’s page on Snyk Advisor. 2023-04-20 not yet calculated CVE-2023-1767
MISC
MISC mattermost — mattermost
  Mattermost fails to redact from audit logs the user password during user creation and the user password hash in other operations if the experimental audit logging configuration was enabled (ExperimentalAuditSettings section in config). 2023-04-17 not yet calculated CVE-2023-1831
MISC phpmyfaq — phpmyfaq
  Cross-site Scripting (XSS) – Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. 2023-04-22 not yet calculated CVE-2023-1875
MISC
CONFIRM sidekiq — sidekiq
  Cross-site Scripting (XSS) – Reflected in GitHub repository sidekiq/sidekiq prior to 7.0.8. 2023-04-21 not yet calculated CVE-2023-1892
MISC
CONFIRM avira — antivirus_for_windows
  A vulnerability within the Avira network protection feature allowed an attacker with local execution rights to cause an overflow. This could corrupt the data on the heap and lead to a denial-of-service situation. Issue was fixed with Endpointprotection.exe version 1.0.2303.633 2023-04-19 not yet calculated CVE-2023-1900
MISC linux — kernel
  The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects. 2023-04-21 not yet calculated CVE-2023-1998
MISC
MISC
MISC freetype — freetype
  An integer overflow vulnerability was discovered in Freetype in tt_hvadvance_adjust() function in src/truetype/ttgxvar.c. 2023-04-14 not yet calculated CVE-2023-2004
MISC
MISC
MISC
MISC
FEDORA
FEDORA
FEDORA
FEDORA
FEDORA
FEDORA
FEDORA linux — kernel
  A flaw was found in the Linux kernel’s udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. 2023-04-14 not yet calculated CVE-2023-2008
MISC
MISC
MISC shopware — shopware_6
  Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `ShopwareCoreFrameworkAdapterTwigSecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731. 2023-04-17 not yet calculated CVE-2023-2017
MISC
MISC
MISC tribe29 — checkmk
  Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host. 2023-04-18 not yet calculated CVE-2023-2020
MISC wordpress — wordpress
  The ZM Ajax Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.2. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. 2023-04-15 not yet calculated CVE-2023-2027
MISC
MISC spring — security
  In Spring Security, versions 5.7.x prior to 5.7.8, versions 5.8.x prior to 5.8.3, and versions 6.0.x prior to 6.0.3, the logout support does not properly clean the security context if using serialized versions. Additionally, it is not possible to explicitly save an empty security context to the HttpSessionSecurityContextRepository. This vulnerability can keep users authenticated even after they performed logout. Users of affected versions should apply the following mitigation. 5.7.x users should upgrade to 5.7.8. 5.8.x users should upgrade to 5.8.3. 6.0.x users should upgrade to 6.0.3. 2023-04-19 not yet calculated CVE-2023-20862
MISC vmware — aria_operations_for_logs
  VMware Aria Operations for Logs contains a deserialization vulnerability. An unauthenticated, malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root. 2023-04-20 not yet calculated CVE-2023-20864
MISC vmware — aria_operations_for_logs
  VMware Aria Operations for Logs contains a command injection vulnerability. A malicious actor with administrative privileges in VMware Aria Operations for Logs can execute arbitrary commands as root. 2023-04-20 not yet calculated CVE-2023-20865
MISC spring — boot
  In Spring Boot versions 3.0.0 – 3.0.5, 2.7.0 – 2.7.10, and older unsupported versions, an application that is deployed to Cloud Foundry could be susceptible to a security bypass. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.6+. 2.7.x users should upgrade to 2.7.11+. Users of older, unsupported versions should upgrade to 3.0.6+ or 2.7.11+. 2023-04-20 not yet calculated CVE-2023-20873
MISC sourcecodester — complaint_management_system
  A vulnerability was found in SourceCodester Complaint Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/userprofile.php of the component GET Parameter Handler. The manipulation of the argument uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226097 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2089
MISC
MISC
MISC sourcecodester — employee_and_visitor_gate_pass_logging_system
  A vulnerability classified as critical has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is an unknown function of the file /admin/maintenance/view_designation.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226098 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2090
MISC
MISC
MISC google — android
  In multiple functions of RunningTasks.java, there is a possible privilege escalation due to a missing privilege check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243130512 2023-04-19 not yet calculated CVE-2023-20909
MISC kylinsoft — youker-assistant
  A vulnerability classified as critical was found in KylinSoft youker-assistant. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099. 2023-04-15 not yet calculated CVE-2023-2091
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability, which was classified as critical, has been found in SourceCodester Vehicle Service Management System 1.0. Affected by this issue is some unknown functionality of the file view_service.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226100. 2023-04-15 not yet calculated CVE-2023-2092
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability, which was classified as critical, was found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226101 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2093
MISC
MISC
MISC google — android
  In deserialize of multiple files, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-256589724 2023-04-19 not yet calculated CVE-2023-20935
MISC sourcecodester — vehicle_service_management_system
  A vulnerability has been found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/mechanics/manage_mechanic.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226102 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2094
MISC
MISC
MISC google — android
  In acc_ctrlrequest_composite of f_accessory.c, there is a possible out of bounds write due to a missing bounds check. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264029575References: Upstream kernel 2023-04-19 not yet calculated CVE-2023-20941
MISC sourcecodester — vehicle_service_management_system A vulnerability was found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226103. 2023-04-15 not yet calculated CVE-2023-2095
MISC
MISC
MISC google — android
  In AlarmManagerActivity of AlarmManagerActivity.java, there is a possible way to bypass background activity launch restrictions via a pendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-195756028 2023-04-19 not yet calculated CVE-2023-20950
MISC sourcecodester — vehicle_service_management_system
  A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/service_requests/manage_inventory.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226104. 2023-04-15 not yet calculated CVE-2023-2096
MISC
MISC
MISC google — android
  In avdt_scb_hdl_pkt_no_frag of avdt_scb_act.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-225879503 2023-04-19 not yet calculated CVE-2023-20967
MISC sourcecodester — vehicle_service_management_system
  A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226105 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2097
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /inc/topBarNav.php. The manipulation of the argument search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226106 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2098
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability classified as problematic has been found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226107. 2023-04-15 not yet calculated CVE-2023-2099
MISC
MISC
MISC sourcecodester — vehicle_service_management_system
  A vulnerability classified as problematic was found in SourceCodester Vehicle Service Management System 1.0. This vulnerability affects unknown code of the file /admin/report/index.php. The manipulation of the argument date_end leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226108. 2023-04-15 not yet calculated CVE-2023-2100
MISC
MISC
MISC moxi624 — mogu_blog_v2
  A vulnerability, which was classified as problematic, has been found in moxi624 Mogu Blog v2 up to 5.2. This issue affects the function uploadPictureByUrl of the file /mogu-picture/file/uploadPicsByUrl. The manipulation of the argument urlList leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226109 was assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2101
MISC
MISC
MISC
MISC easyappointments — easyappointments
  Cross-site Scripting (XSS) – Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-04-15 not yet calculated CVE-2023-2102
CONFIRM
MISC easyappointments — easyappointments
  Improper Access Control in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-04-15 not yet calculated CVE-2023-2104
CONFIRM
MISC easyappointments — easyappointments
  Session Fixation in GitHub repository alextselegidis/easyappointments prior to 1.5.0. 2023-04-15 not yet calculated CVE-2023-2105
MISC
CONFIRM calibre-web — calibre-web
  Weak Password Requirements in GitHub repository janeczku/calibre-web prior to 0.6.20. 2023-04-15 not yet calculated CVE-2023-2106
CONFIRM
MISC ibos — ibos
  A vulnerability, which was classified as critical, was found in IBOS 4.5.5. Affected is an unknown function of the file file/personal/del&op=recycle. The manipulation of the argument fids leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226110 is the identifier assigned to this vulnerability. 2023-04-15 not yet calculated CVE-2023-2107
MISC
MISC
MISC sourcecodester — judging_management_system
  A vulnerability has been found in SourceCodester Judging Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file edit_contestant.php. The manipulation of the argument contestant_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226147. 2023-04-16 not yet calculated CVE-2023-2108
MISC
MISC
MISC google — android
  In register_notification_rsp of btif_rc.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-245916076 2023-04-19 not yet calculated CVE-2023-21080
MISC google — android
  In multiple functions of PackageInstallerService.java and related files, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-230492955 2023-04-19 not yet calculated CVE-2023-21081
MISC google — android
  In getNumberFromCallIntent of NewOutgoingCallIntentBroadcaster.java, there is a possible way to enumerate other user’s contact phone number due to a confused deputy. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-257030107 2023-04-19 not yet calculated CVE-2023-21082
MISC google — android
  In onNullBinding of CallScreeningServiceHelper.java, there is a possible way to record audio without showing a privacy indicator due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-252762941 2023-04-19 not yet calculated CVE-2023-21083
MISC google — android
  In buildPropFile of filesystem.go, there is a possible insecure hash due to an improperly used crypto. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-262892300 2023-04-19 not yet calculated CVE-2023-21084
MISC google — android
  In nci_snd_set_routing_cmd of nci_hmsgs.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-264879662 2023-04-19 not yet calculated CVE-2023-21085
MISC google — android
  In isToggleable of SecureNfcEnabler.java and SecureNfcPreferenceController.java, there is a possible way to enable NFC from a secondary account due to a permissions bypass. This could lead to local escalation of privilege from the Guest account with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-238298970 2023-04-19 not yet calculated CVE-2023-21086
MISC google — android
  In PreferencesHelper.java, an uncaught exception may cause the device to get stuck in a boot loop. This could lead to local persistent denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261723753 2023-04-19 not yet calculated CVE-2023-21087
MISC google — android
  In deliverOnFlushComplete of LocationProviderManager.java, there is a possible way to bypass background activity launch restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-235823542 2023-04-19 not yet calculated CVE-2023-21088
MISC google — android
  In startInstrumentation of ActivityManagerService.java, there is a possible way to keep the foreground service alive while the app is in the background. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-237766679 2023-04-19 not yet calculated CVE-2023-21089
MISC google — android
  In parseUsesPermission of ParsingPackageUtils.java, there is a possible boot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-259942609 2023-04-19 not yet calculated CVE-2023-21090
MISC google — android
  In canDisplayLocalUi of AppLocalePickerActivity.java, there is a possible way to change system app locales due to a missing permission check. This could lead to local denial of service across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-257954050 2023-04-19 not yet calculated CVE-2023-21091
MISC google — android
  In retrieveServiceLocked of ActiveServices.java, there is a possible way to dynamically register a BroadcastReceiver using permissions of System App due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-242040055 2023-04-19 not yet calculated CVE-2023-21092
MISC google — android
  In extractRelativePath of FileUtils.java, there is a possible way to access files in a directory belonging to other applications due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-228450832 2023-04-19 not yet calculated CVE-2023-21093
MISC google — android
  In sanitize of LayerState.cpp, there is a possible way to take over the screen display and swap the display content due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-248031255 2023-04-19 not yet calculated CVE-2023-21094
MISC google — android
  In OnWakelockReleased of attribution_processor.cc, there is a use after free that could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-254774758 2023-04-19 not yet calculated CVE-2023-21096
MISC google — android
  In toUriInner of Intent.java, there is a possible way to launch an arbitrary activity due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-261858325 2023-04-19 not yet calculated CVE-2023-21097
MISC google — android
  In multiple functions of AccountManagerService.java, there is a possible loading of arbitrary code into the System Settings app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-260567867 2023-04-19 not yet calculated CVE-2023-21098
MISC google — android
  In multiple methods of PackageInstallerSession.java, there is a possible way to start foreground services from the background due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12L Android-13Android ID: A-243377226 2023-04-19 not yet calculated CVE-2023-21099
MISC google — android
  In inflate of inflate.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-242544249 2023-04-19 not yet calculated CVE-2023-21100
MISC m_files — m_files_desktop
  Desktop component service allows lateral movement between sessions in M-Files before 23.4.12455.0.  2023-04-20 not yet calculated CVE-2023-2112
MISC devolutions — devolutions_server
  Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints. 2023-04-21 not yet calculated CVE-2023-2118
MISC wordpress — wordpress
  The Responsive Filterable Portfolio plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.0.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 2023-04-18 not yet calculated CVE-2023-2119
MISC
MISC
MISC wordpress — wordpress
  The Thumbnail carousel slider plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. 2023-04-18 not yet calculated CVE-2023-2120
MISC
MISC
MISC sourcecodester — purchase_order_management_system
  A vulnerability classified as critical has been found in SourceCodester Purchase Order Management System 1.0. Affected is an unknown function of the file /admin/suppliers/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226206 is the identifier assigned to this vulnerability. 2023-04-17 not yet calculated CVE-2023-2130
MISC
MISC
MISC inea — me_rtu
  Versions of INEA ME RTU firmware prior to 3.36 are vulnerable to OS command injection, which could allow an attacker to remotely execute arbitrary code. 2023-04-20 not yet calculated CVE-2023-2131
MISC google — chrome
  Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) 2023-04-19 not yet calculated CVE-2023-2133
MISC
MISC
MISC
MISC
MISC
MISC google — chrome
  Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) 2023-04-19 not yet calculated CVE-2023-2134
MISC
MISC
MISC
MISC
MISC
MISC google — chrome
  Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) 2023-04-19 not yet calculated CVE-2023-2135
MISC
MISC
MISC
MISC
MISC
MISC google — chrome
  Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) 2023-04-19 not yet calculated CVE-2023-2136
MISC
MISC
MISC
MISC
MISC
MISC google — chrome
  Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) 2023-04-19 not yet calculated CVE-2023-2137
MISC
MISC
MISC
MISC
MISC
MISC nuxtlabs — nuxtlabs/github-module
  Use of Hard-coded Credentials in GitHub repository nuxtlabs/github-module prior to 1.6.2. 2023-04-18 not yet calculated CVE-2023-2138
MISC
CONFIRM dassault_systemes — delmia_apriso
  A reflected Cross-site Scripting (XSS) Vulnerability in DELMIA Apriso Release 2017 through Release 2022 allows an attacker to execute arbitrary script code. 2023-04-21 not yet calculated CVE-2023-2139
MISC dassault_systemes — delmia_apriso
  A Server-Side Request Forgery vulnerability in DELMIA Apriso Release 2017 through Release 2022 could allow an unauthenticated attacker to issue requests to arbitrary hosts on behalf of the server running the DELMIA Apriso application. 2023-04-21 not yet calculated CVE-2023-2140
MISC dassault_systemes — delmia_apriso
  An unsafe .NET object deserialization in DELMIA Apriso Release 2017 through Release 2022 could lead to post-authentication remote code execution. 2023-04-21 not yet calculated CVE-2023-2141
MISC campcodes — online_thesis_archiving_system
  A vulnerability was found in Campcodes Online Thesis Archiving System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/departments/view_department.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226265 was assigned to this vulnerability. 2023-04-18 not yet calculated CVE-2023-2144
MISC
MISC
MISC campcodes — online_thesis_archiving_system
  A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been classified as critical. Affected is an unknown function of the file projects_per_curriculum.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226266 is the identifier assigned to this vulnerability. 2023-04-18 not yet calculated CVE-2023-2145
MISC
MISC
MISC campcodes — online_thesis_archiving_system
  A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file classes/Master.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226267. 2023-04-18 not yet calculated CVE-2023-2146
MISC
MISC
MISC campcodes — online_thesis_archiving_system
  A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/students/view_details.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226268. 2023-04-18 not yet calculated CVE-2023-2147
MISC
MISC
MISC campcodes — online_thesis_archiving_system
  A vulnerability classified as critical has been found in Campcodes Online Thesis Archiving System 1.0. This affects an unknown part of the file /admin/curriculum/view_curriculum.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226269 was assigned to this vulnerability. 2023-04-18 not yet calculated CVE-2023-2148
MISC
MISC
MISC campcodes — online_thesis_archiving_system
  A vulnerability classified as critical was found in Campcodes Online Thesis Archiving System 1.0. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226270 is the identifier assigned to this vulnerability. 2023-04-18 not yet calculated CVE-2023-2149
MISC
MISC
MISC sourcecodester — task_reminder_system
  A vulnerability, which was classified as critical, has been found in SourceCodester Task Reminder System 1.0. This issue affects some unknown processing of the file Master.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226271. 2023-04-18 not yet calculated CVE-2023-2150
MISC
MISC
MISC sourcecodester — student_study_center_desk_management_system
  A vulnerability, which was classified as critical, was found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file manage_student.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226272. 2023-04-18 not yet calculated CVE-2023-2151
MISC
MISC
MISC sourcecodester — student_study_center_desk_management_system
  A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226273 was assigned to this vulnerability. 2023-04-18 not yet calculated CVE-2023-2152
MISC
MISC
MISC sourcecodester — complaint_ management_system
  A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php of the component POST Parameter Handler. The manipulation of the argument value with the input 1><script>alert(666)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226274 is the identifier assigned to this vulnerability. 2023-04-18 not yet calculated CVE-2023-2153
MISC
MISC
MISC sourcecodester — task_reminder_system
  A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/?page=reminders/view_reminder. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226275. 2023-04-18 not yet calculated CVE-2023-2154
MISC
MISC
MISC sourcecodester — air_cargo_management_system
  A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file classes/Master.php?f=save_cargo_type. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226276. 2023-04-18 not yet calculated CVE-2023-2155
MISC
MISC
MISC modoboa — modoboa
  Weak Password Requirements in GitHub repository modoboa/modoboa prior to 2.1.0. 2023-04-18 not yet calculated CVE-2023-2160
CONFIRM
MISC kernel — kernel
  A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. 2023-04-19 not yet calculated CVE-2023-2162
MISC kernel — kernel
  A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service. 2023-04-19 not yet calculated CVE-2023-2166
MISC wordpress — wordpress
  The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Suggest Terms Title field in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 2023-04-19 not yet calculated CVE-2023-2168
MISC
MISC
MISC wordpress — wordpress
  The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Related Posts functionality in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 2023-04-19 not yet calculated CVE-2023-2169
MISC
MISC
MISC wordpress — wordpress
  The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Related Posts functionality in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. 2023-04-19 not yet calculated CVE-2023-2170
MISC
MISC
MISC kernel — kernel
  A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege. 2023-04-20 not yet calculated CVE-2023-2176
MISC kernel — kernel
  A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service. 2023-04-20 not yet calculated CVE-2023-2177
MISC azuracast — azuracast
  Cross-site Scripting (XSS) – Stored in GitHub repository azuracast/azuracast prior to 0.18. 2023-04-20 not yet calculated CVE-2023-2191
MISC
CONFIRM mattermost – mattermost
  Mattermost fails to invalidate existing authorization codes when deauthorizing an OAuth2 app, allowing an attacker possessing an authorization code to generate an access token. 2023-04-20 not yet calculated CVE-2023-2193
MISC kernel — kernel
  An out-of-bounds write vulnerability was found in the Linux kernel’s SLIMpro I2C device driver. The userspace “data->block[0]” variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. 2023-04-20 not yet calculated CVE-2023-2194
MISC
MISC rosariosis — rosariosis
  Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.9.3. 2023-04-21 not yet calculated CVE-2023-2202
MISC
CONFIRM campcodes — retro_basketball_shoes_online_store
  A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file faqs.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226969 was assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2204
MISC
MISC
MISC campcodes — retro_basketball_shoes_online_store
  A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226970 is the identifier assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2205
MISC
MISC
MISC campcodes — retro_basketball_shoes_online_store
  A vulnerability classified as critical has been found in Campcodes Retro Basketball Shoes Online Store 1.0. This affects an unknown part of the file contactus.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226971. 2023-04-21 not yet calculated CVE-2023-2206
MISC
MISC
MISC campcodes — retro_basketball_shoes_online_store
  A vulnerability classified as critical was found in Campcodes Retro Basketball Shoes Online Store 1.0. This vulnerability affects unknown code of the file contactus1.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226972. 2023-04-21 not yet calculated CVE-2023-2207
MISC
MISC
MISC campcodes — retro_basketball_shoes_online_store
  A vulnerability, which was classified as critical, has been found in Campcodes Retro Basketball Shoes Online Store 1.0. This issue affects some unknown processing of the file details.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226973 was assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2208
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability, which was classified as critical, was found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/sales/view_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226974 is the identifier assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2209
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability has been found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/categories/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226975. 2023-04-21 not yet calculated CVE-2023-2210
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability was found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226976. 2023-04-21 not yet calculated CVE-2023-2211
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226977 was assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2212
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/products/manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226978 is the identifier assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2213
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/sales/manage_sale.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226979. 2023-04-21 not yet calculated CVE-2023-2214
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability classified as critical has been found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226980. 2023-04-21 not yet calculated CVE-2023-2215
MISC
MISC
MISC campcodes — coffee_shop_pos_system
  A vulnerability classified as problematic was found in Campcodes Coffee Shop POS System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php. The manipulation of the argument firstname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226981 was assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2216
MISC
MISC
MISC campcodes — task_reminder_system
  A vulnerability, which was classified as critical, was found in SourceCodester Task Reminder System 1.0. This affects an unknown part of the file /admin/reminders/manage_reminder.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226983. 2023-04-21 not yet calculated CVE-2023-2217
MISC
MISC
MISC campcodes — task_reminder_system
  A vulnerability has been found in SourceCodester Task Reminder System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226984. 2023-04-21 not yet calculated CVE-2023-2218
MISC
MISC
MISC campcodes — task_reminder_system
  A vulnerability was found in SourceCodester Task Reminder System 1.0 and classified as problematic. This issue affects some unknown processing of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226985 was assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2219
MISC
MISC
MISC dream_technology — mica
  A vulnerability was found in Dream Technology mica up to 3.0.5. It has been classified as problematic. Affected is an unknown function of the component Form Object Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-226986 is the identifier assigned to this vulnerability. 2023-04-21 not yet calculated CVE-2023-2220
MISC
MISC
MISC rapid7 — velociraptor
  Due to insufficient validation in the PE and OLE parsers in Rapid7’s Velociraptor versions earlier than 0.6.8 allows attacker to crash Velociraptor during parsing of maliciously malformed files.  For this attack to succeed, the attacker needs to be able to introduce malicious files to the system at the same time that Velociraptor attempts to collect any artifacts that attempt to parse PE files, Authenticode signatures, or OLE files. After crashing, the Velociraptor service will restart and it will still be possible to collect other artifacts. 2023-04-21 not yet calculated CVE-2023-2226
MISC modoboa — modoboa
  Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0. 2023-04-21 not yet calculated CVE-2023-2227
MISC
CONFIRM modoboa — modoboa
  Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.1.0. 2023-04-21 not yet calculated CVE-2023-2228
CONFIRM
MISC tribe29 — checkmk_appliance
  Privilege escalation in Tribe29 Checkmk Appliance before 1.6.4 allows authenticated site users to escalate privileges via incorrectly set permissions. 2023-04-18 not yet calculated CVE-2023-22294
MISC datakit — crosscadware
  Datakit CrossCadWare_x64.dll contains an out of bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information. 2023-04-20 not yet calculated CVE-2023-22295
MISC tribe29 — checkmk_appliance
  Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.4 allows local attacker to retrieve passwords via reading log files. 2023-04-18 not yet calculated CVE-2023-22307
MISC tribe29 — checkmk_appliance
  Reflective Cross-Site-Scripting in Webconf in Tribe29 Checkmk Appliance before 1.6.4. 2023-04-20 not yet calculated CVE-2023-22309
MISC maxtech – max-g866ac
  A vulnerability, which was classified as critical, was found in MAXTECH MAX-G866ac 0.4.1_TBRO_20160314. This affects an unknown part of the component Remote Management. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227001 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. 2023-04-21 not yet calculated CVE-2023-2231
MISC
MISC
MISC datakit — crosscadware_x64_library
  Datakit CrossCadWare_x64.dll contains an out-of-bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information. 2023-04-20 not yet calculated CVE-2023-22321
MISC datakit — crosscadware_x64_library
  Datakit CrossCadWare_x64.dll contains an out-of-bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information. 2023-04-20 not yet calculated CVE-2023-22354
MISC microbrewer — microbrewer
  Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository microweber/microweber prior to 1.3.4. 2023-04-22 not yet calculated CVE-2023-2239
CONFIRM
MISC microbrewer — microbrewer Improper Privilege Management in GitHub repository microweber/microweber prior to 1.3.4. 2023-04-22 not yet calculated CVE-2023-2240
CONFIRM
MISC podofo — podofo
  A vulnerability, which was classified as critical, was found in PoDoFo 0.10.0. Affected is the function readXRefStreamEntry of the file PdfXRefStreamParserObject.cpp. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 535a786f124b739e3c857529cecc29e4eeb79778. It is recommended to apply a patch to fix this issue. VDB-227226 is the identifier assigned to this vulnerability. 2023-04-22 not yet calculated CVE-2023-2241
MISC
MISC
MISC
MISC
MISC sourcecodester — online_computer_and_laptop_store
  A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component GET Parameter Handler. The manipulation of the argument c/s leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227227. 2023-04-22 not yet calculated CVE-2023-2242
MISC
MISC
MISC sourcecodester — complaint_management_sysystem
  A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file users/registration.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227228. 2023-04-22 not yet calculated CVE-2023-2243
MISC
MISC
MISC sourcecodester — online_eyewear_shop
  A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects an unknown part of the file /admin/orders/update_status.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227229 was assigned to this vulnerability. 2023-04-22 not yet calculated CVE-2023-2244
MISC
MISC
MISC hansuncms — hansuncms
  A vulnerability was found in hansunCMS 1.4.3. It has been declared as critical. This vulnerability affects unknown code of the file /ueditor/net/controller.ashx?action=catchimage. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227230 is the identifier assigned to this vulnerability. 2023-04-22 not yet calculated CVE-2023-2245
MISC
MISC
MISC strapi — strapi
  Strapi through 4.5.5 allows authenticated Server-Side Template Injection (SSTI) that can be exploited to execute arbitrary code on the server. A remote attacker with access to the Strapi admin panel can inject a crafted payload that executes code on the server into an email template that bypasses the validation checks that should prevent code execution. 2023-04-19 not yet calculated CVE-2023-22621
MISC
MISC
MISC suse — kubewarden
  An Improper Privilege Management vulnerability in SUSE kubewarden allows attackers to read arbitrary secrets if they get access to the ServiceAccount kubewarden-controller This issue affects: SUSE kubewarden kubewarden-controller versions prior to 1.6.0. 2023-04-19 not yet calculated CVE-2023-22645
CONFIRM datakit — crosscad/ware_x64_library
  Datakit CrossCadWare_x64.dll contains an out-of-bounds read past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This vulnerability could allow an attacker to disclose sensitive information. 2023-04-20 not yet calculated CVE-2023-22846
MISC strapi — strapi
  Strapi through 4.5.5 does not verify the access or ID tokens issued during the OAuth flow when the AWS Cognito login provider is used for authentication. A remote attacker could forge an ID token that is signed using the ‘None’ type algorithm to bypass authentication and impersonate any user that use AWS Cognito for authentication. 2023-04-19 not yet calculated CVE-2023-22893
MISC
MISC
MISC strapi — strapi
  Strapi through 4.5.5 allows attackers (with access to the admin panel) to discover sensitive user details by exploiting the query filter. The attacker can filter users by columns that contain sensitive information and infer a value from API responses. If the attacker has super admin access, then this can be exploited to discover the password hash and password reset token of all users. If the attacker has admin panel access to an account with permission to access the username and email of API users with a lower privileged role (e.g., Editor or Author), then this can be exploited to discover sensitive information for all API users but not other admin accounts. 2023-04-19 not yet calculated CVE-2023-22894
MISC
MISC
MISC oracle — apache_spark
  In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a ‘proxy-user’ to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications. Update to Apache Spark 3.4.0 or later, and ensure that spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its default of “false”, and is not overridden by submitted applications. 2023-04-17 not yet calculated CVE-2023-22946
MISC flexi — multiple_products
  The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW., SICK UE410-EN1 FLEXI ETHERNET GATEW., SICK UE410-EN3S04 FLEXI ETHERNET GATEW., SICK UE410-EN4 FLEXI ETHERNET GATEW., SICK FX0-GENT00000 FLEXISOFT EIP GATEW., SICK FX0-GMOD00000 FLEXISOFT MOD GATEW., SICK FX0-GPNT00000 FLEXISOFT PNET GATEW., SICK FX0-GENT00030 FLEXISOFT EIP GATEW.V2, SICK FX0-GPNT00030 FLEXISOFT PNET GATEW.V2 and SICK FX0-GMOD00010 FLEXISOFT MOD GW. have Telnet enabled by factory default. No password is set in the default configuration. Gateways with a serial number >2311xxxx have the Telnet interface disabled by factory default. 2023-04-19 not yet calculated CVE-2023-23451
MISC datakit — crosscad/ware_x64_library
  Datakit CrossCadWare_x64.dll contains an out-of-bounds write past the end of an allocated buffer while parsing a specially crafted SLDPRT file. This could allow an attacker to execute code in the context of the current process. 2023-04-20 not yet calculated CVE-2023-23579
MISC enalean — tuleap
  Tuleap is a Free & Source tool for end-to-end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-20 not yet calculated CVE-2023-23938
MISC
MISC
MISC electra — electra_central_ac_unit
  Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW. 2023-04-17 not yet calculated CVE-2023-24500
MISC electra — electra_central_ac_unit
  Electra Central AC unit – Hardcoded Credentials in unspecified code used by the unit. 2023-04-17 not yet calculated CVE-2023-24501
MISC electra — electra_central_ac_unit
  Electra Central AC unit – The unit opens an AP with an easily calculated password. 2023-04-17 not yet calculated CVE-2023-24502
MISC electra — electra_central_ac_unit
  Electra Central AC unit – Adjacent attacker may cause the unit to load unauthorized FW. 2023-04-17 not yet calculated CVE-2023-24503
MISC electra — electra_central_ac_unit
  Electra Central AC unit – Adjacent attacker may cause the unit to connect to unauthorized update server. 2023-04-17 not yet calculated CVE-2023-24504
MISC oracle — apache_iotdb
  Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This issue affects Apache IoTDB Grafana Connector: from 0.13.0 through 0.13.3. Attackers could login without authorization. This is fixed in 0.13.4. 2023-04-17 not yet calculated CVE-2023-24831
MISC autodesk — autodesk_maya_usd_plugin
  A malicious actor may convince a victim to open a malicious USD file that may trigger an uninitialized variable which may result in code execution. 2023-04-17 not yet calculated CVE-2023-25010
MISC oracle — apache_superset
  A malicious actor who has been authenticated and granted specific permissions in Apache Superset may use the import dataset feature in order to conduct Server-Side Request Forgery attacks and query internal resources on behalf of the server where Superset is deployed. This vulnerability exists in Apache Superset versions up to and including 2.0.1. 2023-04-17 not yet calculated CVE-2023-25504
MISC
MISC nvidia — dgx-1
  NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler of the AMI MegaRAC BMC, where an attacker with the appropriate level of authorization can cause a buffer overflow, which may lead to denial of service, information disclosure, or arbitrary code execution. 2023-04-22 not yet calculated CVE-2023-25505
MISC nvidia — dgx dgx-1
  NVIDIA DGX-1 contains a vulnerability in Ofbd in AMI SBIOS, where a preconditioned heap can allow a user with elevated privileges to cause an access beyond the end of a buffer, which may lead to code execution, escalation of privileges, denial of service and information disclosure. The scope of the impact of this vulnerability can extend to other components. 2023-04-22 not yet calculated CVE-2023-25506
MISC nvidia — dgx dgx-1
  NVIDIA DGX-1 BMC contains a vulnerability in the SPX REST API, where an attacker with the appropriate level of authorization can inject arbitrary shell commands, which may lead to code execution, denial of service, information disclosure, and data tampering. 2023-04-22 not yet calculated CVE-2023-25507
MISC nvidia — dgx dgx-1
  NVIDIA DGX-1 BMC contains a vulnerability in the IPMI handler, where an attacker with the appropriate level of authorization can upload and download arbitrary files under certain circumstances, which may lead to denial of service, escalation of privileges, information disclosure, and data tampering. 2023-04-22 not yet calculated CVE-2023-25508
MISC nvidia — dgx dgx-1
  NVIDIA DGX-1 SBIOS contains a vulnerability in Bds, which may lead to code execution, denial of service, and escalation of privileges. 2023-04-22 not yet calculated CVE-2023-25509
MISC nvidia — cuda_toolkit
  NVIDIA CUDA Toolkit SDK for Linux and Windows contains a NULL pointer dereference in cuobjdump, where a local user running the tool against a malformed binary may cause a limited denial of service. 2023-04-22 not yet calculated CVE-2023-25510
MISC nvidia — cuda_toolkit
  NVIDIA CUDA Toolkit for Linux and Windows contains a vulnerability in cuobjdump, where a division-by-zero error may enable a user to cause a crash, which may lead to a limited denial of service. 2023-04-22 not yet calculated CVE-2023-25511
MISC nvidia — cuda_toolkit
  NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds memory read by running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure. 2023-04-22 not yet calculated CVE-2023-25512
MISC nvidia — cuda_toolkit
  NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure. 2023-04-22 not yet calculated CVE-2023-25513
MISC nvidia — cuda_toolkit
  NVIDIA CUDA toolkit for Linux and Windows contains a vulnerability in cuobjdump, where an attacker may cause an out-of-bounds read by tricking a user into running cuobjdump on a malformed input file. A successful exploit of this vulnerability may lead to limited denial of service, code execution, and limited information disclosure. 2023-04-22 not yet calculated CVE-2023-25514
MISC schneider_electric — struxureware_data_center_expert
  A CWE-863: Incorrect Authorization vulnerability exists that could allow remote code execution on upload and install packages when a hacker is using a low privileged user account. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25547
MISC schneider_electric — struxureware_data_center_expert
  A CWE-863: Incorrect Authorization vulnerability exists that could allow access to device credentials on specific DCE endpoints not being properly secured when a hacker is using a low privileged user. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25548
MISC schneider_electric — struxureware_data_center_expert
  A CWE-94: Improper Control of Generation of Code (‘Code Injection’) vulnerability exists that allows for remote code execution when using a parameter of the DCE network settings endpoint. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25549
MISC schneider_electric — struxureware_data_center_expert
  A CWE-94: Improper Control of Generation of Code (‘Code Injection’) vulnerability exists that allows remote code execution via the “hostname” parameter when maliciously crafted hostname syntax is entered. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25550
MISC schneider_electric — struxureware_data_center_expert A CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability exists on a DCE file upload endpoint when tampering with parameters over HTTP. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25551
MISC schneider_electric — struxureware_data_center_expert
  A CWE-862: Missing Authorization vulnerability exists that could allow viewing of unauthorized content, changes or deleting of content, or performing unauthorized functions when tampering the Device File Transfer settings on DCE endpoints. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25552
MISC schneider_electric — struxureware_data_center_expert
  A CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability exists on a DCE endpoint through the logging capabilities of the webserver. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25553
MISC schneider_electric — struxureware_data_center_expert A CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability exists that allows a local privilege escalation on the appliance when a maliciously crafted Operating System command is entered on the device. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25554
MISC schneider_electric — struxureware_data_center_expert
  A CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability exists that could allow a user that knows the credentials to execute unprivileged shell commands on the appliance over SSH. Affected products: StruxureWare Data Center Expert (V7.9.2 and prior) 2023-04-18 not yet calculated CVE-2023-25555
MISC schneider_electric — merten_instabus_tastermodul_1fach_system_m_625199
  A CWE-287: Improper Authentication vulnerability exists that could allow a device to be compromised when a key of less than seven digits is entered and the attacker has access to the KNX installation. 2023-04-18 not yet calculated CVE-2023-25556
MISC oracle — apache_dolphinscheduler
  On version 3.0.0 through 3.1.1, Apache DolphinScheduler’s python gateway suffered from improper authentication: an attacker could use a socket bytes attack without authentication. This issue has been fixed from version 3.1.2 onwards. For users who use version 3.0.0 to 3.1.1, you can turn off the python-gateway function by changing the value `python-gateway.enabled=false` in configuration file `application.yaml`. If you are using the python gateway, please upgrade to version 3.1.2 or above. 2023-04-20 not yet calculated CVE-2023-25601
MISC
MISC schneider_electric — multiple_products
  A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when communicating over the Modbus TCP protocol. 2023-04-19 not yet calculated CVE-2023-25619
MISC schneider_electric — multiple_products
  A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when a malicious project file is loaded onto the controller by an authenticated user. 2023-04-19 not yet calculated CVE-2023-25620
MISC tripleplay — tripleplay
  OS Command Injection in TripleData Reporting Engine in Tripleplay Platform releases prior to Caveman 3.4.0 allows authenticated users to run unprivileged OS level commands via a crafted request payload. 2023-04-19 not yet calculated CVE-2023-25759
MISC
MISC tripleplay — tripleplay
  Incorrect Access Control in Tripleplay Platform releases prior to Caveman 3.4.0 allows authenticated user to modify other users’ passwords via a crafted request payload 2023-04-19 not yet calculated CVE-2023-25760
MISC
MISC eclipse — jetty.project Jetty is a java-based web server and servlet engine. In affected versions servlets with multipart support (e.g., annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service — although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory). 2023-04-18 not yet calculated CVE-2023-26048
MISC
MISC
MISC
MISC
MISC eclipse — jetty.project
  Jetty is a java-based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `”` (double quote), it will continue to read the cookie string until it sees a closing quote — even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE=”b; JSESSIONID=1337; c=d”` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue. 2023-04-18 not yet calculated CVE-2023-26049
MISC
MISC
MISC
MISC
MISC flowmon — flowmon
  In Progress Flowmon before 12.2.0, an application endpoint failed to sanitize user-supplied input. A threat actor could leverage a reflected XSS vulnerability to execute arbitrary code within the context of a Flowmon user’s web browser. 2023-04-21 not yet calculated CVE-2023-26100
MISC
MISC flowmon — flowmon
  In Progress Flowmon Packet Investigator before 12.1.0, a Flowmon user with access to Flowmon Packet Investigator could leverage a path-traversal vulnerability to retrieve files on the Flowmon appliance’s local filesystem. 2023-04-21 not yet calculated CVE-2023-26101
MISC
MISC io.finnet — multiple_products
  io.finnet tss-lib before 2.0.0 can leak a secret key via a timing side-channel attack because it relies on the scalar-multiplication implementation in Go crypto/elliptic, which is not constant time (there is an if statement in a loop). One leak is in ecdsa/keygen/round_2.go. (bnb-chain/tss-lib and thorchain/tss are also affected.) 2023-04-21 not yet calculated CVE-2023-26556
MISC
MISC
MISC
MISC io.finnet — multiple_products
  io.finnet tss-lib before 2.0.0 can leak the lambda value of a private key via a timing side-channel attack because it relies on Go big.Int, which is not constant time for Cmp, modular exponentiation, or modular inverse. An example leak is in crypto/paillier/paillier.go. (bnb-chain/tss-lib and thorchain/tss are also affected.) 2023-04-21 not yet calculated CVE-2023-26557
MISC
MISC
MISC
MISC tripleplay — tripleplay
  XSS vulnerability in TripleSign in Tripleplay Platform releases prior to Caveman 3.4.0 allows attackers to inject client-side code to run as an authenticated user via a crafted link. 2023-04-19 not yet calculated CVE-2023-26599
MISC
MISC tempest — piwigo
  SQL injection vulnerability found in Piwigo v.13.5.0 and before allows a remote attacker to execute arbitrary code via the filter_user_id parameter to the admin.php?page=history&filter_image_id=&filter_user_id endpoint. 2023-04-21 not yet calculated CVE-2023-26876
MISC
MISC
MISC python — python
  The e-mail module of Python 0 – 2.7.18, 3.x – 3.11 incorrectly parses e-mail addresses which contain a special character. This vulnerability allows attackers to send messages from e-mail addresses that would otherwise be rejected. 2023-04-19 not yet calculated CVE-2023-27043
MISC
MISC teacms — teacms
  Cross Site Scripting vulnerability found in TeaCMS storage allows attacker to cause a leak of sensitive information via the article title parameter. 2023-04-20 not yet calculated CVE-2023-27090
MISC
MISC jbootfly — jbootfly
  Cross Site Scripting vulnerability found in Jbootfly allows attackers to obtain sensitive information via the username parameter. 2023-04-18 not yet calculated CVE-2023-27092
MISC
MISC papercut — ng
  This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987. 2023-04-20 not yet calculated CVE-2023-27350
MISC
MISC papercut — ng
  This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226. 2023-04-20 not yet calculated CVE-2023-27351
MISC
MISC sonos — one_speaker
  This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of the SMB directory query command. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19845. 2023-04-20 not yet calculated CVE-2023-27352
MISC sonos — one_speaker
  This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the msprox endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-19846. 2023-04-20 not yet calculated CVE-2023-27353
MISC sonos — one_speaker
  This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of the SMB directory query command. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before reading from memory. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-19727. 2023-04-20 not yet calculated CVE-2023-27354
MISC sonos — one_speaker
  This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker 70.3-35220. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MPEG-TS parser. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19773. 2023-04-20 not yet calculated CVE-2023-27355
MISC fastify — fastify
  @fastify/csrf-protection is a plugin which helps protect Fastify servers against CSRF attacks. The CSRF protection enforced by the @fastify/csrf-protection library in combination with @fastify/cookie can be bypassed from network and same-site attackers under certain conditions. @fastify/csrf-protection supports an optional userInfo parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for CVE-2021-29624. Whenever userInfo parameter is missing, or its value can be predicted for the target user account, network and same-site attackers can 1. fixate a _csrf cookie in the victim’s browser, and 2. forge CSRF tokens that are valid for the victim’s session. This allows attackers to bypass the CSRF protection mechanism. As a fix, @fastify/csrf-protection starting from version 6.3.0 (and v4.1.0) includes a server-defined secret hmacKey that cryptographically binds the CSRF token to the value of the _csrf cookie and the userInfo parameter, making tokens non-spoofable by attackers. This protection is effective as long as the userInfo parameter is unique for each user. This is patched in versions 6.3.0 and v4.1.0. Users are advised to upgrade. Users unable to upgrade may use a random, non-predictable userInfo parameter for each user as a mitigation. 2023-04-20 not yet calculated CVE-2023-27495
MISC
MISC
MISC apache — superset
  An authenticated user with Gamma role authorization could have access to metadata information using nontrivial methods in Apache Superset up to and including 2.0.1 2023-04-17 not yet calculated CVE-2023-27525
MISC transbankdevelopers — webpay_rest
  Auth. (admin+) SQL Injection (SQLi) vulnerability in TransbankDevelopers Transbank Webpay REST plugin <= 1.6.6 versions. 2023-04-16 not yet calculated CVE-2023-27610
MISC ego_studio — superclean
  An issue found in Ego Studio SuperClean v.1.1.9 and v.1.1.5 allows an attacker to gain privileges cause a denial of service via the update_info field of the _default_.xml file. 2023-04-20 not yet calculated CVE-2023-27652
MISC
MISC
MISC apng_optimizer — apng_optimizer
  APNG_Optimizer v1.4 was discovered to contain a buffer overflow via the component /apngopt/ubuntu.png. 2023-04-17 not yet calculated CVE-2023-27705
MISC
MISC dedecms — dedecms
  DedeCMS v5.7.106 was discovered to contain a SQL injection vulnerability via the component /dede/sys_sql_query.php. 2023-04-17 not yet calculated CVE-2023-27733
MISC
MISC go-bbs — go-bbs
  go-bbs v1 was discovered to contain an arbitrary file download vulnerability via the component /api/v1/download. 2023-04-17 not yet calculated CVE-2023-27755
MISC sourcecodester — online_jewelry_shop
  A stored cross-site scripting (XSS) vulnerability in /index.php?page=category_list of Online Jewelry Shop v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Category Name parameter. 2023-04-19 not yet calculated CVE-2023-27776
MISC
MISC sourcecodester — online_jewelry_shop
  Cross-site scripting (XSS) vulnerability was discovered in Online Jewelry Shop v1.0 that allows attackers to execute arbitrary script via a crafted URL. 2023-04-19 not yet calculated CVE-2023-27777
MISC prestashop — leurlrewrite
  SQL injection vulnerability found in PrestaShopleurlrewrite v.1.0 and earlier allow a remote attacker to gain privileges via the Dispatcher::getController component. 2023-04-17 not yet calculated CVE-2023-27844
MISC
MISC autodesk — maya_usd_plugin
  A malicious actor may convince a victim to open a malicious USD file that may trigger an out-of-bounds read vulnerability which may result in code execution. 2023-04-17 not yet calculated CVE-2023-27906
MISC autodesk — maya_usd_plugin
  A malicious actor may convince a victim to open a malicious USD file that may trigger an out-of-bounds write vulnerability which may result in code execution. 2023-04-17 not yet calculated CVE-2023-27907
MISC autodesk — fbx_sdk
  An Out-Of-Bounds Write Vulnerability in Autodesk® FBX® SDK version 2020 or prior may lead to code execution through maliciously crafted FBX files or information disclosure. 2023-04-17 not yet calculated CVE-2023-27909
MISC autodesk — fbx_sdk
  A user may be tricked into opening a malicious FBX file that may exploit a stack buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior which may lead to code execution. 2023-04-17 not yet calculated CVE-2023-27910
MISC autodesk — fbx_sdk
  A user may be tricked into opening a malicious FBX file that may exploit a heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 or prior which may lead to code execution. 2023-04-17 not yet calculated CVE-2023-27911
MISC schneider_electric — ecostruxure_control_expert
  A CWE-668: Exposure of Resource to Wrong Sphere vulnerability exists that could cause remote code execution when a valid user visits a malicious link provided through the web endpoints. Affected Products: EcoStruxure Control Expert (V15.1 and above) 2023-04-18 not yet calculated CVE-2023-27976
MISC schneider_electric — ecostruxure_power_monitoring_expert
  A CWE-613: Insufficient Session Expiration vulnerability exists that could allow an attacker to maintain unauthorized access over a hijacked session in PME after the legitimate user has signed out of their account. 2023-04-18 not yet calculated CVE-2023-28003
MISC schneider_electric — powerlogic_hdpm6000
  A CWE-129: Improper validation of an array index vulnerability exists where a specially crafted Ethernet request could result in denial of service or remote code execution. 2023-04-18 not yet calculated CVE-2023-28004
MISC dell — display_manager
  Dell Display Manager, versions 2.1.0 and prior, contains an arbitrary file or folder creation vulnerability during installation. A local low privilege attacker could potentially exploit this vulnerability, leading to the execution of arbitrary code on the operating system with high privileges. 2023-04-20 not yet calculated CVE-2023-28047
MISC ui_desktop — ui_desktop
  A local privilege escalation (LPE) vulnerability in UI Desktop for Windows (Version 0.59.1.71 and earlier) allows a malicious actor with local access to a Windows device running said application to submit arbitrary commands as SYSTEM.This vulnerability is fixed in Version 0.62.3 and later. 2023-04-19 not yet calculated CVE-2023-28122
MISC ui_desktop — ui_desktop
  A permission misconfiguration in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow an user to hijack VPN credentials while UID VPN is starting. This vulnerability is fixed in Version 0.62.3 and later. 2023-04-19 not yet calculated CVE-2023-28123
MISC ui_desktop — ui_desktop
  Improper usage of symmetric encryption in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow users with access to UI Desktop configuration files to decrypt their content. This vulnerability is fixed in Version 0.62.3 and later. 2023-04-19 not yet calculated CVE-2023-28124
MISC qualys — cloud_agent
  An Executable Hijacking condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.5.3.1. Attackers may load a malicious copy of a Dependency Link Library (DLL) via a local attack vector instead of the DLL that the application was expecting, when processes are running with escalated privileges. This vulnerability is bounded only to the time of uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life. 2023-04-18 not yet calculated CVE-2023-28140
MISC qualys — cloud_agent
  An NTFS Junction condition exists in the Qualys Cloud Agent for Windows platform in versions before 4.8.0.31. Attackers may write files to arbitrary locations via a local attack vector. This allows attackers to assume the privileges of the process, and they may delete or otherwise on unauthorized files, allowing for the potential modification or deletion of sensitive files limited only to that specific directory/file object. This vulnerability is bounded to the time of installation/uninstallation and can only be exploited locally. At the time of this disclosure, versions before 4.0 are classified as End of Life. 2023-04-18 not yet calculated CVE-2023-28141
MISC qualys — cloud_agent
  A Race Condition exists in the Qualys Cloud Agent for Windows platform in versions from 3.1.3.34 and before 4.5.3.1. This allows attackers to escalate privileges limited on the local machine during uninstallation of the Qualys Cloud Agent for Windows. Attackers may gain SYSTEM level privileges on that asset to run arbitrary commands. At the time of this disclosure, versions before 4.0 are classified as End of Life. 2023-04-18 not yet calculated CVE-2023-28142
MISC qualys — cloud_agent
  Qualys Cloud Agent for macOS (versions 2.5.1-75 before 3.7) installer allows a local escalation of privilege bounded only to the time of installation and only on older macOSX (macOS 10.15 and older) versions. Attackers may exploit incorrect file permissions to give them ROOT command execution privileges on the host. During the install of the PKG, a step in the process involves extracting the package and copying files to several directories. Attackers may gain writable access to files during the install of PKG when extraction of the package and copying files to several directories, enabling a local escalation of privilege. 2023-04-18 not yet calculated CVE-2023-28143
MISC linux — linux
  A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service. 2023-04-19 not yet calculated CVE-2023-28327
MISC linux — linux
  A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service. 2023-04-19 not yet calculated CVE-2023-28328
MISC discourse — discourse
  Discourse is an open source platform for community discussion. In affected versions a maliciously crafted request from a Discourse administrator can lead to a long-running request and eventual timeout. This has the greatest potential impact in shared hosting environments where admins are untrusted. This issue has been addressed in versions 3.0.3 and 3.1.0.beta4. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-18 not yet calculated CVE-2023-28440
MISC pretalx — pretalx
  pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Organizers can trigger the overwriting (with the standard pretalx 404 page content) of an arbitrary file. 2023-04-20 not yet calculated CVE-2023-28458
MISC
MISC
MISC
MISC pretalx — pretalx
  pretalx 2.3.1 before 2.3.2 allows path traversal in HTML export (a non-default feature). Users were able to upload crafted HTML documents that trigger the reading of arbitrary files. 2023-04-20 not yet calculated CVE-2023-28459
MISC
MISC
MISC
MISC prestashop — shoppingfeed
  Shoppingfeed PrestaShop is an add-on to the PrestaShop ecommerce platform to synchronize data. The module Shoppingfeed for PrestaShop is vulnerable to SQL injection between version 1.4.0 and 1.8.2 due to a lack of input sanitization. This issue has been addressed in version 1.8.3. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-18 not yet calculated CVE-2023-28839
MISC
MISC redis — redis
  Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-18 not yet calculated CVE-2023-28856
MISC
MISC
MISC
MISC ami — megarac_spx
  AMI MegaRAC SPx12 and SPx13 devices have Insufficient Verification of Data Authenticity. 2023-04-18 not yet calculated CVE-2023-28863
MISC
MISC cilium — cilium
  Cilium is a networking, observability, and security solution with an eBPF-based dataplane. When run in debug mode, Cilium will log the contents of the `cilium-secrets` namespace. This could include data such as TLS private keys for Ingress and GatewayAPI resources. An attacker with access to debug output from the Cilium containers could use the resulting output to intercept and modify traffic to and from the affected cluster. Output of the sensitive information would occur at Cilium agent restart, when secrets in the namespace are modified, and on creation of Ingress or GatewayAPI resources. This vulnerability is fixed in Cilium releases 1.11.16, 1.12.9, and 1.13.2. Users unable to upgrade should disable debug mode. 2023-04-18 not yet calculated CVE-2023-29002
MISC hap-wi — roxy-wi
  hap-wi/roxy-wi is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A Path Traversal vulnerability was found in the current version of Roxy-WI (6.3.9.0 at the moment of writing this report). The vulnerability can be exploited via an HTTP request to /app/options.py and the config_file_name parameter. Successful exploitation of this vulnerability could allow an attacker with user level privileges to obtain the content of arbitrary files on the file server within the scope of what the server process has access to. The root-cause of the vulnerability lies in the get_config function of the /app/modules/config/config.py file, which only checks for relative path traversal, but still allows to read files from absolute locations passed via the config_file_name parameter. 2023-04-17 not yet calculated CVE-2023-29004
MISC fastify — passport
  @fastify/passport is a port of passport authentication library for the Fastify ecosystem. Applications using `@fastify/passport` in affected versions for user authentication, in combination with `@fastify/session` as the underlying session management mechanism, are vulnerable to session fixation attacks from network and same-site attackers. fastify applications rely on the `@fastify/passport` library for user authentication. The login and user validation are performed by the `authenticate` function. When executing this function, the `sessionId` is preserved between the pre-login and the authenticated session. Network and same-site attackers can hijack the victim’s session by tossing a valid `sessionId` cookie in the victim’s browser and waiting for the victim to log in on the website. As a solution, newer versions of `@fastify/passport` regenerate `sessionId` upon login, preventing the attacker-controlled pre-session cookie from being upgraded to an authenticated session. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-21 not yet calculated CVE-2023-29019
MISC
MISC
MISC fastify — passport
  @fastify/passport is a port of passport authentication library for the Fastify ecosystem. The CSRF (Cross-Site Request Forger) protection enforced by the `@fastify/csrf-protection` library, when combined with `@fastify/passport` in affected versions, can be bypassed by network and same-site attackers. `fastify/csrf-protection` implements the synchronizer token pattern (using plugins `@fastify/session` and `@fastify/secure-session`) by storing a random value used for CSRF token generation in the `_csrf` attribute of a user’s session. The `@fastify/passport` library does not clear the session object upon authentication, preserving the `_csrf` attribute between pre-login and authenticated sessions. Consequently, CSRF tokens generated before authentication are still valid. Network and same-site attackers can thus obtain a CSRF token for their pre-session, fixate that pre-session in the victim’s browser via cookie tossing, and then perform a CSRF attack after the victim authenticates. As a solution, newer versions of `@fastify/passport` include the configuration options: `clearSessionOnLogin (default: true)` and `clearSessionIgnoreFields (default: [‘passport’, ‘session’])` to clear all the session attributes by default, preserving those explicitly defined in `clearSessionIgnoreFields`. 2023-04-21 not yet calculated CVE-2023-29020
MISC
MISC
MISC
MISC discourse — discourse
  Discourse is an open-source platform for community discussion. This vulnerability is not exploitable on the default install of Discourse. A custom feature must be enabled for it to work at all, and the attacker’s payload must pass the CSP to be executed. However, if an attacker succeeds in embedding Javascript that does pass the CSP, it could result in session hijacking for any users that view the attacker’s post. The vulnerability is patched in the latest tests-passed, beta and stable branches. Users are advised to upgrade. Users unable to upgrade should enable and/or restore your site’s CSP to the default one provided with Discourse. Remove any embed-able hosts configured. 2023-04-18 not yet calculated CVE-2023-29196
MISC guzzle — psr7
  guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (n) into both the header names and values. While the specification states that rnrn is used to terminate the header list, many servers in the wild will also accept nn. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade. 2023-04-17 not yet calculated CVE-2023-29197
MISC
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. The “restricted” mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1, only escaped `<script>` and `<style>`-tags but neither attributes that can be used to inject scripts nor other dangerous HTML tags like `<iframe>`. As a consequence, any code relying on this “restricted” mode for security is vulnerable to JavaScript injection (“cross-site scripting”/XSS). When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. This problem has been patched in XWiki 14.6 RC1 with the introduction of a filter with allowed HTML elements and attributes that is enabled in restricted mode. There are no known workarounds apart from upgrading to a version including the fix. 2023-04-15 not yet calculated CVE-2023-29201
MISC
MISC
MISC
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. The RSS macro that is bundled in XWiki included the content of the feed items without any cleaning in the HTML output when the parameter `content` was set to `true`. This allowed arbitrary HTML and in particular also JavaScript injection and thus cross-site scripting (XSS) by specifying an RSS feed with malicious content. With the interaction of a user with programming rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content and sabotaging the wiki. The issue has been patched in XWiki 14.6 RC1, the content of the feed is now properly cleaned before being displayed. As a workaround, if the RSS macro isn’t used in the wiki, the macro can be uninstalled by deleting `WEB-INF/lib/xwiki-platform-rendering-macro-rss-XX.jar`, where `XX` is XWiki’s version, in the web application’s directory. 2023-04-15 not yet calculated CVE-2023-29202
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. It’s possible to list some users who are normally not viewable from subwiki by requesting users on a subwiki which allows only global users with `uorgsuggest.vm`. This issue only concerns hidden users from main wiki. Note that the disclosed information are the username and the first and last name of users, no other information is leaked. The problem has been patched on XWiki 13.10.8, 14.4.3 and 14.7RC1. 2023-04-15 not yet calculated CVE-2023-29203
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1. 2023-04-15 not yet calculated CVE-2023-29204
MISC
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. The HTML macro does not systematically perform a proper neutralization of script-related html tags. As a result, any user able to use the html macro in XWiki, is able to introduce an XSS attack. This can be particularly dangerous since in a standard wiki, any user is able to use the html macro directly in their own user profile page. The problem has been patched in XWiki 14.8RC1. The patch involves the HTML macros and are systematically cleaned up whenever the user does not have the script correct. 2023-04-15 not yet calculated CVE-2023-29205
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. There was no check in the author of a JavaScript xobject or StyleSheet xobject added in a XWiki document, so until now it was possible for a user having only Edit Right to create such object and to craft a script allowing to perform some operations when executing by a user with appropriate rights. This has been patched in XWiki 14.9-rc-1 by only executing the script if the author of it has Script rights. 2023-04-15 not yet calculated CVE-2023-29206
MISC
MISC
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. The Livetable Macro wasn’t properly sanitizing column names, thus allowing the insertion of raw HTML code including JavaScript. This vulnerability was also exploitable via the Documents Macro that is included since XWiki 3.5M1 and doesn’t require script rights, this can be demonstrated with the syntax `{{documents id=”example” count=”5″ actions=”false” columns=”doc.title, before<script>alert(1)</script>after”/}}`. Therefore, this can also be exploited by users without script right and in comments. With the interaction of a user with more rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10. 2023-04-15 not yet calculated CVE-2023-29207
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. Rights added to a document are not taken into account for viewing it once it’s deleted. Note that this vulnerability only impact deleted documents that where containing view rights: the view rights provided on a space of a deleted document are properly checked. The problem has been patched in XWiki 14.10 by checking the rights of current user: only admin and deleter of the document are allowed to view it. 2023-04-15 not yet calculated CVE-2023-29208
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the legacy notification activity macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the macro parameters of the legacy notification activity macro. This macro is installed by default in XWiki. The vulnerability can be exploited via every wiki page that is editable including the user’s profile, but also with just view rights using the HTMLConverter that is part of the CKEditor integration which is bundled with XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10. 2023-04-15 not yet calculated CVE-2023-29209
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents including the notification preferences macros can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the user parameter of the macro that provide the notification filters. These macros are used in the user profiles and thus installed by default in XWiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10. 2023-04-15 not yet calculated CVE-2023-29210
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights `WikiManager.DeleteWiki` can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `wikiId` url parameter. The problem has been patched on XWiki 13.10.11, 14.4.7, and 14.10. 2023-04-16 not yet calculated CVE-2023-29211
MISC
MISC
MISC xwiki — commons XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the included documents edit panel. The problem has been patched on XWiki 14.4.7, and 14.10. 2023-04-16 not yet calculated CVE-2023-29212
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions of `org.xwiki.platform:xwiki-platform-logging-ui` it is possible to trick a user with programming rights into visiting a constructed url where e.g., by embedding an image with this URL in a document that is viewed by a user with programming rights which will evaluate an expression in the constructed url and execute it. This issue has been addressed in versions 13.10.11, 14.4.7, and 14.10. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-17 not yet calculated CVE-2023-29213
MISC
MISC
MISC xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with edit rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the included pages in the IncludedDocuments panel. The problem has been patched on XWiki 14.4.7, and 14.10. 2023-04-16 not yet calculated CVE-2023-29214
MISC
MISC
MISC schneider_electric — multiple_products
  A CWE-20: Improper Input Validation vulnerability exists that could allow an authenticated attacker to gain the same privilege as the application on the server when a malicious payload is provided over HTTP for the server to execute. 2023-04-18 not yet calculated CVE-2023-29410
MISC schneider_electric — apc_easy_ups_online_monitoring_software
  A CWE-306: Missing Authentication for Critical Function vulnerability exists that could allow changes to administrative credentials, leading to potential remote code execution without requiring prior authentication on the Java RMI interface. 2023-04-18 not yet calculated CVE-2023-29411
MISC schneider_electric — apc_easy_ups_online_monitoring_software
  A CWE-78: Improper Handling of Case Sensitivity vulnerability exists that could cause remote code execution when manipulating internal methods through Java RMI interface. 2023-04-18 not yet calculated CVE-2023-29412
MISC schneider_electric — apc_easy_ups_online_monitoring_software
  A CWE-306: Missing Authentication for Critical Function vulnerability exists that could cause Denial-of-Service when accessed by an unauthenticated user on the Schneider UPS Monitor service. 2023-04-18 not yet calculated CVE-2023-29413
MISC ncurses — ncurses
  ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable. 2023-04-14 not yet calculated CVE-2023-29491
MISC
MISC
MISC
MLIST
MLIST xwiki — commons
  XWiki Commons are technical libraries common to several other top level XWiki projects. It was possible to inject some code using the URL of authenticated endpoints. This problem has been patched on XWiki 13.10.11, 14.4.7 and 14.10. 2023-04-16 not yet calculated CVE-2023-29506
MISC
MISC
MISC xwiki — platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. The Document script API returns directly a DocumentAuthors allowing to set any authors to the document, which in consequence can allow subsequent executions of scripts since this author is used for checking rights. The problem has been patched in XWiki 14.10 and 14.4.7 by returning a safe script API. 2023-04-16 not yet calculated CVE-2023-29507
MISC
MISC
MISC xwiki — platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. A user without script rights can introduce a stored XSS by using the Live Data macro, if the last author of the content of the page has script rights. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11. 2023-04-16 not yet calculated CVE-2023-29508
MISC
MISC xwiki — platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. Any user with view rights on commonly accessible documents can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `documentTree` macro parameters in This macro is installed by default in `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10. 2023-04-16 not yet calculated CVE-2023-29509
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In XWiki, every user can add translations that are only applied to the current user. This also allows overriding existing translations. Such translations are often included in privileged contexts without any escaping which allows remote code execution for any user who has edit access on at least one document which could be the user’s own profile where edit access is enabled by default. A mitigation for this vulnerability is part of XWiki 14.10.2 and XWiki 15.0 RC1: translations with user scope now require script right. This means that regular users cannot exploit this anymore as users don’t have script right by default anymore starting with XWiki 14.10. There are no known workarounds apart from upgrading to a patched version. 2023-04-19 not yet calculated CVE-2023-29510
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., its own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the section ids in `XWiki.AdminFieldsDisplaySheet`. This page is installed by default. The vulnerability has been patched in XWiki versions 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. 2023-04-16 not yet calculated CVE-2023-29511
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on a page (e.g., it’s own user page), can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the information loaded from attachments in `imported.vm`, `importinline.vm`, and `packagelist.vm`. This page is installed by default. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-29512
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. If guest has view right on any document. It’s possible to create a new user using the `distribution/firstadminuser.wiki` in the wrong context. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.1. There is no known workaround other than upgrading. 2023-04-19 not yet calculated CVE-2023-29513
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with edit rights on any document (e.g., their own user profile) can execute code with programming rights, leading to remote code execution. This vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-29514
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can create a space can become admin of that space through App Within Minutes. The admin right implies the script right and thus allows JavaScript injection. The vulnerability can be exploited by creating an app in App Within Minutes. If the button should be disabled because the user doesn’t have global edit right, the app can also be created by directly opening `/xwiki/bin/view/AppWithinMinutes/CreateApplication?wizard=true` on the XWiki installation. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.1 and 15.0 RC1 by not granting the space admin right if the user doesn’t have script right on the space where the app is created. Error messages are displayed to warn the user that the app will be broken in this case. Users who became space admin through this vulnerability won’t lose the space admin right due to the fix, so it is advised to check if all users who created AWM apps should keep their space admin rights. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-29515
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights on `XWiki.AttachmentSelector` can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping in the “Cancel and return to page” button. This page is installed by default. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-29516
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The office document viewer macro was allowing anyone to see any file content from the hosting server, provided that the office server was connected and depending on the permissions of the user running the servlet engine (e.g. tomcat) running XWiki. The same vulnerability also allowed to perform internal requests to resources from the hosting server. The problem has been patched in XWiki 13.10.11, 14.10.1, 14.4.8, 15.0-rc-1. Users are advised to upgrade. It might be possible to work around this vulnerability by running XWiki in a sandbox with a user with very low privileges on the machine. 2023-04-19 not yet calculated CVE-2023-29517
MISC
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Invitation.InvitationCommon`. This page is installed by default. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-19 not yet calculated CVE-2023-29518
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the “property” field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. The vulnerability has been patched in XWiki 13.10.11, 14.4.8, 14.10.2, 15.0-rc-1. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-29519
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It’s possible to break many translations coming from wiki pages by creating a corrupted document containing a translation object. This will lead to a broken page. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.1, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no workarounds other than fixing any way to create a document that fail to load. 2023-04-19 not yet calculated CVE-2023-29520
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of `Macro.VFSTreeMacro`. This page is not installed by default.This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.2, 14.4.8, 13.10.11. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-29521
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with view rights can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. This issue has been patched in XWiki 14.4.8, 14.10.3 and 15.0RC1. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-29522
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user who can edit their own user profile can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The same vulnerability can also be exploited in other contexts where the `display` method on a document is used to display a field with wiki syntax, for example in applications created using `App Within Minutes`. This has been patched in XWiki 13.10.11, 14.4.8, 14.10.2 and 15.0RC1. There is no workaround apart from upgrading. 2023-04-19 not yet calculated CVE-2023-29523
MISC
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It’s possible to execute anything with the right of the Scheduler Application sheet page. A user without script or programming rights, edit your user profile with the object editor and add a new object of type XWiki.SchedulerJobClass, In “Job Script”, groovy code can be added and will be executed in the server context on viewing. This has been patched in XWiki 14.10.3 and 15.0 RC1. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-19 not yet calculated CVE-2023-29524
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Affected versions of xwiki are subject to code injection in the `since` parameter of the `/xwiki/bin/view/XWiki/Notifications/Code/LegacyNotificationAdministration` endpoint. This provides an XWiki syntax injection attack via the since-parameter, allowing privilege escalation from view to programming rights and subsequent code execution privilege. The vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8 and 14.10.3. Users are advised to upgrade. Users unable to upgrade may modify the page `XWiki.Notifications.Code.LegacyNotificationAdministration` to add the missing escaping. For versions < 14.6-rc-1 a workaround is to modify the file `<xwikiwebapp>/templates/distribution/eventmigration.wiki` to add the missing escaping. 2023-04-19 not yet calculated CVE-2023-29525
MISC
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it’s possible to display or interact with any page a user cannot access through the combination of the async and display macros. A comment with either macro will be executed when viewed providing a code injection vector in the context of the running server. This vulnerability has been patched in XWiki 15.0-rc-1, 14.10.3, 14.4.8, and 13.10.11. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-19 not yet calculated CVE-2023-29526
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions a user without script or programming right may edit a user profile (or any other document) with the wiki editor and add groovy script content. Viewing the document after saving it will execute the groovy script in the server context which provides code execution. This vulnerability has been patched in XWiki 15.0-rc-1 and 14.10.3. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-19 not yet calculated CVE-2023-29527
MISC
MISC xwiki — platform
  XWiki Commons are technical libraries common to several other top level XWiki projects. The “restricted” mode of the HTML cleaner in XWiki, introduced in version 4.2-milestone-1 and massively improved in version 14.6-rc-1, allowed the injection of arbitrary HTML code and thus cross-site scripting via invalid HTML comments. As a consequence, any code relying on this “restricted” mode for security is vulnerable to JavaScript injection (“cross-site scripting”/XSS). When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session. This allows server-side code execution with programming rights, impacting the confidentiality, integrity and availability of the XWiki instance. This problem has been patched in XWiki 14.10, HTML comments are now removed in restricted mode and a check has been introduced that ensures that comments don’t start with `>`. There are no known workarounds apart from upgrading to a version including the fix. 2023-04-20 not yet calculated CVE-2023-29528
MISC
MISC
MISC
MISC mp42aac — mp42aac 
  Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component. 2023-04-21 not yet calculated CVE-2023-29575
MISC
MISC mitre — mitre  Code Sector TeraCopy 3.9.7 does not perform proper access validation on the source folder during a copy operation. This leads to Arbitrary File Read by allowing any user to copy any directory in the system to a directory they control. 2023-04-19 not yet calculated CVE-2023-29586
MISC
MISC d-link — d-link 
  D-Link DIR823G_V1.0.2B05 was discovered to contain a stack overflow via the NewPassword parameters in SetPasswdSettings. 2023-04-17 not yet calculated CVE-2023-29665
MISC
MISC dreamer — cms_3.0.1 
  Dreamer CMS 3.0.1 is vulnerable to stored Cross Site Scripting (XSS). 2023-04-18 not yet calculated CVE-2023-29774
MISC dircms — dircms 
  DirCMS 6.0.0 has a Cross Site Scripting (XSS) vulnerability in the foreground. 2023-04-18 not yet calculated CVE-2023-29854
MISC wbce — cms_1.5.3 
  WBCE CMS 1.5.3 has a command execution vulnerability via admin/languages/install.php. 2023-04-18 not yet calculated CVE-2023-29855
MISC test.php — spreadsheet-reader 
  A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter. 2023-04-18 not yet calculated CVE-2023-29887
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the UpdateSnat interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29905
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the Edit_BasicSSID interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29906
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the Edit_BasicSSID_5G interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29907
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the SetMobileAPInfoById interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29908
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the AddWlanMacList interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29909
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the UpdateMacClone interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29910
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the AddMacList interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29911
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 R200V100R004 was discovered to contain a stack overflow via the DelvsList interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29912
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the SetAPWifiorLedInfoById interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29913
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29914
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via CMD parameter at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29915
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via the UpdateWanParams interface at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29916
MISC h3c_magic_r200 — r200v100r004
  H3C Magic R200 version R200V100R004 was discovered to contain a stack overflow via go parameter at /goform/aspForm. 2023-04-21 not yet calculated CVE-2023-29917
MISC powerjob — powerjob 
  PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create app interface. 2023-04-19 not yet calculated CVE-2023-29921
MISC powerjob — powerjob 
  PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface. 2023-04-19 not yet calculated CVE-2023-29922
MISC powerjob — powerjob 
  PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface. 2023-04-19 not yet calculated CVE-2023-29923
MISC powerjob — powerjob 
  PowerJob V4.3.1 is vulnerable to Incorrect Access Control that allows for remote code execution. 2023-04-21 not yet calculated CVE-2023-29924
MISC
MISC powerjob — powerjob 
  PowerJob V4.3.2 has unauthorized interface that causes remote code execution. 2023-04-20 not yet calculated CVE-2023-29926
MISC sourcecodester — judging_management_system 
  Sourcecodester Judging Management System v1.0 is vulnerable to SQL Injection via /php-jms/print_judges.php?print_judges.php=&se_name=&sub_event_id=. 2023-04-20 not yet calculated CVE-2023-30076
MISC altran — picotcp 
  Altran picoTCP through 1.7.0 allows memory corruption (and subsequent denial of service) because of an integer overflow in pico_ipv6_alloc when processing large ICMPv6 packets. This affects installations with Ethernet support in which a packet size greater than 65495 may occur. 2023-04-19 not yet calculated CVE-2023-30463
MISC
MISC kilian_evang — ultimate_noindex_nofollow_tool_ii 
  Cross-Site Request Forgery (CSRF) vulnerability in Kilian Evang Ultimate Noindex Nofollow Tool II plugin <= 1.3 versions. 2023-04-16 not yet calculated CVE-2023-30474
MISC slimphp — slim-psr7 
  slim/psr7 is a PSR-7 implementation for use with Slim 4. In versions prior to 1.6.1 an attacker could sneak in a newline (n) into both the header names and values. While the specification states that rnrn is used to terminate the header list, many servers in the wild will also accept nn. An attacker that is able to control the header names that are passed to Slilm-Psr7 would be able to intentionally craft invalid messages, possibly causing application errors or invalid HTTP requests being sent out with an PSR-18 HTTP client. The latter might present a denial of service vector if a remote service’s web application firewall bans the application due to the receipt of malformed requests. The issue has been patched in version 1.6.1. There are no known workarounds to this issue. Users are advised to upgrade. 2023-04-17 not yet calculated CVE-2023-30536
MISC
MISC
MISC xwiki — platform
  XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki versions 13.10.11, 14.4.7 and 14.10. 2023-04-16 not yet calculated CVE-2023-30537
MISC
MISC
MISC discourse — discourse 
  Discourse is an open source platform for community discussion. Due to the improper sanitization of SVG files, an attacker can execute arbitrary JavaScript on the users’ browsers by uploading a crafted SVG file. This issue is patched in the latest stable and tests-passed versions of Discourse. Users are advised to upgrade. For users unable to upgrade there are two possible workarounds: enable CDN handing of uploads (and ensure the CDN sanitizes SVG files) or disable SVG file uploads by ensuring that the `authorized extensions` site setting does not include `svg` (or reset that setting to the default, by default Discourse doesn’t enable SVG uploads by users). 2023-04-18 not yet calculated CVE-2023-30538
MISC nextcloud — security-advisories 
  Nextcloud is a personal home server system. Depending on the set-up tags and other workflows this issue can be used to limit access of others or being able to grant them access when there are system tag based files access control or files retention rules. It is recommended that the Nextcloud Server is upgraded to 24.0.11 or 25.0.5, the Nextcloud Enterprise Server to 21.0.9.11, 22.2.10.11, 23.0.12.6, 24.0.11 or 25.0.5, and the Nextcloud Files automated tagging app to 1.11.1, 1.12.1, 1.13.1, 1.14.2, 1.15.3 or 1.16.1. Users unable to upgrade should disable all workflow related apps. Users are advised to upgrade. 2023-04-17 not yet calculated CVE-2023-30539
MISC
MISC
MISC
MISC nextcloud — talk
  Nextcloud Talk is a chat, video & audio call extension for Nextcloud. In affected versions a user that was added later to a conversation can use this information to get access to data that was deleted before they were added to the conversation. This issue has been patched in version 15.0.5 and it is recommended that users upgrad to 15.0.5. There are no known workarounds for this issue. 2023-04-17 not yet calculated CVE-2023-30540
MISC
MISC
MISC openzeppelin — contracts
  OpenZeppelin Contracts is a library for secure smart contract development. A function in the implementation contract may be inaccessible if its selector clashes with one of the proxy’s own selectors. Specifically, if the clashing function has a different signature with incompatible ABI encoding, the proxy could revert while attempting to decode the arguments from calldata. The probability of an accidental clash is negligible, but one could be caused deliberately and could cause a reduction in availability. The issue has been fixed in version 4.8.3. As a workaround if a function appears to be inaccessible for this reason, it may be possible to craft the calldata such that ABI decoding does not fail at the proxy and the function is properly proxied through. 2023-04-17 not yet calculated CVE-2023-30541
MISC
MISC
MISC openzeppelin — contracts
  OpenZeppelin Contracts is a library for secure smart contract development. The proposal creation entrypoint (`propose`) in `GovernorCompatibilityBravo` allows the creation of proposals with a `signatures` array shorter than the `calldatas` array. This causes the additional elements of the latter to be ignored, and if the proposal succeeds, the corresponding actions would eventually execute without any calldata. The `ProposalCreated` event correctly represents what will eventually execute, but the proposal parameters as queried through `getActions` appear to respect the original intended calldata. This issue has been patched in 4.8.3. As a workaround, ensure that all proposals that pass through governance have equal length `signatures` and `calldatas` parameters. 2023-04-16 not yet calculated CVE-2023-30542
MISC
MISC uniswap — web3-react
  @web3-react is a framework for building Ethereum Apps. In affected versions the `chainId` may be outdated if the user changes chains as part of the connection flow. This means that the value of `chainId` returned by `useWeb3React()` may be incorrect. In an application, this means that any data derived from `chainId` could be incorrect. For example, if a swapping application derives a wrapped token contract address from the `chainId` *and* a user has changed chains as part of their connection flow the application could cause the user to send funds to the incorrect address when wrapping. This issue has been addressed in PR #749 and is available in updated npm artifacts. There are no known workarounds for this issue. Users are advised to upgrade. 2023-04-17 not yet calculated CVE-2023-30543
MISC
MISC vm2 — vm2
  vm2 is a sandbox that can run untrusted code with whitelisted Node’s built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade. 2023-04-17 not yet calculated CVE-2023-30547
MISC
MISC
MISC
MISC gatsbyjs — gatsbyjs
  gatsby-plugin-sharp is a plugin for the gatsby framework which exposes functions built on the Sharp image processing library. The gatsby-plugin-sharp plugin prior to versions 5.8.1 and 4.25.1 contains a path traversal vulnerability exposed when running the Gatsby develop server (`gatsby develop`). It should be noted that by default gatsby develop is only accessible via the localhost 127.0.0.1, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as –host 0.0.0.0, -H 0.0.0.0, or the GATSBY_HOST=0.0.0.0 environment variable. Attackers exploiting this vulnerability will have read access to all files within the scope of the server process. A patch has been introduced in [email protected] and [email protected] which mitigates the issue by ensuring that included paths remain within the project directory. As stated above, by default gatsby develop is only exposed to the localhost 127.0.0.1. For those using the develop server in the default configuration no risk is posed. If other ranges are required, preventing the develop server from being exposed to untrusted interfaces or IP address ranges would mitigate the risk from this vulnerability. Users are non the less encouraged to upgrade to a safe version. 2023-04-17 not yet calculated CVE-2023-30548
MISC
MISC
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `sql/instance.py` endpoint’s `describe` method. In several cases, user input coming from the `tb_name` parameter value, the `db_name` parameter value or the `schema_name` value in the `sql/instance.py` `describe` endpoint is passed to the `describe_table` methods in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. Please take into account that in some cases all three parameter values are concatenated, in other only one or two of them. The affected methods are: `describe_table` in `sql/engines/clickhouse.py`which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/clickhouse.py`, `describe_table` in `sql/engines/mssql.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/mssql.py`, `describe_table` in `sql/engines/mysql.py`which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/mysql.py`, `describe_table` in `sql/engines/oracle.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/oracle.py`, `describe_table` in `sql/engines/pgsql.py`which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/pgsql.py`, `describe_table` in `sql/engines/phoenix.py` which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/phoenix.py`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-101`. 2023-04-19 not yet calculated CVE-2023-30552
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to multiple SQL injections in the `sql_api/api_workflow.py` endpoint `ExecuteCheck`. User input coming from the `db_name` parameter value and the `full_sql` parameter value in the `api_workflow.py` `ExecuteCheck` endpoint is passed to the methods that follow in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. The affected methods are `execute_check` in `sql/engines/clickhouse.py` which concatenates input which is passed to execution on the database in the `sql/engines/clickhouse.py` `query` method, `execute_check` in `sql/engines/goinception.py`which concatenates input which is passed to execution on the database in the `sql/engines/goinception.py` `query` method, `execute_check` in `sql/engines/oracle.py`which passes unsafe user input into the `object_name_check` method in `sql/engines/oracle.py` which in turn is passed to execution on the database in the `sql/engines/oracle.py` `query` method. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-102`. 2023-04-19 not yet calculated CVE-2023-30553
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `sql_api/api_workflow.py` endpoint `ExecuteCheck` which passes unfiltered input to the `explain_check` method in `sql/engines/oracle.py`. User input coming from the `db_name` parameter value in the `api_workflow.py` `ExecuteCheck` endpoint is passed through the `oracle.py` `execute_check` method and to the `explain_check` method for execution. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-103`. 2023-04-19 not yet calculated CVE-2023-30554
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases.Affected versions are subject to SQL injection in the `explain` method in `sql_optimize.py`. User input coming from the `db_name` parameter value in the `explain` endpoint is passed to the following `query` methods of each database engine for execution. `query` in `sql/engines/mssql.py`, and `query` in `sql/engines/oracle.py`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-108`. 2023-04-19 not yet calculated CVE-2023-30555
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `optimize_sqltuningadvisor` method of `sql_optimize.py`. User input coming from the `db_name` parameter value in `sql_optimize.py` is passed to the `sqltuningadvisor` method in `oracle.py`for execution. To mitigate escape the variables accepted via user input when used in `sql_optimize.py`. Users may also use prepared statements when dealing with SQL as a mitigation for this issue. This issue is also indexed as `GHSL-2022-107`. 2023-04-19 not yet calculated CVE-2023-30556
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `data_dictionary.py` `table_info`. User input coming from the `db_name` in and the `tb_name` parameter values in the `sql/data_dictionary.py` `table_info` endpoint is passed to the following methods in the given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution.The methods are `get_table_meta_data ` in `sql/engines/mssql.py` which passes unsafe user input to the `sql/engines/mssql.py` `query` method, `get_table_desc_data` in `sql/engines/mssql.py`which passes unsafe user input to the `sql/engines/mssql.py` `query`, `get_table_index_data` in `sql/engines/mssql.py`which passes unsafe user input to the `sql/engines/mssql.py` `query` method, `get_table_meta_data` in `sql/engines/oracle.py`which concatenates input which is passed to execution on the database in the `sql/engines/oracle.py` `query` method, `get_table_desc_data` in `sql/engines/oracle.py`which concatenates input which is passed to execution on the database in the `sql/engines/oracle.py` `query` method, and `get_table_index_data` in `sql/engines/oracle.py` which concatenates input which is passed to execution on the database in the `sql/engines/oracle.py` `query` method. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-106`. 2023-04-19 not yet calculated CVE-2023-30557
MISC
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. User input coming from the `db_name` in the `sql/data_dictionary.py` `table_list` endpoint is passed to the methods that follow in a given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. The affected methods are `get_group_tables_by_db` in `sql/engines/mssql.py`which passes unsafe user input to `sql/engines/mssql.py`, and `get_group_tables_by_db` in `sql/engines/oracle.py`which concatenates input which is passed to execution on the database in the `sql/engines/oracle.py` `query` method. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-105`. 2023-04-19 not yet calculated CVE-2023-30558
MISC archery — archery
  Archery is an open-source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. User input coming from the `variable_name` and `variable_value` parameter value in the `sql/instance.py` `param_edit` endpoint is passed to a set of methods in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. The affected methods are: `set_variable` in `sql/engines/goinception.py` which concatenates input which is passed to execution on the database in the `sql/engines/goinception.py`, `get_variables` in `sql/engines/goinception.py` which concatenates input which is passed to execution on the database in the `sql/engines/goinception.py`, `set_variable` in `sql/engines/mysql.py` which concatenates input which is passed to execution on the database in the `sql/engines/mysql.py` `query`, and `get_variables` in `sql/engines/mysql.py`which concatenates input which is passed to execution on the database in the `sql/engines/mysql.py` `query`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This advisory is also indexed as `GHSL-2022-104`. 2023-04-19 not yet calculated CVE-2023-30605
MISC
MISC discourse — discourse Discourse is an open-source platform for community discussion. In affected versions a user logged as an administrator can call arbitrary methods on the `SiteSetting` class, notably `#clear_cache!` and `#notify_changed!`, which when done on a multisite instance, can affect the entire cluster resulting in a denial of service. Users not running in multisite environments are not affected. This issue is patched in the latest stable, beta and tests-passed versions of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-18 not yet calculated CVE-2023-30606
MISC sqlparse — sqlparse
  sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue. 2023-04-18 not yet calculated CVE-2023-30608
MISC
MISC
MISC
MISC awslabs — aws_sdk_rust
  aws-sigv4 is a rust library for low level request signing in the aws cloud platform. The `aws_sigv4::SigningParams` struct had a derived `Debug` implementation. When debug-formatted, it would include a user’s AWS access key, AWS secret key, and security token in plaintext. When TRACE-level logging is enabled for an SDK, `SigningParams` is printed, thereby revealing those credentials to anyone with access to logs. All users of the AWS SDK for Rust who enabled TRACE-level logging, either globally (e.g. `RUST_LOG=trace`), or for the `aws-sigv4` crate specifically are affected. This issue has been addressed in a set of new releases. Users are advised to upgrade. Users unable to upgrade should disable TRACE-level logging for AWS Rust SDK crates. 2023-04-19 not yet calculated CVE-2023-30610
MISC discourse — discourse_reactions
  Discourse-reactions is a plugin that allows user to add their reactions to the post in the Discourse messaging platform. In affected versions data about what reactions were performed on a post in a private topic could be leaked. This issue has been addressed in version 0.3. Users are advised to upgrade. Users unable to upgrade should disable the discourse-reactions plugin to fully mitigate the issue. 2023-04-19 not yet calculated CVE-2023-30611
MISC
MISC cloud_hypervisor — cloud_hypervisor
  Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability. Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only. 2023-04-19 not yet calculated CVE-2023-30612
MISC
MISC
MISC
MISC
MISC ruby_on_rails — ruby_on_rails
  Pay is a payments engine for Ruby on Rails 6.0 and higher. In versions prior to 6.3.2 a payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates Pay. This URL could be distributed via email to specifically target certain individuals. If the targeted application contains a functionality to submit user-generated content (such as comments) the attacker could even distribute the URL using that functionality. This has been patched in version 6.3.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-19 not yet calculated CVE-2023-30614
MISC
MISC wordpress — wordpress
  Form block is a wordpress plugin designed to make form creation easier. Versions prior to 1.0.2 are subject to a Cross-Site Request Forgery due to a missing nonce check. There is potential for a Cross Site Request Forgery for all form blocks, since it allows to send requests to the forms from any website without a user noticing. Users are advised to upgrade to version 1.0.2. There are no known workarounds for this vulnerability. 2023-04-20 not yet calculated CVE-2023-30616
MISC
MISC kitchen-terraform — kitchen-terraform
  Kitchen-Terraform provides a set of Test Kitchen plugins which enable the use of Test Kitchen to converge a Terraform configuration and verify the resulting infrastructure systems with InSpec controls. Kitchen-Terraform v7.0.0 introduced a regression which caused all Terraform output values, including sensitive values, to be printed at the `info` logging level during the `kitchen converge` action. Prior to v7.0.0, the output values were printed at the `debug` level to avoid writing sensitive values to the terminal by default. An attacker would need access to the local machine in order to gain access to these logs during an operation. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-21 not yet calculated CVE-2023-30618
MISC
MISC mindsdb — mindsdb
  mindsdb is a Machine Learning platform to help developers build AI solutions. In affected versions an unsafe extraction is being performed using `tarfile.extractall()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. Sometimes, the vulnerability is called a TarSlip or a ZipSlip variant. An attacker may leverage this vulnerability to overwrite any local file which the server process has access to. There is no risk of file exposure with this vulnerability. This issue has been addressed in release `23.2.1.0 `. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-21 not yet calculated CVE-2023-30620
MISC
MISC
MISC gipsy_discord_bot — gipsy_discord_bot
  Gipsy is a multi-purpose discord bot which aim to be as modular and user-friendly as possible. In versions prior to 1.3 users can run command on the host machine with sudoer permission. The `!ping` command when provided with an IP or hostname used to run a bash `ping <IP>` without verification that the IP or hostname was legitimate. This command was executed with root permissions and may lead to arbitrary command injection on the host server. Users are advised to upgrade. There are no known workarounds for this vulnerability. 2023-04-21 not yet calculated CVE-2023-30621
MISC
MISC
MISC open-source_code_for_blockchain_networks — open-source_code_for_blockchain_networks
  Vulnerability discovered is related to the peer-to-peer (p2p) communications, attackers can craft consensus messages, send it to individual nodes and take them offline. An attacker can crawl the network peers using getaddr message and attack the unpatched nodes. 2023-04-17 not yet calculated CVE-2023-30769
MISC
MISC asustor — asustor_data_master
  A stack-based buffer overflow vulnerability was found in the ASUSTOR Data Master (ADM) due to the lack of data size validation. An attacker can exploit this vulnerability to execute arbitrary code. Affected ADM versions include: 4.0.6.REG2, 4.1.0 and below as well as 4.2.0.RE71 and below. 2023-04-17 not yet calculated CVE-2023-30770
MISC oracle — apache_iotdb_workbench
  Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This issue affects the iotdb-web-workbench component on 0.13.3. iotdb-web-workbench is an optional component of IoTDB, providing a web console of the database. This problem is fixed from version 0.13.4 of iotdb-web-workbench onwards. 2023-04-17 not yet calculated CVE-2023-30771
MISC
MISC linux — kernel
  The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device. 2023-04-16 not yet calculated CVE-2023-30772
CONFIRM
CONFIRM
CONFIRM netflix — lemur
  Netflix Lemur before version 1.3.2 used insufficiently random values when generating default credentials. The insufficiently random values may allow an attacker to guess the credentials and gain access to resources managed by Lemur. 2023-04-19 not yet calculated CVE-2023-30797
MISC
MISC
MISC
MISC encode — starlette
  There MultipartParser usage in Encode’s Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service. 2023-04-21 not yet calculated CVE-2023-30798
MISC
MISC
MISC