CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2023-28892 2023-03-29 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\AdwCleaner\Logs\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link.
2 CVE-2023-28885 DoS 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
The MyLink infotainment system (build 2021.3.26) in General Motors Chevrolet Equinox 2021 vehicles allows attackers to cause a denial of service (temporary failure of Media Player functionality) via a crafted MP3 file.
3 CVE-2023-28884 XSS 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
In MISP 2.4.169, app/Lib/Tools/CustomPaginationTool.php allows XSS in the community index.
4 CVE-2023-28883 Sql 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
In Cerebrate 1.13, a blind SQL injection exists in the searchAll API endpoint.
5 CVE-2023-28867 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
In GraphQL Java (aka graphql-java) before 20.1, an attacker can send a crafted GraphQL query that causes stack consumption. The fixed versions are 20.1, 19.4, 18.4, 17.5, and 0.0.0-2023-03-20T01-49-44-80e3135.
6 CVE-2023-28866 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
In the Linux kernel through 6.2.8, net/bluetooth/hci_sync.c allows out-of-bounds access because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but do not.
7 CVE-2023-28859 2023-03-26 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
redis-py through 4.5.3 leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a non-pipeline operation), and can send response data to the client of an unrelated request. NOTE: this issue exists because of an incomplete fix for CVE-2023-28858.
8 CVE-2023-28858 2023-03-26 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open after canceling an async Redis command at an inopportune time (in the case of a pipeline operation), and can send response data to the client of an unrelated request in an off-by-one manner. The fixed versions for this CVE Record are 4.3.6, 4.4.3, and 4.5.3; however, CVE-2023-28859 is a separate vulnerability.
9 CVE-2023-28818 2023-03-24 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup IT Analytics 11 before 11.2.0. The application upgrade process included unsigned files that could be exploited and result in a customer installing unauthentic components. A malicious actor could install rogue Collector executable files (aptare.jar or upgrademanager.zip) on the Portal server, which might then be downloaded and installed on collectors.
10 CVE-2023-28772 120 Overflow 2023-03-23 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow.
11 CVE-2023-28759 427 2023-03-23 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup before 10.0. A vulnerability in the way NetBackup validates the path to a DLL prior to loading may allow a lower level user to elevate privileges and compromise the system.
12 CVE-2023-28758 2023-03-23 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in Veritas NetBackup before 8.3.0.2. BPCD allows an unprivileged user to specify a log file path when executing a NetBackup command. This can be used to overwrite existing NetBackup log files.
13 CVE-2023-28725 434 Exec Code 2023-03-22 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
General Bytes Crypto Application Server (CAS) 20230120, as distributed with General Bytes BATM devices, allows remote attackers to execute arbitrary Java code by uploading a Java application to the /batm/app/admin/standalone/deployments directory, aka BATM-4780, as exploited in the wild in March 2023. This is fixed in 20221118.48 and 20230120.44.
14 CVE-2023-28718 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Osprey Pump Controller version 1.01 allows users to perform certain actions via HTTP requests without performing any checks to verify the requests. This may allow an attacker to perform certain actions with administrative privileges if a logged-in user visits a malicious website.
15 CVE-2023-28712 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Osprey Pump Controller version 1.01 contains an unauthenticated command injection vulnerability that could allow system access with www-data permissions.
16 CVE-2023-28708 523 2023-03-22 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
17 CVE-2023-28686 2023-03-24 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Dino before 0.2.3, 0.3.x before 0.3.2, and 0.4.x before 0.4.2 allows attackers to modify the personal bookmark store via a crafted message. The attacker can change the display of group chats or force a victim to join a group chat; the victim may then be tricked into disclosing sensitive information.
18 CVE-2023-28685 611 2023-03-22 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
Jenkins AbsInt a³ Plugin 1.1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
19 CVE-2023-28667 502 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Lead Generated WordPress Plugin, version <= 1.23, was affected by an unauthenticated insecure deserialization issue. The tve_labels parameter of the tve_api_form_submit action is passed to the PHP unserialize() function without being sanitized or verified, and as a result could lead to PHP object injection, which when combined with certain class implementations / gadget chains could be leveraged to perform a variety of malicious actions granted a POP chain is also present.
20 CVE-2023-28666 79 XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The InPost Gallery WordPress plugin, in versions < 2.2.2, is affected by a reflected cross-site scripting vulnerability in the 'imgurl' parameter to the add_inpost_gallery_slide_item action, which can only be triggered by an authenticated user.
21 CVE-2023-28665 79 XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Woo Bulk Price Update WordPress plugin, in versions < 2.2.2, is affected by a reflected cross-site scripting vulnerability in the 'page' parameter to the techno_get_products action, which can only be triggered by an authenticated user.
22 CVE-2023-28664 79 XSS 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Meta Data and Taxonomies Filter WordPress plugin, in versions < 1.3.1, is affected by a reflected cross-site scripting vulnerability in the 'tax_name' parameter of the mdf_get_tax_options_in_widget action, which can only be triggered by an authenticated user.
23 CVE-2023-28663 89 Sql 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Formidable PRO2PDF WordPress Plugin, version < 3.11, is affected by an authenticated SQL injection vulnerability in the ‘fieldmap’ parameter in the fpropdf_export_file action.
24 CVE-2023-28662 89 Sql 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.
25 CVE-2023-28661 89 Sql 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The WP Popup Banners WordPress Plugin, version <= 1.2.5, is affected by an authenticated SQL injection vulnerability in the 'value' parameter in the get_popup_data action.
26 CVE-2023-28660 89 Sql 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Events Made Easy WordPress Plugin, version <= 2.3.14 is affected by an authenticated SQL injection vulnerability in the 'search_name' parameter in the eme_recurrences_list action.
27 CVE-2023-28659 89 Sql 2023-03-22 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
The Waiting: One-click Countdowns WordPress Plugin, version <= 0.6.2, is affected by an authenticated SQL injection vulnerability in the pbc_down[meta][id] parameter of the pbc_save_downs action.
28 CVE-2023-28655 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users.
29 CVE-2023-28654 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Osprey Pump Controller version 1.01 has a hidden administrative account that has the hardcoded password that allows full access to the web management interface configuration. The user is not visible in Usernames and Passwords menu list of the application and the password cannot be changed through any normal operation of the device.
30 CVE-2023-28652 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
An authenticated malicious user could successfully upload a malicious image could lead to a denial-of-service condition.
31 CVE-2023-28650 2023-03-27 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
An unauthenticated remote attacker could provide a malicious link and trick an unsuspecting user into clicking on it. If clicked, the attacker could execute the malicious JavaScript (JS) payload in the target’s security context.
32 CVE-2023-28648 Exec Code 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
Osprey Pump Controller version 1.01 inputs passed to a GET parameter are not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.
33 CVE-2023-28642 281 Bypass 2023-03-29 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
34 CVE-2023-28640 269 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
Apiman is a flexible and open source API Management platform. Due to a missing permissions check, an attacker with an authenticated Apiman Manager account may be able to gain access to API keys they do not have permission for if they correctly guess the URL, which includes Organisation ID, Client ID, and Client Version of the targeted non-permitted resource. While not trivial to exploit, it could be achieved by brute-forcing or guessing common names. Access to the non-permitted API Keys could allow use of other users' resources without their permission (depending on the specifics of configuration, such as whether an API key is the only form of security). Apiman 3.1.0.Final resolved this issue. Users are advised to upgrade. The only known workaround is to restrict account access.
35 CVE-2023-28638 119 DoS Overflow 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
Snappier is a high performance C# implementation of the Snappy compression algorithm. This is a buffer overrun vulnerability that can affect any user of Snappier 1.1.0. In this release, much of the code was rewritten to use byte references rather than pointers to pinned buffers. This change generally improves performance and reduces workload on the garbage collector. However, when the garbage collector performs compaction and rearranges memory, it must update any byte references on the stack to refer to the updated location. The .NET garbage collector can only update these byte references if they still point within the buffer or to a point one byte past the end of the buffer. If they point outside this area, the buffer itself may be moved while the byte reference stays the same. There are several places in 1.1.0 where byte references very briefly point outside the valid areas of buffers. These are at locations in the code being used for buffer range checks. While the invalid references are never dereferenced directly, if a GC compaction were to occur during the brief window when they are on the stack then it could invalidate the buffer range check and allow other operations to overrun the buffer. This should be very difficult for an attacker to trigger intentionally. It would require a repetitive bulk attack with the hope that a GC compaction would occur at precisely the right moment during one of the requests. However, one of the range checks with this problem is a check based on input data in the decompression buffer, meaning malformed input data could be used to increase the chance of success. Note that any resulting buffer overrun is likely to cause access to protected memory, which will then cause an exception and the process to be terminated. Therefore, the most likely result of an attack is a denial of service. This issue has been patched in release 1.1.1. Users are advised to upgrade. Users unable to upgrade may pin buffers to a fixed location before using them for compression or decompression to mitigate some, but not all, of these cases. At least one temporary decompression buffer is internal to the library and never pinned.
36 CVE-2023-28637 74 Exec Code 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
DataEase is an open source data visualization analysis tool. In Dataease users are normally allowed to modify data and the data sources are expected to properly sanitize data. The AWS redshift data source does not provide data sanitization which may lead to remote code execution. This vulnerability has been fixed in v1.18.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
37 CVE-2023-28631 755 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
comrak is a CommonMark + GFM compatible Markdown parser and renderer written in rust. A Comrak AST can be constructed manually by a program instead of parsing a Markdown document with `parse_document`. This AST can then be converted to HTML via `html::format_document_with_plugins`. However, the HTML formatting code assumes that the AST is well-formed. For example, many AST notes contain `[u8]` fields which the formatting code assumes is valid UTF-8 data. Several bugs can be triggered if this is not the case. Version 0.17.0 contains adjustments to the AST, storing strings instead of unvalidated byte arrays. Users are advised to upgrade. Users unable to upgrade may manually validate UTF-8 correctness of all data when assigning to `&[u8]` and `Vec<u8>` fields in the AST. This issue is also tracked as `GHSL-2023-049`.
38 CVE-2023-28630 532 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
GoCD is an open source continuous delivery server. In GoCD versions from 20.5.0 and below 23.1.0, if the server environment is not correctly configured by administrators to provide access to the relevant PostgreSQL or MySQL backup tools, the credentials for database access may be unintentionally leaked to admin alerts on the GoCD user interface. The vulnerability is triggered only if the GoCD server host is misconfigured to have backups enabled, but does not have access to the `pg_dump` or `mysqldump` utility tools to backup the configured database type (PostgreSQL or MySQL respectively). In such cases, failure to launch the expected backup utility reports the shell environment used to attempt to launch in the server admin alert, which includes the plaintext database password supplied to the configured tool. This vulnerability does not affect backups of the default on-disk H2 database that GoCD is configured to use. This issue has been addressed and fixed in GoCD 23.1.0. Users are advised to upgrade. Users unable to upgrade may disable backups, or administrators should ensure that the required `pg_dump` (PostgreSQL) or `mysqldump` (MySQL) binaries are available on the GoCD server when backups are triggered.
39 CVE-2023-28629 79 XSS 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
GoCD is an open source continuous delivery server. GoCD versions before 23.1.0 are vulnerable to a stored XSS vulnerability, where pipeline configuration with a malicious pipeline label configuration can affect browser display of pipeline runs generated from that configuration. An attacker that has permissions to configure GoCD pipelines could include JavaScript elements within the label template, causing a XSS vulnerability to be triggered for any users viewing the Value Stream Map or Job Details for runs of the affected pipeline, potentially allowing them to perform arbitrary actions within the victim's browser context rather than their own. This issue has been fixed in GoCD 23.1.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
40 CVE-2023-28628 706 Bypass 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
lambdaisland/uri is a pure Clojure/ClojureScript URI library. In versions prior to 1.14.120 `authority-regex` allows an attacker to send malicious URLs to be parsed by the `lambdaisland/uri` and return the wrong authority. This issue is similar to but distinct from CVE-2020-8910. The regex in question doesn't handle the backslash (`\`) character in the username correctly, leading to a wrong output. ex. a payload of `https://example.com\\@google.com` would return that the host is `google.com`, but the correct host should be `example.com`. Given that the library returns the wrong authority this may be abused to bypass host restrictions depending on how the library is used in an application. Users are advised to upgrade. There are no known workarounds for this vulnerability.
41 CVE-2023-28627 78 Exec Code 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
pymedusa is an automatic video library manager for TV Shows. In versions prior 1.0.12 an attacker with access to the web interface can update the git executable path in /config/general/ > advanced settings with arbitrary OS commands. An attacker may exploit this vulnerability to take execute arbitrary OS commands as the user running the pymedusa program. Users are advised to upgrade. There are no known workarounds for this vulnerability.
42 CVE-2023-28626 400 2023-03-28 2023-03-29
0.0
None ??? ??? ??? ??? ??? ???
comrak is a CommonMark + GFM compatible Markdown parser and renderer written in rust. A range of quadratic parsing issues are present in Comrak. These can be used to craft denial-of-service attacks on services that use Comrak to parse Markdown. This issue has been addressed in version 0.17.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-047`
43 CVE-2023-28617 78 Exec Code 2023-03-19 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
44 CVE-2023-28611 863 Bypass 2023-03-23 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
Incorrect authorization in OMICRON StationGuard 1.10 through 2.20 and StationScout 1.30 through 2.20 allows an attacker to bypass intended access restrictions.
45 CVE-2023-28610 2023-03-23 2023-03-27
0.0
None ??? ??? ??? ??? ??? ???
The update process in OMICRON StationGuard and OMICRON StationScout before 2.21 can be exploited by providing a modified firmware update image. This allows a remote attacker to gain root access to the system.
46 CVE-2023-28609 287 2023-03-18 2023-03-23
0.0
None ??? ??? ??? ??? ??? ???
api/auth.go in Ansible Semaphore before 2.8.89 mishandles authentication.
47 CVE-2023-28607 79 XSS 2023-03-18 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
js/event-graph.js in MISP before 2.4.169 allows XSS via the event-graph relationship tooltip.
48 CVE-2023-28606 79 XSS 2023-03-18 2023-03-24
0.0
None ??? ??? ??? ??? ??? ???
js/event-graph.js in MISP before 2.4.169 allows XSS via event-graph node tooltips.
49 CVE-2023-28597 Exec Code 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution.
50 CVE-2023-28596 2023-03-27 2023-03-28
0.0
None ??? ??? ??? ??? ??? ???
Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to privileges to root.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.