Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2023-38425 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges. | Unknown | N/A | Apple | |
CVE-2023-38426 | An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length. | Unknown | N/A | n/a | |
CVE-2023-38427 | An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts. | Unknown | N/A | n/a | |
CVE-2023-38428 | An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read. | Unknown | N/A | n/a | |
CVE-2023-38429 | An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access. | Unknown | N/A | n/a | |
CVE-2023-3843 | A vulnerability was found in mooSocial mooDating 1.2. It has been classified as problematic. Affected is an unknown function of the file /matchmakings/question of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-235194 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | Unknown | N/A | mooSocial | |
CVE-2023-38430 | An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read. | Unknown | N/A | n/a | |
CVE-2023-38431 | An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read. | Unknown | N/A | n/a | |
CVE-2023-38432 | An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read. | Unknown | N/A | n/a | |
CVE-2023-38433 | Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007. | Unknown | N/A | Fujitsu Limited | |
CVE-2023-38434 | xHTTP 72f812d has a double free in close_connection in xhttp.c via a malformed HTTP request method. | Unknown | N/A | n/a | |
CVE-2023-38435 | An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Apache Felix Healthcheck Webconsole Plugin version 2.0.2 and prior may allow an attacker to perform a reflected cross-site scripting (XSS) attack. Upgrade to Apache Felix Healthcheck Webconsole Plugin 2.1.0 or higher. | Unknown | N/A | Apache Software Foundation | |
CVE-2023-38436 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38437 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38438 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38439 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-3844 | A vulnerability was found in mooSocial mooDating 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /friends of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235195. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | Unknown | N/A | mooSocial | |
CVE-2023-38440 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38441 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38442 | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38443 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38444 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38445 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38446 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38447 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38448 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38449 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-3845 | A vulnerability was found in mooSocial mooDating 1.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /friends/ajax_invite of the component URL Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235196. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | Unknown | N/A | mooSocial | |
CVE-2023-38450 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38451 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38452 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38453 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38454 | In vowifi service, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38455 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38456 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38457 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38458 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38459 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-3846 | A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235197 was assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | Unknown | N/A | mooSocial | |
CVE-2023-38460 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38461 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38462 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38463 | In vowifiservice, there is a possible missing permission check.This could lead to local denial of service with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38464 | In vowifiservice, there is a possible missing permission check.This could lead to local escalation of privilege with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38465 | In ims service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38466 | In ims service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38467 | In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38468 | In urild service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed | Unknown | N/A | Unisoc (Shanghai) Technologies Co., Ltd. | |
CVE-2023-38469 | A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record. | Unknown | N/A | n/a | |
CVE-2023-3847 | A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-235198 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | Unknown | N/A | mooSocial | |
CVE-2023-38470 | A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function. | Unknown | N/A | n/a | |
CVE-2023-38471 | A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function. | Unknown | N/A | n/a | |
CVE-2023-38472 | A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function. | Unknown | N/A | n/a | |
CVE-2023-38473 | A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function. | Unknown | N/A | n/a | |
CVE-2023-38474 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Campaign Monitor Campaign Monitor for WordPress allows Reflected XSS.This issue affects Campaign Monitor for WordPress: from n/a through 2.8.12. | Unknown | N/A | Campaign Monitor | |
CVE-2023-38476 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in SuiteDash :: ONE Dashboard® Client Portal : SuiteDash Direct Login plugin <= 1.7.6 versions. | Unknown | N/A | SuiteDash :: ONE Dashboard® | |
CVE-2023-38478 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for WooCommerce and QuickBooks.This issue affects Integration for WooCommerce and QuickBooks: from n/a through 1.2.3. | Unknown | N/A | CRM Perks | |
CVE-2023-3848 | A vulnerability, which was classified as problematic, has been found in mooSocial mooDating 1.2. This issue affects some unknown processing of the file /users/view of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235199. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | Unknown | N/A | mooSocial | |
CVE-2023-38481 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for WooCommerce and Zoho CRM, Books, Invoice, Inventory, Bigin.This issue affects Integration for WooCommerce and Zoho CRM, Books, Invoice, Inventory, Bigin: from n/a before 1.3.7. | Unknown | N/A | CRM Perks | |
CVE-2023-38482 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in QualityUnit Post Affiliate Pro plugin <= 1.25.0 versions. | Unknown | N/A | QualityUnit | |
CVE-2023-38484 | Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-38485 | Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-38486 | A vulnerability in the secure boot implementation on affected Aruba 9200 and 9000 Series Controllers and Gateways allows an attacker to bypass security controls which would normally prohibit unsigned kernel images from executing. An attacker can use this vulnerability to execute arbitrary runtime operating systems, including unverified and unsigned OS images. | Unknown | N/A | Hewlett Packard Enterprise (HPE) | |
CVE-2023-38487 | HedgeDoc is software for creating real-time collaborative markdown notes. Prior to version 1.9.9, the API of HedgeDoc 1 can be used to create notes with an alias matching the ID of existing notes. The affected existing note can then not be accessed anymore and is effectively hidden by the new one.
When the freeURL feature is enabled (by setting the `allowFreeURL` config option or the `CMD_ALLOW_FREEURL` environment variable to `true`), any user with the appropriate permissions can create a note by making a POST request to the `/new/ |
Unknown | N/A | hedgedoc | |
CVE-2023-38488 | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to update a Kirby content file (e.g. via a contact or comment form). Kirby sites are *not* affected if they don't allow write access for untrusted users or visitors. A field injection in a content storage implementation is a type of vulnerability that allows attackers with content write access to overwrite content fields that the site developer didn't intend to be modified. In a Kirby site this can be used to alter site content, break site behavior or inject malicious data or code. The exact security risk depends on the field type and usage. Kirby stores content of the site, of pages, files and users in text files by default. The text files use Kirby's KirbyData format where each field is separated by newlines and a line with four dashes (`----`). When reading a KirbyData file, the affected code first removed the Unicode BOM sequence from the file contents and afterwards split the content into fields by the field separator. When writing to a KirbyData file, field separators in field data are escaped to prevent user input from interfering with the field structure. However this escaping could be tricked by including a Unicode BOM sequence in a field separator (e.g. `--\xEF\xBB\xBF--`). When writing, this was not detected as a separator, but because the BOM was removed during reading, it could be abused by attackers to inject other field data into content files. Because each field can only be defined once per content file, this vulnerability only affects fields in the content file that were defined above the vulnerable user-writable field or not at all. Fields that are defined below the vulnerable field override the injected field content and were therefore already protected. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have fixed the affected code to only remove the Unicode BOM sequence at the beginning of the file. This fixes this vulnerability both for newly written as well as for existing content files. | Unknown | N/A | getkirby | |
CVE-2023-38489 | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be abused if a Kirby user is logged in on a device or browser that is shared with potentially untrusted users or if an attacker already maliciously used a previous password to log in to a Kirby site as the affected user. Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization. In the variation described in this advisory, it allows attackers to stay logged in to a Kirby site on another device even if the logged in user has since changed their password. Kirby did not invalidate user sessions that were created with a password that was since changed by the user or by a site admin. If a user changed their password to lock out an attacker who was already in possession of the previous password or of a login session on another device or browser, the attacker would not be reliably prevented from accessing the Kirby site as the affected user. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have updated the authentication implementation to keep track of the hashed password in each active session. If the password changed since the login, the session is invalidated. To enforce this fix even if the vulnerability was previously abused, all users are logged out from the Kirby site after updating to one of the patched releases. | Unknown | N/A | getkirby | |
CVE-2023-3849 | A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-235200. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | Unknown | N/A | mooSocial | |
CVE-2023-38490 | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 only affects Kirby sites that use the `Xml` data handler (e.g. `Data::decode($string, 'xml')`) or the `Xml::parse()` method in site or plugin code. The Kirby core does not use any of the affected methods. XML External Entities (XXE) is a little used feature in the XML markup language that allows to include data from external files in an XML structure. If the name of the external file can be controlled by an attacker, this becomes a vulnerability that can be abused for various system impacts like the disclosure of internal or confidential data that is stored on the server (arbitrary file disclosure) or to perform network requests on behalf of the server (server-side request forgery, SSRF). Kirby's `Xml::parse()` method used PHP's `LIBXML_NOENT` constant, which enabled the processing of XML external entities during the parsing operation. The `Xml::parse()` method is used in the `Xml` data handler (e.g. `Data::decode($string, 'xml')`). Both the vulnerable method and the data handler are not used in the Kirby core. However they may be used in site or plugin code, e.g. to parse RSS feeds or other XML files. If those files are of an external origin (e.g. uploaded by a user or retrieved from an external URL), attackers may be able to include an external entity in the XML file that will then be processed in the parsing process. Kirby sites that don't use XML parsing in site or plugin code are *not* affected. The problem has been patched in Kirby 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6. In all of the mentioned releases, the maintainers have removed the `LIBXML_NOENT` constant as processing of external entities is out of scope of the parsing logic. This protects all uses of the method against the described vulnerability. | Unknown | N/A | getkirby | |
CVE-2023-38491 | Kirby is a content management system. A vulnerability in versions prior to 3.5.8.3, 3.6.6.3, 3.7.5.2, 3.8.4.1, and 3.9.6 affects all Kirby sites that might have potential attackers in the group of authenticated Panel users or that allow external visitors to upload an arbitrary file to the content folder. Kirby sites are not affected if they don't allow file uploads for untrusted users or visitors or if the file extensions of uploaded files are limited to a fixed safe list. The attack requires user interaction by another user or visitor and cannot be automated. An editor with write access to the Kirby Panel could upload a file with an unknown file extension like `.xyz` that contains HTML code including harmful content like ` |