CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-40984 | A reflected cross-site scripting (XSS) vulnerability in the File Manager function of Webmin v2.100 allows attackers to execute malicious scripts via injecting a crafted payload into the Replace in Results file. | http://webmin.com | 2023-08-22T00:00:00 | 2023-09-15T00:00:00 | 2023-09-15T00:46:32.383216 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40087 | In transcodeQ*ToFloat of btif_avrcp_audio_track.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/modules/Bluetooth/+/243fdf1c0d53bda9e829b4bec9f7c2a824b4d3d1 | 2023-08-09T02:29:29.982Z | 2023-12-04T22:40:52.488Z | 2023-12-22T00:16:48.976Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'} |
CVE-2023-40438 | An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14, iOS 16.7 and iPadOS 16.7. An app may be able to access edited photos saved to a temporary directory. | https://support.apple.com/en-us/HT213927 | 2023-08-14T20:26:36.261Z | 2024-01-10T22:03:50.347Z | 2024-01-10T22:03:50.347Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40068 | Cross-site scripting vulnerability in Advanced Custom Fields versions 6.1.0 to 6.1.7 and Advanced Custom Fields Pro versions 6.1.0 to 6.1.7 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product with the administrative privilege. | https://www.advancedcustomfields.com/blog/acf-6-1-8/ | 2023-08-09T02:20:30.651Z | 2023-08-21T08:13:50.271Z | 2023-08-21T08:13:50.271Z | {'Vendor': 'WP Engine', 'Product': 'Advanced Custom Fields', 'Versions': 'versions 6.1.0 to 6.1.7'} |
CVE-2023-40592 | In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance. | https://advisory.splunk.com/advisories/SVD-2023-0801 | 2023-08-16T22:07:52.837Z | 2023-08-30T16:19:38.525Z | 2024-01-24T18:30:04.670Z | {'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'} |
CVE-2023-40341 | A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.27.5 and earlier allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job. | https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116 | 2023-08-14T16:02:56.435Z | 2023-08-16T14:32:52.615Z | 2023-10-24T12:51:25.170Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Blue Ocean Plugin', 'Versions': '1.27.5.1, 1.27.4.1'} |
CVE-2023-40711 | Veilid before 0.1.9 does not check the size of uncompressed data during decompression upon an envelope receipt, which allows remote attackers to cause a denial of service (out-of-memory abort) via crafted packet data, as exploited in the wild in August 2023. | https://gitlab.com/veilid/veilid/-/blob/main/CHANGELOG.md | 2023-08-20T00:00:00 | 2023-08-20T00:00:00 | 2023-08-20T00:07:09.267619 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40204 | Unrestricted Upload of File with Dangerous Type vulnerability in Premio Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager.This issue affects Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager: from n/a through 2.9.2.
| https://patchstack.com/database/vulnerability/folders/wordpress-folders-plugin-2-9-2-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-08-10T11:31:18.459Z | 2023-12-20T18:41:38.061Z | 2023-12-20T18:41:38.061Z | {'Vendor': 'Premio', 'Product': 'Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager', 'Versions': 'n/a'} |
CVE-2023-40654 | In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.635Z | 2023-10-08T03:36:04.923Z | 2023-10-08T03:36:04.923Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11'} |
CVE-2023-40896 | Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind. | https://github.com/peris-navince/founded-0-days/blob/main/ac8/SetIpMacBind/1.md | 2023-08-22T00:00:00 | 2023-08-24T00:00:00 | 2023-08-24T17:09:38.991855 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40195 | Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider.
When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users.
To view the warning in the docs please visit https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
| https://github.com/apache/airflow/pull/33233 | 2023-08-10T09:26:47.223Z | 2023-08-28T07:50:01.211Z | 2023-08-28T07:50:01.211Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow Spark Provider', 'Versions': '0'} |
CVE-2023-40253 | Improper Authentication vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Authentication Abuse.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.
| https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html | 2023-08-11T01:54:13.646Z | 2023-08-11T05:34:48.443Z | 2023-08-29T01:46:04.743Z | {'Vendor': 'Genians', 'Product': 'Genian NAC V4.0', 'Versions': 'V4.0.0'} |
CVE-2023-40044 |
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
| https://www.progress.com/ws_ftp | 2023-08-08T19:44:41.112Z | 2023-09-27T14:48:08.190Z | 2023-09-27T15:19:04.776Z | {'Vendor': 'Progress Software Corporation', 'Product': 'WS_FTP Server', 'Versions': '8.8.0, 8.7.0'} |
CVE-2023-40414 | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10, iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary code execution. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.257Z | 2024-01-10T22:03:51.215Z | 2024-01-10T22:03:51.215Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40101 | In collapse of canonicalize_md.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | https://source.android.com/docs/security/bulletin/android-14 | 2023-08-09T02:29:30.483Z | 2023-10-30T17:01:39.631Z | 2023-10-30T17:01:39.631Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'} |
CVE-2023-40802 | The get_parentControl_list_Info function does not verify the parameters entered by the user, causing a post-authentication heap overflow vulnerability in Tenda AC23 v16.03.07.45_cn | https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/get_parentControl_list_Info | 2023-08-22T00:00:00 | 2023-08-25T00:00:00 | 2023-08-25T14:52:07.433822 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40443 | The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to gain root privileges. | https://support.apple.com/en-us/HT213938 | 2023-08-14T20:26:36.262Z | 2023-09-26T20:15:02.234Z | 2023-09-26T20:15:02.234Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40013 | SVG Loader is a javascript library that fetches SVGs using XMLHttpRequests and injects the SVG code in the tag's place. According to the docs, svg-loader will strip all JS code before injecting the SVG file for security reasons but the input sanitization logic is not sufficient and can be trivially bypassed. This allows an attacker to craft a malicious SVG which can result in Cross-site Scripting (XSS). When trying to sanitize the svg the lib removes event attributes such as `onmouseover`, `onclick` but the list of events is not exhaustive. Any website which uses external-svg-loader and allows its users to provide svg src, upload svg files would be susceptible to stored XSS attack. This issue has been addressed in commit `d3562fc08` which is included in releases from 1.6.9. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8 | 2023-08-08T13:46:25.241Z | 2023-08-14T20:10:24.585Z | 2023-08-14T20:10:24.585Z | {'Vendor': 'shubhamjain', 'Product': 'svg-loader', 'Versions': '< 1.6.9'} |
CVE-2023-40455 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:56:10.375Z | 2023-09-26T20:15:02.735Z | 2023-09-26T20:15:02.735Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40140 | In android_view_InputDevice_create of android_view_InputDevice.cpp, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/frameworks/base/+/2d88a5c481df8986dbba2e02c5bf82f105b36243 | 2023-08-09T02:29:36.075Z | 2023-10-27T20:22:59.679Z | 2023-10-27T20:22:59.679Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40843 | Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "sub_73004." | https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/8/8.md | 2023-08-22T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T16:31:28.843293 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40639 | In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges | https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074 | 2023-08-18T02:28:08.632Z | 2023-10-08T03:36:00.240Z | 2023-10-08T03:36:00.240Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10'} |
CVE-2023-40402 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to access sensitive user data. | https://support.apple.com/en-us/HT213940 | 2023-08-14T20:26:36.254Z | 2023-09-26T20:15:03.254Z | 2023-09-26T20:15:03.254Z | {'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'} |
CVE-2023-40052 |
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0
.
An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests.
| https://www.progress.com/openedge | 2023-08-08T19:44:41.113Z | 2024-01-18T15:11:51.468Z | 2024-01-18T16:05:57.443Z | {'Vendor': 'Progress Software Corporation', 'Product': 'OpenEdge', 'Versions': '11.7.0, 12.2.0, Innovation Releases'} |
CVE-2023-40814 | OpenCRX version 5.2.0 is vulnerable to HTML injection via the Accounts Name Field. | https://www.esecforte.com/cve-2023-40814-html-injection-accounts/ | 2023-08-22T00:00:00 | 2023-11-18T00:00:00 | 2023-11-18T03:12:06.759357 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-40547 | A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. | https://access.redhat.com/security/cve/CVE-2023-40547 | 2023-08-15T20:04:15.615Z | 2024-01-25T15:54:23.102Z | 2024-01-25T15:54:23.102Z | {'Vendor': 'n/a', 'Product': 'shim', 'Versions': '15.8'} |
CVE-2023-40117 | In resetSettingsLocked of SettingsProvider.java, there is a possible lockscreen bypass due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | https://android.googlesource.com/platform/packages/apps/Settings/+/11815817de2f2d70fe842b108356a1bc75d44ffb | 2023-08-09T02:29:31.890Z | 2023-10-27T20:22:56.374Z | 2023-10-27T20:22:56.374Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'} |
CVE-2023-40394 | The issue was addressed with improved validation of environment variables. This issue is fixed in iOS 16.6 and iPadOS 16.6. An app may be able to access sensitive user data. | https://support.apple.com/en-us/HT213841 | 2023-08-14T20:26:36.253Z | 2024-01-10T22:03:53.741Z | 2024-01-10T22:03:53.741Z | {'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'} |
CVE-2023-40681 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Groundhogg Inc. Groundhogg plugin <= 2.7.11.10 versions. | https://patchstack.com/database/vulnerability/groundhogg/wordpress-groundhogg-plugin-2-7-11-10-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-08-18T15:18:28.338Z | 2023-10-31T09:48:14.830Z | 2023-10-31T09:48:14.830Z | {'Vendor': 'Groundhogg Inc.', 'Product': 'Groundhogg', 'Versions': 'n/a'} |
CVE-2023-31169 |
An Improper Handling of Unicode Encoding vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:20:01.608Z | 2023-08-31T15:30:23.541Z | 2023-08-31T15:30:23.541Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5030 acSELerator QuickSet Software', 'Versions': '0'} |
CVE-2023-31186 | Avaya IX Workforce Engagement v15.2.7.1195 - User Enumeration - Observable Response Discrepancy | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-04-24T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'Avaya', 'Product': 'IX Workforce Engagement', 'Versions': 'Update to the latest version'} |
CVE-2023-31610 | An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1118 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31240 |
Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | 2023-04-26T19:18:23.304Z | 2023-05-22T19:58:48.755Z | 2023-05-22T19:58:48.755Z | {'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'} |
CVE-2023-31997 | UniFi OS 3.1 introduces a misconfiguration on consoles running UniFi Network that allows users on a local network to access MongoDB. Applicable Cloud Keys that are both (1) running UniFi OS 3.1 and (2) hosting the UniFi Network application. "Applicable Cloud Keys" include the following: Cloud Key Gen2 and Cloud Key Gen2 Plus.
| https://community.ui.com/releases/Security-Advisory-Bulletin-032-032/e57301f4-4f5e-4d9f-90bc-71f1923ed7a4 | 2023-05-01T01:00:12.219Z | 2023-06-30T23:39:29.425Z | 2023-06-30T23:39:29.425Z | {'Vendor': 'Ubiquiti Inc.', 'Product': 'UniFi OS', 'Versions': '3.1.13'} |
CVE-2023-31094 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lauri Karisola / WP Trio Stock Sync for WooCommerce plugin <= 2.4.0 versions. | https://patchstack.com/database/vulnerability/stock-sync-for-woocommerce/wordpress-stock-sync-for-woocommerce-plugin-2-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-24T05:43:49.922Z | 2023-08-18T12:50:58.025Z | 2023-08-18T12:50:58.025Z | {'Vendor': 'Lauri Karisola / WP Trio', 'Product': 'Stock Sync for WooCommerce', 'Versions': 'n/a'} |
CVE-2023-31581 | Dromara Sureness before v1.0.8 was discovered to use a hardcoded key. | https://github.com/dromara/sureness/issues/164 | 2023-04-29T00:00:00 | 2023-10-24T00:00:00 | 2023-10-24T22:17:16.498479 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31702 | SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution on database server via GetUserCurrentPwd?UsrId=1. | https://github.com/sahiloj/CVE-2023-31702/blob/main/README.md | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31217 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in MyTechTalky User Location and IP plugin <= 1.6 versions. | https://patchstack.com/database/vulnerability/user-location-and-ip/wordpress-user-location-and-ip-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-25T12:01:56.446Z | 2023-10-18T12:47:54.712Z | 2023-10-18T12:47:54.712Z | {'Vendor': 'MyTechTalky', 'Product': 'User Location and IP', 'Versions': 'n/a'} |
CVE-2023-31128 | NextCloud Cookbook is a recipe library app. Prior to commit a46d9855 on the `master` branch and commit 489bb744 on the `main-0.9.x` branch, the `pull-checks.yml` workflow is vulnerable to command injection attacks because of using an untrusted `github.head_ref` field. The `github.head_ref` value is an attacker-controlled value. Assigning the value to `zzz";echo${IFS}"hello";#` can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. This issue is fixed in commit a46d9855 on the `master` branch and commit 489bb744 on the `main-0.9.x` branch. There is no risk for the user of the app within the NextCloud server. This only affects the main repository and possible forks of it. Those who have forked the NextCloud Cookbook repository should make sure their forks are on the latest version to prevent code injection attacks and similar. | https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h | 2023-04-24T21:44:10.416Z | 2023-05-26T21:49:06.582Z | 2023-05-26T21:49:06.582Z | {'Vendor': 'nextcloud', 'Product': 'cookbook', 'Versions': 'master < a46d9855, main-0.9.x < 489bb744'} |
CVE-2023-31082 | An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel. | https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A%40mail.gmail.com/ | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-09-29T21:06:22.214581 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31981 | Sngrep v1.6.0 was discovered to contain a stack buffer overflow via the function packet_set_payload at /src/packet.c. | https://github.com/irontec/sngrep/issues/430 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31597 | An issue in Zammad v5.4.0 allows attackers to bypass e-mail verification using an arbitrary address and manipulate the data of the generated user. Attackers are also able to gain unauthorized access to existing tickets. | https://zammad.com/de/advisories/zaa-2023-03 | 2023-04-29T00:00:00 | 2023-05-18T00:00:00 | 2023-05-18T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31714 | Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities. | https://github.com/waqaskanju/Chitor-CMS/commit/69d34420ad382c91b0c285432418c1b0810128c1 | 2023-04-29T00:00:00 | 2023-08-30T00:00:00 | 2023-08-30T21:49:10.672770 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31485 | GitLab::API::v4 through 0.26 does not verify TLS certificates when connecting to a GitLab server, enabling machine-in-the-middle attacks. | https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/ | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | 2023-05-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31190 | DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an Improper Authentication vulnerability during the firmware update procedure.
Specifically, the firmware update procedure ignores and does not check the validity of the TLS certificate of the HTTPS endpoint from which the firmware update package (.tar.bz2 file) is downloaded.
An attacker with the ability to put himself in a Man-in-the-Middle situation (e.g., DNS poisoning, ARP poisoning, control of a node on the route to the endpoint, etc.) can trick the DroneScout ds230 to install a crafted malicious firmware update containing arbitrary files (e.g., executable and configuration) and gain administrative (root) privileges on the underlying Linux operating system.
This issue affects DroneScout ds230 firmware from version 20211210-1627 through 20230329-1042.
| https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-31190/ | 2023-05-04T14:37:53.626Z | 2023-07-11T08:43:25.187Z | 2023-07-11T08:43:25.187Z | {'Vendor': 'bluemark', 'Product': 'ds230', 'Versions': '20211210-1627'} |
CVE-2023-31893 | Telefnica Brasil Vivo Play (IPTV) Firmware: 2023.04.04.01.06.15 is vulnerable to Denial of Service (DoS) via DNS Recursion. | https://www.cert.br/docs/whitepapers/dns-recursivo-aberto/ | 2023-04-29T00:00:00 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31939 | SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the costomer_id parameter at customer_edit.php. | https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug4-SQL-Injection-costomer_id.md | 2023-04-29T00:00:00 | 2023-08-17T00:00:00 | 2023-08-17T19:37:06.876497 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31606 | A Regular Expression Denial of Service (ReDoS) issue was discovered in the sanitize_html function of redcloth gem v4.0.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload. | https://github.com/jgarber/redcloth/issues/73 | 2023-04-29T00:00:00 | 2023-06-06T00:00:00 | 2024-01-10T14:06:16.080766 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31411 | A remote unprivileged attacker can modify and access configuration settings on the EventCam App due to the absence of API authentication. The lack of authentication in the API allows the attacker to potentially compromise the functionality of the EventCam App. | https://sick.com/psirt | 2023-04-27T18:35:47.418Z | 2023-06-19T14:59:30.206Z | 2023-06-19T14:59:30.206Z | {'Vendor': 'SICK AG', 'Product': 'EventCam App', 'Versions': 'all versions'} |
CVE-2023-31041 | An issue was discovered in SysPasswordDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. System password information could optionally be stored in cleartext, which might lead to possible information disclosure. | https://www.insyde.com/security-pledge/SA-2023047 | 2023-04-23T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31942 | Cross Site Scripting vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the description parameter in insert.php. | https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug9-XSS-description.md | 2023-04-29T00:00:00 | 2023-08-17T00:00:00 | 2023-08-17T19:36:18.672126 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31807 | Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via a crafted payload to the personal notes function. | http://chamilo.com | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31554 | null | null | 2023-04-29T00:00:00 | 2023-05-10T00:00:00 | 2023-07-21T21:36:59.674Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-31016 | NVIDIA GPU Display Driver for Windows contains a vulnerability where an uncontrolled search path element may allow an attacker to execute arbitrary code, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. | https://nvidia.custhelp.com/app/answers/detail/a_id/5491 | 2023-04-22T02:38:25.654Z | 2023-11-02T18:36:43.382Z | 2023-11-02T18:36:43.382Z | {'Vendor': 'nvidia', 'Product': 'NVIDIA GPU Display driver, vGPU driver, and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'} |
CVE-2023-31446 | In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup. | https://www.cassianetworks.com | 2023-04-28T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T02:12:53.145302 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31153 | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:04.958Z | 2023-05-10T19:22:06.307Z | 2023-05-10T19:22:06.307Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'} |
CVE-2023-31295 | CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the User Profile field. | https://herolab.usd.de/en/security-advisories/usd-2022-0053/ | 2023-04-27T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T05:52:25.796346 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31450 | A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L | https://www.paessler.com/prtg/history/stable | 2023-04-28T00:00:00 | 2023-08-09T00:00:00 | 2023-08-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31903 | GuppY CMS 6.00.10 is vulnerable to Unrestricted File Upload which allows remote attackers to execute arbitrary code by uploading a php file. | https://www.exploit-db.com/exploits/51052 | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31145 | Collabora Online is a collaborative online office suite based on LibreOffice technology. This vulnerability report describes a reflected XSS vulnerability with full CSP bypass in Nextcloud installations using the recommended bundle. The vulnerability can be exploited to perform a trivial account takeover attack. The vulnerability allows attackers to inject malicious code into web pages, which can be executed in the context of the victim's browser session. This means that an attacker can steal sensitive data, such as login credentials or personal information, or perform unauthorized actions on behalf of the victim, such as modifying or deleting data. In this specific case, the vulnerability allows for a trivial account takeover attack. An attacker can exploit the vulnerability to inject code into the victim's browser session, allowing the attacker to take over the victim's account without their knowledge or consent. This can lead to unauthorized access to sensitive information and data, as well as the ability to perform actions on behalf of the victim. Furthermore, the fact that the vulnerability bypasses the Content Security Policy (CSP) makes it more dangerous, as CSP is an important security mechanism used to prevent cross-site scripting attacks. By bypassing CSP, attackers can circumvent the security measures put in place by the web application and execute their malicious code. This issue has been patched in versions 22.05.13, 21.11.9, and 6.4.27. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/CollaboraOnline/online/security/advisories/GHSA-rqj2-2c2x-gjmm | 2023-04-24T21:44:10.418Z | 2023-05-15T20:58:32.479Z | 2023-05-15T20:58:32.479Z | {'Vendor': 'CollaboraOnline', 'Product': 'online', 'Versions': '< 6.4.27, >= 21.0.0, < 21.11.9, >= 22.0.0, < 22.05.13'} |
CVE-2023-31779 | Wekan v6.84 and earlier is vulnerable to Cross Site Scripting (XSS). An attacker with user privilege on kanban board can insert JavaScript code in in "Reaction to comment" feature. | https://github.com/wekan/wekan/blob/master/CHANGELOG.md | 2023-04-29T00:00:00 | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31407 | SAP Business Planning and Consolidation - versions 740, 750, allows an authorized attacker to upload a malicious file, resulting in Cross-Site Scripting vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.
| https://launchpad.support.sap.com/#/notes/3312892 | 2023-04-27T18:29:50.456Z | 2023-05-09T01:37:53.404Z | 2023-05-09T01:37:53.404Z | {'Vendor': 'SAP_SE', 'Product': 'SAP Business Planning and Consolidation', 'Versions': '740, 750'} |
CVE-2023-31759 | Weak Security in the 433MHz keyfob of Kerui W18 Alarm System v1.0 allows attackers to gain full access via a code replay attack. | https://ashallen.net/wireless-alarm-system-vulnerability-disclosure | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31165 |
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:33.137Z | 2023-05-10T19:25:34.186Z | 2023-05-10T19:25:34.186Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'} |
CVE-2023-31470 | SmartDNS through 41 before 56d0332 allows an out-of-bounds write because of a stack-based buffer overflow in the _dns_encode_domain function in the dns.c file, via a crafted DNS request. | https://github.com/pymumu/smartdns/issues/1378 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31020 | NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause improper access control, which may lead to denial of service or data tampering. | https://nvidia.custhelp.com/app/answers/detail/a_id/5491 | 2023-04-22T02:38:27.189Z | 2023-11-02T18:56:21.202Z | 2023-11-02T18:56:21.202Z | {'Vendor': 'nvidia', 'Product': 'NVIDIA GPU Display driver, vGPU driver, and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'} |
CVE-2023-31923 | Suprema BioStar 2 before 2022 Q4, v2.9.1 has Insecure Permissions. A vulnerability in the web application allows an authenticated attacker with "User Operator" privileges to create a highly privileged user account. The vulnerability is caused by missing server-side validation, which can be exploited to gain full administrator privileges on the system. | https://nobugescapes.com/blog/creating-a-new-user-with-admin-privilege/ | 2023-04-29T00:00:00 | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31132 | Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
| https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876 | 2023-04-24T21:44:10.416Z | 2023-09-05T21:19:22.831Z | 2023-09-05T21:19:22.831Z | {'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '< 1.2.25'} |
CVE-2023-31098 | Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.6.0.
When users change their password to a simple password (with any character or
symbol), attackers can easily guess the user's password and access the account.
Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 https://github.com/apache/inlong/pull/7805 to solve it.
| https://lists.apache.org/thread/1fvloc3no1gbffzrcsx9ltsg08wr2d1w | 2023-04-24T06:13:00.131Z | 2023-05-22T15:31:53.989Z | 2023-05-22T15:31:53.989Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.1.0'} |
CVE-2023-31974 | yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c. | https://github.com/yasm/yasm/issues/208 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31077 | Cross-Site Request Forgery (CSRF) vulnerability in ReCorp Export WP Page to Static HTML/CSS plugin <= 2.1.9 versions. | https://patchstack.com/database/vulnerability/export-wp-page-to-static-html/wordpress-export-wp-page-to-static-html-css-plugin-2-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-04-24T05:42:59.932Z | 2023-11-10T13:36:15.359Z | 2023-11-10T13:36:15.359Z | {'Vendor': 'ReCorp', 'Product': 'Export WP Page to Static HTML/CSS', 'Versions': 'n/a'} |
CVE-2023-31427 |
Brocade Fabric OS versions before Brocade Fabric OS v9.1.1c, and v9.2.0 Could allow an authenticated, local user with knowledge of full path names inside Brocade Fabric OS to execute any command regardless of assigned privilege. Starting with Fabric OS v9.1.0, “root” account access is disabled.
| https://support.broadcom.com/external/content/SecurityAdvisories/0/22379 | 2023-04-28T00:14:58.125Z | 2023-08-01T22:46:17.756Z | 2023-08-01T23:03:22.805Z | {'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'after 9.1.0 and before Brocade Fabric OS v9.2.0 and v9.1.1c'} |
CVE-2023-31718 | FUXA <= 1.1.12 is vulnerable to Local via Inclusion via /api/download. | https://github.com/frangoteam/FUXA | 2023-04-29T00:00:00 | 2023-09-21T00:00:00 | 2023-09-21T23:05:22.915178 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31124 | c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
| https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4 | 2023-04-24T21:44:10.415Z | 2023-05-25T21:09:31.881Z | 2023-05-25T21:09:31.881Z | {'Vendor': 'c-ares', 'Product': 'c-ares', 'Versions': '< 1.19.1'} |
CVE-2023-31431 | A buffer overflow vulnerability in “diagstatus” command in Brocade Fabric OS before Brocade Fabric v9.2.0 and v9.1.1c could allow an authenticated user to crash the Brocade Fabric OS switch leading to a denial of service.
| https://support.broadcom.com/external/content/SecurityAdvisories/0/22384 | 2023-04-28T00:14:58.125Z | 2023-08-01T23:23:18.522Z | 2023-08-01T23:23:18.522Z | {'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'before Brocade Fabric OS v9.1.1c, v9.2.0'} |
CVE-2023-31061 | Repetier Server through 1.4.10 does not have CSRF protection. | https://cybir.com/2023/cve/poc-repetier-server-140/ | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31489 | An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function. | https://github.com/FRRouting/frr/issues/13098 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-11-15T05:07:08.873431 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31173 | Use of Hard-coded Credentials vulnerability in Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator on Windows allows Authentication Bypass.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:20:01.609Z | 2023-08-31T15:30:58.262Z | 2023-08-31T15:30:58.262Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5037 SEL Grid Configurator', 'Versions': '0'} |
CVE-2023-31935 | Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the emial parameter of admin-profile.php. | https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md | 2023-04-29T00:00:00 | 2023-07-28T00:00:00 | 2023-07-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31036 | NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. | https://nvidia.custhelp.com/app/answers/detail/a_id/5509 | 2023-04-22T02:38:33.414Z | 2024-01-12T17:11:38.579Z | 2024-01-12T17:11:38.579Z | {'Vendor': 'nvidia', 'Product': 'Triton Inference Server', 'Versions': 'All versions prior to 2.40'} |
CVE-2023-31466 | An XSS issue was discovered in FSMLabs TimeKeeper 8.0.17. On the "Configuration -> Compliance -> Add a new compliance report" and "Configuration -> Timekeeper Configuration -> Add a new source there" screens, there are entry points to inject JavaScript code. | https://fsmlabs.com/fsmlabs-cybersecurity/ | 2023-04-28T00:00:00 | 2023-07-26T00:00:00 | 2023-07-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31671 | PrestaShop postfinance <= 17.1.13 is vulnerable to SQL Injection via PostfinanceValidationModuleFrontController::postProcess(). | https://shop.webbax.ch/modules-de-paiement/123-module-postfinance.html | 2023-04-29T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31221 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ransom Christofferson PDQ CSV plugin <= 1.0.0 versions. | https://patchstack.com/database/vulnerability/pdq-csv/wordpress-pdq-csv-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-25T12:01:56.446Z | 2023-08-08T12:46:59.765Z | 2023-08-08T12:46:59.765Z | {'Vendor': 'Ransom Christofferson', 'Product': 'PDQ CSV', 'Versions': 'n/a'} |
CVE-2023-31626 | An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1129 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31299 | Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code via the Barcode field of a container. | https://herolab.usd.de/en/security-advisories/usd-2022-0055/ | 2023-04-27T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T04:13:28.159491 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31763 | Weak security in the transmitter of AGShome Smart Alarm v1.0 allows attackers to gain full access to the system via a code replay attack. | https://ashallen.net/wireless-alarm-system-vulnerability-disclosure | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31919 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c. | https://github.com/jerryscript-project/jerryscript/issues/5069 | 2023-04-29T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31630 | An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1138 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31149 |
An Improper Input Validation vulnerability
in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:04.956Z | 2023-05-10T19:20:16.373Z | 2023-05-10T19:20:16.373Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R132-V0, R132-V0, R132-V0, R132-V0'} |
CVE-2023-31519 | Pharmacy Management System v1.0 was discovered to contain a SQL injection vulnerability via the email parameter at login_core.php. | https://github.com/yangliukk/Injection-Vulnerability-In-Pharmacy-Management-System-1.0/blob/main/README.md | 2023-04-29T00:00:00 | 2023-05-16T00:00:00 | 2023-05-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31237 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.9.
| https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-9-open-redirection-vulnerability?_s_id=cve | 2023-04-26T15:10:10.074Z | 2023-12-29T09:56:50.694Z | 2023-12-29T09:56:50.694Z | {'Vendor': 'Dylan James', 'Product': 'Zephyr Project Manager', 'Versions': 'n/a'} |
CVE-2023-31722 | There exists a heap buffer overflow in nasm 2.16.02rc1 (GitHub commit: b952891). | https://bugzilla.nasm.us/show_bug.cgi?id=3392857#c1 | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31236 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in unFocus Projects Scripts n Styles plugin <= 3.5.7 versions. | https://patchstack.com/database/vulnerability/scripts-n-styles/wordpress-scripts-n-styles-plugin-3-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-26T15:10:10.074Z | 2023-06-12T14:47:46.800Z | 2023-06-12T14:47:46.800Z | {'Vendor': 'unFocus Projects', 'Product': 'Scripts n Styles', 'Versions': 'n/a'} |
CVE-2023-31689 | In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution. | https://github.com/vedees/wcms/issues/15 | 2023-04-29T00:00:00 | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31723 | yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c. | https://github.com/yasm/yasm/issues/220 | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31148 | An Improper Input Validation vulnerability
in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:04.956Z | 2023-05-10T19:20:03.147Z | 2023-05-10T19:20:03.147Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R132-V0, R132-V0, R132-V0, R132-V0'} |
CVE-2023-31518 | A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file. | https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/ | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31631 | An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1137 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31918 | Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c. | https://github.com/jerryscript-project/jerryscript/issues/5064 | 2023-04-29T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31277 |
PiiGAB M-Bus transmits credentials in plaintext format.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01 | 2023-06-27T16:55:52.752Z | 2023-07-06T22:56:10.047Z | 2023-07-06T22:56:10.047Z | {'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.