CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-40984
A reflected cross-site scripting (XSS) vulnerability in the File Manager function of Webmin v2.100 allows attackers to execute malicious scripts via injecting a crafted payload into the Replace in Results file.
http://webmin.com
2023-08-22T00:00:00
2023-09-15T00:00:00
2023-09-15T00:46:32.383216
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40087
In transcodeQ*ToFloat of btif_avrcp_audio_track.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/modules/Bluetooth/+/243fdf1c0d53bda9e829b4bec9f7c2a824b4d3d1
2023-08-09T02:29:29.982Z
2023-12-04T22:40:52.488Z
2023-12-22T00:16:48.976Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14, 13, 12L, 12, 11'}
CVE-2023-40438
An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Sonoma 14, iOS 16.7 and iPadOS 16.7. An app may be able to access edited photos saved to a temporary directory.
https://support.apple.com/en-us/HT213927
2023-08-14T20:26:36.261Z
2024-01-10T22:03:50.347Z
2024-01-10T22:03:50.347Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40068
Cross-site scripting vulnerability in Advanced Custom Fields versions 6.1.0 to 6.1.7 and Advanced Custom Fields Pro versions 6.1.0 to 6.1.7 allows a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is logging in to the product with the administrative privilege.
https://www.advancedcustomfields.com/blog/acf-6-1-8/
2023-08-09T02:20:30.651Z
2023-08-21T08:13:50.271Z
2023-08-21T08:13:50.271Z
{'Vendor': 'WP Engine', 'Product': 'Advanced Custom Fields', 'Versions': 'versions 6.1.0 to 6.1.7'}
CVE-2023-40592
In Splunk Enterprise versions below 9.1.1, 9.0.6, and 8.2.12, an attacker can craft a special web request that can result in reflected cross-site scripting (XSS) on the “/app/search/table” web endpoint. Exploitation of this vulnerability can lead to the execution of arbitrary commands on the Splunk platform instance.
https://advisory.splunk.com/advisories/SVD-2023-0801
2023-08-16T22:07:52.837Z
2023-08-30T16:19:38.525Z
2024-01-24T18:30:04.670Z
{'Vendor': 'Splunk', 'Product': 'Splunk Enterprise', 'Versions': '8.2, 9.0, 9.1'}
CVE-2023-40341
A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.27.5 and earlier allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job.
https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116
2023-08-14T16:02:56.435Z
2023-08-16T14:32:52.615Z
2023-10-24T12:51:25.170Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Blue Ocean Plugin', 'Versions': '1.27.5.1, 1.27.4.1'}
CVE-2023-40711
Veilid before 0.1.9 does not check the size of uncompressed data during decompression upon an envelope receipt, which allows remote attackers to cause a denial of service (out-of-memory abort) via crafted packet data, as exploited in the wild in August 2023.
https://gitlab.com/veilid/veilid/-/blob/main/CHANGELOG.md
2023-08-20T00:00:00
2023-08-20T00:00:00
2023-08-20T00:07:09.267619
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40204
Unrestricted Upload of File with Dangerous Type vulnerability in Premio Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager.This issue affects Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager: from n/a through 2.9.2.
https://patchstack.com/database/vulnerability/folders/wordpress-folders-plugin-2-9-2-arbitrary-file-upload-vulnerability?_s_id=cve
2023-08-10T11:31:18.459Z
2023-12-20T18:41:38.061Z
2023-12-20T18:41:38.061Z
{'Vendor': 'Premio', 'Product': 'Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager', 'Versions': 'n/a'}
CVE-2023-40654
In FW-PackageManager, there is a possible missing permission check. This could lead to local escalation of privilege with System execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.635Z
2023-10-08T03:36:04.923Z
2023-10-08T03:36:04.923Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11'}
CVE-2023-40896
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.
https://github.com/peris-navince/founded-0-days/blob/main/ac8/SetIpMacBind/1.md
2023-08-22T00:00:00
2023-08-24T00:00:00
2023-08-24T17:09:38.991855
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40195
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Software Foundation Apache Airflow Spark Provider. When the Apache Spark provider is installed on an Airflow deployment, an Airflow user that is authorized to configure Spark hooks can effectively run arbitrary code on the Airflow node by pointing it at a malicious Spark server. Prior to version 4.1.3, this was not called out in the documentation explicitly, so it is possible that administrators provided authorizations to configure Spark hooks without taking this into account. We recommend administrators to review their configurations to make sure the authorization to configure Spark hooks is only provided to fully trusted users. To view the warning in the docs please visit  https://airflow.apache.org/docs/apache-airflow-providers-apache-spark/4.1.3/connections/spark.html
https://github.com/apache/airflow/pull/33233
2023-08-10T09:26:47.223Z
2023-08-28T07:50:01.211Z
2023-08-28T07:50:01.211Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Airflow Spark Provider', 'Versions': '0'}
CVE-2023-40253
Improper Authentication vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Authentication Abuse.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.
https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html
2023-08-11T01:54:13.646Z
2023-08-11T05:34:48.443Z
2023-08-29T01:46:04.743Z
{'Vendor': 'Genians', 'Product': 'Genian NAC V4.0', 'Versions': 'V4.0.0'}
CVE-2023-40044
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.  
https://www.progress.com/ws_ftp
2023-08-08T19:44:41.112Z
2023-09-27T14:48:08.190Z
2023-09-27T15:19:04.776Z
{'Vendor': 'Progress Software Corporation', 'Product': 'WS_FTP Server', 'Versions': '8.8.0, 8.7.0'}
CVE-2023-40414
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10, iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary code execution.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.257Z
2024-01-10T22:03:51.215Z
2024-01-10T22:03:51.215Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40101
In collapse of canonicalize_md.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/docs/security/bulletin/android-14
2023-08-09T02:29:30.483Z
2023-10-30T17:01:39.631Z
2023-10-30T17:01:39.631Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '14'}
CVE-2023-40802
The get_parentControl_list_Info function does not verify the parameters entered by the user, causing a post-authentication heap overflow vulnerability in Tenda AC23 v16.03.07.45_cn
https://github.com/lst-oss/Vulnerability/tree/main/Tenda/AC23/get_parentControl_list_Info
2023-08-22T00:00:00
2023-08-25T00:00:00
2023-08-25T14:52:07.433822
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40443
The issue was addressed with improved checks. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to gain root privileges.
https://support.apple.com/en-us/HT213938
2023-08-14T20:26:36.262Z
2023-09-26T20:15:02.234Z
2023-09-26T20:15:02.234Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40013
SVG Loader is a javascript library that fetches SVGs using XMLHttpRequests and injects the SVG code in the tag's place. According to the docs, svg-loader will strip all JS code before injecting the SVG file for security reasons but the input sanitization logic is not sufficient and can be trivially bypassed. This allows an attacker to craft a malicious SVG which can result in Cross-site Scripting (XSS). When trying to sanitize the svg the lib removes event attributes such as `onmouseover`, `onclick` but the list of events is not exhaustive. Any website which uses external-svg-loader and allows its users to provide svg src, upload svg files would be susceptible to stored XSS attack. This issue has been addressed in commit `d3562fc08` which is included in releases from 1.6.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/shubhamjain/svg-loader/security/advisories/GHSA-xc2r-jf2x-gjr8
2023-08-08T13:46:25.241Z
2023-08-14T20:10:24.585Z
2023-08-14T20:10:24.585Z
{'Vendor': 'shubhamjain', 'Product': 'svg-loader', 'Versions': '< 1.6.9'}
CVE-2023-40455
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions.
https://support.apple.com/en-us/HT213940
2023-08-14T20:56:10.375Z
2023-09-26T20:15:02.735Z
2023-09-26T20:15:02.735Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40140
In android_view_InputDevice_create of android_view_InputDevice.cpp, there is a possible way to execute arbitrary code due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/frameworks/base/+/2d88a5c481df8986dbba2e02c5bf82f105b36243
2023-08-09T02:29:36.075Z
2023-10-27T20:22:59.679Z
2023-10-27T20:22:59.679Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-40843
Tenda AC6 US_AC6V1.0BR_V15.03.05.16_multi_TD01.bin is vulnerable to Buffer Overflow via function "sub_73004."
https://github.com/XYIYM/Digging/blob/main/Tenda/AC6/bof/8/8.md
2023-08-22T00:00:00
2023-08-30T00:00:00
2023-08-30T16:31:28.843293
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40639
In SoundRecorder service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges
https://www.unisoc.com/en_us/secy/announcementDetail/https://www.unisoc.com/en_us/secy/announcementDetail/1707266966118531074
2023-08-18T02:28:08.632Z
2023-10-08T03:36:00.240Z
2023-10-08T03:36:00.240Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android10'}
CVE-2023-40402
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14. An app may be able to access sensitive user data.
https://support.apple.com/en-us/HT213940
2023-08-14T20:26:36.254Z
2023-09-26T20:15:03.254Z
2023-09-26T20:15:03.254Z
{'Vendor': 'Apple', 'Product': 'macOS', 'Versions': 'unspecified'}
CVE-2023-40052
This issue affects Progress Application Server (PAS) for OpenEdge in versions 11.7 prior to 11.7.18, 12.2 prior to 12.2.13, and innovation releases prior to 12.8.0 .  An attacker who can produce a malformed web request may cause the crash of a PASOE agent potentially disrupting the thread activities of many web application clients. Multiple of these DoS attacks could lead to the flooding of invalid requests as compared to the server’s remaining ability to process valid requests.
https://www.progress.com/openedge
2023-08-08T19:44:41.113Z
2024-01-18T15:11:51.468Z
2024-01-18T16:05:57.443Z
{'Vendor': 'Progress Software Corporation', 'Product': 'OpenEdge', 'Versions': '11.7.0, 12.2.0, Innovation Releases'}
CVE-2023-40814
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Accounts Name Field.
https://www.esecforte.com/cve-2023-40814-html-injection-accounts/
2023-08-22T00:00:00
2023-11-18T00:00:00
2023-11-18T03:12:06.759357
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-40547
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.
https://access.redhat.com/security/cve/CVE-2023-40547
2023-08-15T20:04:15.615Z
2024-01-25T15:54:23.102Z
2024-01-25T15:54:23.102Z
{'Vendor': 'n/a', 'Product': 'shim', 'Versions': '15.8'}
CVE-2023-40117
In resetSettingsLocked of SettingsProvider.java, there is a possible lockscreen bypass due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://android.googlesource.com/platform/packages/apps/Settings/+/11815817de2f2d70fe842b108356a1bc75d44ffb
2023-08-09T02:29:31.890Z
2023-10-27T20:22:56.374Z
2023-10-27T20:22:56.374Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': '13, 12L, 12, 11'}
CVE-2023-40394
The issue was addressed with improved validation of environment variables. This issue is fixed in iOS 16.6 and iPadOS 16.6. An app may be able to access sensitive user data.
https://support.apple.com/en-us/HT213841
2023-08-14T20:26:36.253Z
2024-01-10T22:03:53.741Z
2024-01-10T22:03:53.741Z
{'Vendor': 'Apple', 'Product': 'iOS and iPadOS', 'Versions': 'unspecified'}
CVE-2023-40681
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Groundhogg Inc. Groundhogg plugin <= 2.7.11.10 versions.
https://patchstack.com/database/vulnerability/groundhogg/wordpress-groundhogg-plugin-2-7-11-10-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-08-18T15:18:28.338Z
2023-10-31T09:48:14.830Z
2023-10-31T09:48:14.830Z
{'Vendor': 'Groundhogg Inc.', 'Product': 'Groundhogg', 'Versions': 'n/a'}
CVE-2023-31169
An Improper Handling of Unicode Encoding vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:20:01.608Z
2023-08-31T15:30:23.541Z
2023-08-31T15:30:23.541Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5030 acSELerator QuickSet Software', 'Versions': '0'}
CVE-2023-31186
Avaya IX Workforce Engagement v15.2.7.1195 - User Enumeration - Observable Response Discrepancy
https://www.gov.il/en/Departments/faq/cve_advisories
2023-04-24T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'Avaya', 'Product': 'IX Workforce Engagement', 'Versions': 'Update to the latest version'}
CVE-2023-31610
An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1118
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31240
Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01
2023-04-26T19:18:23.304Z
2023-05-22T19:58:48.755Z
2023-05-22T19:58:48.755Z
{'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'}
CVE-2023-31997
UniFi OS 3.1 introduces a misconfiguration on consoles running UniFi Network that allows users on a local network to access MongoDB. Applicable Cloud Keys that are both (1) running UniFi OS 3.1 and (2) hosting the UniFi Network application. "Applicable Cloud Keys" include the following: Cloud Key Gen2 and Cloud Key Gen2 Plus.
https://community.ui.com/releases/Security-Advisory-Bulletin-032-032/e57301f4-4f5e-4d9f-90bc-71f1923ed7a4
2023-05-01T01:00:12.219Z
2023-06-30T23:39:29.425Z
2023-06-30T23:39:29.425Z
{'Vendor': 'Ubiquiti Inc.', 'Product': 'UniFi OS', 'Versions': '3.1.13'}
CVE-2023-31094
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Lauri Karisola / WP Trio Stock Sync for WooCommerce plugin <= 2.4.0 versions.
https://patchstack.com/database/vulnerability/stock-sync-for-woocommerce/wordpress-stock-sync-for-woocommerce-plugin-2-4-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-24T05:43:49.922Z
2023-08-18T12:50:58.025Z
2023-08-18T12:50:58.025Z
{'Vendor': 'Lauri Karisola / WP Trio', 'Product': 'Stock Sync for WooCommerce', 'Versions': 'n/a'}
CVE-2023-31581
Dromara Sureness before v1.0.8 was discovered to use a hardcoded key.
https://github.com/dromara/sureness/issues/164
2023-04-29T00:00:00
2023-10-24T00:00:00
2023-10-24T22:17:16.498479
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31702
SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution on database server via GetUserCurrentPwd?UsrId=1.
https://github.com/sahiloj/CVE-2023-31702/blob/main/README.md
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31217
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in MyTechTalky User Location and IP plugin <= 1.6 versions.
https://patchstack.com/database/vulnerability/user-location-and-ip/wordpress-user-location-and-ip-plugin-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-25T12:01:56.446Z
2023-10-18T12:47:54.712Z
2023-10-18T12:47:54.712Z
{'Vendor': 'MyTechTalky', 'Product': 'User Location and IP', 'Versions': 'n/a'}
CVE-2023-31128
NextCloud Cookbook is a recipe library app. Prior to commit a46d9855 on the `master` branch and commit 489bb744 on the `main-0.9.x` branch, the `pull-checks.yml` workflow is vulnerable to command injection attacks because of using an untrusted `github.head_ref` field. The `github.head_ref` value is an attacker-controlled value. Assigning the value to `zzz";echo${IFS}"hello";#` can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. This issue is fixed in commit a46d9855 on the `master` branch and commit 489bb744 on the `main-0.9.x` branch. There is no risk for the user of the app within the NextCloud server. This only affects the main repository and possible forks of it. Those who have forked the NextCloud Cookbook repository should make sure their forks are on the latest version to prevent code injection attacks and similar.
https://github.com/nextcloud/cookbook/security/advisories/GHSA-c5pc-mf2f-xq8h
2023-04-24T21:44:10.416Z
2023-05-26T21:49:06.582Z
2023-05-26T21:49:06.582Z
{'Vendor': 'nextcloud', 'Product': 'cookbook', 'Versions': 'master < a46d9855, main-0.9.x < 489bb744'}
CVE-2023-31082
An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel.
https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A%40mail.gmail.com/
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-09-29T21:06:22.214581
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31981
Sngrep v1.6.0 was discovered to contain a stack buffer overflow via the function packet_set_payload at /src/packet.c.
https://github.com/irontec/sngrep/issues/430
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31597
An issue in Zammad v5.4.0 allows attackers to bypass e-mail verification using an arbitrary address and manipulate the data of the generated user. Attackers are also able to gain unauthorized access to existing tickets.
https://zammad.com/de/advisories/zaa-2023-03
2023-04-29T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31714
Chitor-CMS before v1.1.2 was discovered to contain multiple SQL injection vulnerabilities.
https://github.com/waqaskanju/Chitor-CMS/commit/69d34420ad382c91b0c285432418c1b0810128c1
2023-04-29T00:00:00
2023-08-30T00:00:00
2023-08-30T21:49:10.672770
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31485
GitLab::API::v4 through 0.26 does not verify TLS certificates when connecting to a GitLab server, enabling machine-in-the-middle attacks.
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
2023-04-28T00:00:00
2023-04-28T00:00:00
2023-05-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31190
DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an Improper Authentication vulnerability during the firmware update procedure. Specifically, the firmware update procedure ignores and does not check the validity of the TLS certificate of the HTTPS endpoint from which the firmware update package (.tar.bz2 file) is downloaded. An attacker with the ability to put himself in a Man-in-the-Middle situation (e.g., DNS poisoning, ARP poisoning, control of a node on the route to the endpoint, etc.) can trick the DroneScout ds230 to install a crafted malicious firmware update containing arbitrary files (e.g., executable and configuration) and gain administrative (root) privileges on the underlying Linux operating system. This issue affects DroneScout ds230 firmware from version 20211210-1627 through 20230329-1042.
https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-31190/
2023-05-04T14:37:53.626Z
2023-07-11T08:43:25.187Z
2023-07-11T08:43:25.187Z
{'Vendor': 'bluemark', 'Product': 'ds230', 'Versions': '20211210-1627'}
CVE-2023-31893
Telefnica Brasil Vivo Play (IPTV) Firmware: 2023.04.04.01.06.15 is vulnerable to Denial of Service (DoS) via DNS Recursion.
https://www.cert.br/docs/whitepapers/dns-recursivo-aberto/
2023-04-29T00:00:00
2023-06-05T00:00:00
2023-06-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31939
SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the costomer_id parameter at customer_edit.php.
https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug4-SQL-Injection-costomer_id.md
2023-04-29T00:00:00
2023-08-17T00:00:00
2023-08-17T19:37:06.876497
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31606
A Regular Expression Denial of Service (ReDoS) issue was discovered in the sanitize_html function of redcloth gem v4.0.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
https://github.com/jgarber/redcloth/issues/73
2023-04-29T00:00:00
2023-06-06T00:00:00
2024-01-10T14:06:16.080766
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31411
A remote unprivileged attacker can modify and access configuration settings on the EventCam App due to the absence of API authentication. The lack of authentication in the API allows the attacker to potentially compromise the functionality of the EventCam App.
https://sick.com/psirt
2023-04-27T18:35:47.418Z
2023-06-19T14:59:30.206Z
2023-06-19T14:59:30.206Z
{'Vendor': 'SICK AG', 'Product': 'EventCam App', 'Versions': 'all versions'}
CVE-2023-31041
An issue was discovered in SysPasswordDxe in Insyde InsydeH2O with kernel 5.0 through 5.5. System password information could optionally be stored in cleartext, which might lead to possible information disclosure.
https://www.insyde.com/security-pledge/SA-2023047
2023-04-23T00:00:00
2023-08-14T00:00:00
2023-08-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31942
Cross Site Scripting vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the description parameter in insert.php.
https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug9-XSS-description.md
2023-04-29T00:00:00
2023-08-17T00:00:00
2023-08-17T19:36:18.672126
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31807
Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via a crafted payload to the personal notes function.
http://chamilo.com
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31554
null
null
2023-04-29T00:00:00
2023-05-10T00:00:00
2023-07-21T21:36:59.674Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-31016
NVIDIA GPU Display Driver for Windows contains a vulnerability where an uncontrolled search path element may allow an attacker to execute arbitrary code, which may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5491
2023-04-22T02:38:25.654Z
2023-11-02T18:36:43.382Z
2023-11-02T18:36:43.382Z
{'Vendor': 'nvidia', 'Product': 'NVIDIA GPU Display driver, vGPU driver, and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'}
CVE-2023-31446
In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
https://www.cassianetworks.com
2023-04-28T00:00:00
2024-01-10T00:00:00
2024-01-10T02:12:53.145302
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31153
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:04.958Z
2023-05-10T19:22:06.307Z
2023-05-10T19:22:06.307Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'}
CVE-2023-31295
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the User Profile field.
https://herolab.usd.de/en/security-advisories/usd-2022-0053/
2023-04-27T00:00:00
2023-12-29T00:00:00
2023-12-29T05:52:25.796346
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31450
A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
https://www.paessler.com/prtg/history/stable
2023-04-28T00:00:00
2023-08-09T00:00:00
2023-08-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31903
GuppY CMS 6.00.10 is vulnerable to Unrestricted File Upload which allows remote attackers to execute arbitrary code by uploading a php file.
https://www.exploit-db.com/exploits/51052
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31145
Collabora Online is a collaborative online office suite based on LibreOffice technology. This vulnerability report describes a reflected XSS vulnerability with full CSP bypass in Nextcloud installations using the recommended bundle. The vulnerability can be exploited to perform a trivial account takeover attack. The vulnerability allows attackers to inject malicious code into web pages, which can be executed in the context of the victim's browser session. This means that an attacker can steal sensitive data, such as login credentials or personal information, or perform unauthorized actions on behalf of the victim, such as modifying or deleting data. In this specific case, the vulnerability allows for a trivial account takeover attack. An attacker can exploit the vulnerability to inject code into the victim's browser session, allowing the attacker to take over the victim's account without their knowledge or consent. This can lead to unauthorized access to sensitive information and data, as well as the ability to perform actions on behalf of the victim. Furthermore, the fact that the vulnerability bypasses the Content Security Policy (CSP) makes it more dangerous, as CSP is an important security mechanism used to prevent cross-site scripting attacks. By bypassing CSP, attackers can circumvent the security measures put in place by the web application and execute their malicious code. This issue has been patched in versions 22.05.13, 21.11.9, and 6.4.27. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/CollaboraOnline/online/security/advisories/GHSA-rqj2-2c2x-gjmm
2023-04-24T21:44:10.418Z
2023-05-15T20:58:32.479Z
2023-05-15T20:58:32.479Z
{'Vendor': 'CollaboraOnline', 'Product': 'online', 'Versions': '< 6.4.27, >= 21.0.0, < 21.11.9, >= 22.0.0, < 22.05.13'}
CVE-2023-31779
Wekan v6.84 and earlier is vulnerable to Cross Site Scripting (XSS). An attacker with user privilege on kanban board can insert JavaScript code in in "Reaction to comment" feature.
https://github.com/wekan/wekan/blob/master/CHANGELOG.md
2023-04-29T00:00:00
2023-05-22T00:00:00
2023-05-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31407
SAP Business Planning and Consolidation - versions 740, 750, allows an authorized attacker to upload a malicious file, resulting in Cross-Site Scripting vulnerability. After successful exploitation, an attacker can cause limited impact on confidentiality and integrity of the application.
https://launchpad.support.sap.com/#/notes/3312892
2023-04-27T18:29:50.456Z
2023-05-09T01:37:53.404Z
2023-05-09T01:37:53.404Z
{'Vendor': 'SAP_SE', 'Product': 'SAP Business Planning and Consolidation', 'Versions': '740, 750'}
CVE-2023-31759
Weak Security in the 433MHz keyfob of Kerui W18 Alarm System v1.0 allows attackers to gain full access via a code replay attack.
https://ashallen.net/wireless-alarm-system-vulnerability-disclosure
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31165
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:33.137Z
2023-05-10T19:25:34.186Z
2023-05-10T19:25:34.186Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'}
CVE-2023-31470
SmartDNS through 41 before 56d0332 allows an out-of-bounds write because of a stack-based buffer overflow in the _dns_encode_domain function in the dns.c file, via a crafted DNS request.
https://github.com/pymumu/smartdns/issues/1378
2023-04-28T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31020
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an unprivileged regular user can cause improper access control, which may lead to denial of service or data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5491
2023-04-22T02:38:27.189Z
2023-11-02T18:56:21.202Z
2023-11-02T18:56:21.202Z
{'Vendor': 'nvidia', 'Product': 'NVIDIA GPU Display driver, vGPU driver, and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'}
CVE-2023-31923
Suprema BioStar 2 before 2022 Q4, v2.9.1 has Insecure Permissions. A vulnerability in the web application allows an authenticated attacker with "User Operator" privileges to create a highly privileged user account. The vulnerability is caused by missing server-side validation, which can be exploited to gain full administrator privileges on the system.
https://nobugescapes.com/blog/creating-a-new-user-with-admin-privilege/
2023-04-29T00:00:00
2023-05-22T00:00:00
2023-05-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31132
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a privilege escalation vulnerability. A low-privileged OS user with access to a Windows host where Cacti is installed can create arbitrary PHP files in a web document directory. The user can then execute the PHP files under the security context of SYSTEM. This allows an attacker to escalate privilege from a normal user account to SYSTEM. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/Cacti/cacti/security/advisories/GHSA-rf5w-pq3f-9876
2023-04-24T21:44:10.416Z
2023-09-05T21:19:22.831Z
2023-09-05T21:19:22.831Z
{'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '< 1.2.25'}
CVE-2023-31098
Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.6.0.  When users change their password to a simple password (with any character or symbol), attackers can easily guess the user's password and access the account. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 https://github.com/apache/inlong/pull/7805 to solve it.
https://lists.apache.org/thread/1fvloc3no1gbffzrcsx9ltsg08wr2d1w
2023-04-24T06:13:00.131Z
2023-05-22T15:31:53.989Z
2023-05-22T15:31:53.989Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache InLong', 'Versions': '1.1.0'}
CVE-2023-31974
yasm v1.3.0 was discovered to contain a use after free via the function error at /nasm/nasm-pp.c.
https://github.com/yasm/yasm/issues/208
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31077
Cross-Site Request Forgery (CSRF) vulnerability in ReCorp Export WP Page to Static HTML/CSS plugin <= 2.1.9 versions.
https://patchstack.com/database/vulnerability/export-wp-page-to-static-html/wordpress-export-wp-page-to-static-html-css-plugin-2-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-04-24T05:42:59.932Z
2023-11-10T13:36:15.359Z
2023-11-10T13:36:15.359Z
{'Vendor': 'ReCorp', 'Product': 'Export WP Page to Static HTML/CSS', 'Versions': 'n/a'}
CVE-2023-31427
Brocade Fabric OS versions before Brocade Fabric OS v9.1.1c, and v9.2.0 Could allow an authenticated, local user with knowledge of full path names inside Brocade Fabric OS to execute any command regardless of assigned privilege. Starting with Fabric OS v9.1.0, “root” account access is disabled.
https://support.broadcom.com/external/content/SecurityAdvisories/0/22379
2023-04-28T00:14:58.125Z
2023-08-01T22:46:17.756Z
2023-08-01T23:03:22.805Z
{'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'after 9.1.0 and before Brocade Fabric OS v9.2.0 and v9.1.1c'}
CVE-2023-31718
FUXA <= 1.1.12 is vulnerable to Local via Inclusion via /api/download.
https://github.com/frangoteam/FUXA
2023-04-29T00:00:00
2023-09-21T00:00:00
2023-09-21T23:05:22.915178
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31124
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
2023-04-24T21:44:10.415Z
2023-05-25T21:09:31.881Z
2023-05-25T21:09:31.881Z
{'Vendor': 'c-ares', 'Product': 'c-ares', 'Versions': '< 1.19.1'}
CVE-2023-31431
A buffer overflow vulnerability in “diagstatus” command in Brocade Fabric OS before Brocade Fabric v9.2.0 and v9.1.1c could allow an authenticated user to crash the Brocade Fabric OS switch leading to a denial of service.
https://support.broadcom.com/external/content/SecurityAdvisories/0/22384
2023-04-28T00:14:58.125Z
2023-08-01T23:23:18.522Z
2023-08-01T23:23:18.522Z
{'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'before Brocade Fabric OS v9.1.1c, v9.2.0'}
CVE-2023-31061
Repetier Server through 1.4.10 does not have CSRF protection.
https://cybir.com/2023/cve/poc-repetier-server-140/
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31489
An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.
https://github.com/FRRouting/frr/issues/13098
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-11-15T05:07:08.873431
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31173
Use of Hard-coded Credentials vulnerability in Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator on Windows allows Authentication Bypass. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:20:01.609Z
2023-08-31T15:30:58.262Z
2023-08-31T15:30:58.262Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5037 SEL Grid Configurator', 'Versions': '0'}
CVE-2023-31935
Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the emial parameter of admin-profile.php.
https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md
2023-04-29T00:00:00
2023-07-28T00:00:00
2023-07-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31036
NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where, when it is launched with the non-default command line option --model-control explicit, an attacker may use the model load API to cause a relative path traversal. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5509
2023-04-22T02:38:33.414Z
2024-01-12T17:11:38.579Z
2024-01-12T17:11:38.579Z
{'Vendor': 'nvidia', 'Product': 'Triton Inference Server', 'Versions': 'All versions prior to 2.40'}
CVE-2023-31466
An XSS issue was discovered in FSMLabs TimeKeeper 8.0.17. On the "Configuration -> Compliance -> Add a new compliance report" and "Configuration -> Timekeeper Configuration -> Add a new source there" screens, there are entry points to inject JavaScript code.
https://fsmlabs.com/fsmlabs-cybersecurity/
2023-04-28T00:00:00
2023-07-26T00:00:00
2023-07-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31671
PrestaShop postfinance <= 17.1.13 is vulnerable to SQL Injection via PostfinanceValidationModuleFrontController::postProcess().
https://shop.webbax.ch/modules-de-paiement/123-module-postfinance.html
2023-04-29T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31221
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ransom Christofferson PDQ CSV plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/pdq-csv/wordpress-pdq-csv-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-25T12:01:56.446Z
2023-08-08T12:46:59.765Z
2023-08-08T12:46:59.765Z
{'Vendor': 'Ransom Christofferson', 'Product': 'PDQ CSV', 'Versions': 'n/a'}
CVE-2023-31626
An issue in the gpf_notice component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1129
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31299
Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code via the Barcode field of a container.
https://herolab.usd.de/en/security-advisories/usd-2022-0055/
2023-04-27T00:00:00
2023-12-29T00:00:00
2023-12-29T04:13:28.159491
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31763
Weak security in the transmitter of AGShome Smart Alarm v1.0 allows attackers to gain full access to the system via a code replay attack.
https://ashallen.net/wireless-alarm-system-vulnerability-disclosure
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31919
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c.
https://github.com/jerryscript-project/jerryscript/issues/5069
2023-04-29T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31630
An issue in the sqlo_query_spec component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1138
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31149
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:04.956Z
2023-05-10T19:20:16.373Z
2023-05-10T19:20:16.373Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R132-V0, R132-V0, R132-V0, R132-V0'}
CVE-2023-31519
Pharmacy Management System v1.0 was discovered to contain a SQL injection vulnerability via the email parameter at login_core.php.
https://github.com/yangliukk/Injection-Vulnerability-In-Pharmacy-Management-System-1.0/blob/main/README.md
2023-04-29T00:00:00
2023-05-16T00:00:00
2023-05-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31237
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Dylan James Zephyr Project Manager.This issue affects Zephyr Project Manager: from n/a through 3.3.9.
https://patchstack.com/database/vulnerability/zephyr-project-manager/wordpress-zephyr-project-manager-plugin-3-3-9-open-redirection-vulnerability?_s_id=cve
2023-04-26T15:10:10.074Z
2023-12-29T09:56:50.694Z
2023-12-29T09:56:50.694Z
{'Vendor': 'Dylan James', 'Product': 'Zephyr Project Manager', 'Versions': 'n/a'}
CVE-2023-31722
There exists a heap buffer overflow in nasm 2.16.02rc1 (GitHub commit: b952891).
https://bugzilla.nasm.us/show_bug.cgi?id=3392857#c1
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31236
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in unFocus Projects Scripts n Styles plugin <= 3.5.7 versions.
https://patchstack.com/database/vulnerability/scripts-n-styles/wordpress-scripts-n-styles-plugin-3-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-26T15:10:10.074Z
2023-06-12T14:47:46.800Z
2023-06-12T14:47:46.800Z
{'Vendor': 'unFocus Projects', 'Product': 'Scripts n Styles', 'Versions': 'n/a'}
CVE-2023-31689
In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution.
https://github.com/vedees/wcms/issues/15
2023-04-29T00:00:00
2023-05-22T00:00:00
2023-05-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31723
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function expand_mmac_params at /nasm/nasm-pp.c.
https://github.com/yasm/yasm/issues/220
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31148
An Improper Input Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to execute arbitrary code. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:04.956Z
2023-05-10T19:20:03.147Z
2023-05-10T19:20:03.147Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R132-V0, R132-V0, R132-V0, R132-V0'}
CVE-2023-31518
A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file.
https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31631
An issue in the sqlo_preds_contradiction component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1137
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31918
Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c.
https://github.com/jerryscript-project/jerryscript/issues/5064
2023-04-29T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31277
PiiGAB M-Bus transmits credentials in plaintext format.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01
2023-06-27T16:55:52.752Z
2023-07-06T22:56:10.047Z
2023-07-06T22:56:10.047Z
{'Vendor': 'PiiGAB ', 'Product': 'M-Bus SoftwarePack', 'Versions': '900S'}