CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-31627
An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1140
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31298
Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code and obtain sensitive information via the User ID field when creating a new system user.
https://herolab.usd.de/en/security-advisories/usd-2022-0060/
2023-04-27T00:00:00
2023-12-29T00:00:00
2023-12-29T01:52:48.623421
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31762
Weak security in the transmitter of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to gain full access to the system via a code replay attack.
https://ashallen.net/wireless-alarm-system-vulnerability-disclosure
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31670
An issue in wasm2c 1.0.32, wasm2wat 1.0.32, wasm-decompile 1.0.32, and wasm-validate 1.0.32 allows attackers to cause a Denial of Service (DoS) via running a crafted binary.
https://github.com/WebAssembly/wabt/issues/2199
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31220
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP-EXPERTS.IN TEAM WP Categories Widget plugin <= 2.2 versions.
https://patchstack.com/database/vulnerability/wp-categories-widget/wordpress-wp-categories-widget-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-25T12:01:56.446Z
2023-09-04T10:24:37.344Z
2023-09-04T10:24:37.344Z
{'Vendor': 'WP-EXPERTS.IN TEAM', 'Product': 'WP Categories Widget', 'Versions': 'n/a'}
CVE-2023-31488
Hyland Perceptive Filters releases before 2023-12-08 (e.g., 11.4.0.2647), as used in Cisco IronPort Email Security Appliance Software, Cisco Secure Email Gateway, and various non-Cisco products, allow attackers to trigger a segmentation fault and execute arbitrary code via a crafted document.
https://bst.cisco.com/quickview/bug/CSCwe11003
2023-04-29T00:00:00
2024-01-10T00:00:00
2024-01-10T19:52:18.594096
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31172
An Incomplete Filtering of Special Elements vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:20:01.609Z
2023-08-31T15:30:49.213Z
2023-08-31T15:30:49.213Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5030 acSELerator QuickSet Software', 'Versions': '0'}
CVE-2023-31871
OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root.
https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7
2023-04-29T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31934
Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the adminname parameter of admin-profile.php.
https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md
2023-04-29T00:00:00
2023-07-28T00:00:00
2023-07-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31037
NVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.
https://nvidia.custhelp.com/app/answers/detail/a_id/5511
2023-04-22T02:38:33.414Z
2024-01-24T02:12:30.123Z
2024-01-24T02:12:30.123Z
{'Vendor': 'NVIDIA', 'Product': 'Bluefield 2 DPU BMC, BlueField 3 DPU BMC', 'Versions': 'LTS:2.8.2-46, 23.04, 23.07, 23.09'}
CVE-2023-31826
Skyscreamer Open Source Nevado JMS v1.3.2 does not perform security checks when receiving messages. This allows attackers to execute arbitrary commands via supplying crafted data.
http://nevado.skyscreamer.org/
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31125
Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. An uncaught exception vulnerability was introduced in version 5.1.0 and included in version 4.1.0 of the `socket.io` parent package. Older versions are not impacted. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package, including those who use depending packages like `socket.io`. This issue was fixed in version 6.4.2 of Engine.IO. There is no known workaround except upgrading to a safe version.
https://github.com/socketio/engine.io/security/advisories/GHSA-q9mw-68c2-j6m5
2023-04-24T21:44:10.415Z
2023-05-08T20:21:01.341Z
2023-05-08T20:21:01.341Z
{'Vendor': 'socketio', 'Product': 'engine.io', 'Versions': '>= 5.1.0, < 6.4.2'}
CVE-2023-31430
A buffer overflow vulnerability in “secpolicydelete” command in Brocade Fabric OS before Brocade Fabric OS v9.1.1c and v9.2.0 could allow an authenticated privileged user to crash the Brocade Fabric OS switch leading to a denial of service.
https://support.broadcom.com/external/content/SecurityAdvisories/0/22381
2023-04-28T00:14:58.125Z
2023-08-01T23:31:00.376Z
2023-08-01T23:31:00.376Z
{'Vendor': 'Brocade', 'Product': 'Brocade Fabric OS', 'Versions': ' before Brocade Fabric OS v9.1.1c and v9.2.0'}
CVE-2023-31060
Repetier Server through 1.4.10 executes as SYSTEM. This can be leveraged in conjunction with CVE-2023-31059 for full compromise.
https://cybir.com/2023/cve/poc-repetier-server-140/
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31719
FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin.
https://github.com/frangoteam/FUXA
2023-04-29T00:00:00
2023-09-21T00:00:00
2023-09-21T23:06:40.260383
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31133
Ghost is an app for new-media creators with tools to build a website, publish content, send newsletters, and offer paid subscriptions to members. Prior to version 5.46.1, due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack. Ghost(Pro) has already been patched. Maintainers can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. v5.46.1 contains a fix for this issue. As a workaround, add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`.
https://github.com/TryGhost/Ghost/security/advisories/GHSA-r97q-ghch-82j9
2023-04-24T21:44:10.416Z
2023-05-08T20:56:39.299Z
2023-05-08T20:56:39.299Z
{'Vendor': 'TryGhost', 'Product': 'Ghost', 'Versions': '< 5.46.1'}
CVE-2023-31099
Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers.
https://manageengine.com
2023-04-24T00:00:00
2023-05-04T00:00:00
2023-05-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31975
yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c.
https://github.com/yasm/yasm/issues/210
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-06-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31076
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Really Simple Plugins Recipe Maker For Your Food Blog from Zip Recipes plugin <= 8.0.6 versions.
https://patchstack.com/database/vulnerability/zip-recipes/wordpress-recipe-maker-for-your-food-blog-from-zip-recipes-plugin-8-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-24T05:42:59.931Z
2023-08-17T08:44:53.942Z
2023-08-17T08:44:53.942Z
{'Vendor': 'Really Simple Plugins', 'Product': 'Recipe Maker For Your Food Blog from Zip Recipes', 'Versions': 'n/a'}
CVE-2023-31426
The Brocade Fabric OS Commands “configupload” and “configdownload” before Brocade Fabric OS v9.1.1c, v8.2.3d, v9.2.0 print scp, sftp, ftp servers passwords in supportsave. This could allow a remote authenticated attacker to access sensitive information.
https://support.broadcom.com/external/content/SecurityAdvisories/0/22407
2023-04-28T00:14:58.124Z
2023-08-01T21:18:55.037Z
2023-08-01T21:18:55.037Z
{'Vendor': 'Brocade', 'Product': 'Brocade Fabric OS ', 'Versions': 'before Brocade Fabric OS v9.1.1c, v8.2.3d, v9.2.0'}
CVE-2023-31867
Sage X3 version 12.14.0.50-0 is vulnerable to CSV Injection.
http://sage.com
2023-04-29T00:00:00
2023-06-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31164
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:33.137Z
2023-05-10T19:25:16.534Z
2023-05-10T19:25:16.534Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'}
CVE-2023-31471
An issue was discovered on GL.iNet devices before 3.216. Through the software installation feature, it is possible to install arbitrary software, such as a reverse shell, because the restrictions on the available package list are limited to client-side verification. It is possible to install software from the filesystem, the package list, or a URL.
https://www.gl-inet.com
2023-04-28T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31021
NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a malicious user in the guest VM can cause a NULL-pointer dereference, which may lead to denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5491
2023-04-22T02:38:27.190Z
2023-11-02T18:56:21.642Z
2023-11-02T18:56:21.642Z
{'Vendor': 'nvidia', 'Product': 'vGPU driver and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'}
CVE-2023-31922
QuickJS commit 2788d71 was discovered to contain a stack-overflow via the component js_proxy_isArray at quickjs.c.
https://github.com/bellard/quickjs/issues/178
2023-04-29T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31056
CloverDX before 5.17.3 writes passwords to the audit log in certain situations, if the audit log is enabled and single sign-on is not employed. The fixed versions are 5.15.4, 5.16.2, 5.17.3, and 6.0.x.
https://support1.cloverdx.com/hc/en-us/articles/8484869595164-Security-advisory-April-2023
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31406
Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
https://launchpad.support.sap.com/#/notes/3319400
2023-04-27T18:29:50.455Z
2023-05-09T01:37:32.237Z
2023-05-09T01:37:32.237Z
{'Vendor': 'SAP_SE', 'Product': 'SAP BusinessObjects Business Intelligence Platform', 'Versions': '420, 430'}
CVE-2023-31543
A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
https://github.com/bndr/pipreqs/pull/364
2023-04-29T00:00:00
2023-06-30T00:00:00
2023-06-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31001
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) temporarily stores sensitive information in files that could be accessed by a local user. IBM X-Force ID: 254653.
https://www.ibm.com/support/pages/node/7106586
2023-04-21T17:50:04.655Z
2024-01-11T02:44:33.092Z
2024-01-11T02:44:33.092Z
{'Vendor': 'IBM', 'Product': 'Security Verify Access Appliance', 'Versions': '10.0.0.0'}
CVE-2023-31902
RPA Technology Mobile Mouse 3.6.0.4 is vulnerable to Remote Code Execution (RCE).
https://www.redpacketsecurity.com/mobile-mouse-code-execution/
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31847
In davinci 0.3.0-rc after logging in, the user can connect to the mysql malicious server by controlling the data source to read arbitrary files on the client side.
https://github.com/edp963/davinci/issues/2326
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31144
Craft CMS is a content management system. Starting in version 3.0.0 and prior to versions 3.8.4 and 4.4.4, a malformed title in the feed widget can deliver a cross-site scripting payload. This issue is fixed in version 3.8.4 and 4.4.4.
https://github.com/craftcms/cms/security/advisories/GHSA-j4mx-98hw-6rv6
2023-04-24T21:44:10.417Z
2023-05-09T15:22:39.915Z
2023-05-09T15:22:39.915Z
{'Vendor': 'craftcms', 'Product': 'cms', 'Versions': '>= 3.0.0, < 3.8.4, >= 4.0.0, < 4.4.4'}
CVE-2023-31294
CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the Delivery Name field.
https://herolab.usd.de/en/security-advisories/usd-2022-0052/
2023-04-27T00:00:00
2023-12-29T00:00:00
2023-12-29T02:46:30.142249
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31914
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc.
https://github.com/jerryscript-project/jerryscript/issues/5071
2023-04-29T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31017
NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may be able to write arbitrary data to privileged locations by using reparse points. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5491
2023-04-22T02:38:25.654Z
2023-11-02T18:56:19.822Z
2023-11-02T18:56:19.822Z
{'Vendor': 'nvidia', 'Product': 'NVIDIA GPU Display driver, vGPU driver, and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'}
CVE-2023-31447
user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code.
https://draytek.com
2023-04-28T00:00:00
2023-08-21T00:00:00
2023-08-21T12:23:59.756827
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31152
An Authentication Bypass Using an Alternate Path or Channel vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface allows Authentication Bypass. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:04.957Z
2023-05-10T19:21:50.029Z
2023-05-10T19:21:50.029Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R147-V0, R147-V0, R147-V0, R147-V0'}
CVE-2023-31502
Altenergy Power Control Software C1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the component /models/management_model.php.
https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/Insufficient_Verification_of_Data_Authenticity.MD
2023-04-29T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31851
Cudy LT400 1.13.4 is has a cross-site scripting (XSS) vulnerability in /cgi-bin/luci/admin/network/wireless/status via the iface parameter.
https://www.cudy.com
2023-04-29T00:00:00
2023-07-17T00:00:00
2023-07-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31410
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.
https://sick.com/psirt
2023-04-27T18:35:47.418Z
2023-06-19T14:57:52.413Z
2023-06-19T14:57:52.413Z
{'Vendor': 'SICK AG', 'Product': 'EventCam App', 'Versions': 'all versions'}
CVE-2023-31943
SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the ticket_id parameter at ticket_detail.php.
https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug6-SQL-Injection-ticket_id.md
2023-04-29T00:00:00
2023-08-17T00:00:00
2023-08-17T19:36:09.785477
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31806
Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via a crafted payload to the My Progress function.
http://chamilo.com
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31555
podofoinfo 0.10.0 was discovered to contain a segmentation violation via the function PoDoFo::PdfObject::DelayedLoad.
https://github.com/podofo/podofo/issues/67
2023-04-29T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31742
There is a command injection vulnerability in the Linksys WRT54GL router with firmware version 4.30.18.006. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges.
http://linksys.com
2023-04-29T00:00:00
2023-05-22T00:00:00
2023-05-22T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31607
An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1120
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31484
CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
2023-04-28T00:00:00
2023-04-28T00:00:00
2023-07-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31191
DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection. An attacker can exploit this vulnerability by injecting, on carefully selected channels, high power spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information. This issue affects the adjacent channel suppression algorithm present in DroneScout ds230 firmware from version 20211210-1627 through 20230329-1042.
https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-31191/
2023-05-04T14:37:53.633Z
2023-07-11T08:45:14.541Z
2023-07-11T08:45:14.541Z
{'Vendor': 'bluemark', 'Product': 'ds230', 'Versions': '20230104-1650 '}
CVE-2023-31938
SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php.
https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug2-SQL-Injection-emp_id.md
2023-04-29T00:00:00
2023-08-17T00:00:00
2023-08-17T19:37:21.062728
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31200
PTC Vuforia Studio does not require a token; this could allow an attacker with local access to perform a cross-site request forgery attack or a replay attack.
https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13
2023-04-24T23:30:29.242Z
2023-06-07T21:52:29.300Z
2023-06-07T21:52:29.300Z
{'Vendor': 'PTC ', 'Product': 'Vuforia Studio', 'Versions': '0'}
CVE-2023-31129
The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module `os/net/ipv6/uip-nd6.c`. The ND protocol includes a message type called Router Solicitation (RS), which is used to locate routers and update their address information via the SLLAO (Source Link-Layer Address Option). If the indicated source address changes, a given neighbor entry is set to the STALE state. The message handler does not check for RS messages with an SLLAO that indicates a link-layer address change that a neighbor entry can actually be created for the indicated address. The resulting pointer is used without a check, leading to the dereference of a NULL pointer of type `uip_ds6_nbr_t`. The problem has been patched in the `develop` branch of Contiki-NG, and will be included in the upcoming 4.9 release. As a workaround, users can apply Contiki-NG pull request #2271 to patch the problem directly.
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-x29r-5qjg-75mq
2023-04-24T21:44:10.416Z
2023-05-08T20:51:14.657Z
2023-05-08T20:51:14.657Z
{'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'}
CVE-2023-31083
An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur.
https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g%40mail.gmail.com/
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-09-29T21:06:19.077696
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31579
Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token.
https://github.com/dromara/lamp-cloud/issues/183
2023-04-29T00:00:00
2023-11-02T00:00:00
2023-11-02T21:25:06.845490
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31703
Cross Site Scripting (XSS) in the edit user form in Microworld Technologies eScan management console 14.0.1400.2281 allows remote attacker to inject arbitrary code via the from parameter.
https://github.com/sahiloj/CVE-2023-31703/blob/main/README.md
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31216
Cross-Site Request Forgery (CSRF) vulnerability in Ultimate Member plugin <= 2.6.0 versions.
https://patchstack.com/database/vulnerability/ultimate-member/wordpress-ultimate-member-plugin-2-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-04-25T12:01:56.446Z
2023-07-17T13:50:07.650Z
2023-07-17T13:50:07.650Z
{'Vendor': 'Ultimate Member', 'Product': 'Ultimate Member', 'Versions': 'n/a'}
CVE-2023-31996
Hanwha IP Camera ANE-L7012R 1.41.01 is vulnerable to Command Injection due to improper sanitization of special characters for the NAS storage test function.
https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31095
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.2.8.
https://patchstack.com/database/vulnerability/cf7-hubspot/wordpress-integration-for-contact-form-7-hubspot-plugin-1-2-8-open-redirection-vulnerability?_s_id=cve
2023-04-24T05:43:49.922Z
2023-12-29T09:50:01.256Z
2023-12-29T09:50:01.256Z
{'Vendor': 'CRM Perks', 'Product': 'Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms', 'Versions': 'n/a'}
CVE-2023-31580
light-oauth2 before version 2.1.27 obtains the public key without any verification. This could allow attackers to authenticate to the application with a crafted JWT token.
https://github.com/networknt/light-oauth2/issues/369
2023-04-29T00:00:00
2023-10-24T00:00:00
2023-10-24T22:08:42.319924
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31979
Catdoc v0.95 was discovered to contain a global buffer overflow via the function process_file at /src/reader.c.
https://github.com/petewarden/catdoc/issues/9
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31754
Optimizely CMS UI before v12.16.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Admin panel.
https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss
2023-04-29T00:00:00
2023-11-14T00:00:00
2023-11-14T03:11:01.538000
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31611
An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1119
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31241
Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01
2023-04-26T19:18:23.286Z
2023-05-22T19:26:22.401Z
2023-05-22T19:26:22.401Z
{'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'}
CVE-2023-31492
Zoho ManageEngine ADManager Plus version 7182 and prior disclosed the default passwords for the account restoration of unauthorized domains to the authenticated users.
https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md
2023-04-29T00:00:00
2023-08-17T00:00:00
2023-08-22T21:38:25.292711
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31168
An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:20:01.608Z
2023-08-31T15:30:14.809Z
2023-08-31T15:30:14.809Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5030 acSELerator QuickSet Software', 'Versions': '0'}
CVE-2023-31187
Avaya IX Workforce Engagement v15.2.7.1195 - CWE-522: Insufficiently Protected Credentials
https://www.gov.il/en/Departments/faq/cve_advisories
2023-04-24T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'Avaya', 'Product': 'IX Workforce Engagement', 'Versions': 'Update to the latest version'}
CVE-2023-31163
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:33.136Z
2023-05-10T19:24:45.965Z
2023-05-10T19:24:45.965Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'}
CVE-2023-31860
Wuzhi CMS v3.1.2 has a storage type XSS vulnerability in the backend of the Five Finger CMS b2b system.
https://github.com/wuzhicms/b2b/issues/3
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31925
Brocade SANnav before v2.3.0 and v2.2.2a stores SNMPv3 Authentication passwords in plaintext. A privileged user could retrieve these credentials with knowledge and access to these log files. SNMP credentials could be seen in SANnav SupportSave if the capture is performed after an SNMP configuration failure causes an SNMP communication log dump.
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22506
2023-04-29T01:29:30.559Z
2023-08-31T00:20:30.874Z
2023-08-31T00:20:31.179Z
{'Vendor': 'Brocade', 'Product': 'Brocade SANnav', 'Versions': 'Brocade SANnav before v2.3.0 and v2.2.2a '}
CVE-2023-31476
An issue was discovered on GL.iNet devices running firmware before 3.216. There is an arbitrary file write in which an empty file can be created almost anywhere on the filesystem, as long as the filename and path is no more than 6 characters (the working directory is /www).
https://www.gl-inet.com
2023-04-28T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31026
NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a NULL-pointer dereference may lead to denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5491
2023-04-22T02:38:27.192Z
2023-11-02T18:56:22.940Z
2023-11-02T18:56:22.940Z
{'Vendor': 'nvidia', 'Product': 'vGPU driver and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'}
CVE-2023-31708
A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function.
https://github.com/weng-xianhu/eyoucms/issues/41
2023-04-29T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31134
Tauri is software for building applications for multi-platform deployment. The Tauri IPC is usually strictly isolated from external websites, but in versions 1.0.0 until 1.0.9, 1.1.0 until 1.1.4, and 1.2.0 until 1.2.5, the isolation can be bypassed by redirecting an existing Tauri window to an external website. This is either possible by an application implementing a feature for users to visit arbitrary websites or due to a bug allowing the open redirect. This allows the external website access to the IPC layer and therefore to all configured and exposed Tauri API endpoints and application specific implemented Tauri commands. This issue has been patched in versions 1.0.9, 1.1.4, and 1.2.5. As a workaround, prevent arbitrary input in redirect features and/or only allow trusted websites access to the IPC.
https://github.com/tauri-apps/tauri/security/advisories/GHSA-4wm2-cwcf-wwvp
2023-04-24T21:44:10.416Z
2023-05-09T13:09:31.399Z
2023-05-09T13:09:31.399Z
{'Vendor': 'tauri-apps', 'Product': 'tauri', 'Versions': '>= 1.0.0, < 1.0.9, >= 1.1.0, < 1.1.4, >= 1.2.0, < 1.2.5'}
CVE-2023-31071
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Yannick Lefebvre Modal Dialog plugin <= 3.5.14 versions.
https://patchstack.com/database/vulnerability/modal-dialog/wordpress-modal-dialog-plugin-3-5-14-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-24T05:42:59.930Z
2023-08-17T08:41:21.755Z
2023-08-17T08:41:21.755Z
{'Vendor': 'Yannick Lefebvre', 'Product': 'Modal Dialog', 'Versions': 'n/a'}
CVE-2023-31421
It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected.
https://discuss.elastic.co/t/beats-elastic-agent-apm-server-and-fleet-server-8-10-1-security-update-improper-certificate-validation-issue-esa-2023-16/343385
2023-04-27T18:54:56.705Z
2023-10-26T03:10:52.684Z
2023-10-26T03:10:52.684Z
{'Vendor': 'Elastic', 'Product': 'Beats', 'Versions': '8.0.0, 8.9.2'}
CVE-2023-31972
yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c.
https://github.com/yasm/yasm/issues/209
2023-04-29T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31088
Cross-Site Request Forgery (CSRF) vulnerability in Faraz Quazi Floating Action Button plugin <= 1.2.1 versions.
https://patchstack.com/database/vulnerability/floating-action-button/wordpress-floating-action-button-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-04-24T05:43:49.922Z
2023-11-09T22:53:08.821Z
2023-11-09T22:53:08.821Z
{'Vendor': 'Faraz Quazi', 'Product': 'Floating Action Button', 'Versions': 'n/a'}
CVE-2023-31572
An issue in Bludit 4.0.0-rc-2 allows authenticated attackers to change the Administrator password and escalate privileges via a crafted request.
https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/bludit/2023/Bludit-v4.0.0-Release-candidate-2
2023-04-29T00:00:00
2023-05-16T00:00:00
2023-05-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31122
Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
https://httpd.apache.org/security/vulnerabilities_24.html
2023-04-24T17:37:59.263Z
2023-10-23T06:51:59.705Z
2023-10-23T06:51:59.705Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache HTTP Server', 'Versions': '0'}
CVE-2023-31821
An issue found in ALBIS Co. ALBIS v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp ALBIS function.
http://albis.com
2023-04-29T00:00:00
2023-07-13T00:00:00
2023-07-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31437
An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."
https://github.com/systemd/systemd/releases
2023-04-28T00:00:00
2023-06-13T00:00:00
2023-06-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31067
An issue was discovered in TSplus Remote Access through 16.0.2.14. There are Full Control permissions for Everyone on some directories under %PROGRAMFILES(X86)%\TSplus\Clients\www.
http://packetstormsecurity.com/files/174275/TSPlus-16.0.2.14-Insecure-Permissions.html
2023-04-24T00:00:00
2023-09-11T00:00:00
2023-09-11T18:18:26.417003
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31175
An Execution with Unnecessary Privileges vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run system commands with the highest level privilege on the system. See Instruction Manual Appendix A and Appendix E dated 20230615 for more details. This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:20:01.609Z
2023-08-31T15:31:33.536Z
2023-08-31T15:31:33.536Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5037 SEL Grid Configurator', 'Versions': '0'}
CVE-2023-31030
NVIDIA DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5510
2023-04-22T02:38:33.413Z
2024-01-12T18:31:34.210Z
2024-01-12T18:31:34.210Z
{'Vendor': 'nvidia', 'Product': 'DGX A100', 'Versions': 'All BMC versions prior to 00.22.05'}
CVE-2023-31460
A vulnerability in the Connect Mobility Router component of MiVoice Connect versions 9.6.2208.101 and earlier could allow an authenticated attacker with internal network access to conduct a command injection attack due to insufficient restriction on URL parameters.
https://www.mitel.com/support/security-advisories
2023-04-28T00:00:00
2023-05-24T00:00:00
2023-05-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31933
Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the editid parameter of the edit-pass-detail.php file.
https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug4-SQL-Injection-editid2.md
2023-04-29T00:00:00
2023-07-28T00:00:00
2023-07-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31677
Insecure permissions in luowice 3.5.18 allow attackers to view information for other alarm devices via modification of the eseeid parameter.
https://github.com/zzh-newlearner/record/blob/main/luowice.md
2023-04-29T00:00:00
2023-05-16T00:00:00
2023-05-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31227
The hwPartsDFR module has a vulnerability in API calling verification. Successful exploitation of this vulnerability may affect device confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/5/
2023-04-26T00:00:00
2023-05-26T00:00:00
2023-05-26T00:00:00
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0'}
CVE-2023-31698
Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration).
https://github.com/bludit/bludit/issues/1509
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-12-30T20:56:19.182482
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31620
An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1128
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31159
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:19:33.136Z
2023-05-10T19:23:29.182Z
2023-05-10T19:23:29.182Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R132-V0, R132-V0, R132-V0, R132-V0'}
CVE-2023-31289
Pexip Infinity before 31.2 has Improper Input Validation for signalling, allowing remote attackers to trigger an abort.
https://docs.pexip.com/admin/security_bulletins.htm
2023-04-27T00:00:00
2023-12-25T00:00:00
2023-12-25T06:13:09.746497
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31231
Unrestricted Upload of File with Dangerous Type vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates).This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.65.
https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-65-arbitrary-file-upload-vulnerability?_s_id=cve
2023-04-26T15:10:10.074Z
2023-12-20T18:56:58.422Z
2023-12-20T18:56:58.422Z
{'Vendor': 'Unlimited Elements', 'Product': 'Unlimited Elements For Elementor (Free Widgets, Addons, Templates)', 'Versions': 'n/a'}
CVE-2023-31724
yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c.
https://github.com/yasm/yasm/issues/222
2023-04-29T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31548
A stored Cross-site scripting (XSS) vulnerability in the FundRaiserEditor.php component of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548
2023-04-29T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31180
WJJ Software - InnoKB Server, InnoKB/Console 2.2.1 - Reflected cross-site scripting (RXSS) through an unspecified request.
https://www.gov.il/en/Departments/faq/cve_advisories
2023-04-24T23:25:07.106Z
2023-05-08T00:00:00
2023-05-17T21:52:52.036Z
{'Vendor': ' WJJ Software', 'Product': ' InnoKB Server, InnoKB/Console', 'Versions': '2.2.1'}
CVE-2023-31753
SQL injection vulnerability in diskusi.php in eNdonesia 8.7, allows an attacker to execute arbitrary SQL commands via the "rid=" parameter.
https://github.com/khmk2k/CVE-2023-31753/
2023-04-29T00:00:00
2023-07-20T00:00:00
2023-07-20T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31616
An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
https://github.com/openlink/virtuoso-opensource/issues/1122
2023-04-29T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31246
Incorrect default permissions in some Intel(R) SDP Tool software before version 1.4 build 5 may allow an authenticated user to potentially enable escalation of privilege via local access.
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00905.html
2023-05-05T03:00:03.594Z
2023-08-11T02:37:22.996Z
2023-08-11T02:37:22.996Z
{'Vendor': 'n/a', 'Product': 'Intel(R) SDP Tool software', 'Versions': 'before version 1.4 build 5'}
CVE-2023-31092
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Foxskav Easy Bet.This issue affects Easy Bet: from n/a through 1.0.2.
https://patchstack.com/database/vulnerability/easy-bet/wordpress-easy-bet-plugin-1-0-2-sql-injection-vulnerability?_s_id=cve
2023-04-24T05:43:49.922Z
2023-12-20T16:06:08.229Z
2023-12-20T16:06:08.229Z
{'Vendor': 'Foxskav', 'Product': 'Easy Bet', 'Versions': 'n/a'}
CVE-2023-31568
Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4.
https://github.com/podofo/podofo/issues/72
2023-04-29T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-31138
DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.36 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, using object model traversal in the payload of a PATCH request, authenticated users with write access to an object may be able to modify related objects that they should not have access to. DHIS2 implementers should upgrade to a supported version of DHIS2 to receive a patch: 2.37.9.1, 2.38.3.1, or 2.39.1.2. It is possible to work around this issue by blocking all PATCH requests on a reverse proxy, but this may cause some issues with the functionality of built-in applications using legacy PATCH requests.
https://github.com/dhis2/dhis2-core/security/advisories/GHSA-pwvw-4m67-f4g2
2023-04-24T21:44:10.417Z
2023-05-09T14:11:11.868Z
2023-05-09T14:11:11.868Z
{'Vendor': 'dhis2', 'Product': 'dhis2-core', 'Versions': '>= 2.36, < 2.37.9.1, >= 2.38, < 2.38.3.1, >= 2.39, < 2.39.1.2'}