CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-31627 | An issue in the strhash component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1140 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31298 | Cross Site Scripting (XSS) vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to execute arbitrary code and obtain sensitive information via the User ID field when creating a new system user. | https://herolab.usd.de/en/security-advisories/usd-2022-0060/ | 2023-04-27T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T01:52:48.623421 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31762 | Weak security in the transmitter of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to gain full access to the system via a code replay attack. | https://ashallen.net/wireless-alarm-system-vulnerability-disclosure | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31670 | An issue in wasm2c 1.0.32, wasm2wat 1.0.32, wasm-decompile 1.0.32, and wasm-validate 1.0.32 allows attackers to cause a Denial of Service (DoS) via running a crafted binary. | https://github.com/WebAssembly/wabt/issues/2199 | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31220 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP-EXPERTS.IN TEAM WP Categories Widget plugin <= 2.2 versions. | https://patchstack.com/database/vulnerability/wp-categories-widget/wordpress-wp-categories-widget-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-25T12:01:56.446Z | 2023-09-04T10:24:37.344Z | 2023-09-04T10:24:37.344Z | {'Vendor': 'WP-EXPERTS.IN TEAM', 'Product': 'WP Categories Widget', 'Versions': 'n/a'} |
CVE-2023-31488 | Hyland Perceptive Filters releases before 2023-12-08 (e.g., 11.4.0.2647), as used in Cisco IronPort Email Security Appliance Software, Cisco Secure Email Gateway, and various non-Cisco products, allow attackers to trigger a segmentation fault and execute arbitrary code via a crafted document. | https://bst.cisco.com/quickview/bug/CSCwe11003 | 2023-04-29T00:00:00 | 2024-01-10T00:00:00 | 2024-01-10T19:52:18.594096 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31172 |
An Incomplete Filtering of Special Elements vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:20:01.609Z | 2023-08-31T15:30:49.213Z | 2023-08-31T15:30:49.213Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5030 acSELerator QuickSet Software', 'Versions': '0'} |
CVE-2023-31871 | OpenText Documentum Content Server before 23.2 has a flaw that allows for privilege escalation from a non-privileged Documentum user to root. The software comes prepackaged with a root owned SUID binary dm_secure_writer. The binary has security controls in place preventing creation of a file in a non-owned directory, or as the root user. However, these controls can be carefully bypassed to allow for an arbitrary file write as root. | https://gist.github.com/picar0jsu/a8e623639da34f36202ce5e436668de7 | 2023-04-29T00:00:00 | 2023-05-18T00:00:00 | 2023-05-18T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31934 | Cross Site Scripting vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to obtain sensitive information via the adminname parameter of admin-profile.php. | https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug1-XSS-in-Admin-Name.md | 2023-04-29T00:00:00 | 2023-07-28T00:00:00 | 2023-07-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31037 |
NVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.
| https://nvidia.custhelp.com/app/answers/detail/a_id/5511 | 2023-04-22T02:38:33.414Z | 2024-01-24T02:12:30.123Z | 2024-01-24T02:12:30.123Z | {'Vendor': 'NVIDIA', 'Product': 'Bluefield 2 DPU BMC, BlueField 3 DPU BMC', 'Versions': 'LTS:2.8.2-46, 23.04, 23.07, 23.09'} |
CVE-2023-31826 | Skyscreamer Open Source Nevado JMS v1.3.2 does not perform security checks when receiving messages. This allows attackers to execute arbitrary commands via supplying crafted data. | http://nevado.skyscreamer.org/ | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31125 | Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. An uncaught exception vulnerability was introduced in version 5.1.0 and included in version 4.1.0 of the `socket.io` parent package. Older versions are not impacted. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package, including those who use depending packages like `socket.io`. This issue was fixed in version 6.4.2 of Engine.IO. There is no known workaround except upgrading to a safe version.
| https://github.com/socketio/engine.io/security/advisories/GHSA-q9mw-68c2-j6m5 | 2023-04-24T21:44:10.415Z | 2023-05-08T20:21:01.341Z | 2023-05-08T20:21:01.341Z | {'Vendor': 'socketio', 'Product': 'engine.io', 'Versions': '>= 5.1.0, < 6.4.2'} |
CVE-2023-31430 | A buffer overflow vulnerability in “secpolicydelete” command in Brocade Fabric OS before Brocade Fabric OS v9.1.1c and v9.2.0 could allow an authenticated privileged user to crash the Brocade Fabric OS switch leading to a denial of service.
| https://support.broadcom.com/external/content/SecurityAdvisories/0/22381 | 2023-04-28T00:14:58.125Z | 2023-08-01T23:31:00.376Z | 2023-08-01T23:31:00.376Z | {'Vendor': 'Brocade', 'Product': 'Brocade Fabric OS', 'Versions': ' before Brocade Fabric OS v9.1.1c and v9.2.0'} |
CVE-2023-31060 | Repetier Server through 1.4.10 executes as SYSTEM. This can be leveraged in conjunction with CVE-2023-31059 for full compromise. | https://cybir.com/2023/cve/poc-repetier-server-140/ | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31719 | FUXA <= 1.1.12 is vulnerable to SQL Injection via /api/signin. | https://github.com/frangoteam/FUXA | 2023-04-29T00:00:00 | 2023-09-21T00:00:00 | 2023-09-21T23:06:40.260383 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31133 | Ghost is an app for new-media creators with tools to build a website, publish content, send newsletters, and offer paid subscriptions to members. Prior to version 5.46.1, due to a lack of validation when filtering on the public API endpoints, it is possible to reveal private fields via a brute force attack.
Ghost(Pro) has already been patched. Maintainers can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version below v5.46.1. v5.46.1 contains a fix for this issue. As a workaround, add a block for requests to `/ghost/api/content/*` where the `filter` query parameter contains `password` or `email`. | https://github.com/TryGhost/Ghost/security/advisories/GHSA-r97q-ghch-82j9 | 2023-04-24T21:44:10.416Z | 2023-05-08T20:56:39.299Z | 2023-05-08T20:56:39.299Z | {'Vendor': 'TryGhost', 'Product': 'Ghost', 'Versions': '< 5.46.1'} |
CVE-2023-31099 | Zoho ManageEngine OPManager through 126323 allows an authenticated user to achieve remote code execution via probe servers. | https://manageengine.com | 2023-04-24T00:00:00 | 2023-05-04T00:00:00 | 2023-05-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31975 | yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. | https://github.com/yasm/yasm/issues/210 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-06-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31076 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Really Simple Plugins Recipe Maker For Your Food Blog from Zip Recipes plugin <= 8.0.6 versions. | https://patchstack.com/database/vulnerability/zip-recipes/wordpress-recipe-maker-for-your-food-blog-from-zip-recipes-plugin-8-0-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-24T05:42:59.931Z | 2023-08-17T08:44:53.942Z | 2023-08-17T08:44:53.942Z | {'Vendor': 'Really Simple Plugins', 'Product': 'Recipe Maker For Your Food Blog from Zip Recipes', 'Versions': 'n/a'} |
CVE-2023-31426 |
The Brocade Fabric OS Commands “configupload” and “configdownload” before Brocade Fabric OS v9.1.1c, v8.2.3d, v9.2.0 print scp, sftp, ftp servers passwords in supportsave. This could allow a remote authenticated attacker to access sensitive information.
| https://support.broadcom.com/external/content/SecurityAdvisories/0/22407 | 2023-04-28T00:14:58.124Z | 2023-08-01T21:18:55.037Z | 2023-08-01T21:18:55.037Z | {'Vendor': 'Brocade', 'Product': 'Brocade Fabric OS ', 'Versions': 'before Brocade Fabric OS v9.1.1c, v8.2.3d, v9.2.0'} |
CVE-2023-31867 | Sage X3 version 12.14.0.50-0 is vulnerable to CSV Injection. | http://sage.com | 2023-04-29T00:00:00 | 2023-06-22T00:00:00 | 2023-06-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31164 |
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:33.137Z | 2023-05-10T19:25:16.534Z | 2023-05-10T19:25:16.534Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'} |
CVE-2023-31471 | An issue was discovered on GL.iNet devices before 3.216. Through the software installation feature, it is possible to install arbitrary software, such as a reverse shell, because the restrictions on the available package list are limited to client-side verification. It is possible to install software from the filesystem, the package list, or a URL. | https://www.gl-inet.com | 2023-04-28T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31021 | NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a malicious user in the guest VM can cause a NULL-pointer dereference, which may lead to denial of service. | https://nvidia.custhelp.com/app/answers/detail/a_id/5491 | 2023-04-22T02:38:27.190Z | 2023-11-02T18:56:21.642Z | 2023-11-02T18:56:21.642Z | {'Vendor': 'nvidia', 'Product': 'vGPU driver and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'} |
CVE-2023-31922 | QuickJS commit 2788d71 was discovered to contain a stack-overflow via the component js_proxy_isArray at quickjs.c. | https://github.com/bellard/quickjs/issues/178 | 2023-04-29T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31056 | CloverDX before 5.17.3 writes passwords to the audit log in certain situations, if the audit log is enabled and single sign-on is not employed. The fixed versions are 5.15.4, 5.16.2, 5.17.3, and 6.0.x. | https://support1.cloverdx.com/hc/en-us/articles/8484869595164-Security-advisory-April-2023 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31406 | Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
| https://launchpad.support.sap.com/#/notes/3319400 | 2023-04-27T18:29:50.455Z | 2023-05-09T01:37:32.237Z | 2023-05-09T01:37:32.237Z | {'Vendor': 'SAP_SE', 'Product': 'SAP BusinessObjects Business Intelligence Platform', 'Versions': '420, 430'} |
CVE-2023-31543 | A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server. | https://github.com/bndr/pipreqs/pull/364 | 2023-04-29T00:00:00 | 2023-06-30T00:00:00 | 2023-06-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31001 | IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.6.1) temporarily stores sensitive information in files that could be accessed by a local user. IBM X-Force ID: 254653. | https://www.ibm.com/support/pages/node/7106586 | 2023-04-21T17:50:04.655Z | 2024-01-11T02:44:33.092Z | 2024-01-11T02:44:33.092Z | {'Vendor': 'IBM', 'Product': 'Security Verify Access Appliance', 'Versions': '10.0.0.0'} |
CVE-2023-31902 | RPA Technology Mobile Mouse 3.6.0.4 is vulnerable to Remote Code Execution (RCE). | https://www.redpacketsecurity.com/mobile-mouse-code-execution/ | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31847 | In davinci 0.3.0-rc after logging in, the user can connect to the mysql malicious server by controlling the data source to read arbitrary files on the client side. | https://github.com/edp963/davinci/issues/2326 | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31144 | Craft CMS is a content management system. Starting in version 3.0.0 and prior to versions 3.8.4 and 4.4.4, a malformed title in the feed widget can deliver a cross-site scripting payload. This issue is fixed in version 3.8.4 and 4.4.4. | https://github.com/craftcms/cms/security/advisories/GHSA-j4mx-98hw-6rv6 | 2023-04-24T21:44:10.417Z | 2023-05-09T15:22:39.915Z | 2023-05-09T15:22:39.915Z | {'Vendor': 'craftcms', 'Product': 'cms', 'Versions': '>= 3.0.0, < 3.8.4, >= 4.0.0, < 4.4.4'} |
CVE-2023-31294 | CSV Injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 (#718), allows remote attackers to obtain sensitive information via the Delivery Name field. | https://herolab.usd.de/en/security-advisories/usd-2022-0052/ | 2023-04-27T00:00:00 | 2023-12-29T00:00:00 | 2023-12-29T02:46:30.142249 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31914 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc. | https://github.com/jerryscript-project/jerryscript/issues/5071 | 2023-04-29T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31017 | NVIDIA GPU Display Driver for Windows contains a vulnerability where an attacker may be able to write arbitrary data to privileged locations by using reparse points. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, or data tampering. | https://nvidia.custhelp.com/app/answers/detail/a_id/5491 | 2023-04-22T02:38:25.654Z | 2023-11-02T18:56:19.822Z | 2023-11-02T18:56:19.822Z | {'Vendor': 'nvidia', 'Product': 'NVIDIA GPU Display driver, vGPU driver, and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'} |
CVE-2023-31447 | user_login.cgi on Draytek Vigor2620 devices before 3.9.8.4 (and on all versions of Vigor2925 devices) allows attackers to send a crafted payload to modify the content of the code segment, insert shellcode, and execute arbitrary code. | https://draytek.com | 2023-04-28T00:00:00 | 2023-08-21T00:00:00 | 2023-08-21T12:23:59.756827 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31152 | An Authentication Bypass Using an Alternate Path or Channel vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface allows Authentication Bypass.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:04.957Z | 2023-05-10T19:21:50.029Z | 2023-05-10T19:21:50.029Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R147-V0, R147-V0, R147-V0, R147-V0'} |
CVE-2023-31502 | Altenergy Power Control Software C1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the component /models/management_model.php. | https://github.com/ahmedalroky/Disclosures/blob/main/apesystems/Insufficient_Verification_of_Data_Authenticity.MD | 2023-04-29T00:00:00 | 2023-05-11T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31851 | Cudy LT400 1.13.4 is has a cross-site scripting (XSS) vulnerability in /cgi-bin/luci/admin/network/wireless/status via the iface parameter. | https://www.cudy.com | 2023-04-29T00:00:00 | 2023-07-17T00:00:00 | 2023-07-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31410 | A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted. | https://sick.com/psirt | 2023-04-27T18:35:47.418Z | 2023-06-19T14:57:52.413Z | 2023-06-19T14:57:52.413Z | {'Vendor': 'SICK AG', 'Product': 'EventCam App', 'Versions': 'all versions'} |
CVE-2023-31943 | SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the ticket_id parameter at ticket_detail.php. | https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug6-SQL-Injection-ticket_id.md | 2023-04-29T00:00:00 | 2023-08-17T00:00:00 | 2023-08-17T19:36:09.785477 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31806 | Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via a crafted payload to the My Progress function. | http://chamilo.com | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31555 | podofoinfo 0.10.0 was discovered to contain a segmentation violation via the function PoDoFo::PdfObject::DelayedLoad. | https://github.com/podofo/podofo/issues/67 | 2023-04-29T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31742 | There is a command injection vulnerability in the Linksys WRT54GL router with firmware version 4.30.18.006. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges. | http://linksys.com | 2023-04-29T00:00:00 | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31607 | An issue in the __libc_malloc component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1120 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31484 | CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS. | https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/ | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | 2023-07-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31191 | DroneScout ds230 Remote ID receiver from BlueMark Innovations is affected by an information loss vulnerability through traffic injection.
An attacker can exploit this vulnerability by injecting, on carefully selected channels, high power spoofed Open Drone ID (ODID) messages which force the DroneScout ds230 Remote ID receiver to drop real Remote ID (RID) information and, instead, generate and transmit JSON encoded MQTT messages containing crafted RID information. Consequently, the MQTT broker, typically operated by a system integrator, will have no access to the drones’ real RID information.
This issue affects the adjacent channel suppression algorithm present in DroneScout ds230 firmware from version 20211210-1627 through 20230329-1042. | https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-31191/ | 2023-05-04T14:37:53.633Z | 2023-07-11T08:45:14.541Z | 2023-07-11T08:45:14.541Z | {'Vendor': 'bluemark', 'Product': 'ds230', 'Versions': '20230104-1650 '} |
CVE-2023-31938 | SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php. | https://github.com/DiliLearngent/BugReport/blob/main/php/Online-Travel-Agency-System/bug2-SQL-Injection-emp_id.md | 2023-04-29T00:00:00 | 2023-08-17T00:00:00 | 2023-08-17T19:37:21.062728 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31200 |
PTC Vuforia Studio does not require a token; this could allow an
attacker with local access to perform a cross-site request forgery
attack or a replay attack.
| https://https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-13 | 2023-04-24T23:30:29.242Z | 2023-06-07T21:52:29.300Z | 2023-06-07T21:52:29.300Z | {'Vendor': 'PTC ', 'Product': 'Vuforia Studio', 'Versions': '0'} |
CVE-2023-31129 | The Contiki-NG operating system versions 4.8 and prior can be triggered to dereference a NULL pointer in the message handling code for IPv6 router solicitiations. Contiki-NG contains an implementation of IPv6 Neighbor Discovery (ND) in the module `os/net/ipv6/uip-nd6.c`. The ND protocol includes a message type called Router Solicitation (RS), which is used to locate routers and update their address information via the SLLAO (Source Link-Layer Address Option). If the indicated source address changes, a given neighbor entry is set to the STALE state.
The message handler does not check for RS messages with an SLLAO that indicates a link-layer address change that a neighbor entry can actually be created for the indicated address. The resulting pointer is used without a check, leading to the dereference of a NULL pointer of type `uip_ds6_nbr_t`.
The problem has been patched in the `develop` branch of Contiki-NG, and will be included in the upcoming 4.9 release. As a workaround, users can apply Contiki-NG pull request #2271 to patch the problem directly. | https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-x29r-5qjg-75mq | 2023-04-24T21:44:10.416Z | 2023-05-08T20:51:14.657Z | 2023-05-08T20:51:14.657Z | {'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'} |
CVE-2023-31083 | An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu->proto is set. A NULL pointer dereference may occur. | https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g%40mail.gmail.com/ | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-09-29T21:06:19.077696 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31579 | Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token. | https://github.com/dromara/lamp-cloud/issues/183 | 2023-04-29T00:00:00 | 2023-11-02T00:00:00 | 2023-11-02T21:25:06.845490 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31703 | Cross Site Scripting (XSS) in the edit user form in Microworld Technologies eScan management console 14.0.1400.2281 allows remote attacker to inject arbitrary code via the from parameter. | https://github.com/sahiloj/CVE-2023-31703/blob/main/README.md | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31216 | Cross-Site Request Forgery (CSRF) vulnerability in Ultimate Member plugin <= 2.6.0 versions. | https://patchstack.com/database/vulnerability/ultimate-member/wordpress-ultimate-member-plugin-2-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-04-25T12:01:56.446Z | 2023-07-17T13:50:07.650Z | 2023-07-17T13:50:07.650Z | {'Vendor': 'Ultimate Member', 'Product': 'Ultimate Member', 'Versions': 'n/a'} |
CVE-2023-31996 | Hanwha IP Camera ANE-L7012R 1.41.01 is vulnerable to Command Injection due to improper sanitization of special characters for the NAS storage test function. | https://www.hanwhavision.com/wp-content/uploads/2023/04/Camera-Vulnerability-Report.pdf | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31095 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms.This issue affects Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms: from n/a through 1.2.8.
| https://patchstack.com/database/vulnerability/cf7-hubspot/wordpress-integration-for-contact-form-7-hubspot-plugin-1-2-8-open-redirection-vulnerability?_s_id=cve | 2023-04-24T05:43:49.922Z | 2023-12-29T09:50:01.256Z | 2023-12-29T09:50:01.256Z | {'Vendor': 'CRM Perks', 'Product': 'Integration for HubSpot and Contact Form 7, WPForms, Elementor, Ninja Forms', 'Versions': 'n/a'} |
CVE-2023-31580 | light-oauth2 before version 2.1.27 obtains the public key without any verification. This could allow attackers to authenticate to the application with a crafted JWT token. | https://github.com/networknt/light-oauth2/issues/369 | 2023-04-29T00:00:00 | 2023-10-24T00:00:00 | 2023-10-24T22:08:42.319924 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31979 | Catdoc v0.95 was discovered to contain a global buffer overflow via the function process_file at /src/reader.c. | https://github.com/petewarden/catdoc/issues/9 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31754 | Optimizely CMS UI before v12.16.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Admin panel. | https://labs.withsecure.com/advisories/optimizely-admin-panel-dom-xss | 2023-04-29T00:00:00 | 2023-11-14T00:00:00 | 2023-11-14T03:11:01.538000 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31611 | An issue in the __libc_longjmp component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1119 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31241 |
Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01 | 2023-04-26T19:18:23.286Z | 2023-05-22T19:26:22.401Z | 2023-05-22T19:26:22.401Z | {'Vendor': 'Snap One', 'Product': 'OvrC Cloud', 'Versions': '0'} |
CVE-2023-31492 | Zoho ManageEngine ADManager Plus version 7182 and prior disclosed the default passwords for the account restoration of unauthorized domains to the authenticated users. | https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md | 2023-04-29T00:00:00 | 2023-08-17T00:00:00 | 2023-08-22T21:38:25.292711 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31168 |
An Inclusion of Functionality from Untrusted Control Sphere vulnerability in the Schweitzer Engineering Laboratories SEL-5030 acSELerator QuickSet Software could allow an attacker to embed instructions that could be executed by an authorized device operator.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5030 acSELerator QuickSet Software: through 7.1.3.0.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:20:01.608Z | 2023-08-31T15:30:14.809Z | 2023-08-31T15:30:14.809Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5030 acSELerator QuickSet Software', 'Versions': '0'} |
CVE-2023-31187 | Avaya IX Workforce Engagement v15.2.7.1195 - CWE-522: Insufficiently Protected Credentials | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-04-24T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'Avaya', 'Product': 'IX Workforce Engagement', 'Versions': 'Update to the latest version'} |
CVE-2023-31163 |
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:33.136Z | 2023-05-10T19:24:45.965Z | 2023-05-10T19:24:45.965Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'} |
CVE-2023-31860 | Wuzhi CMS v3.1.2 has a storage type XSS vulnerability in the backend of the Five Finger CMS b2b system. | https://github.com/wuzhicms/b2b/issues/3 | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31925 | Brocade
SANnav before v2.3.0 and v2.2.2a stores SNMPv3 Authentication passwords
in plaintext. A privileged user could retrieve these credentials with
knowledge and access to these log files. SNMP
credentials could be seen in SANnav SupportSave if the capture is
performed after an SNMP configuration failure causes an SNMP
communication log dump.
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22506 | 2023-04-29T01:29:30.559Z | 2023-08-31T00:20:30.874Z | 2023-08-31T00:20:31.179Z | {'Vendor': 'Brocade', 'Product': 'Brocade SANnav', 'Versions': 'Brocade SANnav before v2.3.0 and v2.2.2a '} |
CVE-2023-31476 | An issue was discovered on GL.iNet devices running firmware before 3.216. There is an arbitrary file write in which an empty file can be created almost anywhere on the filesystem, as long as the filename and path is no more than 6 characters (the working directory is /www). | https://www.gl-inet.com | 2023-04-28T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31026 | NVIDIA vGPU software for Windows and Linux contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a NULL-pointer dereference may lead to denial of service. | https://nvidia.custhelp.com/app/answers/detail/a_id/5491 | 2023-04-22T02:38:27.192Z | 2023-11-02T18:56:22.940Z | 2023-11-02T18:56:22.940Z | {'Vendor': 'nvidia', 'Product': 'vGPU driver and Cloud gaming driver', 'Versions': 'All versions prior to and including 13.8, 15.3, 16.1 and all versions prior to and including September 2023 release'} |
CVE-2023-31708 | A Cross-Site Request Forgery (CSRF) in EyouCMS v1.6.2 allows attackers to execute arbitrary commands via a supplying a crafted HTML file to the Upload software format function. | https://github.com/weng-xianhu/eyoucms/issues/41 | 2023-04-29T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31134 | Tauri is software for building applications for multi-platform deployment. The Tauri IPC is usually strictly isolated from external websites, but in versions 1.0.0 until 1.0.9, 1.1.0 until 1.1.4, and 1.2.0 until 1.2.5, the isolation can be bypassed by redirecting an existing Tauri window to an external website. This is either possible by an application implementing a feature for users to visit
arbitrary websites or due to a bug allowing the open redirect. This allows the external website access to the IPC layer and therefore to all configured and exposed Tauri API endpoints and application specific implemented Tauri commands. This issue has been patched in versions 1.0.9, 1.1.4, and 1.2.5. As a workaround, prevent arbitrary input in redirect features and/or only allow trusted websites access to the IPC. | https://github.com/tauri-apps/tauri/security/advisories/GHSA-4wm2-cwcf-wwvp | 2023-04-24T21:44:10.416Z | 2023-05-09T13:09:31.399Z | 2023-05-09T13:09:31.399Z | {'Vendor': 'tauri-apps', 'Product': 'tauri', 'Versions': '>= 1.0.0, < 1.0.9, >= 1.1.0, < 1.1.4, >= 1.2.0, < 1.2.5'} |
CVE-2023-31071 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Yannick Lefebvre Modal Dialog plugin <= 3.5.14 versions. | https://patchstack.com/database/vulnerability/modal-dialog/wordpress-modal-dialog-plugin-3-5-14-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-24T05:42:59.930Z | 2023-08-17T08:41:21.755Z | 2023-08-17T08:41:21.755Z | {'Vendor': 'Yannick Lefebvre', 'Product': 'Modal Dialog', 'Versions': 'n/a'} |
CVE-2023-31421 | It was discovered that when acting as TLS clients, Beats, Elastic Agent, APM Server, and Fleet Server did not verify whether the server certificate is valid for the target IP address; however, certificate signature validation is still performed. More specifically, when the client is configured to connect to an IP address (instead of a hostname) it does not validate the server certificate's IP SAN values against that IP address and certificate validation fails, and therefore the connection is not blocked as expected. | https://discuss.elastic.co/t/beats-elastic-agent-apm-server-and-fleet-server-8-10-1-security-update-improper-certificate-validation-issue-esa-2023-16/343385 | 2023-04-27T18:54:56.705Z | 2023-10-26T03:10:52.684Z | 2023-10-26T03:10:52.684Z | {'Vendor': 'Elastic', 'Product': 'Beats', 'Versions': '8.0.0, 8.9.2'} |
CVE-2023-31972 | yasm v1.3.0 was discovered to contain a use after free via the function pp_getline at /nasm/nasm-pp.c. | https://github.com/yasm/yasm/issues/209 | 2023-04-29T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31088 | Cross-Site Request Forgery (CSRF) vulnerability in Faraz Quazi Floating Action Button plugin <= 1.2.1 versions. | https://patchstack.com/database/vulnerability/floating-action-button/wordpress-floating-action-button-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-04-24T05:43:49.922Z | 2023-11-09T22:53:08.821Z | 2023-11-09T22:53:08.821Z | {'Vendor': 'Faraz Quazi', 'Product': 'Floating Action Button', 'Versions': 'n/a'} |
CVE-2023-31572 | An issue in Bludit 4.0.0-rc-2 allows authenticated attackers to change the Administrator password and escalate privileges via a crafted request. | https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/bludit/2023/Bludit-v4.0.0-Release-candidate-2 | 2023-04-29T00:00:00 | 2023-05-16T00:00:00 | 2023-05-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31122 | Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
| https://httpd.apache.org/security/vulnerabilities_24.html | 2023-04-24T17:37:59.263Z | 2023-10-23T06:51:59.705Z | 2023-10-23T06:51:59.705Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache HTTP Server', 'Versions': '0'} |
CVE-2023-31821 | An issue found in ALBIS Co. ALBIS v.13.6.1 allows a remote attacker to gain access to sensitive information via the channel access token in the miniapp ALBIS function. | http://albis.com | 2023-04-29T00:00:00 | 2023-07-13T00:00:00 | 2023-07-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31437 | An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability." | https://github.com/systemd/systemd/releases | 2023-04-28T00:00:00 | 2023-06-13T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31067 | An issue was discovered in TSplus Remote Access through 16.0.2.14. There are Full Control permissions for Everyone on some directories under %PROGRAMFILES(X86)%\TSplus\Clients\www. | http://packetstormsecurity.com/files/174275/TSPlus-16.0.2.14-Insecure-Permissions.html | 2023-04-24T00:00:00 | 2023-09-11T00:00:00 | 2023-09-11T18:18:26.417003 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31175 |
An Execution with Unnecessary Privileges vulnerability in the Schweitzer Engineering Laboratories SEL-5037 SEL Grid Configurator could allow an attacker to run system commands with the highest level privilege on the system.
See Instruction Manual Appendix A and Appendix E dated 20230615 for more details.
This issue affects SEL-5037 SEL Grid Configurator: before 4.5.0.20.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:20:01.609Z | 2023-08-31T15:31:33.536Z | 2023-08-31T15:31:33.536Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-5037 SEL Grid Configurator', 'Versions': '0'} |
CVE-2023-31030 | NVIDIA DGX A100 BMC contains a vulnerability in the host KVM daemon, where an unauthenticated attacker may cause a stack overflow by sending a specially crafted network packet. A successful exploit of this vulnerability may lead to arbitrary code execution, denial of service, information disclosure, and data tampering. | https://nvidia.custhelp.com/app/answers/detail/a_id/5510 | 2023-04-22T02:38:33.413Z | 2024-01-12T18:31:34.210Z | 2024-01-12T18:31:34.210Z | {'Vendor': 'nvidia', 'Product': 'DGX A100', 'Versions': 'All BMC versions prior to 00.22.05'} |
CVE-2023-31460 | A vulnerability in the Connect Mobility Router component of MiVoice Connect versions 9.6.2208.101 and earlier could allow an authenticated attacker with internal network access to conduct a command injection attack due to insufficient restriction on URL parameters. | https://www.mitel.com/support/security-advisories | 2023-04-28T00:00:00 | 2023-05-24T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31933 | Sql injection vulnerability found in Rail Pass Management System v.1.0 allows a remote attacker to execute arbitrary code via the editid parameter of the edit-pass-detail.php file. | https://github.com/DiliLearngent/BugReport/blob/main/php/Rail-Pass-Management-System/bug4-SQL-Injection-editid2.md | 2023-04-29T00:00:00 | 2023-07-28T00:00:00 | 2023-07-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31677 | Insecure permissions in luowice 3.5.18 allow attackers to view information for other alarm devices via modification of the eseeid parameter. | https://github.com/zzh-newlearner/record/blob/main/luowice.md | 2023-04-29T00:00:00 | 2023-05-16T00:00:00 | 2023-05-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31227 | The hwPartsDFR module has a vulnerability in API calling verification. Successful exploitation of this vulnerability may affect device confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/5/ | 2023-04-26T00:00:00 | 2023-05-26T00:00:00 | 2023-05-26T00:00:00 | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0, 2.1.0'} |
CVE-2023-31698 | Bludit v3.14.1 is vulnerable to Stored Cross Site Scripting (XSS) via SVG file on site logo. NOTE: the product's security model is that users are trusted by the administrator to insert arbitrary content (users cannot create their own accounts through self-registration). | https://github.com/bludit/bludit/issues/1509 | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-12-30T20:56:19.182482 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31620 | An issue in the dv_compare component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1128 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31159 |
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code.
See SEL Service Bulletin dated 2022-11-15 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:19:33.136Z | 2023-05-10T19:23:29.182Z | 2023-05-10T19:23:29.182Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R132-V0, R132-V0, R132-V0, R132-V0'} |
CVE-2023-31289 | Pexip Infinity before 31.2 has Improper Input Validation for signalling, allowing remote attackers to trigger an abort. | https://docs.pexip.com/admin/security_bulletins.htm | 2023-04-27T00:00:00 | 2023-12-25T00:00:00 | 2023-12-25T06:13:09.746497 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31231 | Unrestricted Upload of File with Dangerous Type vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates).This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.65.
| https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-65-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-04-26T15:10:10.074Z | 2023-12-20T18:56:58.422Z | 2023-12-20T18:56:58.422Z | {'Vendor': 'Unlimited Elements', 'Product': 'Unlimited Elements For Elementor (Free Widgets, Addons, Templates)', 'Versions': 'n/a'} |
CVE-2023-31724 | yasm 1.3.0.55.g101bc was discovered to contain a segmentation violation via the function do_directive at /nasm/nasm-pp.c. | https://github.com/yasm/yasm/issues/222 | 2023-04-29T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31548 | A stored Cross-site scripting (XSS) vulnerability in the FundRaiserEditor.php component of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548 | 2023-04-29T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31180 |
WJJ Software - InnoKB Server, InnoKB/Console 2.2.1 - Reflected cross-site scripting (RXSS) through an unspecified request.
| https://www.gov.il/en/Departments/faq/cve_advisories | 2023-04-24T23:25:07.106Z | 2023-05-08T00:00:00 | 2023-05-17T21:52:52.036Z | {'Vendor': ' WJJ Software', 'Product': ' InnoKB Server, InnoKB/Console', 'Versions': '2.2.1'} |
CVE-2023-31753 | SQL injection vulnerability in diskusi.php in eNdonesia 8.7, allows an attacker to execute arbitrary SQL commands via the "rid=" parameter. | https://github.com/khmk2k/CVE-2023-31753/ | 2023-04-29T00:00:00 | 2023-07-20T00:00:00 | 2023-07-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31616 | An issue in the bif_mod component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | https://github.com/openlink/virtuoso-opensource/issues/1122 | 2023-04-29T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31246 | Incorrect default permissions in some Intel(R) SDP Tool software before version 1.4 build 5 may allow an authenticated user to potentially enable escalation of privilege via local access. | http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00905.html | 2023-05-05T03:00:03.594Z | 2023-08-11T02:37:22.996Z | 2023-08-11T02:37:22.996Z | {'Vendor': 'n/a', 'Product': 'Intel(R) SDP Tool software', 'Versions': 'before version 1.4 build 5'} |
CVE-2023-31092 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Foxskav Easy Bet.This issue affects Easy Bet: from n/a through 1.0.2.
| https://patchstack.com/database/vulnerability/easy-bet/wordpress-easy-bet-plugin-1-0-2-sql-injection-vulnerability?_s_id=cve | 2023-04-24T05:43:49.922Z | 2023-12-20T16:06:08.229Z | 2023-12-20T16:06:08.229Z | {'Vendor': 'Foxskav', 'Product': 'Easy Bet', 'Versions': 'n/a'} |
CVE-2023-31568 | Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4. | https://github.com/podofo/podofo/issues/72 | 2023-04-29T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-31138 | DHIS2 Core contains the service layer and Web API for DHIS2, an information system for data capture. Starting in the 2.36 branch and prior to versions 2.37.9.1, 2.38.3.1, and 2.39.1.2, using object model traversal in the payload of a PATCH request, authenticated users with write access to an object may be able to modify related objects that they should not have access to. DHIS2 implementers should upgrade to a supported version of DHIS2 to receive a patch: 2.37.9.1, 2.38.3.1, or 2.39.1.2. It is possible to work around this issue by blocking all PATCH requests on a reverse proxy, but this may cause some issues with the functionality of built-in applications using legacy PATCH requests. | https://github.com/dhis2/dhis2-core/security/advisories/GHSA-pwvw-4m67-f4g2 | 2023-04-24T21:44:10.417Z | 2023-05-09T14:11:11.868Z | 2023-05-09T14:11:11.868Z | {'Vendor': 'dhis2', 'Product': 'dhis2-core', 'Versions': '>= 2.36, < 2.37.9.1, >= 2.38, < 2.38.3.1, >= 2.39, < 2.39.1.2'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.