CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-30179
CraftCMS version 3.7.59 is vulnerable to Server-Side Template Injection (SSTI). An authenticated attacker can inject Twig Template to User Photo Location field when setting User Photo Location in User Settings, lead to Remote Code Execution. NOTE: the vendor disputes this because only Administrators can add this Twig code, and (by design) Administrators are allowed to do that by default.
https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#442---2023-03-14
2023-04-07T00:00:00
2023-06-13T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30529
Jenkins Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require POST requests for an HTTP endpoint, allowing attackers to reindex the database.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3013
2023-04-12T08:40:40.605Z
2023-04-12T17:05:17.194Z
2023-10-24T12:49:51.787Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Lucene-Search Plugin', 'Versions': '0'}
CVE-2023-30745
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Phan Chuong IP Metaboxes plugin <= 2.1.1 versions.
https://patchstack.com/database/vulnerability/ip-metaboxes/wordpress-ip-metaboxes-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-14T07:08:36.338Z
2023-06-12T13:59:02.634Z
2023-06-12T13:59:02.634Z
{'Vendor': 'Phan Chuong', 'Product': 'IP Metaboxes', 'Versions': 'n/a'}
CVE-2023-30591
Denial-of-service in NodeBB <= v2.8.10 allows unauthenticated attackers to trigger a crash, when invoking `eventName.startsWith()` or `eventName.toString()`, while processing Socket.IO messages via crafted Socket.IO messages containing array or object type for the event name respectively.
https://starlabs.sg/advisories/23/23-30591/
2023-04-13T04:12:59.954Z
2023-09-29T05:06:43.923Z
2023-09-29T05:06:43.923Z
{'Vendor': 'NodeBB, Inc.', 'Product': 'NodeBB', 'Versions': '0'}
CVE-2023-30084
An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c.
https://github.com/libming/libming/issues/268
2023-04-07T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30987
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query on certain databases. IBM X-Force ID: 253440.
https://www.ibm.com/support/pages/node/7047560
2023-04-21T17:49:51.825Z
2023-10-16T20:48:07.845Z
2023-10-16T20:48:07.845Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1 ,11.5'}
CVE-2023-30207
A divide by zero issue discovered in Kodi Home Theater Software 19.5 and earlier allows attackers to cause a denial of service via use of crafted mp3 file.
https://github.com/xbmc/xbmc/issues/22378
2023-04-07T00:00:00
2023-07-05T00:00:00
2024-01-23T07:06:17.072478
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30657
Improper input validation vulnerability in EnhancedAttestationResult prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.117Z
2023-07-06T02:51:30.507Z
2023-07-06T02:51:30.507Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30712
Improper input validation in Settings Suggestions prior to SMR Sep-2023 Release 1 allows attackers to launch arbitrary activity.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09
2023-04-14T01:59:51.136Z
2023-09-06T03:11:58.480Z
2023-09-06T03:11:58.480Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 13'}
CVE-2023-30505
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt
2023-04-11T20:22:08.184Z
2023-05-16T18:51:46.597Z
2023-07-07T14:28:51.484Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'}
CVE-2023-30856
eDEX-UI is a science fiction terminal emulator. Versions 2.2.8 and prior are vulnerable to cross-site websocket hijacking. When running eDEX-UI and browsing the web, a malicious website can connect to eDEX's internal terminal control websocket, and send arbitrary commands to the shell. The project has been archived since 2021, and as of time of publication there are no plans to patch this issue and release a new version. Some workarounds are available, including shutting down eDEX-UI when browsing the web and ensuring the eDEX terminal runs with lowest possible privileges.
https://github.com/GitSquared/edex-ui/security/advisories/GHSA-q8xc-f2wf-ffh9
2023-04-18T16:13:15.882Z
2023-04-28T15:54:54.891Z
2023-04-28T15:54:54.891Z
{'Vendor': 'GitSquared', 'Product': 'edex-ui', 'Versions': '<= 2.2.8'}
CVE-2023-30913
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.245Z
2023-07-12T08:31:55.539Z
2023-07-12T08:31:55.539Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30440
IBM PowerVM Hypervisor FW860.00 through FW860.B3, FW950.00 through FW950.70, FW1010.00 through FW1010.50, FW1020.00 through FW1020.30, and FW1030.00 through FW1030.10 could allow a local attacker with control a partition that has been assigned SRIOV virtual function (VF) to cause a denial of service to a peer partition or arbitrary data corruption. IBM X-Force ID: 253175.
https://www.ibm.com/support/pages/node/6997133
2023-04-08T15:56:40.868Z
2023-05-23T13:20:41.163Z
2023-05-23T13:20:41.163Z
{'Vendor': 'IBM', 'Product': 'PowerVM Hypervisor', 'Versions': 'FW860.00, FW950.00, FW1010.00, FW1020.00, FW1030.00'}
CVE-2023-30769
Vulnerability discovered is related to the peer-to-peer (p2p) communications, attackers can craft consensus messages, send it to individual nodes and take them offline. An attacker can crawl the network peers using getaddr message and attack the unpatched nodes.
https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks
2023-04-14T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Dogecoin', 'Product': 'Node', 'Versions': 'Release'}
CVE-2023-30786
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Benjamin Guy Captcha Them All plugin <= 1.3.3 versions.
https://patchstack.com/database/vulnerability/captcha-them-all/wordpress-captcha-them-all-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-17T12:29:35.717Z
2023-08-16T09:38:46.457Z
2023-08-16T09:38:46.457Z
{'Vendor': 'Benjamin Guy', 'Product': 'Captcha Them All', 'Versions': 'n/a'}
CVE-2023-30801
All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.
https://github.com/qbittorrent/qBittorrent/issues/18731
2023-04-18T10:31:45.962Z
2023-10-10T13:46:46.775Z
2023-10-10T13:46:46.775Z
{'Vendor': 'qBittorrent', 'Product': 'qBittorrent client', 'Versions': '0'}
CVE-2023-30552
Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `sql/instance.py` endpoint's `describe` method. In several cases, user input coming from the `tb_name` parameter value, the `db_name` parameter value or the `schema_name` value in the `sql/instance.py` `describe` endpoint is passed to the `describe_table` methods in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. Please take into account that in some cases all three parameter values are concatenated, in other only one or two of them. The affected methods are: `describe_table` in `sql/engines/clickhouse.py`which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/clickhouse.py`, `describe_table` in `sql/engines/mssql.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/mssql.py`, `describe_table` in `sql/engines/mysql.py`which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/mysql.py`, `describe_table` in `sql/engines/oracle.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/oracle.py`, `describe_table` in `sql/engines/pgsql.py`which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/pgsql.py`, `describe_table` in `sql/engines/phoenix.py` which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/phoenix.py`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-101`.
https://github.com/hhyo/Archery/security/advisories/GHSA-9jvj-8h33-6cqp
2023-04-12T15:19:33.768Z
2023-04-18T22:35:30.098Z
2023-04-18T22:35:30.098Z
{'Vendor': 'hhyo', 'Product': 'Archery', 'Versions': '<= 1.9.0'}
CVE-2023-30417
A cross-site scripting (XSS) vulnerability in Pear-Admin-Boot up to v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title of a private message.
https://gitee.com/pear-admin/Pear-Admin-Boot/issues/I6SXHX
2023-04-07T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30944
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
https://bugzilla.redhat.com/show_bug.cgi?id=2188606
2023-04-21T00:00:00
2023-05-02T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': 'Fixed in 4.1.3, 4.0.8, 3.11.14 and 3.9.21'}
CVE-2023-30694
Out-of-bounds Write in IpcTxPcscTransmitApdu of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.126Z
2023-08-10T01:18:38.315Z
2023-08-10T01:18:38.315Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30544
Kiwi TCMS is an open source test management system. In versions of Kiwi TCMS prior to 12.2, users were able to update their email addresses via the `My profile` admin page. This page allowed them to change the email address registered with their account without the ownership verification performed during account registration. Operators of Kiwi TCMS should upgrade to v12.2 or later to receive a patch. No known workarounds exist.
https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7x6q-3v3m-cwjg
2023-04-12T15:19:33.767Z
2023-04-24T16:26:08.626Z
2023-04-24T16:26:08.626Z
{'Vendor': 'kiwitcms', 'Product': 'Kiwi', 'Versions': '< 12.2'}
CVE-2023-30952
A security defect was discovered in Foundry Issues that enabled users to create convincing phishing links by editing the request sent when creating an Issue. This defect was resolved in Frontend release 6.228.0 .
https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4
2023-04-21T10:39:02.385Z
2023-08-03T21:12:53.803Z
2023-08-03T21:12:53.803Z
{'Vendor': 'Palantir', 'Product': 'com.palantir.foundry:foundry-frontend', 'Versions': '6.228.0'}
CVE-2023-30682
Improper access control in Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call silenceRinger API without permission.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.122Z
2023-08-10T01:18:25.722Z
2023-08-10T01:18:25.722Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30378
In Tenda AC15 V15.03.05.19, the function "sub_8EE8" contains a stack-based buffer overflow vulnerability.
https://github.com/2205794866/Tenda/blob/main/AC15/5.md
2023-04-07T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30728
Intent redirection vulnerability in PackageInstallerCHN prior to version 13.1.03.00 allows local attacker to access arbitrary file. This vulnerability requires user interaction.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09
2023-04-14T01:59:51.138Z
2023-09-06T03:12:14.820Z
2023-09-06T03:12:14.820Z
{'Vendor': 'Samsung Mobile', 'Product': 'PackageInstallerCHN ', 'Versions': ' 13.1.03.00'}
CVE-2023-30840
Fluid is an open source Kubernetes-native distributed dataset orchestrator and accelerator for data-intensive applications. Starting in version 0.7.0 and prior to version 0.8.6, if a malicious user gains control of a Kubernetes node running fluid csi pod (controlled by the `csi-nodeplugin-fluid` node-daemonset), they can leverage the fluid-csi service account to modify specs of all the nodes in the cluster. However, since this service account lacks `list node` permissions, the attacker may need to use other techniques to identify vulnerable nodes. Once the attacker identifies and modifies the node specs, they can manipulate system-level-privileged components to access all secrets in the cluster or execute pods on other nodes. This allows them to elevate privileges beyond the compromised node and potentially gain full privileged access to the whole cluster. To exploit this vulnerability, the attacker can make all other nodes unschedulable (for example, patch node with taints) and wait for system-critical components with high privilege to appear on the compromised node. However, this attack requires two prerequisites: a compromised node and identifying all vulnerable nodes through other means. Version 0.8.6 contains a patch for this issue. As a workaround, delete the `csi-nodeplugin-fluid` daemonset in `fluid-system` namespace and avoid using CSI mode to mount FUSE file systems. Alternatively, using sidecar mode to mount FUSE file systems is recommended.
https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-93xx-cvmc-9w3v
2023-04-18T16:13:15.880Z
2023-05-08T17:45:46.519Z
2023-05-08T17:45:46.519Z
{'Vendor': 'fluid-cloudnative', 'Product': 'fluid', 'Versions': '>= 0.7.0, < 0.8.6'}
CVE-2023-30513
Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3075
2023-04-12T08:40:40.603Z
2023-04-12T17:05:05.743Z
2023-10-24T12:49:33.213Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Kubernetes Plugin', 'Versions': '3910.ve59cec5e33ea_, 3670.3672.v0ec52a_286336, 3900.3902.v10b_836a_c8c15'}
CVE-2023-30456
An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.
https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
2023-04-10T00:00:00
2023-04-10T00:00:00
2023-07-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30905
The MC990 X and UV300 RMC component has and inadequate default configuration that could be exploited to obtain enhanced privilege.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04473en_us
2023-04-20T16:58:53.925Z
2023-06-16T20:47:58.863Z
2023-06-16T21:05:27.472Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE MC990 X RMC firmware', 'Versions': '0'}
CVE-2023-30285
An issue in Deviniti Issue Sync Synchronization v3.5.2 for Jira allows attackers to obtain the login credentials of a user via a crafted request sent to /rest/synchronizer/1.0/technicalUser.
http://deviniti.com
2023-04-07T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30790
MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/relationships` endpoint and first_name and last_name parameter.
https://fluidattacks.com/advisories/napoli
2023-04-17T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'}
CVE-2023-30708
Improper authentication in SecSettings prior to SMR Sep-2023 Release 1 allows attacker to access Captive Portal Wi-Fi in Reactivation Lock status.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09
2023-04-14T01:59:51.130Z
2023-09-06T03:11:54.441Z
2023-09-06T03:11:54.441Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 11, 12, 13'}
CVE-2023-30564
Alaris Systems Manager does not perform input validation during the Device Import Function.
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-alaris-system-with-guardrails-suite-mx
2023-04-12T16:30:07.537Z
2023-07-13T19:06:02.948Z
2023-10-26T15:51:01.853Z
{'Vendor': 'Becton Dickinson & Co', 'Product': 'BD Alarisâ„¢ Systems Manager', 'Versions': '0'}
CVE-2023-30837
Vyper is a pythonic smart contract language for the EVM. The storage allocator does not guard against allocation overflows in versions prior to 0.3.8. An attacker can overwrite the owner variable. This issue was fixed in version 0.3.8.
https://github.com/vyperlang/vyper/security/advisories/GHSA-mgv8-gggw-mrg6
2023-04-18T16:13:15.879Z
2023-05-08T16:03:06.162Z
2023-05-08T16:03:06.162Z
{'Vendor': 'vyperlang', 'Product': 'vyper', 'Versions': '< 0.3.8'}
CVE-2023-30925
In opm service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.246Z
2023-07-12T08:31:23.622Z
2023-07-12T08:31:23.622Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30860
WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue.
https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm
2023-04-18T16:13:15.882Z
2023-05-08T18:04:09.703Z
2023-05-08T18:04:09.703Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': "WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account"}
CVE-2023-30499
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FolioVision FV Flowplayer Video Player plugin <= 7.5.32.7212 versions.
https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-32-7212-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:43.801Z
2023-08-18T14:41:03.606Z
2023-08-18T14:41:03.606Z
{'Vendor': 'FolioVision', 'Product': 'FV Flowplayer Video Player', 'Versions': 'n/a'}
CVE-2023-30533
SheetJS Community Edition before 0.19.3 allows Prototype Pollution via a crafted file. In other words. 0.19.2 and earlier are affected, whereas 0.19.3 and later are unaffected.
https://git.sheetjs.com/sheetjs/sheetjs/src/branch/master/CHANGELOG.md
2023-04-12T00:00:00
2023-04-24T00:00:00
2023-09-07T06:11:51.421670
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30319
Cross Site Scripting (XSS) vulnerability in username field in /src/chatbotapp/LoginServlet.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code.
https://github.com/wliang6/ChatEngine/blame/fded8e710ad59f816867ad47d7fc4862f6502f3e/src/chatbotapp/LoginServlet.java#L30:L40
2023-04-07T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30749
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in ihomefinder Optima Express + MarketBoost IDX Plugin plugin <= 7.3.0 versions.
https://patchstack.com/database/vulnerability/optima-express/wordpress-optima-express-marketboost-idx-plugin-plugin-7-3-0-cross-site-scripting-xss?_s_id=cve
2023-04-14T07:08:36.339Z
2023-08-14T14:17:09.819Z
2023-08-14T14:17:09.819Z
{'Vendor': 'ihomefinder', 'Product': 'Optima Express + MarketBoost IDX Plugin', 'Versions': 'n/a'}
CVE-2023-30899
A vulnerability has been identified in Siveillance Video 2020 R2 (All versions < V20.2 HotfixRev14), Siveillance Video 2020 R3 (All versions < V20.3 HotfixRev12), Siveillance Video 2021 R1 (All versions < V21.1 HotfixRev12), Siveillance Video 2021 R2 (All versions < V21.2 HotfixRev8), Siveillance Video 2022 R1 (All versions < V22.1 HotfixRev7), Siveillance Video 2022 R2 (All versions < V22.2 HotfixRev5), Siveillance Video 2022 R3 (All versions < V22.3 HotfixRev2), Siveillance Video 2023 R1 (All versions < V23.1 HotfixRev1). The Management Server component of affected applications deserializes data without sufficient validations. This could allow an authenticated remote attacker to execute code on the affected system.
https://cert-portal.siemens.com/productcert/pdf/ssa-789345.pdf
2023-04-20T12:49:01.866Z
2023-05-09T11:51:37.547Z
2023-05-09T11:51:37.547Z
{'Vendor': 'Siemens', 'Product': 'Siveillance Video 2020 R2', 'Versions': 'All versions < V20.2 HotfixRev14'}
CVE-2023-30933
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.248Z
2023-07-12T08:31:37.964Z
2023-07-12T08:31:37.964Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30525
A cross-site request forgery (CSRF) vulnerability in Jenkins Report Portal Plugin 0.5 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified bearer token authentication.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2950
2023-04-12T08:40:40.604Z
2023-04-12T17:05:14.297Z
2023-10-24T12:49:47.090Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Report Portal Plugin', 'Versions': '0'}
CVE-2023-30876
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Dave Ross Dave's WordPress Live Search plugin <= 4.8.1 versions.
https://patchstack.com/database/vulnerability/daves-wordpress-live-search/wordpress-dave-s-wordpress-live-search-plugin-4-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-19T12:33:22.776Z
2023-08-17T08:08:59.692Z
2023-08-17T08:08:59.692Z
{'Vendor': 'Dave Ross', 'Product': "Dave's WordPress Live Search", 'Versions': 'n/a'}
CVE-2023-30437
IBM Security Guardium 11.3, 11.4, and 11.5 could allow an unauthorized user to enumerate usernames by sending a specially crafted HTTP request. IBM X-Force ID: 252293.
https://www.ibm.com/support/pages/node/7028506
2023-04-08T15:56:20.544Z
2023-08-27T22:24:41.341Z
2023-08-27T22:24:41.341Z
{'Vendor': 'IBM', 'Product': 'Security Guardium', 'Versions': '11.3, 11.4, 11.5'}
CVE-2023-30122
An arbitrary file upload vulnerability in the component /admin/ajax.php?action=save_menu of Online Food Ordering System v2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.
https://github.com/xtxxueyan/bug_report/blob/main/vendors/onetnom23/online-food-ordering-system-v2/RCE-1.md
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30088
An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c.
https://github.com/cesanta/mjs/issues/243
2023-04-07T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30765
​Delta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-01
2023-06-06T14:32:07.388Z
2023-07-10T19:04:41.114Z
2023-07-10T19:04:41.114Z
{'Vendor': 'Delta Electronics', 'Product': 'Infrasuite Device Master', 'Versions': '0'}
CVE-2023-30620
mindsdb is a Machine Learning platform to help developers build AI solutions. In affected versions an unsafe extraction is being performed using `tarfile.extractall()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. Sometimes, the vulnerability is called a TarSlip or a ZipSlip variant. An attacker may leverage this vulnerability to overwrite any local file which the server process has access to. There is no risk of file exposure with this vulnerability. This issue has been addressed in release `23.2.1.0 `. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx
2023-04-13T13:25:18.832Z
2023-04-21T20:11:26.129Z
2023-04-21T20:11:26.129Z
{'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.2.1.0 '}
CVE-2023-30509
Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt
2023-04-11T20:22:08.185Z
2023-05-16T18:55:05.306Z
2023-07-07T14:31:12.085Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'}
CVE-2023-30698
Improper access control vulnerability in TelephonyUI prior to SMR Aug-2023 Release 1 allows local attacker to connect BLE without privilege.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.127Z
2023-08-10T01:18:44.150Z
2023-08-10T01:18:44.150Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30362
Buffer Overflow vulnerability in coap_send function in libcoap library 4.3.1-103-g52cfd56 fixed in 4.3.1-120-ge242200 allows attackers to obtain sensitive information via malformed pdu.
https://github.com/obgm/libcoap/issues/1063
2023-04-07T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30732
Improper access control in system property prior to SMR Oct-2023 Release 1 allows local attacker to get CPU serial number.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10
2023-04-14T01:59:51.138Z
2023-10-04T03:02:45.309Z
2023-10-04T03:02:45.309Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 13'}
CVE-2023-30677
Improper access control vulnerability in Samsung Pass prior to version 4.2.03.1 allows physical attackers to access data of Samsung Pass on a certain state of an unlocked device.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=07
2023-04-14T01:59:51.120Z
2023-07-06T02:51:50.242Z
2023-07-06T02:51:50.242Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Pass', 'Versions': '4.2.03.1'}
CVE-2023-30948
A security defect in Foundry's Comments functionality resulted in the retrieval of attachments to comments not being gated by additional authorization checks. This could enable an authenticated user to inject a prior discovered attachment UUID into other arbitrary comments to discover it's content. This defect was fixed in Foundry Comments 2.249.0, and a patch was rolled out to affected Foundry environments. No further intervention is required at this time.
https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62
2023-04-21T10:39:02.384Z
2023-06-06T14:12:59.240Z
2023-06-06T14:12:59.240Z
{'Vendor': 'Palantir', 'Product': 'com.palantir.comments:comments', 'Versions': '*'}
CVE-2023-30724
Improper authentication in GallerySearchProvider of Gallery prior to version 14.5.01.2 allows attacker to access search history.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09
2023-04-14T01:59:51.137Z
2023-09-06T03:12:11.505Z
2023-09-06T03:12:11.505Z
{'Vendor': 'Samsung Mobile', 'Product': 'Gallery', 'Versions': '14.5.01.2'}
CVE-2023-30661
Exposure of Sensitive Information vulnerability in getChipInfos in UwbAospAdapterService prior to SMR Jul-2023 Release 1 allows local attackers to access the UWB chipset Identifier.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.118Z
2023-07-06T02:51:34.339Z
2023-07-06T02:51:34.339Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30548
gatsby-plugin-sharp is a plugin for the gatsby framework which exposes functions built on the Sharp image processing library. The gatsby-plugin-sharp plugin prior to versions 5.8.1 and 4.25.1 contains a path traversal vulnerability exposed when running the Gatsby develop server (`gatsby develop`). It should be noted that by default gatsby develop is only accessible via the localhost 127.0.0.1, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as --host 0.0.0.0, -H 0.0.0.0, or the GATSBY_HOST=0.0.0.0 environment variable. Attackers exploiting this vulnerability will have read access to all files within the scope of the server process. A patch has been introduced in [email protected] and [email protected] which mitigates the issue by ensuring that included paths remain within the project directory. As stated above, by default gatsby develop is only exposed to the localhost 127.0.0.1. For those using the develop server in the default configuration no risk is posed. If other ranges are required, preventing the develop server from being exposed to untrusted interfaces or IP address ranges would mitigate the risk from this vulnerability. Users are non the less encouraged to upgrade to a safe version.
https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-h2pm-378c-pcxx
2023-04-12T15:19:33.767Z
2023-04-17T20:43:43.033Z
2023-04-17T20:43:43.033Z
{'Vendor': 'gatsbyjs', 'Product': 'gatsby', 'Versions': '< 4.25.1, >= 5.0.0, < 5.8.1'}
CVE-2023-30323
SQL Injection vulnerability in username field in /src/chatbotapp/chatWindow.java in Payatu ChatEngine v.1.0, allows attackers to gain sensitive information.
https://github.com/wliang6/ChatEngine/blob/fded8e710ad59f816867ad47d7fc4862f6502f3e/src/chatbotapp/chatWindow.java#L34:L60
2023-04-07T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30266
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type.
https://gist.github.com/HuBenLab/a6ef7e5efeae2635f54cb69327409a19
2023-04-07T00:00:00
2023-04-26T00:00:00
2023-05-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30636
TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error, with RpcStatus UNAVAILABLE for "not leader") upon an attempt to start a node in a situation where the context deadline is exceeded
https://github.com/tikv/tikv/issues/14517
2023-04-13T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30909
A remote authentication bypass issue exists in some OneView APIs.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04538en_us
2023-04-20T16:58:53.926Z
2023-09-14T14:56:34.484Z
2023-09-14T14:56:46.865Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '0'}
CVE-2023-30588
When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.
https://nodejs.org/en/blog/vulnerability/june-2023-security-releases
2023-04-13T01:00:12.086Z
2023-11-28T19:15:19.430Z
2023-11-28T19:15:19.430Z
{'Vendor': 'Node.js', 'Product': 'Node.js', 'Versions': '16.20.1, 18.16.1, 20.3.1'}
CVE-2023-30619
Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.
https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922
2023-04-13T13:25:18.832Z
2023-05-04T13:35:35.432Z
2023-05-04T13:35:35.432Z
{'Vendor': 'Enalean', 'Product': 'tuleap', 'Versions': ' >= 14.7.99.76, < 14.7.99.143'}
CVE-2023-30530
Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2944
2023-04-12T08:40:40.605Z
2023-04-12T17:05:17.918Z
2023-10-24T12:49:52.993Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Consul KV Builder Plugin', 'Versions': '0'}
CVE-2023-30863
In Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498
2023-04-19T09:06:41.102Z
2023-06-06T05:13:09.889Z
2023-06-06T05:13:09.889Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10'}
CVE-2023-30926
In opm service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.247Z
2023-07-12T08:31:25.063Z
2023-07-12T08:31:25.063Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30475
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Elliot Sowersby, RelyWP WooCommerce Affiliate Plugin – Coupon Affiliates plugin <= 5.4.5 versions.
https://patchstack.com/database/vulnerability/woo-coupon-usage/wordpress-coupon-affiliates-plugin-5-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:03.427Z
2023-08-14T13:53:31.680Z
2023-08-14T13:53:31.680Z
{'Vendor': 'Elliot Sowersby, RelyWP', 'Product': 'WooCommerce Affiliate Plugin – Coupon Affiliates', 'Versions': 'n/a'}
CVE-2023-30875
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in All My Web Needs Logo Scheduler plugin <= 1.2.0 versions.
https://patchstack.com/database/vulnerability/logo-scheduler-great-for-holidays-events-and-more/wordpress-logo-scheduler-great-for-holidays-events-and-more-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-19T12:33:22.776Z
2023-08-18T07:58:44.657Z
2023-08-18T07:58:44.657Z
{'Vendor': 'All My Web Needs', 'Product': 'Logo Scheduler', 'Versions': 'n/a'}
CVE-2023-30526
A missing permission check in Jenkins Report Portal Plugin 0.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2950
2023-04-12T08:40:40.604Z
2023-04-12T17:05:14.987Z
2023-10-24T12:49:48.302Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Report Portal Plugin', 'Versions': '0'}
CVE-2023-30199
Prestashop customexporter <= 1.7.20 is vulnerable to Incorrect Access Control via modules/customexporter/downloads/download.php.
https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247
2023-04-07T00:00:00
2023-05-19T00:00:00
2023-05-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30463
Altran picoTCP through 1.7.0 allows memory corruption (and subsequent denial of service) because of an integer overflow in pico_ipv6_alloc when processing large ICMPv6 packets. This affects installations with Ethernet support in which a packet size greater than 65495 may occur.
https://github.com/tass-belgium/picotcp/releases
2023-04-10T00:00:00
2023-04-19T00:00:00
2023-04-19T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30930
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.248Z
2023-07-12T08:31:29.506Z
2023-07-12T08:31:29.506Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30658
Improper input validation vulnerability in DataProfile prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.117Z
2023-07-06T02:51:31.427Z
2023-07-06T02:51:31.427Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30571
Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories.
https://groups.google.com/g/libarchive-announce
2023-04-12T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30988
The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 254016.
https://www.ibm.com/support/pages/node/7012355
2023-04-21T17:49:51.825Z
2023-07-16T22:37:18.693Z
2023-07-16T22:37:18.693Z
{'Vendor': 'IBM', 'Product': 'i', 'Versions': '7.2, 7.3, 7.4, 7.5'}
CVE-2023-30967
Gotham Orbital-Simulator service prior to 0.692.0 was found to be vulnerable to a Path traversal issue allowing an unauthenticated user to read arbitrary files on the file system.
https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79
2023-04-21T11:42:33.501Z
2023-10-25T23:18:23.681Z
2023-10-25T23:18:23.681Z
{'Vendor': 'Palantir', 'Product': 'com.palantir.meta:orbital-simulator', 'Versions': '*'}
CVE-2023-30434
IBM Storage Scale (IBM Spectrum Scale 5.1.0.0 through 5.1.2.9, 5.1.3.0 through 5.1.6.1 and IBM Elastic Storage Systems 6.1.0.0 through 6.1.2.5, 6.1.3.0 through 6.1.6.0) could allow a local user to cause a kernel panic. IBM X-Force ID: 252187.
https://www.ibm.com/support/pages/node/6988363
2023-04-08T15:56:20.543Z
2023-05-05T14:03:16.921Z
2023-05-05T14:03:16.921Z
{'Vendor': 'IBM', 'Product': 'Elastic Storage System', 'Versions': '6.1.0.0, 6.1.3.0'}
CVE-2023-30623
`embano1/wip` is a GitHub Action written in Bash. Prior to version 2, the `embano1/wip` action uses the `github.event.pull_request.title` parameter in an insecure way. The title parameter is used in a run statement - resulting in a command injection vulnerability due to string interpolation. This vulnerability can be triggered by any user on GitHub. They just need to create a pull request with a commit message containing an exploit. (Note that first-time PR requests will not be run - but the attacker can submit a valid PR before submitting an invalid PR). The commit can be genuine, but the commit message can be malicious. This can be used to execute code on the GitHub runners and can be used to exfiltrate any secrets used in the CI pipeline, including repository tokens. Version 2 has a fix for this issue.
https://github.com/embano1/wip/security/advisories/GHSA-rg3q-prf8-qxmp
2023-04-13T13:25:18.832Z
2023-04-24T21:03:15.974Z
2023-04-24T21:03:15.974Z
{'Vendor': 'embano1', 'Product': 'wip', 'Versions': '< 2'}
CVE-2023-30789
MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/work` endpoint and job and company parameter.
https://fluidattacks.com/advisories/napoli
2023-04-17T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'}
CVE-2023-30766
Hidden functionality issue exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may be altered. Affected products and versions are as follows: KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A.
https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/
2023-05-11T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'KbDevice,Inc.', 'Product': 'KB-AHR series and KB-IRIP series', 'Versions': 'KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A'}
CVE-2023-30859
Triton is a Minecraft plugin for Spigot and BungeeCord that helps you translate your Minecraft server. The CustomPayload packet allows you to execute commands on the spigot/bukkit console. When you enable bungee mode in the config it will enable the bungee bridge and the server will begin to broadcast the 'triton:main' plugin channel. Using this plugin channel you are able to send a payload packet containing a byte (2) and a string (any spigot command). This could be used to make yourself a server operator and be used to extract other user information through phishing (pretending to be an admin), many servers use essentials so the /geoip command could be available to them, etc. This could also be modified to allow you to set the servers language, set another players language, etc. This issue affects those who have bungee enabled in config. This issue has been fixed in version 3.8.4.
https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r
2023-04-18T16:13:15.882Z
2023-05-01T13:41:19.603Z
2023-05-01T13:41:19.603Z
{'Vendor': 'tritonmc', 'Product': 'Triton', 'Versions': '< 3.8.4'}
CVE-2023-30674
Improper configuration in Samsung Internet prior to version 21.0.0.41 allows attacker to bypass SameSite Cookie.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=07
2023-04-14T01:59:51.119Z
2023-07-06T02:51:47.378Z
2023-07-06T02:51:47.378Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Internet', 'Versions': '21.0.0.41'}
CVE-2023-30731
Logic error in package installation via debugger command prior to SMR Oct-2023 Release 1 allows physical attacker to install an application that has different build type.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10
2023-04-14T01:59:51.138Z
2023-10-04T03:02:44.271Z
2023-10-04T03:02:44.271Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 12, 13'}
CVE-2023-30662
Exposure of Sensitive Information vulnerability in getChipIds in UwbAospAdapterService prior to SMR Jul-2023 Release 1 allows local attackers to access the UWB chipset Identifier.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.118Z
2023-07-06T02:51:35.282Z
2023-07-06T02:51:35.282Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30727
Improper access control vulnerability in SecSettings prior to SMR Oct-2023 Release 1 allows attackers to enable Wi-Fi and connect arbitrary Wi-Fi without User Interaction.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10
2023-04-14T01:59:51.138Z
2023-10-04T03:02:43.232Z
2023-10-04T03:02:43.232Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 11, 12, 13'}
CVE-2023-30265
CLTPHP <=6.0 is vulnerable to Directory Traversal.
https://gist.github.com/HuBenLab/1d1bc201d5df41426d719e56d4421b30
2023-04-07T00:00:00
2023-04-26T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30635
TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error) upon an attempt to get a timestamp from the Placement Driver.
https://github.com/tikv/tikv/issues/14516
2023-04-13T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30320
Cross Site Scripting (XSS) vulnerability in textMessage field in /src/chatbotapp/chatWindow.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code.
https://github.com/wliang6/ChatEngine/blob/master/src/chatbotapp/chatWindow.java#L71:L81
2023-04-07T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30770
A stack-based buffer overflow vulnerability was found in the ASUSTOR Data Master (ADM) due to the lack of data size validation. An attacker can exploit this vulnerability to execute arbitrary code. Affected ADM versions include: 4.0.6.REG2, 4.1.0 and below as well as 4.2.0.RE71 and below.
https://www.asustor.com/security/security_advisory_detail?id=21
2023-04-14T18:41:42.637Z
2023-04-17T06:32:05.965Z
2023-05-04T04:03:35.683Z
{'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'}
CVE-2023-30459
SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default).
https://smartptt.com
2023-04-10T00:00:00
2023-04-14T00:00:00
2023-04-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30838
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, the `ValidateCore::isCleanHTML()` method of Prestashop misses hijackable events which can lead to cross-site scripting (XSS) injection, allowed by the presence of pre-setup `@keyframes` methods. This XSS, which hijacks HTML attributes, can be triggered without any interaction by the visitor/administrator, which makes it as dangerous as a trivial XSS attack. Contrary to other attacks which target HTML attributes and are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope. Versions 8.0.4 and 1.7.8.9 contain a fix for this issue.
https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fh7r-996q-gvcp
2023-04-18T16:13:15.879Z
2023-04-25T18:22:54.521Z
2023-04-25T18:22:54.521Z
{'Vendor': 'PrestaShop', 'Product': 'PrestaShop', 'Versions': '>= 8.0.0, < 8.0.4, < 1.7.8.9'}
CVE-2023-30707
Improper input validation vulnerability in FileProviderStatusReceiver in Samsung Keyboard prior to SMR Sep-2023 Release 1 allows local attackers to delete arbitrary files with Samsung Keyboard privilege.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09
2023-04-14T01:59:51.129Z
2023-09-06T03:11:53.437Z
2023-09-06T03:11:53.437Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 12'}
CVE-2023-30642
Improper privilege management vulnerability in Galaxy Themes Service prior to SMR Jul-2023 Release 1 allows local attackers to call privilege function.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.115Z
2023-07-06T02:50:15.536Z
2023-07-06T02:50:15.536Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30212
OURPHP <= 7.2.0 is vulnerale to Cross Site Scripting (XSS) via /client/manage/ourphp_out.php.
https://wanheiqiyihu.top/2023/03/27/OURPHP-v7-2-0-ourphp-out-php-Reflection-xss/
2023-04-07T00:00:00
2023-04-26T00:00:00
2023-04-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30496
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MagePeople Team WpBusTicketly plugin <= 5.2.5 versions.
https://patchstack.com/database/vulnerability/bus-ticket-booking-with-seat-reservation/wordpress-bus-ticket-booking-with-seat-reservation-plugin-5-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:43.801Z
2023-11-22T19:46:36.727Z
2023-11-22T19:46:36.727Z
{'Vendor': 'MagePeople Team', 'Product': 'WpBusTicketly', 'Versions': 'n/a'}
CVE-2023-30183
null
null
2023-04-07T00:00:00
null
2023-05-02T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-30300
An issue in the component hang.wasm of WebAssembly 1.0 causes an infinite loop.
https://github.com/WebAssembly/wabt/issues/2180
2023-04-07T00:00:00
2023-05-03T00:00:00
2023-06-26T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30750
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CreativeMindsSolutions CM Popup Plugin for WordPress.This issue affects CM Popup Plugin for WordPress: from n/a through 1.5.10.
https://patchstack.com/database/vulnerability/cm-pop-up-banners/wordpress-cm-pop-up-banners-for-wordpress-plugin-1-5-10-sql-injection-vulnerability?_s_id=cve
2023-04-14T07:08:36.339Z
2023-12-20T17:06:20.367Z
2023-12-20T17:06:20.367Z
{'Vendor': 'CreativeMindsSolutions', 'Product': 'CM Popup Plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-30245
SQL injection vulnerability found in Judging Management System v.1.0 allows a remote attacker to execute arbitrary code via the crit_id parameter of the edit_criteria.php file.
https://www.github.com
2023-04-07T00:00:00
2023-05-15T00:00:00
2023-05-15T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}