CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-30179 | CraftCMS version 3.7.59 is vulnerable to Server-Side Template Injection (SSTI). An authenticated attacker can inject Twig Template to User Photo Location field when setting User Photo Location in User Settings, lead to Remote Code Execution. NOTE: the vendor disputes this because only Administrators can add this Twig code, and (by design) Administrators are allowed to do that by default. | https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#442---2023-03-14 | 2023-04-07T00:00:00 | 2023-06-13T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30529 | Jenkins Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require POST requests for an HTTP endpoint, allowing attackers to reindex the database. | https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3013 | 2023-04-12T08:40:40.605Z | 2023-04-12T17:05:17.194Z | 2023-10-24T12:49:51.787Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Lucene-Search Plugin', 'Versions': '0'} |
CVE-2023-30745 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Phan Chuong IP Metaboxes plugin <= 2.1.1 versions. | https://patchstack.com/database/vulnerability/ip-metaboxes/wordpress-ip-metaboxes-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-14T07:08:36.338Z | 2023-06-12T13:59:02.634Z | 2023-06-12T13:59:02.634Z | {'Vendor': 'Phan Chuong', 'Product': 'IP Metaboxes', 'Versions': 'n/a'} |
CVE-2023-30591 | Denial-of-service in NodeBB <= v2.8.10 allows unauthenticated attackers to trigger a crash, when invoking `eventName.startsWith()` or `eventName.toString()`, while processing Socket.IO messages via crafted Socket.IO messages containing array or object type for the event name respectively. | https://starlabs.sg/advisories/23/23-30591/ | 2023-04-13T04:12:59.954Z | 2023-09-29T05:06:43.923Z | 2023-09-29T05:06:43.923Z | {'Vendor': 'NodeBB, Inc.', 'Product': 'NodeBB', 'Versions': '0'} |
CVE-2023-30084 | An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c. | https://github.com/libming/libming/issues/268 | 2023-04-07T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30987 | IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query on certain databases. IBM X-Force ID: 253440. | https://www.ibm.com/support/pages/node/7047560 | 2023-04-21T17:49:51.825Z | 2023-10-16T20:48:07.845Z | 2023-10-16T20:48:07.845Z | {'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '10.5, 11.1 ,11.5'} |
CVE-2023-30207 | A divide by zero issue discovered in Kodi Home Theater Software 19.5 and earlier allows attackers to cause a denial of service via use of crafted mp3 file. | https://github.com/xbmc/xbmc/issues/22378 | 2023-04-07T00:00:00 | 2023-07-05T00:00:00 | 2024-01-23T07:06:17.072478 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30657 | Improper input validation vulnerability in EnhancedAttestationResult prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.117Z | 2023-07-06T02:51:30.507Z | 2023-07-06T02:51:30.507Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30712 | Improper input validation in Settings Suggestions prior to SMR Sep-2023 Release 1 allows attackers to launch arbitrary activity. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09 | 2023-04-14T01:59:51.136Z | 2023-09-06T03:11:58.480Z | 2023-09-06T03:11:58.480Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 13'} |
CVE-2023-30505 | Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt | 2023-04-11T20:22:08.184Z | 2023-05-16T18:51:46.597Z | 2023-07-07T14:28:51.484Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'} |
CVE-2023-30856 | eDEX-UI is a science fiction terminal emulator. Versions 2.2.8 and prior are vulnerable to cross-site websocket hijacking. When running eDEX-UI and browsing the web, a malicious website can connect to eDEX's internal terminal control websocket, and send arbitrary commands to the shell. The project has been archived since 2021, and as of time of publication there are no plans to patch this issue and release a new version. Some workarounds are available, including shutting down eDEX-UI when browsing the web and ensuring the eDEX terminal runs with lowest possible privileges. | https://github.com/GitSquared/edex-ui/security/advisories/GHSA-q8xc-f2wf-ffh9 | 2023-04-18T16:13:15.882Z | 2023-04-28T15:54:54.891Z | 2023-04-28T15:54:54.891Z | {'Vendor': 'GitSquared', 'Product': 'edex-ui', 'Versions': '<= 2.2.8'} |
CVE-2023-30913 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.245Z | 2023-07-12T08:31:55.539Z | 2023-07-12T08:31:55.539Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30440 | IBM PowerVM Hypervisor FW860.00 through FW860.B3, FW950.00 through FW950.70, FW1010.00 through FW1010.50, FW1020.00 through FW1020.30, and FW1030.00 through FW1030.10 could allow a local attacker with control a partition that has been assigned SRIOV virtual function (VF) to cause a denial of service to a peer partition or arbitrary data corruption. IBM X-Force ID: 253175. | https://www.ibm.com/support/pages/node/6997133 | 2023-04-08T15:56:40.868Z | 2023-05-23T13:20:41.163Z | 2023-05-23T13:20:41.163Z | {'Vendor': 'IBM', 'Product': 'PowerVM Hypervisor', 'Versions': 'FW860.00, FW950.00, FW1010.00, FW1020.00, FW1030.00'} |
CVE-2023-30769 | Vulnerability discovered is related to the peer-to-peer (p2p) communications, attackers can craft consensus messages, send it to individual nodes and take them offline. An attacker can crawl the network peers using getaddr message and attack the unpatched nodes. | https://www.halborn.com/blog/post/halborn-discovers-zero-day-impacting-dogecoin-and-280-networks | 2023-04-14T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Dogecoin', 'Product': 'Node', 'Versions': 'Release'} |
CVE-2023-30786 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Benjamin Guy Captcha Them All plugin <= 1.3.3 versions. | https://patchstack.com/database/vulnerability/captcha-them-all/wordpress-captcha-them-all-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-17T12:29:35.717Z | 2023-08-16T09:38:46.457Z | 2023-08-16T09:38:46.457Z | {'Vendor': 'Benjamin Guy', 'Product': 'Captcha Them All', 'Versions': 'n/a'} |
CVE-2023-30801 | All versions of the qBittorrent client through 4.5.5 use default credentials when the web user interface is enabled. The administrator is not forced to change the default credentials. As of 4.5.5, this issue has not been fixed. A remote attacker can use the default credentials to authenticate and execute arbitrary operating system commands using the "external program" feature in the web user interface. This was reportedly exploited in the wild in March 2023.
| https://github.com/qbittorrent/qBittorrent/issues/18731 | 2023-04-18T10:31:45.962Z | 2023-10-10T13:46:46.775Z | 2023-10-10T13:46:46.775Z | {'Vendor': 'qBittorrent', 'Product': 'qBittorrent client', 'Versions': '0'} |
CVE-2023-30552 | Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `sql/instance.py` endpoint's `describe` method. In several cases, user input coming from the `tb_name` parameter value, the `db_name` parameter value or the `schema_name` value in the `sql/instance.py` `describe` endpoint is passed to the `describe_table` methods in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the `query` method of each database engine for execution. Please take into account that in some cases all three parameter values are concatenated, in other only one or two of them. The affected methods are: `describe_table` in `sql/engines/clickhouse.py`which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/clickhouse.py`, `describe_table` in `sql/engines/mssql.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/mssql.py`, `describe_table` in `sql/engines/mysql.py`which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/mysql.py`, `describe_table` in `sql/engines/oracle.py` which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/oracle.py`, `describe_table` in `sql/engines/pgsql.py`which concatenates input which is passed to execution on the database in the `query` methods in `sql/engines/pgsql.py`, `describe_table` in `sql/engines/phoenix.py` which concatenates input which is passed to execution on the database in the `query` method in `sql/engines/phoenix.py`. Each of these issues may be mitigated by escaping user input or by using prepared statements when executing SQL queries. This issue is also indexed as `GHSL-2022-101`.
| https://github.com/hhyo/Archery/security/advisories/GHSA-9jvj-8h33-6cqp | 2023-04-12T15:19:33.768Z | 2023-04-18T22:35:30.098Z | 2023-04-18T22:35:30.098Z | {'Vendor': 'hhyo', 'Product': 'Archery', 'Versions': '<= 1.9.0'} |
CVE-2023-30417 | A cross-site scripting (XSS) vulnerability in Pear-Admin-Boot up to v2.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title of a private message. | https://gitee.com/pear-admin/Pear-Admin-Boot/issues/I6SXHX | 2023-04-07T00:00:00 | 2023-04-25T00:00:00 | 2023-04-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30944 | The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database. | https://bugzilla.redhat.com/show_bug.cgi?id=2188606 | 2023-04-21T00:00:00 | 2023-05-02T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': 'Fixed in 4.1.3, 4.0.8, 3.11.14 and 3.9.21'} |
CVE-2023-30694 | Out-of-bounds Write in IpcTxPcscTransmitApdu of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | 2023-04-14T01:59:51.126Z | 2023-08-10T01:18:38.315Z | 2023-08-10T01:18:38.315Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'} |
CVE-2023-30544 | Kiwi TCMS is an open source test management system. In versions of Kiwi TCMS prior to 12.2, users were able to update their email addresses via the `My profile` admin page. This page allowed them to change the email address registered with their account without the ownership verification performed during account registration. Operators of Kiwi TCMS should upgrade to v12.2 or later to receive a patch. No known workarounds exist. | https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-7x6q-3v3m-cwjg | 2023-04-12T15:19:33.767Z | 2023-04-24T16:26:08.626Z | 2023-04-24T16:26:08.626Z | {'Vendor': 'kiwitcms', 'Product': 'Kiwi', 'Versions': '< 12.2'} |
CVE-2023-30952 | A security defect was discovered in Foundry Issues that enabled users to create convincing phishing links by editing the request sent when creating an Issue. This defect was resolved in Frontend release 6.228.0 . | https://palantir.safebase.us/?tcuUid=42bdb7fa-9a6d-4462-b89d-cabc62f281f4 | 2023-04-21T10:39:02.385Z | 2023-08-03T21:12:53.803Z | 2023-08-03T21:12:53.803Z | {'Vendor': 'Palantir', 'Product': 'com.palantir.foundry:foundry-frontend', 'Versions': '6.228.0'} |
CVE-2023-30682 | Improper access control in Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call silenceRinger API without permission. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | 2023-04-14T01:59:51.122Z | 2023-08-10T01:18:25.722Z | 2023-08-10T01:18:25.722Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'} |
CVE-2023-30378 | In Tenda AC15 V15.03.05.19, the function "sub_8EE8" contains a stack-based buffer overflow vulnerability. | https://github.com/2205794866/Tenda/blob/main/AC15/5.md | 2023-04-07T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30728 | Intent redirection vulnerability in PackageInstallerCHN prior to version 13.1.03.00 allows local attacker to access arbitrary file. This vulnerability requires user interaction. | https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09 | 2023-04-14T01:59:51.138Z | 2023-09-06T03:12:14.820Z | 2023-09-06T03:12:14.820Z | {'Vendor': 'Samsung Mobile', 'Product': 'PackageInstallerCHN ', 'Versions': ' 13.1.03.00'} |
CVE-2023-30840 | Fluid is an open source Kubernetes-native distributed dataset orchestrator and accelerator for data-intensive applications. Starting in version 0.7.0 and prior to version 0.8.6, if a malicious user gains control of a Kubernetes node running fluid csi pod (controlled by the `csi-nodeplugin-fluid` node-daemonset), they can leverage the fluid-csi service account to modify specs of all the nodes in the cluster. However, since this service account lacks `list node` permissions, the attacker may need to use other techniques to identify vulnerable nodes.
Once the attacker identifies and modifies the node specs, they can manipulate system-level-privileged components to access all secrets in the cluster or execute pods on other nodes. This allows them to elevate privileges beyond the compromised node and potentially gain full privileged access to the whole cluster.
To exploit this vulnerability, the attacker can make all other nodes unschedulable (for example, patch node with taints) and wait for system-critical components with high privilege to appear on the compromised node. However, this attack requires two prerequisites: a compromised node and identifying all vulnerable nodes through other means.
Version 0.8.6 contains a patch for this issue. As a workaround, delete the `csi-nodeplugin-fluid` daemonset in `fluid-system` namespace and avoid using CSI mode to mount FUSE file systems. Alternatively, using sidecar mode to mount FUSE file systems is recommended. | https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-93xx-cvmc-9w3v | 2023-04-18T16:13:15.880Z | 2023-05-08T17:45:46.519Z | 2023-05-08T17:45:46.519Z | {'Vendor': 'fluid-cloudnative', 'Product': 'fluid', 'Versions': '>= 0.7.0, < 0.8.6'} |
CVE-2023-30513 | Jenkins Kubernetes Plugin 3909.v1f2c633e8590 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log when push mode for durable task logging is enabled. | https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3075 | 2023-04-12T08:40:40.603Z | 2023-04-12T17:05:05.743Z | 2023-10-24T12:49:33.213Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Kubernetes Plugin', 'Versions': '3910.ve59cec5e33ea_, 3670.3672.v0ec52a_286336, 3900.3902.v10b_836a_c8c15'} |
CVE-2023-30456 | An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4. | https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5 | 2023-04-10T00:00:00 | 2023-04-10T00:00:00 | 2023-07-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30905 | The MC990 X and UV300 RMC component has and inadequate default configuration that could be exploited to obtain enhanced privilege. | https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04473en_us | 2023-04-20T16:58:53.925Z | 2023-06-16T20:47:58.863Z | 2023-06-16T21:05:27.472Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE MC990 X RMC firmware', 'Versions': '0'} |
CVE-2023-30285 | An issue in Deviniti Issue Sync Synchronization v3.5.2 for Jira allows attackers to obtain the login credentials of a user via a crafted request sent to /rest/synchronizer/1.0/technicalUser. | http://deviniti.com | 2023-04-07T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30790 | MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/relationships` endpoint and first_name and last_name parameter. | https://fluidattacks.com/advisories/napoli | 2023-04-17T00:00:00 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'} |
CVE-2023-30708 | Improper authentication in SecSettings prior to SMR Sep-2023 Release 1 allows attacker to access Captive Portal Wi-Fi in Reactivation Lock status. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09 | 2023-04-14T01:59:51.130Z | 2023-09-06T03:11:54.441Z | 2023-09-06T03:11:54.441Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 11, 12, 13'} |
CVE-2023-30564 | Alaris Systems Manager does not perform input validation during the Device Import Function. | https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-alaris-system-with-guardrails-suite-mx | 2023-04-12T16:30:07.537Z | 2023-07-13T19:06:02.948Z | 2023-10-26T15:51:01.853Z | {'Vendor': 'Becton Dickinson & Co', 'Product': 'BD Alarisâ„¢ Systems Manager', 'Versions': '0'} |
CVE-2023-30837 | Vyper is a pythonic smart contract language for the EVM. The storage allocator does not guard against allocation overflows in versions prior to 0.3.8. An attacker can overwrite the owner variable. This issue was fixed in version 0.3.8.
| https://github.com/vyperlang/vyper/security/advisories/GHSA-mgv8-gggw-mrg6 | 2023-04-18T16:13:15.879Z | 2023-05-08T16:03:06.162Z | 2023-05-08T16:03:06.162Z | {'Vendor': 'vyperlang', 'Product': 'vyper', 'Versions': '< 0.3.8'} |
CVE-2023-30925 | In opm service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.246Z | 2023-07-12T08:31:23.622Z | 2023-07-12T08:31:23.622Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30860 | WWBN AVideo is an open source video platform. In AVideo prior to version 12.4, a normal user can make a Meeting Schedule where the user can invite another user in that Meeting, but it does not properly sanitize the malicious characters when creating a Meeting Room. This allows attacker to insert malicious scripts. Since any USER including the ADMIN can see the meeting room that was created by the attacker this can lead to cookie hijacking and takeover of any accounts. Version 12.4 contains a patch for this issue. | https://github.com/WWBN/AVideo/security/advisories/GHSA-xr9h-p2rc-rpqm | 2023-04-18T16:13:15.882Z | 2023-05-08T18:04:09.703Z | 2023-05-08T18:04:09.703Z | {'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': "WWBN/AVideo stored XSS vulnerability leads to takeover of any user's account, including admin's account"} |
CVE-2023-30499 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in FolioVision FV Flowplayer Video Player plugin <= 7.5.32.7212 versions. | https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-32-7212-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-11T14:13:43.801Z | 2023-08-18T14:41:03.606Z | 2023-08-18T14:41:03.606Z | {'Vendor': 'FolioVision', 'Product': 'FV Flowplayer Video Player', 'Versions': 'n/a'} |
CVE-2023-30533 | SheetJS Community Edition before 0.19.3 allows Prototype Pollution via a crafted file. In other words. 0.19.2 and earlier are affected, whereas 0.19.3 and later are unaffected. | https://git.sheetjs.com/sheetjs/sheetjs/src/branch/master/CHANGELOG.md | 2023-04-12T00:00:00 | 2023-04-24T00:00:00 | 2023-09-07T06:11:51.421670 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30319 | Cross Site Scripting (XSS) vulnerability in username field in /src/chatbotapp/LoginServlet.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code. | https://github.com/wliang6/ChatEngine/blame/fded8e710ad59f816867ad47d7fc4862f6502f3e/src/chatbotapp/LoginServlet.java#L30:L40 | 2023-04-07T00:00:00 | 2023-07-06T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30749 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in ihomefinder Optima Express + MarketBoost IDX Plugin plugin <= 7.3.0 versions. | https://patchstack.com/database/vulnerability/optima-express/wordpress-optima-express-marketboost-idx-plugin-plugin-7-3-0-cross-site-scripting-xss?_s_id=cve | 2023-04-14T07:08:36.339Z | 2023-08-14T14:17:09.819Z | 2023-08-14T14:17:09.819Z | {'Vendor': 'ihomefinder', 'Product': 'Optima Express + MarketBoost IDX Plugin', 'Versions': 'n/a'} |
CVE-2023-30899 | A vulnerability has been identified in Siveillance Video 2020 R2 (All versions < V20.2 HotfixRev14), Siveillance Video 2020 R3 (All versions < V20.3 HotfixRev12), Siveillance Video 2021 R1 (All versions < V21.1 HotfixRev12), Siveillance Video 2021 R2 (All versions < V21.2 HotfixRev8), Siveillance Video 2022 R1 (All versions < V22.1 HotfixRev7), Siveillance Video 2022 R2 (All versions < V22.2 HotfixRev5), Siveillance Video 2022 R3 (All versions < V22.3 HotfixRev2), Siveillance Video 2023 R1 (All versions < V23.1 HotfixRev1). The Management Server component of affected applications deserializes data without sufficient validations. This could allow an authenticated remote attacker to execute code on the affected system. | https://cert-portal.siemens.com/productcert/pdf/ssa-789345.pdf | 2023-04-20T12:49:01.866Z | 2023-05-09T11:51:37.547Z | 2023-05-09T11:51:37.547Z | {'Vendor': 'Siemens', 'Product': 'Siveillance Video 2020 R2', 'Versions': 'All versions < V20.2 HotfixRev14'} |
CVE-2023-30933 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.248Z | 2023-07-12T08:31:37.964Z | 2023-07-12T08:31:37.964Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30525 | A cross-site request forgery (CSRF) vulnerability in Jenkins Report Portal Plugin 0.5 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified bearer token authentication. | https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2950 | 2023-04-12T08:40:40.604Z | 2023-04-12T17:05:14.297Z | 2023-10-24T12:49:47.090Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Report Portal Plugin', 'Versions': '0'} |
CVE-2023-30876 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Dave Ross Dave's WordPress Live Search plugin <= 4.8.1 versions. | https://patchstack.com/database/vulnerability/daves-wordpress-live-search/wordpress-dave-s-wordpress-live-search-plugin-4-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-19T12:33:22.776Z | 2023-08-17T08:08:59.692Z | 2023-08-17T08:08:59.692Z | {'Vendor': 'Dave Ross', 'Product': "Dave's WordPress Live Search", 'Versions': 'n/a'} |
CVE-2023-30437 | IBM Security Guardium 11.3, 11.4, and 11.5 could allow an unauthorized user to enumerate usernames by sending a specially crafted HTTP request. IBM X-Force ID: 252293. | https://www.ibm.com/support/pages/node/7028506 | 2023-04-08T15:56:20.544Z | 2023-08-27T22:24:41.341Z | 2023-08-27T22:24:41.341Z | {'Vendor': 'IBM', 'Product': 'Security Guardium', 'Versions': '11.3, 11.4, 11.5'} |
CVE-2023-30122 | An arbitrary file upload vulnerability in the component /admin/ajax.php?action=save_menu of Online Food Ordering System v2.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. | https://github.com/xtxxueyan/bug_report/blob/main/vendors/onetnom23/online-food-ordering-system-v2/RCE-1.md | 2023-04-07T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30088 | An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c. | https://github.com/cesanta/mjs/issues/243 | 2023-04-07T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30765 |
Delta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-01 | 2023-06-06T14:32:07.388Z | 2023-07-10T19:04:41.114Z | 2023-07-10T19:04:41.114Z | {'Vendor': 'Delta Electronics', 'Product': 'Infrasuite Device Master', 'Versions': '0'} |
CVE-2023-30620 | mindsdb is a Machine Learning platform to help developers build AI solutions. In affected versions an unsafe extraction is being performed using `tarfile.extractall()` from a remotely retrieved tarball. Which may lead to the writing of the extracted files to an unintended location. Sometimes, the vulnerability is called a TarSlip or a ZipSlip variant. An attacker may leverage this vulnerability to overwrite any local file which the server process has access to. There is no risk of file exposure with this vulnerability. This issue has been addressed in release `23.2.1.0 `. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/mindsdb/mindsdb/security/advisories/GHSA-2g5w-29q9-w6hx | 2023-04-13T13:25:18.832Z | 2023-04-21T20:11:26.129Z | 2023-04-21T20:11:26.129Z | {'Vendor': 'mindsdb', 'Product': 'mindsdb', 'Versions': '< 23.2.1.0 '} |
CVE-2023-30509 | Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt | 2023-04-11T20:22:08.185Z | 2023-05-16T18:55:05.306Z | 2023-07-07T14:31:12.085Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'} |
CVE-2023-30698 | Improper access control vulnerability in TelephonyUI prior to SMR Aug-2023 Release 1 allows local attacker to connect BLE without privilege. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | 2023-04-14T01:59:51.127Z | 2023-08-10T01:18:44.150Z | 2023-08-10T01:18:44.150Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'} |
CVE-2023-30362 | Buffer Overflow vulnerability in coap_send function in libcoap library 4.3.1-103-g52cfd56 fixed in 4.3.1-120-ge242200 allows attackers to obtain sensitive information via malformed pdu. | https://github.com/obgm/libcoap/issues/1063 | 2023-04-07T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30732 | Improper access control in system property prior to SMR Oct-2023 Release 1 allows local attacker to get CPU serial number. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10 | 2023-04-14T01:59:51.138Z | 2023-10-04T03:02:45.309Z | 2023-10-04T03:02:45.309Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 13'} |
CVE-2023-30677 | Improper access control vulnerability in Samsung Pass prior to version 4.2.03.1 allows physical attackers to access data of Samsung Pass on a certain state of an unlocked device. | https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=07 | 2023-04-14T01:59:51.120Z | 2023-07-06T02:51:50.242Z | 2023-07-06T02:51:50.242Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Pass', 'Versions': '4.2.03.1'} |
CVE-2023-30948 | A security defect in Foundry's Comments functionality resulted in the retrieval of attachments to comments not being gated by additional authorization checks. This could enable an authenticated user to inject a prior discovered attachment UUID into other arbitrary comments to discover it's content.
This defect was fixed in Foundry Comments 2.249.0, and a patch was rolled out to affected Foundry environments. No further intervention is required at this time. | https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62 | 2023-04-21T10:39:02.384Z | 2023-06-06T14:12:59.240Z | 2023-06-06T14:12:59.240Z | {'Vendor': 'Palantir', 'Product': 'com.palantir.comments:comments', 'Versions': '*'} |
CVE-2023-30724 | Improper authentication in GallerySearchProvider of Gallery prior to version 14.5.01.2 allows attacker to access search history. | https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09 | 2023-04-14T01:59:51.137Z | 2023-09-06T03:12:11.505Z | 2023-09-06T03:12:11.505Z | {'Vendor': 'Samsung Mobile', 'Product': 'Gallery', 'Versions': '14.5.01.2'} |
CVE-2023-30661 | Exposure of Sensitive Information vulnerability in getChipInfos in UwbAospAdapterService prior to SMR Jul-2023 Release 1 allows local attackers to access the UWB chipset Identifier. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.118Z | 2023-07-06T02:51:34.339Z | 2023-07-06T02:51:34.339Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30548 | gatsby-plugin-sharp is a plugin for the gatsby framework which exposes functions built on the Sharp image processing library. The gatsby-plugin-sharp plugin prior to versions 5.8.1 and 4.25.1 contains a path traversal vulnerability exposed when running the Gatsby develop server (`gatsby develop`). It should be noted that by default gatsby develop is only accessible via the localhost 127.0.0.1, and one would need to intentionally expose the server to other interfaces to exploit this vulnerability by using server options such as --host 0.0.0.0, -H 0.0.0.0, or the GATSBY_HOST=0.0.0.0 environment variable. Attackers exploiting this vulnerability will have read access to all files within the scope of the server process. A patch has been introduced in [email protected] and [email protected] which mitigates the issue by ensuring that included paths remain within the project directory. As stated above, by default gatsby develop is only exposed to the localhost 127.0.0.1. For those using the develop server in the default configuration no risk is posed. If other ranges are required, preventing the develop server from being exposed to untrusted interfaces or IP address ranges would mitigate the risk from this vulnerability. Users are non the less encouraged to upgrade to a safe version. | https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-h2pm-378c-pcxx | 2023-04-12T15:19:33.767Z | 2023-04-17T20:43:43.033Z | 2023-04-17T20:43:43.033Z | {'Vendor': 'gatsbyjs', 'Product': 'gatsby', 'Versions': '< 4.25.1, >= 5.0.0, < 5.8.1'} |
CVE-2023-30323 | SQL Injection vulnerability in username field in /src/chatbotapp/chatWindow.java in Payatu ChatEngine v.1.0, allows attackers to gain sensitive information. | https://github.com/wliang6/ChatEngine/blob/fded8e710ad59f816867ad47d7fc4862f6502f3e/src/chatbotapp/chatWindow.java#L34:L60 | 2023-04-07T00:00:00 | 2023-07-06T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30266 | CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type. | https://gist.github.com/HuBenLab/a6ef7e5efeae2635f54cb69327409a19 | 2023-04-07T00:00:00 | 2023-04-26T00:00:00 | 2023-05-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30636 | TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error, with RpcStatus UNAVAILABLE for "not leader") upon an attempt to start a node in a situation where the context deadline is exceeded | https://github.com/tikv/tikv/issues/14517 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30909 | A remote authentication bypass issue exists in some
OneView APIs.
| https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04538en_us | 2023-04-20T16:58:53.926Z | 2023-09-14T14:56:34.484Z | 2023-09-14T14:56:46.865Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE OneView', 'Versions': '0'} |
CVE-2023-30588 | When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20. | https://nodejs.org/en/blog/vulnerability/june-2023-security-releases | 2023-04-13T01:00:12.086Z | 2023-11-28T19:15:19.430Z | 2023-11-28T19:15:19.430Z | {'Vendor': 'Node.js', 'Product': 'Node.js', 'Versions': '16.20.1, 18.16.1, 20.3.1'} |
CVE-2023-30619 | Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.
| https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922 | 2023-04-13T13:25:18.832Z | 2023-05-04T13:35:35.432Z | 2023-05-04T13:35:35.432Z | {'Vendor': 'Enalean', 'Product': 'tuleap', 'Versions': ' >= 14.7.99.76, < 14.7.99.143'} |
CVE-2023-30530 | Jenkins Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp Consul ACL Token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2944 | 2023-04-12T08:40:40.605Z | 2023-04-12T17:05:17.918Z | 2023-10-24T12:49:52.993Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Consul KV Builder Plugin', 'Versions': '0'} |
CVE-2023-30863 | In Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges. | https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498 | 2023-04-19T09:06:41.102Z | 2023-06-06T05:13:09.889Z | 2023-06-06T05:13:09.889Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10'} |
CVE-2023-30926 | In opm service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.247Z | 2023-07-12T08:31:25.063Z | 2023-07-12T08:31:25.063Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30475 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Elliot Sowersby, RelyWP WooCommerce Affiliate Plugin – Coupon Affiliates plugin <= 5.4.5 versions. | https://patchstack.com/database/vulnerability/woo-coupon-usage/wordpress-coupon-affiliates-plugin-5-4-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-11T14:13:03.427Z | 2023-08-14T13:53:31.680Z | 2023-08-14T13:53:31.680Z | {'Vendor': 'Elliot Sowersby, RelyWP', 'Product': 'WooCommerce Affiliate Plugin – Coupon Affiliates', 'Versions': 'n/a'} |
CVE-2023-30875 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in All My Web Needs Logo Scheduler plugin <= 1.2.0 versions. | https://patchstack.com/database/vulnerability/logo-scheduler-great-for-holidays-events-and-more/wordpress-logo-scheduler-great-for-holidays-events-and-more-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-19T12:33:22.776Z | 2023-08-18T07:58:44.657Z | 2023-08-18T07:58:44.657Z | {'Vendor': 'All My Web Needs', 'Product': 'Logo Scheduler', 'Versions': 'n/a'} |
CVE-2023-30526 | A missing permission check in Jenkins Report Portal Plugin 0.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified bearer token authentication. | https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2950 | 2023-04-12T08:40:40.604Z | 2023-04-12T17:05:14.987Z | 2023-10-24T12:49:48.302Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Report Portal Plugin', 'Versions': '0'} |
CVE-2023-30199 | Prestashop customexporter <= 1.7.20 is vulnerable to Incorrect Access Control via modules/customexporter/downloads/download.php. | https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247 | 2023-04-07T00:00:00 | 2023-05-19T00:00:00 | 2023-05-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30463 | Altran picoTCP through 1.7.0 allows memory corruption (and subsequent denial of service) because of an integer overflow in pico_ipv6_alloc when processing large ICMPv6 packets. This affects installations with Ethernet support in which a packet size greater than 65495 may occur. | https://github.com/tass-belgium/picotcp/releases | 2023-04-10T00:00:00 | 2023-04-19T00:00:00 | 2023-04-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30930 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.248Z | 2023-07-12T08:31:29.506Z | 2023-07-12T08:31:29.506Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30658 | Improper input validation vulnerability in DataProfile prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.117Z | 2023-07-06T02:51:31.427Z | 2023-07-06T02:51:31.427Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30571 | Libarchive through 3.6.2 can cause directories to have world-writable permissions. The umask() call inside archive_write_disk_posix.c changes the umask of the whole process for a very short period of time; a race condition with another thread can lead to a permanent umask 0 setting. Such a race condition could lead to implicit directory creation with permissions 0777 (without the sticky bit), which means that any low-privileged local user can delete and rename files inside those directories. | https://groups.google.com/g/libarchive-announce | 2023-04-12T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30988 | The IBM i 7.2, 7.3, 7.4, and 7.5 product Facsimile Support for i contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain root access to the host operating system. IBM X-Force ID: 254016. | https://www.ibm.com/support/pages/node/7012355 | 2023-04-21T17:49:51.825Z | 2023-07-16T22:37:18.693Z | 2023-07-16T22:37:18.693Z | {'Vendor': 'IBM', 'Product': 'i', 'Versions': '7.2, 7.3, 7.4, 7.5'} |
CVE-2023-30967 | Gotham Orbital-Simulator service prior to 0.692.0 was found to be vulnerable to a Path traversal issue allowing an unauthenticated user to read arbitrary files on the file system. | https://palantir.safebase.us/?tcuUid=8fd5809f-26f8-406e-b36f-4a6596a19d79 | 2023-04-21T11:42:33.501Z | 2023-10-25T23:18:23.681Z | 2023-10-25T23:18:23.681Z | {'Vendor': 'Palantir', 'Product': 'com.palantir.meta:orbital-simulator', 'Versions': '*'} |
CVE-2023-30434 | IBM Storage Scale (IBM Spectrum Scale 5.1.0.0 through 5.1.2.9, 5.1.3.0 through 5.1.6.1 and IBM Elastic Storage Systems 6.1.0.0 through 6.1.2.5, 6.1.3.0 through 6.1.6.0) could allow a local user to cause a kernel panic. IBM X-Force ID: 252187. | https://www.ibm.com/support/pages/node/6988363 | 2023-04-08T15:56:20.543Z | 2023-05-05T14:03:16.921Z | 2023-05-05T14:03:16.921Z | {'Vendor': 'IBM', 'Product': 'Elastic Storage System', 'Versions': '6.1.0.0, 6.1.3.0'} |
CVE-2023-30623 | `embano1/wip` is a GitHub Action written in Bash. Prior to version 2, the `embano1/wip` action uses the `github.event.pull_request.title` parameter in an insecure way. The title parameter is used in a run statement - resulting in a command injection vulnerability due to string interpolation. This vulnerability can be triggered by any user on GitHub. They just need to create a pull request with a commit message containing an exploit. (Note that first-time PR requests will not be run - but the attacker can submit a valid PR before submitting an invalid PR). The commit can be genuine, but the commit message can be malicious. This can be used to execute code on the GitHub runners and can be used to exfiltrate any secrets used in the CI pipeline, including repository tokens. Version 2 has a fix for this issue. | https://github.com/embano1/wip/security/advisories/GHSA-rg3q-prf8-qxmp | 2023-04-13T13:25:18.832Z | 2023-04-24T21:03:15.974Z | 2023-04-24T21:03:15.974Z | {'Vendor': 'embano1', 'Product': 'wip', 'Versions': '< 2'} |
CVE-2023-30789 | MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/work` endpoint and job and company parameter. | https://fluidattacks.com/advisories/napoli | 2023-04-17T00:00:00 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'} |
CVE-2023-30766 | Hidden functionality issue exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may be altered. Affected products and versions are as follows: KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A. | https://www.kbdevice.com/news/%e3%83%ac%e3%82%b3%e3%83%bc%e3%83%80%e3%83%bc%e3%81%ae%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e6%94%bb%e6%92%83%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e3%82%a2%e3%83%83%e3%83%97%e3%83%87/ | 2023-05-11T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'KbDevice,Inc.', 'Product': 'KB-AHR series and KB-IRIP series', 'Versions': 'KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A'} |
CVE-2023-30859 | Triton is a Minecraft plugin for Spigot and BungeeCord that helps you translate your Minecraft server. The CustomPayload packet allows you to execute commands on the spigot/bukkit console. When you enable bungee mode in the config it will enable the bungee bridge and the server will begin to broadcast the 'triton:main' plugin channel. Using this plugin channel you are able to send a payload packet containing a byte (2) and a string (any spigot command). This could be used to make yourself a server operator and be used to extract other user information through phishing (pretending to be an admin), many servers use essentials so the /geoip command could be available to them, etc. This could also be modified to allow you to set the servers language, set another players language, etc. This issue affects those who have bungee enabled in config. This issue has been fixed in version 3.8.4. | https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r | 2023-04-18T16:13:15.882Z | 2023-05-01T13:41:19.603Z | 2023-05-01T13:41:19.603Z | {'Vendor': 'tritonmc', 'Product': 'Triton', 'Versions': '< 3.8.4'} |
CVE-2023-30674 | Improper configuration in Samsung Internet prior to version 21.0.0.41 allows attacker to bypass SameSite Cookie. | https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=07 | 2023-04-14T01:59:51.119Z | 2023-07-06T02:51:47.378Z | 2023-07-06T02:51:47.378Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Internet', 'Versions': '21.0.0.41'} |
CVE-2023-30731 | Logic error in package installation via debugger command prior to SMR Oct-2023 Release 1 allows physical attacker to install an application that has different build type. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10 | 2023-04-14T01:59:51.138Z | 2023-10-04T03:02:44.271Z | 2023-10-04T03:02:44.271Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 12, 13'} |
CVE-2023-30662 | Exposure of Sensitive Information vulnerability in getChipIds in UwbAospAdapterService prior to SMR Jul-2023 Release 1 allows local attackers to access the UWB chipset Identifier. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.118Z | 2023-07-06T02:51:35.282Z | 2023-07-06T02:51:35.282Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30727 | Improper access control vulnerability in SecSettings prior to SMR Oct-2023 Release 1 allows attackers to enable Wi-Fi and connect arbitrary Wi-Fi without User Interaction. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10 | 2023-04-14T01:59:51.138Z | 2023-10-04T03:02:43.232Z | 2023-10-04T03:02:43.232Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 11, 12, 13'} |
CVE-2023-30265 | CLTPHP <=6.0 is vulnerable to Directory Traversal. | https://gist.github.com/HuBenLab/1d1bc201d5df41426d719e56d4421b30 | 2023-04-07T00:00:00 | 2023-04-26T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30635 | TiKV 6.1.2 allows remote attackers to cause a denial of service (fatal error) upon an attempt to get a timestamp from the Placement Driver. | https://github.com/tikv/tikv/issues/14516 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30320 | Cross Site Scripting (XSS) vulnerability in textMessage field in /src/chatbotapp/chatWindow.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code. | https://github.com/wliang6/ChatEngine/blob/master/src/chatbotapp/chatWindow.java#L71:L81 | 2023-04-07T00:00:00 | 2023-07-06T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30770 | A stack-based buffer overflow vulnerability was found in the ASUSTOR Data Master (ADM) due to the lack of data size validation. An attacker can exploit this vulnerability to execute arbitrary code. Affected ADM versions include: 4.0.6.REG2, 4.1.0 and below as well as 4.2.0.RE71 and below. | https://www.asustor.com/security/security_advisory_detail?id=21 | 2023-04-14T18:41:42.637Z | 2023-04-17T06:32:05.965Z | 2023-05-04T04:03:35.683Z | {'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'} |
CVE-2023-30459 | SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has administrator privileges) by writing a malicious C# script and executing it on the server (via server settings in the administrator control panel on port 8101, by default). | https://smartptt.com | 2023-04-10T00:00:00 | 2023-04-14T00:00:00 | 2023-04-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30838 | PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, the `ValidateCore::isCleanHTML()` method of Prestashop misses hijackable events which can lead to cross-site scripting (XSS) injection, allowed by the presence of pre-setup `@keyframes` methods. This XSS, which hijacks HTML attributes, can be triggered without any interaction by the visitor/administrator, which makes it as dangerous as a trivial XSS attack. Contrary to other attacks which target HTML attributes and are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope. Versions 8.0.4 and 1.7.8.9 contain a fix for this issue. | https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fh7r-996q-gvcp | 2023-04-18T16:13:15.879Z | 2023-04-25T18:22:54.521Z | 2023-04-25T18:22:54.521Z | {'Vendor': 'PrestaShop', 'Product': 'PrestaShop', 'Versions': '>= 8.0.0, < 8.0.4, < 1.7.8.9'} |
CVE-2023-30707 | Improper input validation vulnerability in FileProviderStatusReceiver in Samsung Keyboard prior to SMR Sep-2023 Release 1 allows local attackers to delete arbitrary files with Samsung Keyboard privilege. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09 | 2023-04-14T01:59:51.129Z | 2023-09-06T03:11:53.437Z | 2023-09-06T03:11:53.437Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 12'} |
CVE-2023-30642 | Improper privilege management vulnerability in Galaxy Themes Service prior to SMR Jul-2023 Release 1 allows local attackers to call privilege function. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.115Z | 2023-07-06T02:50:15.536Z | 2023-07-06T02:50:15.536Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30212 | OURPHP <= 7.2.0 is vulnerale to Cross Site Scripting (XSS) via /client/manage/ourphp_out.php. | https://wanheiqiyihu.top/2023/03/27/OURPHP-v7-2-0-ourphp-out-php-Reflection-xss/ | 2023-04-07T00:00:00 | 2023-04-26T00:00:00 | 2023-04-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30496 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MagePeople Team WpBusTicketly plugin <= 5.2.5 versions. | https://patchstack.com/database/vulnerability/bus-ticket-booking-with-seat-reservation/wordpress-bus-ticket-booking-with-seat-reservation-plugin-5-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-11T14:13:43.801Z | 2023-11-22T19:46:36.727Z | 2023-11-22T19:46:36.727Z | {'Vendor': 'MagePeople Team', 'Product': 'WpBusTicketly', 'Versions': 'n/a'} |
CVE-2023-30183 | null | null | 2023-04-07T00:00:00 | null | 2023-05-02T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-30300 | An issue in the component hang.wasm of WebAssembly 1.0 causes an infinite loop. | https://github.com/WebAssembly/wabt/issues/2180 | 2023-04-07T00:00:00 | 2023-05-03T00:00:00 | 2023-06-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30750 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CreativeMindsSolutions CM Popup Plugin for WordPress.This issue affects CM Popup Plugin for WordPress: from n/a through 1.5.10.
| https://patchstack.com/database/vulnerability/cm-pop-up-banners/wordpress-cm-pop-up-banners-for-wordpress-plugin-1-5-10-sql-injection-vulnerability?_s_id=cve | 2023-04-14T07:08:36.339Z | 2023-12-20T17:06:20.367Z | 2023-12-20T17:06:20.367Z | {'Vendor': 'CreativeMindsSolutions', 'Product': 'CM Popup Plugin for WordPress', 'Versions': 'n/a'} |
CVE-2023-30245 | SQL injection vulnerability found in Judging Management System v.1.0 allows a remote attacker to execute arbitrary code via the crit_id parameter of the edit_criteria.php file. | https://www.github.com | 2023-04-07T00:00:00 | 2023-05-15T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.