CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-30615
Iris is a web collaborative platform aiming to help incident responders sharing technical details during investigations. A stored Cross-Site Scripting (XSS) vulnerability has been identified in iris-web, affecting multiple locations . The vulnerability in allows an attacker to inject malicious scripts into the application, which are then executed when a user visits the affected locations. This can lead to unauthorized access, data theft, or other malicious activities. An attacker need to be authenticated on the application to exploit this vulnerability. The issue was patched in version 2.2.1 of iris-web.
https://github.com/dfir-iris/iris-web/security/advisories/GHSA-gc6j-6276-2m49
2023-04-13T13:25:18.831Z
2023-05-25T17:39:06.887Z
2023-05-25T17:39:06.887Z
{'Vendor': 'dfir-iris', 'Product': 'iris-web', 'Versions': '< 2.2.1'}
CVE-2023-30195
In the module "Detailed Order" (lgdetailedorder) in version up to 1.1.20 from Linea Grafica for PrestaShop, a guest can download personal informations without restriction formatted in json.
https://friends-of-presta.github.io/security-advisories/modules/2023/06/22/lgdetailedorder.html
2023-04-07T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30746
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Booqable Rental Software Booqable Rental plugin <= 2.4.15 versions.
https://patchstack.com/database/vulnerability/booqable-rental-reservations/wordpress-booqable-rental-plugin-plugin-2-4-12-cross-site-scripting-xss?_s_id=cve
2023-04-14T07:08:36.338Z
2023-05-10T08:24:38.838Z
2023-05-10T12:44:06.474Z
{'Vendor': 'Booqable Rental Software', 'Product': 'Booqable Rental Plugin', 'Versions': 'n/a'}
CVE-2023-30603
Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator’s privilege, resulting in performing arbitrary system operation or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7085-13321-1.html
2023-04-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Hitron Technologies Inc.', 'Product': 'Hitron CODA-5310', 'Versions': 'v7.2.4.7.1b3'}
CVE-2023-30253
Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
https://github.com/Dolibarr/dolibarr
2023-04-07T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30087
Buffer Overflow vulnerability found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_mk_string function in mjs.c.
https://github.com/cesanta/mjs/issues/244
2023-04-07T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30438
An internally discovered vulnerability in PowerVM on IBM Power9 and Power10 systems could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions which could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server. IBM X-Force ID: 252706.
https://www.ibm.com/support/pages/node/6993021
2023-04-08T15:56:20.544Z
2023-05-17T12:48:37.240Z
2023-05-17T12:48:37.240Z
{'Vendor': 'IBM', 'Product': 'PowerVM Hypervisor', 'Versions': 'FW950.00, FW1010.00, FW1020.00, FW1030.00'}
CVE-2023-30711
Improper authentication in Phone and Messaging Storage SMR SEP-2023 Release 1 allows attacker to insert arbitrary data to the provider.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09
2023-04-14T01:59:51.136Z
2023-09-06T03:11:57.479Z
2023-09-06T03:11:57.479Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 11, 12, 13'}
CVE-2023-30204
Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the judge_id parameter at /php-jms/edit_judge.php.
https://github.com/debug601/bug_report/blob/main/vendors/oretnom23/judging-management-system/SQLi-3.md
2023-04-07T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30654
Improper access control vulnerability in SLocationService prior to SMR Aug-2023 Release 1 allows local attacker to update fake location.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.117Z
2023-08-10T01:17:07.618Z
2023-08-10T01:17:07.618Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30013
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.
https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/2
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-09-21T17:06:08.499439
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30910
HPE MSA Controller prior to version IN210R004 could be remotely exploited to allow inconsistent interpretation of HTTP requests. 
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbst04539en_us
2023-04-20T16:58:53.926Z
2023-10-09T15:04:35.757Z
2023-10-09T15:10:09.082Z
{'Vendor': 'Hewlett Packer Enterprise (HPE)', 'Product': 'HPE MSA Controller', 'Versions': '0'}
CVE-2023-30855
Pimcore is an open source data and experience management platform. Versions of Pimcore prior to 10.5.18 are vulnerable to path traversal. The impact of this path traversal and arbitrary extension is limited to creation of arbitrary files and appending data to existing files. When combined with the SQL Injection, the exported data `RESTRICTED DIFFUSION 9 / 9` can be controlled and a webshell can be uploaded. Attackers can use that to execute arbitrary PHP code on the server with the permissions of the webserver. Users may upgrade to version 10.5.18 to receive a patch or, as a workaround, apply the patch manually.
https://github.com/pimcore/pimcore/security/advisories/GHSA-g2mc-fqqc-hxg3
2023-04-18T16:13:15.882Z
2023-05-08T17:59:14.178Z
2023-05-08T17:59:14.178Z
{'Vendor': 'pimcore', 'Product': 'pimcore', 'Versions': '< 10.5.18'}
CVE-2023-30506
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt
2023-04-11T20:22:08.184Z
2023-05-16T18:51:50.159Z
2023-07-07T14:30:35.097Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'}
CVE-2023-30785
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Video Grid plugin <= 1.21 versions.
https://patchstack.com/database/vulnerability/video-grid/wordpress-video-grid-plugin-1-21-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-17T12:29:35.717Z
2023-08-16T09:48:01.671Z
2023-08-16T09:48:01.671Z
{'Vendor': 'I Thirteen Web Solution', 'Product': 'Video Grid', 'Versions': 'n/a'}
CVE-2023-30414
Jerryscript commit 1a2c047 was discovered to contain a stack overflow via the component vm_loop at /jerry-core/vm/vm.c.
https://github.com/jerryscript-project/jerryscript/issues/5051
2023-04-07T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30551
Rekor is an open source software supply chain transparency log. Rekor prior to version 1.1.1 may crash due to out of memory (OOM) conditions caused by reading archive metadata files into memory without checking their sizes first. Verification of a JAR file submitted to Rekor can cause an out of memory crash if files within the META-INF directory of the JAR are sufficiently large. Parsing of an APK file submitted to Rekor can cause an out of memory crash if the .SIGN or .PKGINFO files within the APK are sufficiently large. The OOM crash has been patched in Rekor version 1.1.1. There are no known workarounds.
https://github.com/sigstore/rekor/security/advisories/GHSA-2h5h-59f5-c5x9
2023-04-12T15:19:33.767Z
2023-05-08T15:52:42.446Z
2023-05-08T15:52:42.446Z
{'Vendor': 'sigstore', 'Product': 'rekor', 'Versions': '< 1.1.1'}
CVE-2023-30802
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to a source code disclosure vulnerability. A remote and unauthenticated attacker can obtain PHP source code by sending an HTTP request with an invalid Content-Length field.
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/
2023-04-18T10:31:45.962Z
2023-10-10T14:07:17.732Z
2023-10-10T14:07:17.732Z
{'Vendor': 'Sangfor', 'Product': 'Net-Gen Application Firewall', 'Versions': '8.0.17'}
CVE-2023-30382
A buffer overflow in the component hl.exe of Valve Half-Life up to 5433873 allows attackers to execute arbitrary code and escalate privileges by supplying crafted parameters.
https://labs.jumpsec.com/advisory-cve-2023-30382-half-life-local-privilege-escalation/
2023-04-07T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30678
Potential zip path traversal vulnerability in Calendar application prior to version 12.4.07.15 in Android 13 allows attackers to write arbitrary file.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=07
2023-04-14T01:59:51.120Z
2023-07-06T02:51:51.241Z
2023-07-06T02:51:51.241Z
{'Vendor': 'Samsung Mobile', 'Product': 'Calendar', 'Versions': '12.4.07.15 in Android 13'}
CVE-2023-30697
An improper input validation in IpcTxCfgSetSimlockPayload in libsec-ril prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.127Z
2023-08-10T01:18:42.527Z
2023-08-10T01:18:42.527Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30402
YASM v1.3.0 was discovered to contain a heap overflow via the function handle_dot_label at /nasm/nasm-token.re.
https://github.com/yasm/yasm/issues/206
2023-04-07T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30951
The Foundry Magritte plugin rest-source was found to be vulnerable to an an XML external Entity attack (XXE).
https://palantir.safebase.us/?tcuUid=fe021f28-9e25-42c4-acd8-772cd8006ced
2023-04-21T10:39:02.385Z
2023-08-03T21:07:11.189Z
2023-08-03T21:07:11.189Z
{'Vendor': 'Palantir', 'Product': 'com.palantir.magritte:magritte-rest-source-bundle', 'Versions': '*'}
CVE-2023-30547
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m
2023-04-12T15:19:33.767Z
2023-04-17T21:42:10.514Z
2023-04-17T21:42:10.514Z
{'Vendor': 'patriksimek', 'Product': 'vm2', 'Versions': '< 3.9.17'}
CVE-2023-30394
Progress Ipswitch MoveIT 1.1.11 was discovered to contain a cross-site scripting (XSS) vulenrability via the API authentication function.
https://github.com/ros-planning/moveit
2023-04-07T00:00:00
2023-05-11T00:00:00
2023-06-02T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30681
An improper input validation vulnerability within initialize function in HAL VaultKeeper prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.122Z
2023-08-10T01:18:24.510Z
2023-08-10T01:18:24.510Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30906
The vulnerability could be locally exploited to allow escalation of privilege.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04486en_us
2023-04-20T16:58:53.926Z
2023-07-18T13:57:44.330Z
2023-07-18T14:04:50.948Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE Intelligent Provisioning (IP) for Gen9', 'Versions': 'v2.87 or later'}
CVE-2023-30455
An issue was discovered in ebankIT before 7. A Denial-of-Service attack is possible through the GET parameter EStatementsIds located on the /Controls/Generic/EBMK/Handlers/EStatements/DownloadEStatement.ashx endpoint. The GET parameter accepts over 100 comma-separated e-statement IDs without throwing an error. When this many IDs are supplied, the server takes around 60 seconds to respond and successfully generate the expected ZIP archive (during this time period, no other pages load). A threat actor could issue a request to this endpoint with 100+ statement IDs every 30 seconds, potentially resulting in an overload of the server for all users.
https://blog.ebankit.com/blog-press
2023-04-10T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30510
A vulnerability exists in the Aruba EdgeConnect Enterprise web management interface that allows remote authenticated users to issue arbitrary URL requests from the Aruba EdgeConnect Enterprise instance. The impact of this vulnerability is limited to a subset of URLs which can result in the possible disclosure of data due to the network position of the Aruba EdgeConnect Enterprise instance.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt
2023-04-11T20:22:08.185Z
2023-05-16T18:56:20.679Z
2023-07-07T14:31:21.543Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'}
CVE-2023-30843
Payload is a free and open source headless content management system. In versions prior to 1.7.0, if a user has access to documents that contain hidden fields or fields they do not have access to, the user could reverse-engineer those values via brute force. Version 1.7.0 contains a patch. As a workaround, write a `beforeOperation` hook to remove `where` queries that attempt to access hidden field data.
https://github.com/payloadcms/payload/security/advisories/GHSA-35jj-vqcf-f2jf
2023-04-18T16:13:15.880Z
2023-04-26T20:32:54.545Z
2023-04-26T20:32:54.545Z
{'Vendor': 'payloadcms', 'Product': 'payload', 'Versions': '< 1.7.0'}
CVE-2023-30639
Archer Platform 6.8 before 6.12 P6 HF1 (6.12.0.6.1) contains a stored XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. 6.11.P4 (6.11.0.4) is also a fixed release.
https://www.archerirm.community/t5/security-advisories/archer-update-for-stored-cross-site-scripting/ta-p/697581
2023-04-13T00:00:00
2023-05-01T00:00:00
2023-05-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30269
CLTPHP <=6.0 is vulnerable to Improper Input Validation via application/admin/controller/Template.php.
https://gist.github.com/HuBenLab/f5eb8ebbba20c835a3170d392c9e46a4
2023-04-07T00:00:00
2023-04-26T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30638
Atos Unify OpenScape SBC 10 before 10R3.1.3, OpenScape Branch 10 before 10R3.1.2, and OpenScape BCF 10 before 10R10.7.0 allow remote authenticated admins to inject commands.
https://networks.unify.com/security/advisories/OBSO-2303-02.pdf
2023-04-13T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30792
Anchor tag hrefs in Lexical prior to v0.10.0 would render javascript: URLs, allowing for cross-site scripting on link clicks in cases where input was being parsed from untrusted sources.
https://github.com/facebook/lexical/releases/tag/v0.10.0
2023-04-17T13:42:08.187Z
2023-04-29T02:21:49.696Z
2023-04-29T02:21:49.696Z
{'Vendor': 'Meta Platforms, Inc', 'Product': 'Lexical', 'Versions': '0.0.0'}
CVE-2023-30268
CLTPHP <=6.0 is vulnerable to Improper Input Validation.
https://gist.github.com/HuBenLab/16dc2f87f91a6f8c60eefce5abf18c08
2023-04-07T00:00:00
2023-05-04T00:00:00
2023-05-09T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30454
An issue was discovered in ebankIT before 7. Document Object Model based XSS exists within the /Security/Transactions/Transactions.aspx endpoint. Users can supply their own JavaScript within the ctl100$ctl00MainContent$TransactionMainContent$accControl$hdnAccountsArray POST parameter that will be passed to an eval() function and executed upon pressing the continue button.
https://blog.ebankit.com/blog-press
2023-04-10T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30842
null
null
2023-04-18T00:00:00
null
2023-04-27T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-30680
Improper privilege management vulnerability in MMIGroup prior to SMR Aug-2023 Release 1 allows code execution with privilege.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.121Z
2023-08-10T01:18:23.078Z
2023-08-10T01:18:23.078Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30403
An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to bypass login by connecting to the web app after a successful attempt by a legitimate user.
https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/
2023-04-07T00:00:00
2023-05-02T00:00:00
2023-05-02T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30053
TOTOLINK A7100RU V7.4cu.2313_B20191024 is vulnerable to Command Injection.
https://github.com/Am1ngl/ttt/tree/main/160
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30950
The foundry campaigns service was found to be vulnerable to an unauthenticated information disclosure in a rest endpoint
https://palantir.safebase.us/?tcuUid=d839709d-c50f-4a37-8faa-b0c35054418a
2023-04-21T10:39:02.385Z
2023-08-03T21:10:15.711Z
2023-08-03T21:10:15.711Z
{'Vendor': 'Palantir', 'Product': 'com.palantir.campaigns:campaigns', 'Versions': '*'}
CVE-2023-30546
Contiki-NG is an operating system for Internet of Things devices. An off-by-one error can be triggered in the Antelope database management system in the Contiki-NG operating system in versions 4.8 and prior. The problem exists in the Contiki File System (CFS) backend for the storage of data (file os/storage/antelope/storage-cfs.c). In the functions `storage_get_index` and `storage_put_index`, a buffer for merging two strings is allocated with one byte less than the maximum size of the merged strings, causing subsequent function calls to the cfs_open function to read from memory beyond the buffer size. The vulnerability has been patched in the "develop" branch of Contiki-NG, and is expected to be included in the next release. As a workaround, the problem can be fixed by applying the patch in Contiki-NG pull request #2425.
https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-257g-w39m-5jj4
2023-04-12T15:19:33.767Z
2023-04-26T18:14:46.436Z
2023-04-26T18:14:46.436Z
{'Vendor': 'contiki-ng', 'Product': 'contiki-ng', 'Versions': '<= 4.8'}
CVE-2023-30383
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
http://tplink.com
2023-04-07T00:00:00
2023-07-18T00:00:00
2023-07-18T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30679
Improper access control in HDCP trustlet prior to SMR Aug-2023 Release 1 allows local attackers to execute arbitrary code.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.121Z
2023-08-10T01:18:21.619Z
2023-08-10T01:18:21.619Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30696
An improper input validation in IpcTxGetVerifyAkey in libsec-ril prior to SMR Aug-2023 Release 1 allows attacker to cause out-of-bounds write.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.127Z
2023-08-10T01:18:41.177Z
2023-08-10T01:18:41.177Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30946
A security defect was identified in Foundry Issues. If a user was added to an issue on a resource that they did not have access to and consequently could not see, they could query Foundry's Notification API and receive metadata about the issue including the RID of the issue, severity, internal UUID of the author, and the user-defined title of the issue.
https://palantir.safebase.us/?tcuUid=4cf0b6e6-564a-467b-83ae-36fec3a491c3
2023-04-21T10:39:02.384Z
2023-06-29T18:49:23.694Z
2023-06-29T18:49:23.694Z
{'Vendor': 'Palantir', 'Product': 'com.palantir.issues:issues', 'Versions': '*'}
CVE-2023-30415
Sourcecodester Packers and Movers Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /inquiries/view_inquiry.php.
http://packetstormsecurity.com/files/174758/Packers-And-Movers-Management-System-1.0-SQL-Injection.html
2023-04-07T00:00:00
2023-09-28T00:00:00
2023-09-28T15:15:31.632077
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30550
MeterSphere is an open source continuous testing platform, covering functions such as test tracking, interface testing, UI testing, and performance testing. This IDOR vulnerability allows the administrator of a project to modify other projects under the workspace. An attacker can obtain some operating permissions. The issue has been fixed in version 2.9.0.
https://github.com/metersphere/metersphere/security/advisories/GHSA-j5cq-cpw2-gp2q
2023-04-12T15:19:33.767Z
2023-05-04T17:26:13.218Z
2023-05-04T17:26:13.218Z
{'Vendor': 'metersphere', 'Product': 'metersphere', 'Versions': '< 2.9.0'}
CVE-2023-30803
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an authentication bypass vulnerability. A remote and unauthenticated attacker can bypass authentication and access administrative functionality by sending HTTP requests using a crafted Y-forwarded-for header.
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/
2023-04-18T10:31:45.963Z
2023-10-10T14:14:04.657Z
2023-10-10T14:14:04.657Z
{'Vendor': 'Sangfor', 'Product': 'Net-Gen Application Firewall', 'Versions': '8.0.17'}
CVE-2023-30784
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kaya Studio Kaya QR Code Generator plugin <= 1.5.2 versions.
https://patchstack.com/database/vulnerability/kaya-qr-code-generator/wordpress-kaya-qr-code-generator-plugin-1-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-17T12:29:35.717Z
2023-08-16T09:56:19.581Z
2023-08-16T09:56:19.581Z
{'Vendor': 'Kaya Studio', 'Product': 'Kaya QR Code Generator', 'Versions': 'n/a'}
CVE-2023-30442
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 federated server is vulnerable to a denial of service as the server may crash when using a specially crafted wrapper using certain options. IBM X-Force ID: 253202.
https://www.ibm.com/support/pages/node/7010561
2023-04-08T15:56:40.869Z
2023-07-10T00:01:47.971Z
2023-07-10T00:01:47.971Z
{'Vendor': 'IBM', 'Product': 'Db2 for Linux, UNIX and Windows', 'Versions': '11.1, 11.5'}
CVE-2023-30911
HPE Integrated Lights-Out 5, and Integrated Lights-Out 6 using iLOrest may cause denial of service.
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04544en_us
2023-04-20T16:58:53.926Z
2023-10-18T17:04:35.447Z
2023-10-18T17:04:56.957Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'HPE Integrated Lights-Out', 'Versions': '0, 0'}
CVE-2023-30854
AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in version 12.4.
https://github.com/WWBN/AVideo/security/advisories/GHSA-6vrj-ph27-qfp3
2023-04-18T16:13:15.881Z
2023-04-28T15:35:59.382Z
2023-04-28T15:35:59.382Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': '< 12.4'}
CVE-2023-30507
Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt
2023-04-11T20:22:08.184Z
2023-05-16T18:54:48.679Z
2023-07-07T14:30:44.416Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'}
CVE-2023-30710
Improper input validation vulnerability in Knox AI prior to SMR Sep-2023 Release 1 allows local attackers to launch privileged activities.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09
2023-04-14T01:59:51.136Z
2023-09-06T03:11:56.455Z
2023-09-06T03:11:56.455Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 13'}
CVE-2023-30205
A stored cross-site scripting (XSS) vulnerability in DouPHP v1.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the unique_id parameter in /admin/article.php.
https://github.com/godd-bot/cve/issues/2
2023-04-07T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30655
Improper input validation vulnerability in SCEPProfile prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.117Z
2023-07-06T02:51:28.536Z
2023-07-06T02:51:28.536Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30985
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 3), Solid Edge SE2023 (All versions < V223.0 Update 2). Affected applications contain an out of bounds read past the end of an allocated buffer while parsing a specially crafted OBJ file. This vulnerability could allow an attacker to disclose sensitive information. (ZDI-CAN-19426)
https://cert-portal.siemens.com/productcert/pdf/ssa-932528.pdf
2023-04-21T15:30:43.319Z
2023-05-09T11:51:38.608Z
2023-08-08T09:20:22.154Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 3'}
CVE-2023-30086
Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.
http://libtiff-release-v4-0-7.com
2023-04-07T00:00:00
2023-05-09T00:00:00
2023-06-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30747
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPGem WooCommerce Easy Duplicate Product plugin <= 0.3.0.0 versions.
https://patchstack.com/database/vulnerability/woo-easy-duplicate-product/wordpress-woocommerce-easy-duplicate-product-plugin-0-3-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-14T07:08:36.339Z
2023-08-15T12:35:21.013Z
2023-08-15T12:35:21.013Z
{'Vendor': 'WPGem', 'Product': 'WooCommerce Easy Duplicate Product', 'Versions': 'n/a'}
CVE-2023-30602
Hitron Technologies CODA-5310’s Telnet function transfers sensitive data in plaintext. An unauthenticated remote attacker can exploit this vulnerability to access credentials of normal users and administrator.
https://www.twcert.org.tw/tw/cp-132-7084-74e83-1.html
2023-04-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Hitron Technologies Inc.', 'Product': 'Hitron CODA-5310', 'Versions': 'v7.2.4.7.1b3'}
CVE-2023-30481
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alexey Golubnichenko AGP Font Awesome Collection plugin <= 3.2.4 versions.
https://patchstack.com/database/vulnerability/agp-font-awesome-collection/wordpress-agp-font-awesome-collection-plugin-3-2-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:24.504Z
2023-08-10T11:43:13.444Z
2023-08-10T11:43:13.444Z
{'Vendor': 'Alexey Golubnichenko', 'Product': 'AGP Font Awesome Collection', 'Versions': 'n/a'}
CVE-2023-30897
A vulnerability has been identified in SIMATIC WinCC (All versions < V7.5.2.13). Affected applications fail to set proper access rights for their installation folder if a non-default installation path was chosen during installation. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.
https://cert-portal.siemens.com/productcert/pdf/ssa-914026.pdf
2023-04-20T05:09:40.252Z
2023-06-13T08:17:11.223Z
2023-06-13T08:17:11.223Z
{'Vendor': 'Siemens', 'Product': 'SIMATIC WinCC', 'Versions': 'All versions < V7.5.2.13'}
CVE-2023-30194
Prestashop posstaticfooter <= 1.0.0 is vulnerable to SQL Injection via posstaticfooter::getPosCurrentHook().
https://themeforest.net/user/posthemes/portfolio
2023-04-07T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30751
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in iControlWP Article Directory Redux plugin <= 1.0.2 versions.
https://patchstack.com/database/vulnerability/article-directory-redux/wordpress-article-directory-redux-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-14T07:08:36.339Z
2023-08-14T14:39:24.970Z
2023-08-14T14:39:24.970Z
{'Vendor': 'iControlWP', 'Product': 'Article Directory Redux', 'Versions': 'n/a'}
CVE-2023-30614
Pay is a payments engine for Ruby on Rails 6.0 and higher. In versions prior to 6.3.2 a payments info page of Pay is susceptible to reflected Cross-site scripting. An attacker could create a working URL that renders a javascript link to a user on a Rails application that integrates Pay. This URL could be distributed via email to specifically target certain individuals. If the targeted application contains a functionality to submit user-generated content (such as comments) the attacker could even distribute the URL using that functionality. This has been patched in version 6.3.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/pay-rails/pay/security/advisories/GHSA-cqf3-vpx7-rxhw
2023-04-13T13:25:18.831Z
2023-04-19T17:28:30.937Z
2023-04-19T17:28:30.937Z
{'Vendor': 'pay-rails', 'Product': 'pay', 'Versions': '< 6.3.2'}
CVE-2023-30497
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Simon Chuang WP LINE Notify plugin <= 1.4.4 versions.
https://patchstack.com/database/vulnerability/wp-line-notify/wordpress-wordpress-line-notify-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:43.801Z
2023-09-06T08:01:35.581Z
2023-09-06T08:01:35.581Z
{'Vendor': 'Simon Chuang', 'Product': 'WP LINE Notify', 'Versions': 'n/a'}
CVE-2023-30478
Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Newsletters plugin <= 4.8.8 versions.
https://patchstack.com/database/vulnerability/newsletters-lite/wordpress-newsletters-plugin-4-8-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-04-11T14:13:03.428Z
2023-11-10T13:42:14.519Z
2023-11-10T13:42:14.519Z
{'Vendor': 'Tribulant', 'Product': 'Newsletters', 'Versions': 'n/a'}
CVE-2023-30706
Improper authorization in Samsung Keyboard prior to SMR Sep-2023 Release 1 allows attacker to read arbitrary file with system privilege.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09
2023-04-14T01:59:51.129Z
2023-09-06T03:11:52.376Z
2023-09-06T03:11:52.376Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 12'}
CVE-2023-30356
Missing Support for an Integrity Check in Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 allows attackers to update the device with crafted firmware
https://github.com/SECloudUNIMORE/ACES/blob/master/Tenda/CP3/tmp_MU.md
2023-04-07T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30643
Missing authentication vulnerability in Galaxy Themes Service prior to SMR Jul-2023 Release 1 allows local attackers to delete arbitrary non-preloaded applications.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.116Z
2023-07-06T02:50:16.555Z
2023-07-06T02:50:16.555Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30090
Semcms Shop v4.2 was discovered to contain an arbitrary file uplaod vulnerability via the component SEMCMS_Upfile.php. This vulnerability allows attackers to execute arbitrary code via uploading a crafted PHP file.
https://github.com/xlccccc/vuln/tree/master/Semcms
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30839
PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds.
https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-p379-cxqh-q822
2023-04-18T16:13:15.880Z
2023-04-25T18:41:38.777Z
2023-04-25T18:41:38.777Z
{'Vendor': 'PrestaShop', 'Product': 'PrestaShop', 'Versions': '>= 8.0.0, < 8.0.4, < 1.7.8.9'}
CVE-2023-30993
IBM Cloud Pak for Security (CP4S) 1.9.0.0 through 1.9.2.0 could allow an attacker with a valid API key for one tenant to access data from another tenant's account. IBM X-Force ID: 254136.
https://www.ibm.com/support/pages/node/6995221
2023-04-21T17:49:51.826Z
2023-06-27T19:25:24.382Z
2023-06-27T19:25:24.382Z
{'Vendor': 'IBM', 'Product': 'Cloud Pak for Security', 'Versions': '1.9.0.0'}
CVE-2023-30585
A vulnerability has been identified in the Node.js (.msi version) installation process, specifically affecting Windows users who install Node.js using the .msi installer. This vulnerability emerges during the repair operation, where the "msiexec.exe" process, running under the NT AUTHORITY\SYSTEM context, attempts to read the %USERPROFILE% environment variable from the current user's registry. The issue arises when the path referenced by the %USERPROFILE% environment variable does not exist. In such cases, the "msiexec.exe" process attempts to create the specified path in an unsafe manner, potentially leading to the creation of arbitrary folders in arbitrary locations. The severity of this vulnerability is heightened by the fact that the %USERPROFILE% environment variable in the Windows registry can be modified by standard (or "non-privileged") users. Consequently, unprivileged actors, including malicious entities or trojans, can manipulate the environment variable key to deceive the privileged "msiexec.exe" process. This manipulation can result in the creation of folders in unintended and potentially malicious locations. It is important to note that this vulnerability is specific to Windows users who install Node.js using the .msi installer. Users who opt for other installation methods are not affected by this particular issue.
https://nodejs.org/en/blog/vulnerability/june-2023-security-releases
2023-04-13T01:00:12.086Z
2023-11-28T01:23:08.734Z
2023-11-28T01:23:08.734Z
{'Vendor': 'Node.js', 'Product': 'Node.js', 'Versions': '16.20.1, 18.16.1, 20.3.1'}
CVE-2023-30458
A username enumeration issue was discovered in Medicine Tracker System 1.0. The login functionality allows a malicious user to guess a valid username due to a different response time from invalid usernames. When one enters a valid username, the response time increases depending on the length of the supplied password.
https://www.sourcecodester.com/php/16308/medicine-tracker-system-php-oop-and-mysql-db-source-code-free-download.html
2023-04-10T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30264
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type via application/admin/controller/Template.php:update.
https://gist.github.com/HuBenLab/8498761dc3eaaed724a134197f092c47
2023-04-07T00:00:00
2023-05-04T00:00:00
2023-05-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30321
Cross Site Scripting (XSS) vulnerability in textMessage field in /src/chatbotapp/LoginServlet.java in wliang6 ChatEngine commit fded8e710ad59f816867ad47d7fc4862f6502f3e, allows attackers to execute arbitrary code.
https://github.com/wliang6/ChatEngine/blob/fded8e710ad59f816867ad47d7fc4862f6502f3e/src/chatbotapp/LoginServlet.java#L55:L64
2023-04-07T00:00:00
2023-07-06T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30771
Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This issue affects the iotdb-web-workbench component on 0.13.3. iotdb-web-workbench is an optional component of IoTDB, providing a web console of the database. This problem is fixed from version 0.13.4 of iotdb-web-workbench onwards.
https://lists.apache.org/thread/08nc3dr6lshfppx0pzmz5vbggdnzpojb
2023-04-16T02:36:51.763Z
2023-04-17T07:26:12.996Z
2023-04-17T07:26:12.996Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache IoTDB Workbench', 'Versions': '0.13.3'}
CVE-2023-30399
Insecure permissions in the settings page of GARO Wallbox GLB/GTB/GTC before v189 allows attackers to redirect users to a crafted update package link via a man-in-the-middle attack.
http://garocharging.com/glb-wallbox/
2023-04-07T00:00:00
2023-05-04T00:00:00
2023-05-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30663
Improper input validation vulnerability in OemPersonalizationSetLock in libsec-ril prior to SMR Jul-2023 Release 1 allows local attackers to cause an Out-Of-Bounds write.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.118Z
2023-07-06T02:51:36.276Z
2023-07-06T02:51:36.276Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30726
PendingIntent hijacking vulnerability in GameLauncher prior to version 4.2.59.5 allows local attackers to access data.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09
2023-04-14T01:59:51.138Z
2023-09-06T03:12:13.772Z
2023-09-06T03:12:13.772Z
{'Vendor': 'Samsung Mobile', 'Product': 'GameLauncher ', 'Versions': ' 4.2.59.5'}
CVE-2023-30376
In Tenda AC15 V15.03.05.19, the function "henan_pppoe_user" contains a stack-based buffer overflow vulnerability.
https://github.com/2205794866/Tenda/blob/main/AC15/9.md
2023-04-07T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30675
Improper authentication in Samsung Pass prior to version 4.2.03.1 allows local attacker to access stored account information when Samsung Wallet is not installed.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=07
2023-04-14T01:59:51.119Z
2023-07-06T02:51:48.349Z
2023-07-06T02:51:48.349Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Pass', 'Versions': '4.2.03.1'}
CVE-2023-30730
Implicit intent hijacking vulnerability in Camera prior to versions 11.0.16.43 in Android 11, 12.1.00.30, 12.0.07.53, 12.1.03.10 in Android 12, and 13.0.01.43, 13.1.00.83 in Android 13 allows local attacker to access specific file.
https://security.samsungmobile.com/serviceWeb.smsb?year=2023&month=09
2023-04-14T01:59:51.138Z
2023-09-06T03:12:16.839Z
2023-09-06T03:12:16.839Z
{'Vendor': 'Samsung Mobile', 'Product': 'Camera', 'Versions': '11.0.16.43 in Android 11, 12.1.00.30, 12.0.07.53, 12.1.03.10 in Android 12, and 13.0.01.43, 13.1.00.83 in Android 13'}
CVE-2023-30858
The Denosaurs emoji package provides emojis for dinosaurs. Starting in version 0.1.0 and prior to version 0.3.0, the reTrimSpace regex has 2nd degree polynomial inefficiency, leading to a delayed response given a big payload. The issue has been patched in 0.3.0. As a workaround, avoid using the `replace`, `unemojify`, or `strip` functions.
https://github.com/denosaurs/emoji/security/advisories/GHSA-w2xx-hjhp-gx5v
2023-04-18T16:13:15.882Z
2023-04-28T20:49:26.858Z
2023-04-28T20:49:26.858Z
{'Vendor': 'denosaurs', 'Product': 'emoji', 'Versions': '< 0.3.0'}
CVE-2023-30622
Clusternet is a general-purpose system for controlling Kubernetes clusters across different environments. An issue in clusternet prior to version 0.15.2 can be leveraged to lead to a cluster-level privilege escalation. The clusternet has a deployment called `cluster-hub` inside the `clusternet-system` Kubernetes namespace, which runs on worker nodes randomly. The deployment has a service account called `clusternet-hub`, which has a cluster role called `clusternet:hub` via cluster role binding. The `clusternet:hub` cluster role has `"*" verbs of "*.*"` resources. Thus, if a malicious user can access the worker node which runs the clusternet, they can leverage the service account to do malicious actions to critical system resources. For example, the malicious user can leverage the service account to get ALL secrets in the entire cluster, resulting in cluster-level privilege escalation. Version 0.15.2 contains a fix for this issue.
https://github.com/clusternet/clusternet/security/advisories/GHSA-833c-xh79-p429
2023-04-13T13:25:18.832Z
2023-04-24T15:34:05.430Z
2023-04-24T15:34:05.430Z
{'Vendor': 'clusternet', 'Product': 'clusternet', 'Versions': '< 0.15.2'}
CVE-2023-30788
MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people/add` endpoint and nickName, description, lastName, middleName and firstName parameter.
https://fluidattacks.com/advisories/napoli
2023-04-17T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'}
CVE-2023-30570
pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. The earliest affected version is 3.28.
https://libreswan.org/security/CVE-2023-30570/CVE-2023-30570.txt
2023-04-12T00:00:00
2023-05-28T00:00:00
2023-05-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30989
IBM Performance Tools for i 7.2, 7.3, 7.4, and 7.5 contains a local privilege escalation vulnerability. A malicious actor with command line access to the host operating system can elevate privileges to gain all object access to the host operating system. IBM X-Force ID: 254017.
https://www.ibm.com/support/pages/node/7012353
2023-04-21T17:49:51.826Z
2023-07-16T22:40:06.019Z
2023-07-16T22:40:06.019Z
{'Vendor': 'IBM', 'Product': 'i', 'Versions': '7.2, 7.3, 7.4, 7.5'}
CVE-2023-30065
MitraStar GPT-2741GNAC-N2 with firmware BR_g5.9_1.11(WVK.0)b32 was discovered to contain a remote code execution (RCE) vulnerability in the ping function.
https://github.com/Sigmw/mitrastar-code-execution/blob/main/README.md
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30435
IBM Security Guardium 11.3, 11.4, and 11.5 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 252291.
https://www.ibm.com/support/pages/node/7028506
2023-04-08T15:56:20.543Z
2023-08-27T22:18:31.330Z
2023-08-27T22:18:31.330Z
{'Vendor': 'IBM', 'Product': 'Security Guardium', 'Versions': '11.3, 11.4, 11.5'}
CVE-2023-30659
Improper input validation vulnerability in Transaction prior to SMR Jul-2023 Release 1 allows local attackers to launch privileged activities.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.117Z
2023-07-06T02:51:32.412Z
2023-07-06T02:51:32.412Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30874
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Steve Curtis, St. Pete Design Gps Plotter plugin <= 5.1.4 versions.
https://patchstack.com/database/vulnerability/gps-plotter/wordpress-gps-plotter-plugin-5-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-19T12:33:22.776Z
2023-08-17T08:25:39.198Z
2023-08-17T08:25:39.198Z
{'Vendor': 'Steve Curtis, St. Pete Design', 'Product': 'Gps Plotter', 'Versions': 'n/a'}
CVE-2023-30527
Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2992
2023-04-12T08:40:40.605Z
2023-04-12T17:05:15.700Z
2023-10-24T12:49:49.479Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins WSO2 Oauth Plugin', 'Versions': '0'}
CVE-2023-30177
CraftCMS 3.7.59 is vulnerable Cross Site Scripting (XSS). An attacker can inject javascript code into Volume Name.
https://github.com/craftcms/cms/commit/00fb253d5318e10204433e5d93934108e574005e
2023-04-07T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30198
Prestashop winbizpayment <= 1.0.2 is vulnerable to Incorrect Access Control via modules/winbizpayment/downloads/download.php.
https://github.com/PrestaShop/PrestaShop/blob/6c05518b807d014ee8edb811041e3de232520c28/classes/Tools.php#L1247
2023-04-07T00:00:00
2023-06-12T00:00:00
2023-06-27T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30931
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.248Z
2023-07-12T08:31:31.387Z
2023-07-12T08:31:31.387Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30531
Jenkins Consul KV Builder Plugin 2.0.13 and earlier does not mask the HashiCorp Consul ACL Token on the global configuration form, increasing the potential for attackers to observe and capture it.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2944
2023-04-12T08:40:40.605Z
2023-04-12T17:05:18.653Z
2023-10-24T12:49:54.188Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Consul KV Builder Plugin', 'Versions': '0'}
CVE-2023-30927
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.247Z
2023-07-12T08:31:25.996Z
2023-07-12T08:31:25.996Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}