CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-30258 | Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request. | https://eldstal.se/advisories/230327-magnusbilling.html | 2023-04-07T00:00:00 | 2023-06-23T00:00:00 | 2023-11-14T03:06:56.091504 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30608 | sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue.
| https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2 | 2023-04-13T13:25:18.830Z | 2023-04-18T21:32:11.145Z | 2023-04-18T21:32:11.145Z | {'Vendor': 'andialbrecht', 'Product': 'sqlparse', 'Versions': '>= 0.1.15, < 0.4.4'} |
CVE-2023-30864 | In Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges. | https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498 | 2023-04-19T09:06:41.102Z | 2023-06-06T05:13:10.873Z | 2023-06-06T05:13:10.873Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10'} |
CVE-2023-30537 | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki versions 13.10.11, 14.4.7 and 14.10. | https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vrr8-fp7c-7qgp | 2023-04-12T15:19:33.766Z | 2023-04-16T07:06:43.764Z | 2023-04-16T07:06:43.764Z | {'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 12.6.6, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'} |
CVE-2023-30188 | Memory Exhaustion vulnerability in ONLYOFFICE Document Server 4.0.3 through 7.3.2 allows remote attackers to cause a denial of service via crafted JavaScript file. | https://github.com/ONLYOFFICE/DocumentServer | 2023-04-07T00:00:00 | 2023-08-14T00:00:00 | 2023-08-14T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30472 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MyThemeShop URL Shortener by MyThemeShop plugin <= 1.0.17 versions. | https://patchstack.com/database/vulnerability/mts-url-shortener/wordpress-url-shortener-by-mythemeshop-plugin-1-0-17-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-11T14:13:03.427Z | 2023-09-27T10:42:38.828Z | 2023-09-27T10:42:38.828Z | {'Vendor': 'MyThemeShop', 'Product': 'URL Shortener by MyThemeShop', 'Versions': 'n/a'} |
CVE-2023-30921 | In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.246Z | 2023-07-12T08:31:12.760Z | 2023-07-12T08:31:12.760Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30560 | The configuration from the PCU can be modified without authentication using physical connection to the PCU.
| https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-alaris-system-with-guardrails-suite-mx | 2023-04-12T16:30:07.536Z | 2023-07-13T18:53:49.951Z | 2023-07-13T18:53:49.951Z | {'Vendor': 'Becton Dickinson & Co ', 'Product': 'BD Alarisâ„¢ Point-of-Care Unit (PCU) Model 8015', 'Versions': '0'} |
CVE-2023-30130 | An issue found in CraftCMS v.3.8.1 allows a remote attacker to execute arbitrary code via a crafted script to the Section parameter. | https://craftcms.com/ | 2023-04-07T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30649 | Heap out of bound write vulnerability in RmtUimNeedApdu of RILD prior to SMR Jul-2023 Release 1 allows attackers to execute arbitrary code. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.116Z | 2023-07-06T02:50:22.397Z | 2023-07-06T02:50:22.397Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30281 | Insecure permissions vulnerability was discovered, due to a lack of permissions’s control in scquickaccounting before v3.7.3 from Store Commander for PrestaShop, a guest can access exports from the module which can lead to leak of personnal informations from ps_customer table sush as name / surname / email | https://friends-of-presta.github.io/security-advisories/modules/2023/05/04/scquickaccounting.html | 2023-04-07T00:00:00 | 2023-05-16T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30452 | The MoroSystems EasyMind - Mind Maps plugin before 2.15.0 for Confluence allows persistent XSS when saving a Mind Map with the hyperlink parameter. | https://marketplace.atlassian.com/apps/1211267/easymind-mind-maps-for-confluence/version-history | 2023-04-10T00:00:00 | 2023-05-16T00:00:00 | 2023-05-16T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30901 | A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user. | https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf | 2023-04-20T12:49:03.482Z | 2023-06-13T08:17:12.290Z | 2024-01-09T09:59:13.439Z | {'Vendor': 'Siemens', 'Product': 'POWER METER SICAM Q100', 'Versions': 'All versions < V2.60'} |
CVE-2023-30844 | Mutagen provides real-time file synchronization and flexible network forwarding for developers. Prior to versions 0.16.6 and 0.17.1 in `mutagen` and prior to version 0.17.1 in `mutagen-compose`, Mutagen `list` and `monitor` commands are susceptible to control characters that could be provided by remote endpoints. This could cause terminal corruption, either intentional or unintentional, if these characters were present in error messages or file paths/names. This could be used as an attack vector if synchronizing with an untrusted remote endpoint, synchronizing files not under control of the user, or forwarding to/from an untrusted remote endpoint. On very old systems with terminals susceptible to issues such as CVE-2003-0069, the issue could theoretically cause code execution. The problem has been patched in Mutagen v0.16.6 and v0.17.1. Earlier versions of Mutagen are no longer supported and will not be patched. Versions of Mutagen after v0.18.0 will also have the patch merged. As a workaround, avoiding synchronization of untrusted files or interaction with untrusted remote endpoints should mitigate any risk. | https://github.com/mutagen-io/mutagen/security/advisories/GHSA-jmp2-wc4p-wfh2 | 2023-04-18T16:13:15.880Z | 2023-05-08T17:54:03.685Z | 2023-05-08T17:54:03.685Z | {'Vendor': 'mutagen-io', 'Product': 'mutagen', 'Versions': 'github.com/mutagen-io/mutagen < 0.16.6, github.com/mutagen-io/mutagen >= 0.17.0, < 0.17.1, github.com/mutagen-io/mutagen-compose < 0.17.1'} |
CVE-2023-30517 | Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server. | https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2841 | 2023-04-12T08:40:40.603Z | 2023-04-12T17:05:08.593Z | 2023-10-24T12:49:37.810Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins NeuVector Vulnerability Scanner Plugin', 'Versions': '0'} |
CVE-2023-30669 | Out-of-bounds Write in DoOemFactorySendFactoryTestResult of libsec-ril prior to SMR Jul-2023 Release 1 allows local attacker to execute arbitrary code. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.119Z | 2023-07-06T02:51:42.564Z | 2023-07-06T02:51:42.564Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30686 | Out-of-bounds Write in ReqDataRaw of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | 2023-04-14T01:59:51.123Z | 2023-08-10T01:18:30.732Z | 2023-08-10T01:18:30.732Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'} |
CVE-2023-30956 | A security defect was identified in Foundry Comments that enabled a user to discover the contents of an attachment submitted to another comment if they knew the internal UUID of the target attachment. This defect was resolved with the release of Foundry Comments 2.267.0.
| https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a | 2023-04-21T11:25:51.028Z | 2023-07-10T21:07:31.073Z | 2023-07-10T21:07:31.073Z | {'Vendor': 'Palantir', 'Product': 'com.palantir.comments:comments', 'Versions': '*'} |
CVE-2023-30405 | A cross-site scripting (XSS) vulnerability in Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the wl_ssid parameter at /boafrm/formHomeWlanSetup. | https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html | 2023-04-07T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30540 | Nextcloud Talk is a chat, video & audio call extension for Nextcloud. In affected versions a user that was added later to a conversation can use this information to get access to data that was deleted before they were added to the conversation. This issue has been patched in version 15.0.5 and it is recommended that users upgrad to 15.0.5. There are no known workarounds for this issue. | https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c9hr-cq65-9mjw | 2023-04-12T15:19:33.766Z | 2023-04-17T21:32:29.470Z | 2023-04-17T21:32:29.470Z | {'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 15.0.0, < 15.0.5'} |
CVE-2023-30690 | Improper input validation vulnerability in Duo prior to SMR Oct-2023 Release 1 allows local attackers to launch privileged activities. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10 | 2023-04-14T01:59:51.125Z | 2023-10-04T03:01:38.598Z | 2023-10-04T03:01:38.598Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 11, 12, 13'} |
CVE-2023-30940 | In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.249Z | 2023-07-12T08:31:47.448Z | 2023-07-12T08:31:47.448Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30805 | The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.
| https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/ | 2023-04-18T10:31:45.963Z | 2023-10-10T14:25:16.222Z | 2023-10-10T14:28:15.299Z | {'Vendor': 'Sangfor', 'Product': 'Net-Gen Application Firewall', 'Versions': '8.0.17'} |
CVE-2023-30106 | Sourcecodester Medicine Tracker System in PHP 1.0.0 is vulnerable to Cross Site Scripting (XSS) via page=about. | https://www.sourcecodester.com | 2023-04-07T00:00:00 | 2023-04-25T00:00:00 | 2023-04-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30556 | Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `optimize_sqltuningadvisor` method of `sql_optimize.py`. User input coming from the `db_name` parameter value in `sql_optimize.py` is passed to the `sqltuningadvisor` method in `oracle.py`for execution. To mitigate escape the variables accepted via user input when used in `sql_optimize.py`. Users may also use prepared statements when dealing with SQL as a mitigation for this issue. This issue is also indexed as `GHSL-2022-107`. | https://github.com/hhyo/Archery/security/advisories/GHSA-6pv9-9gq7-hr68 | 2023-04-12T15:19:33.768Z | 2023-04-18T22:35:38.243Z | 2023-04-18T22:35:38.243Z | {'Vendor': 'hhyo', 'Product': 'Archery', 'Versions': '<= 1.9.0'} |
CVE-2023-30782 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Andy Moyle Church Admin plugin <= 3.7.5 versions. | https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-3-7-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-17T12:29:35.716Z | 2023-08-16T09:43:38.596Z | 2023-08-16T09:43:38.596Z | {'Vendor': 'Andy Moyle', 'Product': 'Church Admin', 'Versions': 'n/a'} |
CVE-2023-30628 | Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and kiwitcms/enterprise v12.2 and prior,
the `changelog.yml` workflow is vulnerable to command injection attacks because of using an untrusted `github.head_ref` field. The `github.head_ref` value is an attacker-controlled value. Assigning the value to `zzz";echo${IFS}"hello";#` can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. Commit 834c86dfd1b2492ccad7ebbfd6304bfec895fed2 of the kiwitcms/Kiwi repository and commit e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751 of the kiwitcms/enterprise repository contain a fix for this issue. | https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx | 2023-04-13T13:25:18.833Z | 2023-04-24T21:17:32.896Z | 2023-04-24T21:17:32.896Z | {'Vendor': 'kiwitcms', 'Product': 'Kiwi', 'Versions': '<= 12.2'} |
CVE-2023-30297 | An issue found in N-able Technologies N-central Server before 2023.4 allows a local attacker to execute arbitrary code via the monitoring function of the server. | https://www.n-able.com/ | 2023-04-07T00:00:00 | 2023-08-03T00:00:00 | 2023-08-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30917 | In DMService, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges. | https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073 | 2023-04-21T08:42:30.246Z | 2023-07-12T08:31:07.843Z | 2023-07-12T08:31:07.843Z | {'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'} |
CVE-2023-30444 | IBM Watson Machine Learning on Cloud Pak for Data 4.0 and 4.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 253350. | https://www.ibm.com/support/pages/node/6985859 | 2023-04-08T15:56:40.869Z | 2023-04-27T12:52:10.336Z | 2023-04-27T12:52:10.336Z | {'Vendor': 'IBM', 'Product': 'Watson Machine Learning on Cloud Pak for Data', 'Versions': '4.0, 4.5'} |
CVE-2023-30014 | SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php. | https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-1.md | 2023-04-07T00:00:00 | 2024-01-12T00:00:00 | 2024-01-12T08:44:56.340569 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30501 | Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise. | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt | 2023-04-11T20:22:08.184Z | 2023-05-16T18:49:59.884Z | 2023-07-07T14:29:28.332Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'} |
CVE-2023-30151 | A SQL injection vulnerability in the Boxtal (envoimoinscher) module for PrestaShop, after version 3.1.10, allows remote attackers to execute arbitrary SQL commands via the `key` GET parameter. | https://help.boxtal.com/hc/fr/articles/360001342977-J-ai-besoin-du-module-PrestaShop-ancienne-version-Boxtal-Envoimoinscher-pour-mon-site | 2023-04-07T00:00:00 | 2023-07-13T00:00:00 | 2023-08-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30852 | Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the `/admin/misc/script-proxy` API endpoint that is accessible by an authenticated administrator user is vulnerable to arbitrary JavaScript and CSS file read via the `scriptPath` and `scripts` parameters. The `scriptPath` parameter is not sanitized properly and is vulnerable to path traversal attack. Any JavaScript/CSS file from the application server can be read by specifying sufficient number of `../` patterns to go out from the application webroot followed by path of the folder where the file is located in the "scriptPath" parameter and the file name in the "scripts" parameter. The JavaScript file is successfully read only if the web application has read access to it. Users should update to version 10.5.21 to receive a patch or, as a workaround, apply the patch manual. | https://github.com/pimcore/pimcore/security/advisories/GHSA-j5c3-r84f-9596 | 2023-04-18T16:13:15.881Z | 2023-04-27T16:44:28.113Z | 2023-04-27T16:44:28.113Z | {'Vendor': 'pimcore', 'Product': 'pimcore', 'Versions': '< 10.5.21'} |
CVE-2023-30716 | Improper access control vulnerability in SVCAgent prior to SMR Sep-2023 Release 1 allows attackers to trigger certain commands. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09 | 2023-04-14T01:59:51.136Z | 2023-09-06T03:12:02.855Z | 2023-09-06T03:12:02.855Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 11, 12, 13'} |
CVE-2023-30203 | Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the event_id parameter at /php-jms/result_sheet.php. | https://github.com/debug601/bug_report/blob/main/vendors/oretnom23/judging-management-system/SQLi-2.md | 2023-04-07T00:00:00 | 2023-05-04T00:00:00 | 2023-05-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30653 | Out of bounds read and write in enableTspDevice of sysinput HAL service prior to SMR Jul-2023 Release 1 allows local attackers to execute arbitrary code. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.117Z | 2023-07-06T02:50:26.344Z | 2023-07-06T02:50:26.344Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30741 | Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
| https://launchpad.support.sap.com/#/notes/3309935 | 2023-04-14T06:01:02.875Z | 2023-05-09T01:34:43.315Z | 2023-05-09T01:34:43.315Z | {'Vendor': 'SAP_SE', 'Product': 'SAP BusinessObjects Business Intelligence Platform', 'Versions': '420, 430'} |
CVE-2023-30604 | It is identified a vulnerability of insufficient authentication in the system configuration interface of Hitron Technologies CODA-5310. An unauthorized remote attacker can exploit this vulnerability to access system configuration interface, resulting in performing arbitrary system operation or disrupt service. | https://www.twcert.org.tw/tw/cp-132-7086-35622-1.html | 2023-04-13T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'Hitron Technologies Inc.', 'Product': 'Hitron CODA-5310', 'Versions': 'v7.2.4.7.1b3'} |
CVE-2023-30487 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThimPress LearnPress Export Import plugin <= 4.0.2 versions. | https://patchstack.com/database/vulnerability/learnpress-import-export/wordpress-learnpress-export-import-plugin-4-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-11T14:13:24.505Z | 2023-05-18T08:37:57.048Z | 2023-05-18T08:37:57.048Z | {'Vendor': 'ThimPress', 'Product': 'LearnPress Export Import', 'Versions': 'n/a'} |
CVE-2023-30192 | Prestashop possearchproducts 1.7 is vulnerable to SQL Injection via PosSearch::find(). | https://themeforest.net/user/posthemes/portfolio | 2023-04-07T00:00:00 | 2023-05-11T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30757 | A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated.
This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password. | https://cert-portal.siemens.com/productcert/pdf/ssa-042050.pdf | 2023-04-14T11:16:56.497Z | 2023-06-13T08:17:10.136Z | 2023-12-12T11:25:35.869Z | {'Vendor': 'Siemens', 'Product': 'Totally Integrated Automation Portal (TIA Portal) V14', 'Versions': 'All versions'} |
CVE-2023-30242 | NS-ASG v6.3 was discovered to contain a SQL injection vulnerability via the component /admin/add_ikev2.php. | http://ns-asg.com | 2023-04-07T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30612 | Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability. Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only. | https://github.com/cloud-hypervisor/cloud-hypervisor/security/advisories/GHSA-g6mw-f26h-4jgp | 2023-04-13T13:25:18.831Z | 2023-04-19T17:25:40.446Z | 2023-04-19T17:25:40.446Z | {'Vendor': 'cloud-hypervisor', 'Product': 'cloud-hypervisor', 'Versions': '>= 30.0, < 30.1, >= 31.0, < 31.1'} |
CVE-2023-30491 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CodeBard CodeBard's Patron Button and Widgets for Patreon plugin <= 2.1.8 versions. | https://patchstack.com/database/vulnerability/patron-button-and-widgets-by-codebard/wordpress-codebard-s-patron-button-and-widgets-for-patreon-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-11T14:13:43.800Z | 2023-08-05T22:35:24.329Z | 2023-08-05T22:35:24.329Z | {'Vendor': 'CodeBard', 'Product': "CodeBard's Patron Button and Widgets for Patreon", 'Versions': 'n/a'} |
CVE-2023-30868 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Jon Christopher CMS Tree Page View plugin <= 1.6.7 versions. | https://patchstack.com/database/vulnerability/cms-tree-page-view/wordpress-cms-tree-page-view-plugin-1-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-04-19T12:33:22.775Z | 2023-05-18T08:28:46.250Z | 2023-05-18T08:28:46.250Z | {'Vendor': 'Jon Christopher', 'Product': 'CMS Tree Page View', 'Versions': 'n/a'} |
CVE-2023-30184 | A stored cross-site scripting (XSS) vulnerability in Typecho v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter at /index.php/archives/1/comment. | https://github.com/typecho/typecho/issues/1546 | 2023-04-07T00:00:00 | 2023-05-04T00:00:00 | 2023-05-04T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30700 | PendingIntent hijacking vulnerability in SemWifiApTimeOutImpl in framework prior to SMR Aug-2023 Release 1 allows local attackers to access ContentProvider without proper permission. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08 | 2023-04-14T01:59:51.128Z | 2023-08-10T01:18:46.641Z | 2023-08-10T01:18:46.641Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'} |
CVE-2023-30350 | FS S3900-24T4S devices allow authenticated attackers with guest access to escalate their privileges and reset the admin password. | http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html | 2023-04-07T00:00:00 | 2023-05-28T00:00:00 | 2023-05-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30645 | Heap out of bound write vulnerability in IpcRxIncomingCBMsg of RILD prior to SMR Jul-2023 Release 1 allows attackers to execute arbitrary code. | https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07 | 2023-04-14T01:59:51.116Z | 2023-07-06T02:50:18.547Z | 2023-07-06T02:50:18.547Z | {'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'} |
CVE-2023-30995 | IBM Aspera Faspex 4.0 through 4.4.2 and 5.0 through 5.0.5 could allow a malicious actor to bypass IP whitelist restrictions using a specially crafted HTTP request. IBM X-Force ID: 254268. | https://www.ibm.com/support/pages/node/7029681 | 2023-04-21T17:49:51.826Z | 2023-09-08T20:56:37.103Z | 2023-10-10T19:12:02.374Z | {'Vendor': 'IBM', 'Product': 'Aspera Faspex', 'Versions': '5.0, 4.0'} |
CVE-2023-30096 | A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user information field. | https://github.com/totaljs/messenger/issues/10 | 2023-04-07T00:00:00 | 2023-05-04T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-30079 | null | null | 2023-04-07T00:00:00 | null | 2023-11-06T15:13:47.482623 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-30429 | Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar.
This issue affects Apache Pulsar: before 2.10.4, and 2.11.0.
When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mTLS authentication to authenticate with the Pulsar Function Worker, the Pulsar Function Worker incorrectly performs authorization by using the Proxy's role for authorization instead of the client's role, which can lead to privilege escalation, especially if the proxy is configured with a superuser role.
The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version.
2.10 Pulsar Function Worker users should upgrade to at least 2.10.4.
2.11 Pulsar Function Worker users should upgrade to at least 2.11.1.
3.0 Pulsar Function Worker users are unaffected.
Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.
| https://lists.apache.org/thread/v0gcvvxswr830314q4b1kybsfmcf3jf8 | 2023-04-08T03:30:20.317Z | 2023-07-12T09:08:23.703Z | 2023-07-12T09:08:23.703Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache Pulsar', 'Versions': '0, 2.11.0'} |
CVE-2023-45382 | In the module "SoNice Retour" (sonice_retour) up to version 2.1.0 from Common-Services for PrestaShop, a guest can download personal information without restriction by performing a path traversal attack. Due to a lack of permissions control and a lack of control in the path name construction, a guest can perform a path traversal to view all files on the information system. | https://common-services.com/fr/home-fr/ | 2023-10-09T00:00:00 | 2023-11-17T00:00:00 | 2023-11-17T01:53:11.318300 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45678 | stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of buffer write in `start_decoder` because at maximum `m->submaps` can be 16 but `submap_floor` and `submap_residue` are declared as arrays of 15 elements. This issue may lead to code execution. | https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ | 2023-10-10T14:36:40.862Z | 2023-10-20T23:26:51.139Z | 2023-10-20T23:26:51.139Z | {'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 1.22'} |
CVE-2023-45228 |
The application suffers from improper access control when editing users.
A user with read permissions can manipulate users, passwords, and
permissions by sending a single HTTP POST request with modified
parameters.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08 | 2023-10-25T15:23:55.527Z | 2023-10-26T16:19:41.642Z | 2023-10-26T16:19:41.642Z | {'Vendor': 'Sielco', 'Product': 'Analog FM transmitter', 'Versions': '2.12 (EXC5000GX), 2.12 (EXC120GX), 2.11 (EXC300GX), 2.10 (EXC1600GX), 2.10 (EXC2000GX), 2.08 (EXC1600GX), 2.08 (EXC1000GX), 2.07 (EXC3000GX), 2.06 (EXC5000GX), 1.7.7 (EXC30GT), 1.7.4 (EXC300GT), 1.7.4 (EXC100GT), 1.7.4 (EXC5000GT), 1.6.3 (EXC1000GT), 1.5.4 (EXC120GT)'} |
CVE-2023-45044 | A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.1.4.2596 build 20231128 and later
QuTS hero h5.1.4.2596 build 20231128 and later
| https://www.qnap.com/en/security-advisory/qsa-23-27 | 2023-10-03T08:58:16.880Z | 2024-01-05T16:19:00.887Z | 2024-01-05T16:19:00.887Z | {'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'} |
CVE-2023-45802 | When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.
This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.
Users are recommended to upgrade to version 2.4.58, which fixes the issue.
| https://httpd.apache.org/security/vulnerabilities_24.html | 2023-10-13T09:44:15.791Z | 2023-10-23T06:50:23.991Z | 2023-10-23T06:50:23.991Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache HTTP Server', 'Versions': '2.4.17'} |
CVE-2023-45013 | null | null | 2023-10-02T16:00:40.527Z | 2023-11-02T02:12:55.306Z | 2024-01-02T19:00:08.752Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-45855 | qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI. | https://github.com/SunshineOtaku/Report-CVE/blob/main/qdPM/9.2/Directory%20Traversal.md | 2023-10-14T00:00:00 | 2023-10-14T00:00:00 | 2023-10-14T04:17:56.363112 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45639 | Cross-Site Request Forgery (CSRF) vulnerability in Codex-m Sort SearchResult By Title plugin <= 10.0 versions. | https://patchstack.com/database/vulnerability/sort-searchresult-by-title/wordpress-sort-searchresult-by-title-plugin-10-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T09:58:47.168Z | 2023-10-16T09:32:24.951Z | 2023-10-16T09:32:24.951Z | {'Vendor': 'Codex-m', 'Product': 'Sort SearchResult By Title', 'Versions': 'n/a'} |
CVE-2023-45269 | Cross-Site Request Forgery (CSRF) vulnerability in David Cole Simple SEO plugin <= 2.0.25 versions. | https://patchstack.com/database/vulnerability/cds-simple-seo/wordpress-simple-seo-plugin-2-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-06T13:05:32.934Z | 2023-10-13T15:00:17.817Z | 2023-11-15T17:06:24.541Z | {'Vendor': 'David Cole', 'Product': 'Simple SEO', 'Versions': 'n/a'} |
CVE-2023-45286 | A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body. | https://github.com/go-resty/resty/issues/743 | 2023-10-06T17:06:26.221Z | 2023-11-28T16:31:21.078Z | 2024-01-04T18:41:48.460Z | {'Vendor': 'github.com/go-resty/resty/v2', 'Product': 'github.com/go-resty/resty/v2', 'Versions': '2.10.0'} |
CVE-2023-45005 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Castos Seriously Simple Stats plugin <= 1.5.1 versions. | https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-02T10:33:37.984Z | 2023-10-17T09:05:23.248Z | 2023-10-17T09:05:23.248Z | {'Vendor': 'Castos', 'Product': 'Seriously Simple Stats', 'Versions': 'n/a'} |
CVE-2023-45906 | Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/user/add. | https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20user%20added%20function.md | 2023-10-16T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T13:12:00.090978 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45140 | The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15. | https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5x | 2023-10-04T16:02:46.329Z | 2023-11-08T15:26:26.584Z | 2023-11-08T15:26:26.584Z | {'Vendor': 'ovh', 'Product': 'the-bastion', 'Versions': '>= 3.0.0, <= 3.14.0'} |
CVE-2023-45510 | tsMuxer version git-2539d07 was discovered to contain an alloc-dealloc-mismatch (operator new [] vs operator delete) error. | https://github.com/justdan96/tsMuxer/issues/778 | 2023-10-09T00:00:00 | 2023-10-12T00:00:00 | 2023-10-12T20:36:19.420197 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45394 | Stored Cross-Site Scripting (XSS) vulnerability in the Company field in the "Request a Quote" Section of Small CRM v3.0 allows an attacker to store and execute malicious javascript code in the Admin panel which leads to Admin account takeover. | https://github.com/kartik753/CVE/blob/main/CVE-2023-45394 | 2023-10-09T00:00:00 | 2023-10-20T00:00:00 | 2023-10-20T03:47:14.633119 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45681 | stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory write past an allocated heap buffer in `start_decoder`. The root cause is a potential integer overflow in `sizeof(char*) * (f->comment_list_length)` which may make `setup_malloc` allocate less memory than required. Since there is another integer overflow an attacker may overflow it too to force `setup_malloc` to return 0 and make the exploit more reliable. This issue may lead to code execution. | https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/ | 2023-10-10T14:36:40.862Z | 2023-10-20T23:26:56.100Z | 2023-10-20T23:26:56.100Z | {'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 1.22'} |
CVE-2023-45951 | lylme_spage v1.7.0 was discovered to contain a SQL injection vulnerability via the $userip parameter at function.php. | https://github.com/LyLme/lylme_spage/issues/32 | 2023-10-16T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T19:50:12.758784 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45052 | Cross-Site Request Forgery (CSRF) vulnerability in dan009 WP Bing Map Pro plugin < 5.0 versions. | https://patchstack.com/database/vulnerability/api-bing-map-2018/wordpress-wp-bing-map-pro-plugin-5-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-03T13:30:39.403Z | 2023-10-12T12:28:37.096Z | 2023-10-12T12:28:37.096Z | {'Vendor': 'dan009', 'Product': 'WP Bing Map Pro', 'Versions': 'n/a'} |
CVE-2023-45117 | Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'eid' parameter of the /update.php?q=rmquiz resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/argerich/ | 2023-10-04T14:28:12.264Z | 2023-12-21T15:47:00.234Z | 2024-01-02T13:59:21.840Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'} |
CVE-2023-45814 | Bunkum is an open-source protocol-agnostic request server for custom game servers. First, a little bit of background. So, in the beginning, Bunkum's `AuthenticationService` only supported injecting `IUser`s. However, as Refresh and SoundShapesServer implemented permissions systems support for injecting `IToken`s into endpoints was added. All was well until 4.0. Bunkum 4.0 then changed to enforce relations between `IToken`s and `IUser`s. This wasn't implemented in a very good way in the `AuthenticationService`, and ended up breaking caching in such a way that cached tokens would persist after the lifetime of the request - since we tried to cache both tokens and users. From that point until now, from what I understand, Bunkum was attempting to use that cached token at the start of the next request once cached. Naturally, when that token expired, downstream projects like Refresh would remove the object from Realm - and cause the object in the cache to be in a detached state, causing an exception from invalid use of `IToken.User`. So in other words, a use-after-free since Realm can't manage the lifetime of the cached token. Security-wise, the scope is fairly limited, can only be pulled off on a couple endpoints given a few conditions, and you can't guarantee which token you're going to get. Also, the token *would* get invalidated properly if the endpoint had either a `IToken` usage or a `IUser` usage. The fix is to just wipe the token cache after the request was handled, which is now in `4.2.1`. Users are advised to upgrade. There are no known workarounds for this vulnerability. | https://github.com/LittleBigRefresh/Bunkum/security/advisories/GHSA-jrf2-h5j6-3rrq | 2023-10-13T12:00:50.437Z | 2023-10-18T21:22:03.066Z | 2023-10-18T21:22:03.066Z | {'Vendor': 'LittleBigRefresh', 'Product': 'Bunkum', 'Versions': '>= 4.0.0, < 4.2.1'} |
CVE-2023-45750 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in POSIMYTH Nexter Extension plugin <= 2.0.3 versions. | https://patchstack.com/database/vulnerability/nexter-extension/wordpress-nexter-extension-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-10-12T08:27:55.558Z | 2023-10-24T11:28:01.344Z | 2023-10-24T11:28:01.344Z | {'Vendor': 'POSIMYTH', 'Product': 'Nexter Extension', 'Versions': 'n/a'} |
CVE-2023-45245 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36119. | https://security-advisory.acronis.com/advisories/SEC-6017 | 2023-10-05T21:47:00.379Z | 2023-10-06T09:53:55.524Z | 2023-10-06T09:53:55.524Z | {'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'} |
CVE-2023-45615 | There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt | 2023-10-09T16:22:24.802Z | 2023-11-14T22:44:59.789Z | 2023-11-14T22:44:59.789Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'} |
CVE-2023-45880 | GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads directory, directly in the webroot. | https://herolab.usd.de/security-advisories/usd-2023-0022/ | 2023-10-15T00:00:00 | 2023-11-14T00:00:00 | 2023-11-14T05:27:22.051100 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45479 | Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the list parameter in the function sub_49E098. | 2023-10-09T00:00:00 | 2023-11-29T00:00:00 | 2023-11-29T05:15:54.752289 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
|
CVE-2023-45357 | Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a sensitive information disclosure vulnerability. An authenticated attacker could potentially obtain access to sensitive information via a popup warning message. 6.14 (6.14.0) is also a fixed release. | https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617 | 2023-10-09T00:00:00 | 2023-10-17T00:00:00 | 2023-10-17T04:16:56.084389 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45642 | Cross-Site Request Forgery (CSRF) vulnerability in Hassan Ali Snap Pixel plugin <= 1.5.7 versions. | https://patchstack.com/database/vulnerability/snap-pixel/wordpress-snap-pixel-plugin-1-5-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T09:58:47.168Z | 2023-10-16T09:48:34.511Z | 2023-10-16T09:48:34.511Z | {'Vendor': 'Hassan Ali', 'Product': 'Snap Pixel', 'Versions': 'n/a'} |
CVE-2023-45838 | Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `aufs` package. | https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844 | 2023-10-13T15:53:40.298Z | 2023-12-05T11:30:10.671Z | 2023-12-05T18:00:07.196Z | {'Vendor': 'Buildroot', 'Product': 'Buildroot', 'Versions': '2023.08.1, dev commit 622698d7847'} |
CVE-2023-45992 | A vulnerability in the web-based interface of the RUCKUS Cloudpath product on version 5.12 build 5538 or before to could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against a user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system. | http://ruckus.com | 2023-10-16T00:00:00 | 2023-10-19T00:00:00 | 2023-10-31T20:44:05.766891 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45341 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_price' parameter of the routers/menu-router.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.767Z | 2023-11-02T13:58:33.567Z | 2023-11-02T13:58:33.567Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45204 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain a type confusion vulnerability while parsing specially crafted IGS files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21268) | https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf | 2023-10-05T15:37:13.907Z | 2023-10-10T10:21:44.994Z | 2023-10-10T10:21:44.994Z | {'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'} |
CVE-2023-45654 | Cross-Site Request Forgery (CSRF) vulnerability in Pixelgrade Comments Ratings plugin <= 1.1.7 versions. | https://patchstack.com/database/vulnerability/comments-ratings/wordpress-comments-ratings-plugin-1-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-10T12:38:22.832Z | 2023-10-16T08:46:13.568Z | 2023-10-16T08:46:13.568Z | {'Vendor': 'Pixelgrade', 'Product': 'Comments Ratings', 'Versions': 'n/a'} |
CVE-2023-45984 | TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the lang parameter in the function setLanguageCfg. | https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/setLanguageCfg.md | 2023-10-16T00:00:00 | 2023-10-16T00:00:00 | 2023-10-16T17:28:34.692406 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45068 | Cross-Site Request Forgery (CSRF) vulnerability in Supsystic Contact Form by Supsystic plugin <= 1.7.27 versions. | https://patchstack.com/database/vulnerability/contact-form-by-supsystic/wordpress-contact-form-by-supsystic-plugin-1-7-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-03T13:31:21.243Z | 2023-10-12T12:44:37.438Z | 2023-10-12T12:44:37.438Z | {'Vendor': 'Supsystic', 'Product': 'Contact Form by Supsystic', 'Versions': 'n/a'} |
CVE-2023-45746 | Cross-site scripting vulnerability in Movable Type series allows a remote authenticated attacker to inject an arbitrary script. Affected products/versions are as follows: Movable Type 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Premium 1.58 and earlier, Movable Type Premium Advanced 1.58 and earlier, Movable Type Cloud Edition (Version 7) r.5405 and earlier, and Movable Type Premium Cloud Edition 1.58 and earlier. | https://movabletype.org/news/2023/10/mt-79020-released.html | 2023-10-12T05:42:52.133Z | 2023-10-30T04:57:43.561Z | 2023-10-30T04:57:43.561Z | {'Vendor': 'Six Apart Ltd.', 'Product': 'Movable Type 7 (Movable Type 7 Series)', 'Versions': 'r.5405 and earlier'} |
CVE-2023-45316 | Mattermost fails to validate if a relative path is passed in /plugins/playbooks/api/v0/telemetry/run/<telem_run_id> as a telemetry run ID, allowing an attacker to use a path traversal payload that points to a different endpoint leading to a CSRF attack.
| https://mattermost.com/security-updates | 2023-12-05T08:22:34.306Z | 2023-12-12T08:23:17.299Z | 2023-12-12T08:23:17.299Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 0, 8.1.6, 9.0.4, 9.1.3, 9.2.2, 7.8.15'} |
CVE-2023-45603 | Unrestricted Upload of File with Dangerous Type vulnerability in Jeff Starr User Submitted Posts – Enable Users to Submit Posts from the Front End.This issue affects User Submitted Posts – Enable Users to Submit Posts from the Front End: from n/a through 20230902.
| https://patchstack.com/database/vulnerability/user-submitted-posts/wordpress-user-submitted-posts-plugin-20230902-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve | 2023-10-09T10:11:54.306Z | 2023-12-20T18:38:19.544Z | 2023-12-20T18:38:19.544Z | {'Vendor': 'Jeff Starr', 'Product': 'User Submitted Posts – Enable Users to Submit Posts from the Front End', 'Versions': 'n/a'} |
CVE-2023-45253 | An issue was discovered in Huddly HuddlyCameraService before version 8.0.7, not including version 7.99, allows attackers to manipulate files and escalate privileges via RollingFileAppender.DeleteFile method performed by the log4net library. | https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/ | 2023-10-05T00:00:00 | 2023-12-01T00:00:00 | 2023-12-01T06:01:59.985019 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45879 | GibbonEdu Gibbon version 25.0.0 allows HTML Injection via an IFRAME element to the Messager component. | https://herolab.usd.de/security-advisories/usd-2023-0019/ | 2023-10-15T00:00:00 | 2023-11-14T00:00:00 | 2023-11-14T05:23:31.655719 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-45480 | Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the src parameter in the function sub_47D878. | 2023-10-09T00:00:00 | 2023-11-29T00:00:00 | 2023-11-29T05:15:56.782169 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
|
CVE-2023-45048 | Cross-Site Request Forgery (CSRF) vulnerability in Repuso Social proof testimonials and reviews by Repuso plugin <= 5.00 versions. | https://patchstack.com/database/vulnerability/social-testimonials-and-reviews-widget/wordpress-social-proof-testimonials-and-reviews-by-repuso-plugin-4-97-cross-site-request-forgery-csrf?_s_id=cve | 2023-10-03T13:30:39.402Z | 2023-10-12T12:16:39.033Z | 2023-10-12T12:16:39.033Z | {'Vendor': 'Repuso', 'Product': 'Social proof testimonials and reviews by Repuso', 'Versions': 'n/a'} |
CVE-2023-45674 | Farmbot-Web-App is a web control interface for the Farmbot farm automation platform. An SQL injection vulnerability was found in FarmBot's web app that allows authenticated attackers to extract arbitrary data from its database (including the user table). This issue may lead to Information Disclosure. This issue has been patched in version 15.8.4. Users are advised to upgrade. There are no known workarounds for this issue. | https://github.com/FarmBot/Farmbot-Web-App/security/advisories/GHSA-pgq5-ff74-g7xq | 2023-10-10T14:36:40.861Z | 2023-10-13T23:35:51.427Z | 2023-10-13T23:35:51.427Z | {'Vendor': 'FarmBot', 'Product': 'Farmbot-Web-App', 'Versions': '< 15.8.4'} |
CVE-2023-45623 | Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt | 2023-10-09T16:22:24.803Z | 2023-11-14T22:56:19.989Z | 2023-11-14T22:56:19.989Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'} |
CVE-2023-45273 | Cross-Site Request Forgery (CSRF) vulnerability in Matt McKenny Stout Google Calendar plugin <= 1.2.3 versions. | https://patchstack.com/database/vulnerability/stout-google-calendar/wordpress-stout-google-calendar-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-06T13:05:32.934Z | 2023-10-16T08:18:48.457Z | 2023-10-16T08:18:48.457Z | {'Vendor': 'Matt McKenny', 'Product': 'Stout Google Calendar', 'Versions': 'n/a'} |
CVE-2023-45336 | Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/hann | 2023-10-06T21:35:59.765Z | 2023-11-02T13:26:16.010Z | 2023-11-02T13:26:16.010Z | {'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'} |
CVE-2023-45770 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fastwpspeed Fast WP Speed plugin <= 1.0.0 versions. | https://patchstack.com/database/vulnerability/fast-wp-speed/wordpress-fast-wp-speed-plugin-1-0-0-reflected-cross-site-scripting-vulnerability?_s_id=cve | 2023-10-12T14:57:39.224Z | 2023-10-24T12:16:08.741Z | 2023-10-24T12:16:08.741Z | {'Vendor': 'Fastwpspeed', 'Product': 'Fast WP Speed', 'Versions': 'n/a'} |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.