CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-30258
Command Injection vulnerability in MagnusSolution magnusbilling 6.x and 7.x allows remote attackers to run arbitrary commands via unauthenticated HTTP request.
https://eldstal.se/advisories/230327-magnusbilling.html
2023-04-07T00:00:00
2023-06-23T00:00:00
2023-11-14T03:06:56.091504
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30608
sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2
2023-04-13T13:25:18.830Z
2023-04-18T21:32:11.145Z
2023-04-18T21:32:11.145Z
{'Vendor': 'andialbrecht', 'Product': 'sqlparse', 'Versions': '>= 0.1.15, < 0.4.4'}
CVE-2023-30864
In Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
https://www.unisoc.com/en_us/secy/announcementDetail/1664822361414762498
2023-04-19T09:06:41.102Z
2023-06-06T05:13:10.873Z
2023-06-06T05:13:10.873Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10'}
CVE-2023-30537
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki versions 13.10.11, 14.4.7 and 14.10.
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vrr8-fp7c-7qgp
2023-04-12T15:19:33.766Z
2023-04-16T07:06:43.764Z
2023-04-16T07:06:43.764Z
{'Vendor': 'xwiki', 'Product': 'xwiki-platform', 'Versions': '>= 12.6.6, < 13.10.11, >= 14.0-rc-1, < 14.4.7, >= 14.5, < 14.10'}
CVE-2023-30188
Memory Exhaustion vulnerability in ONLYOFFICE Document Server 4.0.3 through 7.3.2 allows remote attackers to cause a denial of service via crafted JavaScript file.
https://github.com/ONLYOFFICE/DocumentServer
2023-04-07T00:00:00
2023-08-14T00:00:00
2023-08-14T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30472
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MyThemeShop URL Shortener by MyThemeShop plugin <= 1.0.17 versions.
https://patchstack.com/database/vulnerability/mts-url-shortener/wordpress-url-shortener-by-mythemeshop-plugin-1-0-17-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:03.427Z
2023-09-27T10:42:38.828Z
2023-09-27T10:42:38.828Z
{'Vendor': 'MyThemeShop', 'Product': 'URL Shortener by MyThemeShop', 'Versions': 'n/a'}
CVE-2023-30921
In messaging service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.246Z
2023-07-12T08:31:12.760Z
2023-07-12T08:31:12.760Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30560
The configuration from the PCU can be modified without authentication using physical connection to the PCU.
https://www.bd.com/en-us/about-bd/cybersecurity/bulletin/bd-alaris-system-with-guardrails-suite-mx
2023-04-12T16:30:07.536Z
2023-07-13T18:53:49.951Z
2023-07-13T18:53:49.951Z
{'Vendor': 'Becton Dickinson & Co ', 'Product': 'BD Alarisâ„¢ Point-of-Care Unit (PCU) Model 8015', 'Versions': '0'}
CVE-2023-30130
An issue found in CraftCMS v.3.8.1 allows a remote attacker to execute arbitrary code via a crafted script to the Section parameter.
https://craftcms.com/
2023-04-07T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30649
Heap out of bound write vulnerability in RmtUimNeedApdu of RILD prior to SMR Jul-2023 Release 1 allows attackers to execute arbitrary code.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.116Z
2023-07-06T02:50:22.397Z
2023-07-06T02:50:22.397Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30281
Insecure permissions vulnerability was discovered, due to a lack of permissions’s control in scquickaccounting before v3.7.3 from Store Commander for PrestaShop, a guest can access exports from the module which can lead to leak of personnal informations from ps_customer table sush as name / surname / email
https://friends-of-presta.github.io/security-advisories/modules/2023/05/04/scquickaccounting.html
2023-04-07T00:00:00
2023-05-16T00:00:00
2023-06-07T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30452
The MoroSystems EasyMind - Mind Maps plugin before 2.15.0 for Confluence allows persistent XSS when saving a Mind Map with the hyperlink parameter.
https://marketplace.atlassian.com/apps/1211267/easymind-mind-maps-for-confluence/version-history
2023-04-10T00:00:00
2023-05-16T00:00:00
2023-05-16T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30901
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user.
https://cert-portal.siemens.com/productcert/pdf/ssa-887249.pdf
2023-04-20T12:49:03.482Z
2023-06-13T08:17:12.290Z
2024-01-09T09:59:13.439Z
{'Vendor': 'Siemens', 'Product': 'POWER METER SICAM Q100', 'Versions': 'All versions < V2.60'}
CVE-2023-30844
Mutagen provides real-time file synchronization and flexible network forwarding for developers. Prior to versions 0.16.6 and 0.17.1 in `mutagen` and prior to version 0.17.1 in `mutagen-compose`, Mutagen `list` and `monitor` commands are susceptible to control characters that could be provided by remote endpoints. This could cause terminal corruption, either intentional or unintentional, if these characters were present in error messages or file paths/names. This could be used as an attack vector if synchronizing with an untrusted remote endpoint, synchronizing files not under control of the user, or forwarding to/from an untrusted remote endpoint. On very old systems with terminals susceptible to issues such as CVE-2003-0069, the issue could theoretically cause code execution. The problem has been patched in Mutagen v0.16.6 and v0.17.1. Earlier versions of Mutagen are no longer supported and will not be patched. Versions of Mutagen after v0.18.0 will also have the patch merged. As a workaround, avoiding synchronization of untrusted files or interaction with untrusted remote endpoints should mitigate any risk.
https://github.com/mutagen-io/mutagen/security/advisories/GHSA-jmp2-wc4p-wfh2
2023-04-18T16:13:15.880Z
2023-05-08T17:54:03.685Z
2023-05-08T17:54:03.685Z
{'Vendor': 'mutagen-io', 'Product': 'mutagen', 'Versions': 'github.com/mutagen-io/mutagen < 0.16.6, github.com/mutagen-io/mutagen >= 0.17.0, < 0.17.1, github.com/mutagen-io/mutagen-compose < 0.17.1'}
CVE-2023-30517
Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.
https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2841
2023-04-12T08:40:40.603Z
2023-04-12T17:05:08.593Z
2023-10-24T12:49:37.810Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins NeuVector Vulnerability Scanner Plugin', 'Versions': '0'}
CVE-2023-30669
Out-of-bounds Write in DoOemFactorySendFactoryTestResult of libsec-ril prior to SMR Jul-2023 Release 1 allows local attacker to execute arbitrary code.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.119Z
2023-07-06T02:51:42.564Z
2023-07-06T02:51:42.564Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30686
Out-of-bounds Write in ReqDataRaw of libsec-ril prior to SMR Aug-2023 Release 1 allows local attacker to execute arbitrary code.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.123Z
2023-08-10T01:18:30.732Z
2023-08-10T01:18:30.732Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30956
A security defect was identified in Foundry Comments that enabled a user to discover the contents of an attachment submitted to another comment if they knew the internal UUID of the target attachment. This defect was resolved with the release of Foundry Comments 2.267.0.
https://palantir.safebase.us/?tcuUid=40367943-738c-4e69-b852-4a503c77478a
2023-04-21T11:25:51.028Z
2023-07-10T21:07:31.073Z
2023-07-10T21:07:31.073Z
{'Vendor': 'Palantir', 'Product': 'com.palantir.comments:comments', 'Versions': '*'}
CVE-2023-30405
A cross-site scripting (XSS) vulnerability in Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the wl_ssid parameter at /boafrm/formHomeWlanSetup.
https://packetstormsecurity.com/files/172057/Aigital-Wireless-N-Repeater-Mini_Router.0.131229-Cross-Site-Scripting.html
2023-04-07T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30540
Nextcloud Talk is a chat, video & audio call extension for Nextcloud. In affected versions a user that was added later to a conversation can use this information to get access to data that was deleted before they were added to the conversation. This issue has been patched in version 15.0.5 and it is recommended that users upgrad to 15.0.5. There are no known workarounds for this issue.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c9hr-cq65-9mjw
2023-04-12T15:19:33.766Z
2023-04-17T21:32:29.470Z
2023-04-17T21:32:29.470Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 15.0.0, < 15.0.5'}
CVE-2023-30690
Improper input validation vulnerability in Duo prior to SMR Oct-2023 Release 1 allows local attackers to launch privileged activities.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=10
2023-04-14T01:59:51.125Z
2023-10-04T03:01:38.598Z
2023-10-04T03:01:38.598Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Oct-2023 Release in Android 11, 12, 13'}
CVE-2023-30940
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.249Z
2023-07-12T08:31:47.448Z
2023-07-12T08:31:47.448Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30805
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.
https://labs.watchtowr.com/yet-more-unauth-remote-command-execution-vulns-in-firewalls-sangfor-edition/
2023-04-18T10:31:45.963Z
2023-10-10T14:25:16.222Z
2023-10-10T14:28:15.299Z
{'Vendor': 'Sangfor', 'Product': 'Net-Gen Application Firewall', 'Versions': '8.0.17'}
CVE-2023-30106
Sourcecodester Medicine Tracker System in PHP 1.0.0 is vulnerable to Cross Site Scripting (XSS) via page=about.
https://www.sourcecodester.com
2023-04-07T00:00:00
2023-04-25T00:00:00
2023-04-25T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30556
Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `optimize_sqltuningadvisor` method of `sql_optimize.py`. User input coming from the `db_name` parameter value in `sql_optimize.py` is passed to the `sqltuningadvisor` method in `oracle.py`for execution. To mitigate escape the variables accepted via user input when used in `sql_optimize.py`. Users may also use prepared statements when dealing with SQL as a mitigation for this issue. This issue is also indexed as `GHSL-2022-107`.
https://github.com/hhyo/Archery/security/advisories/GHSA-6pv9-9gq7-hr68
2023-04-12T15:19:33.768Z
2023-04-18T22:35:38.243Z
2023-04-18T22:35:38.243Z
{'Vendor': 'hhyo', 'Product': 'Archery', 'Versions': '<= 1.9.0'}
CVE-2023-30782
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Andy Moyle Church Admin plugin <= 3.7.5 versions.
https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-3-7-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-17T12:29:35.716Z
2023-08-16T09:43:38.596Z
2023-08-16T09:43:38.596Z
{'Vendor': 'Andy Moyle', 'Product': 'Church Admin', 'Versions': 'n/a'}
CVE-2023-30628
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and kiwitcms/enterprise v12.2 and prior, the `changelog.yml` workflow is vulnerable to command injection attacks because of using an untrusted `github.head_ref` field. The `github.head_ref` value is an attacker-controlled value. Assigning the value to `zzz";echo${IFS}"hello";#` can lead to command injection. Since the permission is not restricted, the attacker has a write-access to the repository. Commit 834c86dfd1b2492ccad7ebbfd6304bfec895fed2 of the kiwitcms/Kiwi repository and commit e39f7e156fdaf6fec09a15ea6f4e8fec8cdbf751 of the kiwitcms/enterprise repository contain a fix for this issue.
https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-cw6r-6ccx-5hwx
2023-04-13T13:25:18.833Z
2023-04-24T21:17:32.896Z
2023-04-24T21:17:32.896Z
{'Vendor': 'kiwitcms', 'Product': 'Kiwi', 'Versions': '<= 12.2'}
CVE-2023-30297
An issue found in N-able Technologies N-central Server before 2023.4 allows a local attacker to execute arbitrary code via the monitoring function of the server.
https://www.n-able.com/
2023-04-07T00:00:00
2023-08-03T00:00:00
2023-08-03T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30917
In DMService, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
https://www.unisoc.com/en_us/secy/announcementDetail/1676902764208259073
2023-04-21T08:42:30.246Z
2023-07-12T08:31:07.843Z
2023-07-12T08:31:07.843Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000', 'Versions': 'Android10/Android11/Android12/Android13'}
CVE-2023-30444
IBM Watson Machine Learning on Cloud Pak for Data 4.0 and 4.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 253350.
https://www.ibm.com/support/pages/node/6985859
2023-04-08T15:56:40.869Z
2023-04-27T12:52:10.336Z
2023-04-27T12:52:10.336Z
{'Vendor': 'IBM', 'Product': 'Watson Machine Learning on Cloud Pak for Data', 'Versions': '4.0, 4.5'}
CVE-2023-30014
SQL Injection vulnerability in oretnom23 Judging Management System v1.0, allows remote attackers to execute arbitrary code and obtain sensitive information via sub_event_id parameter in sub_event_stat_update.php.
https://github.com/Pings1031/cve_report/blob/main/judging-management-system/SQLi-1.md
2023-04-07T00:00:00
2024-01-12T00:00:00
2024-01-12T08:44:56.340569
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30501
Vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface that allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-007.txt
2023-04-11T20:22:08.184Z
2023-05-16T18:49:59.884Z
2023-07-07T14:29:28.332Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba EdgeConnect Enterprise Software', 'Versions': 'ECOS 9.2.x.x, ECOS 9.1.x.x, ECOS 9.0.x.x, ECOS 8.x.x.x'}
CVE-2023-30151
A SQL injection vulnerability in the Boxtal (envoimoinscher) module for PrestaShop, after version 3.1.10, allows remote attackers to execute arbitrary SQL commands via the `key` GET parameter.
https://help.boxtal.com/hc/fr/articles/360001342977-J-ai-besoin-du-module-PrestaShop-ancienne-version-Boxtal-Envoimoinscher-pour-mon-site
2023-04-07T00:00:00
2023-07-13T00:00:00
2023-08-01T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30852
Pimcore is an open source data and experience management platform. Prior to version 10.5.21, the `/admin/misc/script-proxy` API endpoint that is accessible by an authenticated administrator user is vulnerable to arbitrary JavaScript and CSS file read via the `scriptPath` and `scripts` parameters. The `scriptPath` parameter is not sanitized properly and is vulnerable to path traversal attack. Any JavaScript/CSS file from the application server can be read by specifying sufficient number of `../` patterns to go out from the application webroot followed by path of the folder where the file is located in the "scriptPath" parameter and the file name in the "scripts" parameter. The JavaScript file is successfully read only if the web application has read access to it. Users should update to version 10.5.21 to receive a patch or, as a workaround, apply the patch manual.
https://github.com/pimcore/pimcore/security/advisories/GHSA-j5c3-r84f-9596
2023-04-18T16:13:15.881Z
2023-04-27T16:44:28.113Z
2023-04-27T16:44:28.113Z
{'Vendor': 'pimcore', 'Product': 'pimcore', 'Versions': '< 10.5.21'}
CVE-2023-30716
Improper access control vulnerability in SVCAgent prior to SMR Sep-2023 Release 1 allows attackers to trigger certain commands.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=09
2023-04-14T01:59:51.136Z
2023-09-06T03:12:02.855Z
2023-09-06T03:12:02.855Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Sep-2023 Release in Android 11, 12, 13'}
CVE-2023-30203
Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the event_id parameter at /php-jms/result_sheet.php.
https://github.com/debug601/bug_report/blob/main/vendors/oretnom23/judging-management-system/SQLi-2.md
2023-04-07T00:00:00
2023-05-04T00:00:00
2023-05-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30653
Out of bounds read and write in enableTspDevice of sysinput HAL service prior to SMR Jul-2023 Release 1 allows local attackers to execute arbitrary code.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.117Z
2023-07-06T02:50:26.344Z
2023-07-06T02:50:26.344Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30741
Due to insufficient input validation, SAP BusinessObjects Business Intelligence Platform - versions 420, 430, allows an unauthenticated attacker to redirect users to untrusted site using a malicious link. On successful exploitation, an attacker can view or modify information causing a limited impact on confidentiality and integrity of the application.
https://launchpad.support.sap.com/#/notes/3309935
2023-04-14T06:01:02.875Z
2023-05-09T01:34:43.315Z
2023-05-09T01:34:43.315Z
{'Vendor': 'SAP_SE', 'Product': 'SAP BusinessObjects Business Intelligence Platform', 'Versions': '420, 430'}
CVE-2023-30604
It is identified a vulnerability of insufficient authentication in the system configuration interface of Hitron Technologies CODA-5310. An unauthorized remote attacker can exploit this vulnerability to access system configuration interface, resulting in performing arbitrary system operation or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7086-35622-1.html
2023-04-13T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Hitron Technologies Inc.', 'Product': 'Hitron CODA-5310', 'Versions': 'v7.2.4.7.1b3'}
CVE-2023-30487
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThimPress LearnPress Export Import plugin <= 4.0.2 versions.
https://patchstack.com/database/vulnerability/learnpress-import-export/wordpress-learnpress-export-import-plugin-4-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:24.505Z
2023-05-18T08:37:57.048Z
2023-05-18T08:37:57.048Z
{'Vendor': 'ThimPress', 'Product': 'LearnPress Export Import', 'Versions': 'n/a'}
CVE-2023-30192
Prestashop possearchproducts 1.7 is vulnerable to SQL Injection via PosSearch::find().
https://themeforest.net/user/posthemes/portfolio
2023-04-07T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30757
A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated. This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password.
https://cert-portal.siemens.com/productcert/pdf/ssa-042050.pdf
2023-04-14T11:16:56.497Z
2023-06-13T08:17:10.136Z
2023-12-12T11:25:35.869Z
{'Vendor': 'Siemens', 'Product': 'Totally Integrated Automation Portal (TIA Portal) V14', 'Versions': 'All versions'}
CVE-2023-30242
NS-ASG v6.3 was discovered to contain a SQL injection vulnerability via the component /admin/add_ikev2.php.
http://ns-asg.com
2023-04-07T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30612
Cloud hypervisor is a Virtual Machine Monitor for Cloud workloads. This vulnerability allows users to close arbitrary open file descriptors in the Cloud Hypervisor process via sending malicious HTTP request through the HTTP API socket. As a result, the Cloud Hypervisor process can be easily crashed, causing Deny-of-Service (DoS). This can also be a potential Use-After-Free (UAF) vulnerability. Users require to have the write access to the API socket file to trigger this vulnerability. Impacted versions of Cloud Hypervisor include upstream main branch, v31.0, and v30.0. The vulnerability was initially detected by our `http_api_fuzzer` via oss-fuzz. This issue has been addressed in versions 30.1 and 31.1. Users unable to upgrade may mitigate this issue by ensuring the write access to the API socket file is granted to trusted users only.
https://github.com/cloud-hypervisor/cloud-hypervisor/security/advisories/GHSA-g6mw-f26h-4jgp
2023-04-13T13:25:18.831Z
2023-04-19T17:25:40.446Z
2023-04-19T17:25:40.446Z
{'Vendor': 'cloud-hypervisor', 'Product': 'cloud-hypervisor', 'Versions': '>= 30.0, < 30.1, >= 31.0, < 31.1'}
CVE-2023-30491
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in CodeBard CodeBard's Patron Button and Widgets for Patreon plugin <= 2.1.8 versions.
https://patchstack.com/database/vulnerability/patron-button-and-widgets-by-codebard/wordpress-codebard-s-patron-button-and-widgets-for-patreon-plugin-2-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-11T14:13:43.800Z
2023-08-05T22:35:24.329Z
2023-08-05T22:35:24.329Z
{'Vendor': 'CodeBard', 'Product': "CodeBard's Patron Button and Widgets for Patreon", 'Versions': 'n/a'}
CVE-2023-30868
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Jon Christopher CMS Tree Page View plugin <= 1.6.7 versions.
https://patchstack.com/database/vulnerability/cms-tree-page-view/wordpress-cms-tree-page-view-plugin-1-6-7-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-04-19T12:33:22.775Z
2023-05-18T08:28:46.250Z
2023-05-18T08:28:46.250Z
{'Vendor': 'Jon Christopher', 'Product': 'CMS Tree Page View', 'Versions': 'n/a'}
CVE-2023-30184
A stored cross-site scripting (XSS) vulnerability in Typecho v1.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the url parameter at /index.php/archives/1/comment.
https://github.com/typecho/typecho/issues/1546
2023-04-07T00:00:00
2023-05-04T00:00:00
2023-05-04T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30700
PendingIntent hijacking vulnerability in SemWifiApTimeOutImpl in framework prior to SMR Aug-2023 Release 1 allows local attackers to access ContentProvider without proper permission.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=08
2023-04-14T01:59:51.128Z
2023-08-10T01:18:46.641Z
2023-08-10T01:18:46.641Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Aug-2023 Release 1'}
CVE-2023-30350
FS S3900-24T4S devices allow authenticated attackers with guest access to escalate their privileges and reset the admin password.
http://packetstormsecurity.com/files/172124/FS-S3900-24T4S-Privilege-Escalation.html
2023-04-07T00:00:00
2023-05-28T00:00:00
2023-05-28T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30645
Heap out of bound write vulnerability in IpcRxIncomingCBMsg of RILD prior to SMR Jul-2023 Release 1 allows attackers to execute arbitrary code.
https://security.samsungmobile.com/securityUpdate.smsb?year=2023&month=07
2023-04-14T01:59:51.116Z
2023-07-06T02:50:18.547Z
2023-07-06T02:50:18.547Z
{'Vendor': 'Samsung Mobile', 'Product': 'Samsung Mobile Devices', 'Versions': 'SMR Jul-2023 Release 1'}
CVE-2023-30995
IBM Aspera Faspex 4.0 through 4.4.2 and 5.0 through 5.0.5 could allow a malicious actor to bypass IP whitelist restrictions using a specially crafted HTTP request. IBM X-Force ID: 254268.
https://www.ibm.com/support/pages/node/7029681
2023-04-21T17:49:51.826Z
2023-09-08T20:56:37.103Z
2023-10-10T19:12:02.374Z
{'Vendor': 'IBM', 'Product': 'Aspera Faspex', 'Versions': '5.0, 4.0'}
CVE-2023-30096
A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user information field.
https://github.com/totaljs/messenger/issues/10
2023-04-07T00:00:00
2023-05-04T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-30079
null
null
2023-04-07T00:00:00
null
2023-11-06T15:13:47.482623
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-30429
Incorrect Authorization vulnerability in Apache Software Foundation Apache Pulsar. This issue affects Apache Pulsar: before 2.10.4, and 2.11.0. When a client connects to the Pulsar Function Worker via the Pulsar Proxy where the Pulsar Proxy uses mTLS authentication to authenticate with the Pulsar Function Worker, the Pulsar Function Worker incorrectly performs authorization by using the Proxy's role for authorization instead of the client's role, which can lead to privilege escalation, especially if the proxy is configured with a superuser role. The recommended mitigation for impacted users is to upgrade the Pulsar Function Worker to a patched version. 2.10 Pulsar Function Worker users should upgrade to at least 2.10.4. 2.11 Pulsar Function Worker users should upgrade to at least 2.11.1. 3.0 Pulsar Function Worker users are unaffected. Any users running the Pulsar Function Worker for 2.9.* and earlier should upgrade to one of the above patched versions.
https://lists.apache.org/thread/v0gcvvxswr830314q4b1kybsfmcf3jf8
2023-04-08T03:30:20.317Z
2023-07-12T09:08:23.703Z
2023-07-12T09:08:23.703Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache Pulsar', 'Versions': '0, 2.11.0'}
CVE-2023-45382
In the module "SoNice Retour" (sonice_retour) up to version 2.1.0 from Common-Services for PrestaShop, a guest can download personal information without restriction by performing a path traversal attack. Due to a lack of permissions control and a lack of control in the path name construction, a guest can perform a path traversal to view all files on the information system.
https://common-services.com/fr/home-fr/
2023-10-09T00:00:00
2023-11-17T00:00:00
2023-11-17T01:53:11.318300
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45678
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger out of buffer write in `start_decoder` because at maximum `m->submaps` can be 16 but `submap_floor` and `submap_residue` are declared as arrays of 15 elements. This issue may lead to code execution.
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
2023-10-10T14:36:40.862Z
2023-10-20T23:26:51.139Z
2023-10-20T23:26:51.139Z
{'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 1.22'}
CVE-2023-45228
The application suffers from improper access control when editing users. A user with read permissions can manipulate users, passwords, and permissions by sending a single HTTP POST request with modified parameters.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-08
2023-10-25T15:23:55.527Z
2023-10-26T16:19:41.642Z
2023-10-26T16:19:41.642Z
{'Vendor': 'Sielco', 'Product': 'Analog FM transmitter', 'Versions': '2.12 (EXC5000GX), 2.12 (EXC120GX), 2.11 (EXC300GX), 2.10 (EXC1600GX), 2.10 (EXC2000GX), 2.08 (EXC1600GX), 2.08 (EXC1000GX), 2.07 (EXC3000GX), 2.06 (EXC5000GX), 1.7.7 (EXC30GT), 1.7.4 (EXC300GT), 1.7.4 (EXC100GT), 1.7.4 (EXC5000GT), 1.6.3 (EXC1000GT), 1.5.4 (EXC120GT)'}
CVE-2023-45044
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.4.2596 build 20231128 and later QuTS hero h5.1.4.2596 build 20231128 and later
https://www.qnap.com/en/security-advisory/qsa-23-27
2023-10-03T08:58:16.880Z
2024-01-05T16:19:00.887Z
2024-01-05T16:19:00.887Z
{'Vendor': 'QNAP Systems Inc.', 'Product': 'QuTS hero', 'Versions': 'h5.1.x'}
CVE-2023-45802
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
https://httpd.apache.org/security/vulnerabilities_24.html
2023-10-13T09:44:15.791Z
2023-10-23T06:50:23.991Z
2023-10-23T06:50:23.991Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache HTTP Server', 'Versions': '2.4.17'}
CVE-2023-45013
null
null
2023-10-02T16:00:40.527Z
2023-11-02T02:12:55.306Z
2024-01-02T19:00:08.752Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-45855
qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.
https://github.com/SunshineOtaku/Report-CVE/blob/main/qdPM/9.2/Directory%20Traversal.md
2023-10-14T00:00:00
2023-10-14T00:00:00
2023-10-14T04:17:56.363112
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45639
Cross-Site Request Forgery (CSRF) vulnerability in Codex-m Sort SearchResult By Title plugin <= 10.0 versions.
https://patchstack.com/database/vulnerability/sort-searchresult-by-title/wordpress-sort-searchresult-by-title-plugin-10-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T09:58:47.168Z
2023-10-16T09:32:24.951Z
2023-10-16T09:32:24.951Z
{'Vendor': 'Codex-m', 'Product': 'Sort SearchResult By Title', 'Versions': 'n/a'}
CVE-2023-45269
Cross-Site Request Forgery (CSRF) vulnerability in David Cole Simple SEO plugin <= 2.0.25 versions.
https://patchstack.com/database/vulnerability/cds-simple-seo/wordpress-simple-seo-plugin-2-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-06T13:05:32.934Z
2023-10-13T15:00:17.817Z
2023-11-15T17:06:24.541Z
{'Vendor': 'David Cole', 'Product': 'Simple SEO', 'Versions': 'n/a'}
CVE-2023-45286
A race condition in go-resty can result in HTTP request body disclosure across requests. This condition can be triggered by calling sync.Pool.Put with the same *bytes.Buffer more than once, when request retries are enabled and a retry occurs. The call to sync.Pool.Get will then return a bytes.Buffer that hasn't had bytes.Buffer.Reset called on it. This dirty buffer will contain the HTTP request body from an unrelated request, and go-resty will append the current HTTP request body to it, sending two bodies in one request. The sync.Pool in question is defined at package level scope, so a completely unrelated server could receive the request body.
https://github.com/go-resty/resty/issues/743
2023-10-06T17:06:26.221Z
2023-11-28T16:31:21.078Z
2024-01-04T18:41:48.460Z
{'Vendor': 'github.com/go-resty/resty/v2', 'Product': 'github.com/go-resty/resty/v2', 'Versions': '2.10.0'}
CVE-2023-45005
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Castos Seriously Simple Stats plugin <= 1.5.1 versions.
https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-02T10:33:37.984Z
2023-10-17T09:05:23.248Z
2023-10-17T09:05:23.248Z
{'Vendor': 'Castos', 'Product': 'Seriously Simple Stats', 'Versions': 'n/a'}
CVE-2023-45906
Dreamer CMS v4.1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/user/add.
https://github.com/moonsabc123/dreamer_cms/blob/main/There%20is%20a%20csrf%20in%20the%20user%20added%20function.md
2023-10-16T00:00:00
2023-10-17T00:00:00
2023-10-17T13:12:00.090978
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45140
The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15.
https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5x
2023-10-04T16:02:46.329Z
2023-11-08T15:26:26.584Z
2023-11-08T15:26:26.584Z
{'Vendor': 'ovh', 'Product': 'the-bastion', 'Versions': '>= 3.0.0, <= 3.14.0'}
CVE-2023-45510
tsMuxer version git-2539d07 was discovered to contain an alloc-dealloc-mismatch (operator new [] vs operator delete) error.
https://github.com/justdan96/tsMuxer/issues/778
2023-10-09T00:00:00
2023-10-12T00:00:00
2023-10-12T20:36:19.420197
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45394
Stored Cross-Site Scripting (XSS) vulnerability in the Company field in the "Request a Quote" Section of Small CRM v3.0 allows an attacker to store and execute malicious javascript code in the Admin panel which leads to Admin account takeover.
https://github.com/kartik753/CVE/blob/main/CVE-2023-45394
2023-10-09T00:00:00
2023-10-20T00:00:00
2023-10-20T03:47:14.633119
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45681
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory write past an allocated heap buffer in `start_decoder`. The root cause is a potential integer overflow in `sizeof(char*) * (f->comment_list_length)` which may make `setup_malloc` allocate less memory than required. Since there is another integer overflow an attacker may overflow it too to force `setup_malloc` to return 0 and make the exploit more reliable. This issue may lead to code execution.
https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/
2023-10-10T14:36:40.862Z
2023-10-20T23:26:56.100Z
2023-10-20T23:26:56.100Z
{'Vendor': 'nothings', 'Product': 'stb', 'Versions': '<= 1.22'}
CVE-2023-45951
lylme_spage v1.7.0 was discovered to contain a SQL injection vulnerability via the $userip parameter at function.php.
https://github.com/LyLme/lylme_spage/issues/32
2023-10-16T00:00:00
2023-10-17T00:00:00
2023-10-17T19:50:12.758784
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45052
Cross-Site Request Forgery (CSRF) vulnerability in dan009 WP Bing Map Pro plugin < 5.0 versions.
https://patchstack.com/database/vulnerability/api-bing-map-2018/wordpress-wp-bing-map-pro-plugin-5-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-03T13:30:39.403Z
2023-10-12T12:28:37.096Z
2023-10-12T12:28:37.096Z
{'Vendor': 'dan009', 'Product': 'WP Bing Map Pro', 'Versions': 'n/a'}
CVE-2023-45117
Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'eid' parameter of the /update.php?q=rmquiz resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/argerich/
2023-10-04T14:28:12.264Z
2023-12-21T15:47:00.234Z
2024-01-02T13:59:21.840Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Examination System', 'Versions': '1.0'}
CVE-2023-45814
Bunkum is an open-source protocol-agnostic request server for custom game servers. First, a little bit of background. So, in the beginning, Bunkum's `AuthenticationService` only supported injecting `IUser`s. However, as Refresh and SoundShapesServer implemented permissions systems support for injecting `IToken`s into endpoints was added. All was well until 4.0. Bunkum 4.0 then changed to enforce relations between `IToken`s and `IUser`s. This wasn't implemented in a very good way in the `AuthenticationService`, and ended up breaking caching in such a way that cached tokens would persist after the lifetime of the request - since we tried to cache both tokens and users. From that point until now, from what I understand, Bunkum was attempting to use that cached token at the start of the next request once cached. Naturally, when that token expired, downstream projects like Refresh would remove the object from Realm - and cause the object in the cache to be in a detached state, causing an exception from invalid use of `IToken.User`. So in other words, a use-after-free since Realm can't manage the lifetime of the cached token. Security-wise, the scope is fairly limited, can only be pulled off on a couple endpoints given a few conditions, and you can't guarantee which token you're going to get. Also, the token *would* get invalidated properly if the endpoint had either a `IToken` usage or a `IUser` usage. The fix is to just wipe the token cache after the request was handled, which is now in `4.2.1`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/LittleBigRefresh/Bunkum/security/advisories/GHSA-jrf2-h5j6-3rrq
2023-10-13T12:00:50.437Z
2023-10-18T21:22:03.066Z
2023-10-18T21:22:03.066Z
{'Vendor': 'LittleBigRefresh', 'Product': 'Bunkum', 'Versions': '>= 4.0.0, < 4.2.1'}
CVE-2023-45750
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in POSIMYTH Nexter Extension plugin <= 2.0.3 versions.
https://patchstack.com/database/vulnerability/nexter-extension/wordpress-nexter-extension-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-10-12T08:27:55.558Z
2023-10-24T11:28:01.344Z
2023-10-24T11:28:01.344Z
{'Vendor': 'POSIMYTH', 'Product': 'Nexter Extension', 'Versions': 'n/a'}
CVE-2023-45245
Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36119.
https://security-advisory.acronis.com/advisories/SEC-6017
2023-10-05T21:47:00.379Z
2023-10-06T09:53:55.524Z
2023-10-06T09:53:55.524Z
{'Vendor': 'Acronis', 'Product': 'Acronis Agent', 'Versions': 'unspecified'}
CVE-2023-45615
There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
2023-10-09T16:22:24.802Z
2023-11-14T22:44:59.789Z
2023-11-14T22:44:59.789Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'}
CVE-2023-45880
GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads directory, directly in the webroot.
https://herolab.usd.de/security-advisories/usd-2023-0022/
2023-10-15T00:00:00
2023-11-14T00:00:00
2023-11-14T05:27:22.051100
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45479
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the list parameter in the function sub_49E098.
https://github.com/l3m0n…_49E098_code.png
2023-10-09T00:00:00
2023-11-29T00:00:00
2023-11-29T05:15:54.752289
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45357
Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a sensitive information disclosure vulnerability. An authenticated attacker could potentially obtain access to sensitive information via a popup warning message. 6.14 (6.14.0) is also a fixed release.
https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/708617
2023-10-09T00:00:00
2023-10-17T00:00:00
2023-10-17T04:16:56.084389
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45642
Cross-Site Request Forgery (CSRF) vulnerability in Hassan Ali Snap Pixel plugin <= 1.5.7 versions.
https://patchstack.com/database/vulnerability/snap-pixel/wordpress-snap-pixel-plugin-1-5-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T09:58:47.168Z
2023-10-16T09:48:34.511Z
2023-10-16T09:48:34.511Z
{'Vendor': 'Hassan Ali', 'Product': 'Snap Pixel', 'Versions': 'n/a'}
CVE-2023-45838
Multiple data integrity vulnerabilities exist in the package hash checking functionality of Buildroot 2023.08.1 and Buildroot dev commit 622698d7847. A specially crafted man-in-the-middle attack can lead to arbitrary command execution in the builder.This vulnerability is related to the `aufs` package.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1844
2023-10-13T15:53:40.298Z
2023-12-05T11:30:10.671Z
2023-12-05T18:00:07.196Z
{'Vendor': 'Buildroot', 'Product': 'Buildroot', 'Versions': '2023.08.1, dev commit 622698d7847'}
CVE-2023-45992
A vulnerability in the web-based interface of the RUCKUS Cloudpath product on version 5.12 build 5538 or before to could allow a remote, unauthenticated attacker to execute persistent XSS and CSRF attacks against a user of the admin management interface. A successful attack, combined with a certain admin activity, could allow the attacker to gain full admin privileges on the exploited system.
http://ruckus.com
2023-10-16T00:00:00
2023-10-19T00:00:00
2023-10-31T20:44:05.766891
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45341
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The '*_price' parameter of the routers/menu-router.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.767Z
2023-11-02T13:58:33.567Z
2023-11-02T13:58:33.567Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45204
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0009), Tecnomatix Plant Simulation V2302 (All versions < V2302.0003). The affected applications contain a type confusion vulnerability while parsing specially crafted IGS files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21268)
https://cert-portal.siemens.com/productcert/pdf/ssa-524778.pdf
2023-10-05T15:37:13.907Z
2023-10-10T10:21:44.994Z
2023-10-10T10:21:44.994Z
{'Vendor': 'Siemens', 'Product': 'Tecnomatix Plant Simulation V2201', 'Versions': 'All versions < V2201.0009'}
CVE-2023-45654
Cross-Site Request Forgery (CSRF) vulnerability in Pixelgrade Comments Ratings plugin <= 1.1.7 versions.
https://patchstack.com/database/vulnerability/comments-ratings/wordpress-comments-ratings-plugin-1-1-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-10T12:38:22.832Z
2023-10-16T08:46:13.568Z
2023-10-16T08:46:13.568Z
{'Vendor': 'Pixelgrade', 'Product': 'Comments Ratings', 'Versions': 'n/a'}
CVE-2023-45984
TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow via the lang parameter in the function setLanguageCfg.
https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/setLanguageCfg.md
2023-10-16T00:00:00
2023-10-16T00:00:00
2023-10-16T17:28:34.692406
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45068
Cross-Site Request Forgery (CSRF) vulnerability in Supsystic Contact Form by Supsystic plugin <= 1.7.27 versions.
https://patchstack.com/database/vulnerability/contact-form-by-supsystic/wordpress-contact-form-by-supsystic-plugin-1-7-24-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-03T13:31:21.243Z
2023-10-12T12:44:37.438Z
2023-10-12T12:44:37.438Z
{'Vendor': 'Supsystic', 'Product': 'Contact Form by Supsystic', 'Versions': 'n/a'}
CVE-2023-45746
Cross-site scripting vulnerability in Movable Type series allows a remote authenticated attacker to inject an arbitrary script. Affected products/versions are as follows: Movable Type 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5405 and earlier (Movable Type 7 Series), Movable Type Premium 1.58 and earlier, Movable Type Premium Advanced 1.58 and earlier, Movable Type Cloud Edition (Version 7) r.5405 and earlier, and Movable Type Premium Cloud Edition 1.58 and earlier.
https://movabletype.org/news/2023/10/mt-79020-released.html
2023-10-12T05:42:52.133Z
2023-10-30T04:57:43.561Z
2023-10-30T04:57:43.561Z
{'Vendor': 'Six Apart Ltd.', 'Product': 'Movable Type 7 (Movable Type 7 Series)', 'Versions': 'r.5405 and earlier'}
CVE-2023-45316
Mattermost fails to validate if a relative path is passed in /plugins/playbooks/api/v0/telemetry/run/<telem_run_id> as a telemetry run ID, allowing an attacker to use a path traversal payload that points to a different endpoint leading to a CSRF attack.
https://mattermost.com/security-updates
2023-12-05T08:22:34.306Z
2023-12-12T08:23:17.299Z
2023-12-12T08:23:17.299Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 0, 8.1.6, 9.0.4, 9.1.3, 9.2.2, 7.8.15'}
CVE-2023-45603
Unrestricted Upload of File with Dangerous Type vulnerability in Jeff Starr User Submitted Posts – Enable Users to Submit Posts from the Front End.This issue affects User Submitted Posts – Enable Users to Submit Posts from the Front End: from n/a through 20230902.
https://patchstack.com/database/vulnerability/user-submitted-posts/wordpress-user-submitted-posts-plugin-20230902-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve
2023-10-09T10:11:54.306Z
2023-12-20T18:38:19.544Z
2023-12-20T18:38:19.544Z
{'Vendor': 'Jeff Starr', 'Product': 'User Submitted Posts – Enable Users to Submit Posts from the Front End', 'Versions': 'n/a'}
CVE-2023-45253
An issue was discovered in Huddly HuddlyCameraService before version 8.0.7, not including version 7.99, allows attackers to manipulate files and escalate privileges via RollingFileAppender.DeleteFile method performed by the log4net library.
https://www.xlent.no/aktuelt/security-disclosure-of-vulnerabilities-cve-2023-45252-and-cve-2023-45253/
2023-10-05T00:00:00
2023-12-01T00:00:00
2023-12-01T06:01:59.985019
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45879
GibbonEdu Gibbon version 25.0.0 allows HTML Injection via an IFRAME element to the Messager component.
https://herolab.usd.de/security-advisories/usd-2023-0019/
2023-10-15T00:00:00
2023-11-14T00:00:00
2023-11-14T05:23:31.655719
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45480
Tenda AC10 version US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via the src parameter in the function sub_47D878.
https://github.com/l3m0n…_47d878_code.png
2023-10-09T00:00:00
2023-11-29T00:00:00
2023-11-29T05:15:56.782169
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-45048
Cross-Site Request Forgery (CSRF) vulnerability in Repuso Social proof testimonials and reviews by Repuso plugin <= 5.00 versions.
https://patchstack.com/database/vulnerability/social-testimonials-and-reviews-widget/wordpress-social-proof-testimonials-and-reviews-by-repuso-plugin-4-97-cross-site-request-forgery-csrf?_s_id=cve
2023-10-03T13:30:39.402Z
2023-10-12T12:16:39.033Z
2023-10-12T12:16:39.033Z
{'Vendor': 'Repuso', 'Product': 'Social proof testimonials and reviews by Repuso', 'Versions': 'n/a'}
CVE-2023-45674
Farmbot-Web-App is a web control interface for the Farmbot farm automation platform. An SQL injection vulnerability was found in FarmBot's web app that allows authenticated attackers to extract arbitrary data from its database (including the user table). This issue may lead to Information Disclosure. This issue has been patched in version 15.8.4. Users are advised to upgrade. There are no known workarounds for this issue.
https://github.com/FarmBot/Farmbot-Web-App/security/advisories/GHSA-pgq5-ff74-g7xq
2023-10-10T14:36:40.861Z
2023-10-13T23:35:51.427Z
2023-10-13T23:35:51.427Z
{'Vendor': 'FarmBot', 'Product': 'Farmbot-Web-App', 'Versions': '< 15.8.4'}
CVE-2023-45623
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-017.txt
2023-10-09T16:22:24.803Z
2023-11-14T22:56:19.989Z
2023-11-14T22:56:19.989Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ', 'Versions': 'ArubaOS 10.5.x.x: 10.5.0.0 and below, ArubaOS 10.4.x.x: 10.4.0.2 and below, InstantOS 8.11.x.x: 8.11.1.2 and below, InstantOS 8.10.x.x: 8.10.0.8 and below, InstantOS 8.6.x.x: 8.6.0.22 and below'}
CVE-2023-45273
Cross-Site Request Forgery (CSRF) vulnerability in Matt McKenny Stout Google Calendar plugin <= 1.2.3 versions.
https://patchstack.com/database/vulnerability/stout-google-calendar/wordpress-stout-google-calendar-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-06T13:05:32.934Z
2023-10-16T08:18:48.457Z
2023-10-16T08:18:48.457Z
{'Vendor': 'Matt McKenny', 'Product': 'Stout Google Calendar', 'Versions': 'n/a'}
CVE-2023-45336
Online Food Ordering System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'password' parameter of the routers/router.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/hann
2023-10-06T21:35:59.765Z
2023-11-02T13:26:16.010Z
2023-11-02T13:26:16.010Z
{'Vendor': 'Projectworlds Pvt. Limited', 'Product': 'Online Food Ordering System', 'Versions': '1.0'}
CVE-2023-45770
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fastwpspeed Fast WP Speed plugin <= 1.0.0 versions.
https://patchstack.com/database/vulnerability/fast-wp-speed/wordpress-fast-wp-speed-plugin-1-0-0-reflected-cross-site-scripting-vulnerability?_s_id=cve
2023-10-12T14:57:39.224Z
2023-10-24T12:16:08.741Z
2023-10-24T12:16:08.741Z
{'Vendor': 'Fastwpspeed', 'Product': 'Fast WP Speed', 'Versions': 'n/a'}