CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2387 | A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument winsServer1 leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227665 | 2023-04-28T11:48:36.408Z | 2023-04-28T19:00:05.399Z | 2023-10-22T18:47:42.601Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2738 | A vulnerability classified as critical has been found in Tongda OA 11.10. This affects the function actionGetdata of the file GatewayController.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229149 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229149 | 2023-05-16T14:32:59.091Z | 2023-05-16T15:00:04.971Z | 2023-10-23T06:23:22.266Z | {'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '11.10'} |
CVE-2023-2368 | A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php?page=manage_questionnaire. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227644. | https://vuldb.com/?id.227644 | 2023-04-28T11:08:18.422Z | 2023-04-28T12:31:04.224Z | 2023-10-22T18:24:32.512Z | {'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'} |
CVE-2023-2692 | A vulnerability has been found in SourceCodester ICT Laboratory Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file views/room_info.php of the component GET Parameter Handler. The manipulation of the argument name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228973 was assigned to this vulnerability. | https://vuldb.com/?id.228973 | 2023-05-14T07:47:36.240Z | 2023-05-14T09:00:03.763Z | 2023-10-23T06:13:36.029Z | {'Vendor': 'SourceCodester', 'Product': 'ICT Laboratory Management System', 'Versions': '1.0'} |
CVE-2023-2942 | Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.1. | https://github.com/openemr/openemr/commit/c1c0805696ca68577c37bf30e29f90e5f3e0f1a9 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2041 | A vulnerability classified as critical was found in novel-plus 3.6.2. Affected by this vulnerability is an unknown functionality of the file /category/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.225919 | 2023-04-14T06:30:56.860Z | 2023-04-14T09:00:06.961Z | 2023-10-22T09:47:40.025Z | {'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'} |
CVE-2023-2411 | A vulnerability was found in SourceCodester AC Repair and Services System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227705 was assigned to this vulnerability. | https://vuldb.com/?id.227705 | 2023-04-28T16:30:47.455Z | 2023-04-28T23:00:06.229Z | 2023-10-22T19:04:46.974Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-2104 | Improper Access Control in GitHub repository alextselegidis/easyappointments prior to 1.5.0. | https://huntr.dev/bounties/3099b8d1-c49c-41b8-a929-73ccded6fc7c | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | {'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'} |
CVE-2023-2554 | External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0. | https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'} |
CVE-2023-2807 | Authentication Bypass by Spoofing vulnerability in the password reset process of Pandora FMS allows an unauthenticated attacker to initiate a password reset process for any user account without proper authentication. This issue affects PandoraFMS v771 and prior versions on all platforms. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-05-19T08:29:18.021Z | 2023-06-13T11:10:59.966Z | 2023-09-26T10:25:07.973Z | {'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'} |
CVE-2023-2780 | Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1. | https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-2295 | A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2. | https://bugzilla.redhat.com/show_bug.cgi?id=2189777 | 2023-04-26T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'libreswan', 'Versions': 'Affects libreswan v4.9-1.el8 and libreswan v4.9-1.el9, Fixed in libreswan v4.9-3.el8_8 and libreswan v4.9-4.el9_2'} |
CVE-2023-2446 | The UserPro plugin for WordPress is vulnerable to sensitive information disclosure via the 'userpro' shortcode in versions up to, and including 5.1.1. This is due to insufficient restriction on sensitive user meta values that can be called via that shortcode. This makes it possible for authenticated attackers, with subscriber-level permissions, and above to retrieve sensitive user meta that can be used to gain access to a high privileged user account. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4072ba5f-6385-4fa3-85b6-89dac7b60a92?source=cve | 2023-05-01T14:17:16.045Z | 2023-11-22T07:32:12.130Z | 2023-11-22T07:32:12.130Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2915 | The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message resulting in a denial-of-service condition. | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471 | 2023-05-26T13:45:57.862Z | 2023-08-17T15:05:52.368Z | 2023-08-17T15:05:52.368Z | {'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ThinServer', 'Versions': '11.0.0 - 11.2.6, 11.1.0 - 11.1.6, 11.2.0 - 11.2.7, 12.0.0 - 12.0.5, 12.1.0 - 12.1.6, 13.0.0 - 13.0.2, 13.1.0'} |
CVE-2023-2850 | NodeBB is affected by a Cross-Site WebSocket Hijacking vulnerability due to missing validation of the request origin. Exploitation of this vulnerability allows certain user information to be extracted by attacker. | https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j | 2023-05-23T11:27:01.949Z | 2023-07-25T11:13:18.100Z | 2023-07-25T13:42:38.643Z | {'Vendor': 'NodeBB', 'Product': 'NodeBB', 'Versions': '< 2.8.13, >= 3.0.0, < 3.1.3'} |
CVE-2023-2503 | The 10Web Social Post Feed WordPress plugin before 1.2.9 does not sanitise and escape some parameter before outputting it back in a page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/07b1caf1-d00b-4075-b71a-0516d5604286 | 2023-05-03T15:15:59.963Z | 2023-06-05T13:38:58.202Z | 2023-06-05T13:38:58.202Z | {'Vendor': 'Unknown', 'Product': '10Web Social Post Feed', 'Versions': '0'} |
CVE-2023-2153 | A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php of the component POST Parameter Handler. The manipulation of the argument value with the input 1><script>alert(666)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226274 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226274 | 2023-04-18T10:56:14.857Z | 2023-04-18T14:00:05.924Z | 2023-10-22T14:30:34.999Z | {'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'} |
CVE-2023-2796 | The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id. | https://wpscan.com/vulnerability/e9ef793c-e5a3-4c55-beee-56b0909f7a0d | 2023-05-18T13:09:17.354Z | 2023-07-10T12:40:07.475Z | 2023-07-10T12:40:07.475Z | {'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'} |
CVE-2023-2779 | The Social Share, Social Login and Social Comments WordPress plugin before 7.13.52 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://wpscan.com/vulnerability/fe9b7696-3b0e-42e2-9dbc-55167605f5c5 | 2023-05-17T19:48:16.127Z | 2023-06-19T10:52:39.566Z | 2023-06-19T10:52:39.566Z | {'Vendor': 'Unknown', 'Product': 'Social Share, Social Login and Social Comments Plugin', 'Versions': '0'} |
CVE-2023-2283 | A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK. | https://access.redhat.com/security/cve/CVE-2023-2283 | 2023-04-25T00:00:00 | 2023-05-26T00:00:00 | 2023-12-22T10:06:16.415494 | {'Vendor': 'n/a', 'Product': 'libssh', 'Versions': 'libssh-2'} |
CVE-2023-2329 | The WooCommerce Google Sheet Connector WordPress plugin before 1.3.6 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack | https://wpscan.com/vulnerability/6e58f099-e8d6-49e4-9f02-d6a556c5b1d2 | 2023-04-27T09:07:06.197Z | 2023-07-17T13:29:48.544Z | 2023-08-08T08:04:24.970Z | {'Vendor': 'Unknown', 'Product': 'WooCommerce Google Sheet Connector', 'Versions': '0'} |
CVE-2023-2903 | A vulnerability classified as problematic has been found in NFine Rapid Development Platform 20230511. This affects an unknown part of the file /SystemManage/Role/GetGridJson?keyword=&page=1&rows=20. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229977 | 2023-05-25T20:36:45.522Z | 2023-05-25T22:31:03.689Z | 2023-10-23T07:09:43.326Z | {'Vendor': 'NFine', 'Product': 'Rapid Development Platform', 'Versions': '20230511'} |
CVE-2023-2000 | Mattermost Desktop App fails to validate a mattermost server redirection and navigates to an arbitrary website
| https://mattermost.com/security-updates | 2023-04-12T09:56:00.685Z | 2023-05-02T08:57:39.331Z | 2023-05-02T08:57:39.331Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 5.3.0'} |
CVE-2023-2450 | The FiboSearch - AJAX Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.23.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/880573d8-6dad-4a1b-a5db-33e1dc243062?source=cve | 2023-05-01T14:58:53.154Z | 2023-06-09T05:33:23.112Z | 2023-06-09T05:33:23.112Z | {'Vendor': 'damian-gora', 'Product': 'FiboSearch – Ajax Search for WooCommerce', 'Versions': '1.23.0'} |
CVE-2023-2145 | A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been classified as critical. Affected is an unknown function of the file projects_per_curriculum.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226266 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226266 | 2023-04-18T10:47:06.396Z | 2023-04-18T11:00:07.358Z | 2023-10-22T14:20:49.368Z | {'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'} |
CVE-2023-2515 | Mattermost fails to restrict a user with permissions to edit other users and to create personal access tokens from elevating their privileges to system admin
| https://mattermost.com/security-updates | 2023-05-04T11:36:47.883Z | 2023-05-12T08:53:44.111Z | 2023-05-12T08:53:44.111Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.1.8, 7.7.4, 7.8.3, 7.9.2'} |
CVE-2023-2846 | Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets. | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-005_en.pdf | 2023-05-23T07:15:33.185Z | 2023-06-30T04:05:26.423Z | 2023-06-30T04:05:26.423Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MELSEC-F Series FX3U-16MR/ES', 'Versions': 'all versions'} |
CVE-2023-2391 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. This issue affects some unknown processing of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ntp.server2 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227669 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227669 | 2023-04-28T11:48:52.572Z | 2023-04-28T20:31:04.092Z | 2023-10-22T18:52:35.209Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2684 | The File Renaming on Upload WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/42b1f017-c497-4825-b12a-8dce3e108a55 | 2023-05-12T15:02:36.630Z | 2023-06-19T10:52:40.415Z | 2023-06-19T10:52:40.415Z | {'Vendor': 'Unknown', 'Product': 'File Renaming on Upload', 'Versions': '0'} |
CVE-2023-2407 | The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments – Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Cross-Site Request Forgery. This is due to missing nonce validation in the ls_parse_vcita_callback() function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/207b40fa-2062-48d6-990b-f05cbbf8fb8e?source=cve | 2023-04-28T16:12:20.755Z | 2023-06-03T04:35:13.332Z | 2023-06-03T04:35:13.332Z | {'Vendor': 'vcita', 'Product': 'Event Registration Calendar By vcita', 'Versions': '*'} |
CVE-2023-2057 | A vulnerability was found in EyouCms 1.5.4. It has been classified as problematic. Affected is an unknown function of the file login.php?m=admin&c=Arctype&a=edit of the component New Picture Handler. The manipulation of the argument litpic_loca leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225942 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.225942 | 2023-04-14T08:33:41.592Z | 2023-04-14T13:31:04.204Z | 2023-10-22T10:04:44.772Z | {'Vendor': 'n/a', 'Product': 'EyouCms', 'Versions': '1.5.4'} |
CVE-2023-2954 | Cross-site Scripting (XSS) - Stored in GitHub repository liangliangyy/djangoblog prior to master. | https://huntr.dev/bounties/47f08086-aaae-4ca7-b0ca-24c616d3ad7d | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'liangliangyy', 'Product': 'liangliangyy/djangoblog', 'Versions': 'unspecified'} |
CVE-2023-2811 | The AI ChatBot WordPress plugin before 4.5.6 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks to all admin when setting chatbot and all client when using chatbot | https://wpscan.com/vulnerability/82a81721-0435-45a6-bd5b-dc90186cf803 | 2023-05-19T13:17:23.743Z | 2023-06-19T10:52:41.241Z | 2023-06-19T10:52:41.241Z | {'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'} |
CVE-2023-2112 | Desktop component service allows lateral movement between sessions in M-Files before 23.4.12455.0. | https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2112/ | 2023-04-17T08:52:30.318Z | 2023-04-20T08:05:52.085Z | 2023-04-20T08:05:52.085Z | {'Vendor': 'M-Files', 'Product': 'M-Files Desktop', 'Versions': '0'} |
CVE-2023-2305 | The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdm_members', 'wpdm_login_form', 'wpdm_reg_form' shortcodes in versions up to, and including, 3.2.70 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a66bc196-e5f8-46b4-a81c-c888eb64021c?source=cve | 2023-04-26T13:52:44.616Z | 2023-06-09T05:33:25.665Z | 2023-06-09T05:33:25.665Z | {'Vendor': 'codename065', 'Product': 'Download Manager', 'Versions': '*'} |
CVE-2023-2240 | Improper Privilege Management in GitHub repository microweber/microweber prior to 1.3.4. | https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203 | 2023-04-22T00:00:00 | 2023-04-22T00:00:00 | 2023-04-22T00:00:00 | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-2610 | Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532. | https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | 2023-12-23T07:06:26.300355 | {'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'} |
CVE-2023-2539 | null | null | 2023-05-05T08:21:24.484Z | 2023-05-05T08:25:33.868Z | 2023-05-05T08:26:16.959Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2169 | The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Related Posts functionality in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/52574d99-1ffe-4152-bf13-9cdd11d7300a?source=cve | 2023-04-18T20:38:56.206Z | 2023-04-19T09:38:19.339Z | 2023-04-19T09:38:19.339Z | {'Vendor': 'stevejburge', 'Product': 'TaxoPress is the WordPress Tag, Category, and Taxonomy Manager', 'Versions': '*'} |
CVE-2023-2493 | The All In One Redirection WordPress plugin before 2.2.0 does not properly sanitise and escape multiple parameters before using them in an SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. | https://wpscan.com/vulnerability/a9a205a4-eef9-4f30-877a-4c562930650c | 2023-05-03T13:44:36.032Z | 2023-07-10T12:40:10.450Z | 2023-07-10T13:05:41.028Z | {'Vendor': 'Unknown', 'Product': 'All In One Redirection', 'Versions': '0'} |
CVE-2023-2186 | On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution. | https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html | 2023-04-19T15:35:06.060Z | 2023-06-07T06:37:33.280Z | 2023-06-07T06:37:33.280Z | {'Vendor': 'Triangle MicroWorks', 'Product': 'SCADA Data Gateway', 'Versions': '5.01.03'} |
CVE-2023-2885 | Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability in CBOT Chatbot allows Adversary in the Middle (AiTM).This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
| https://www.usom.gov.tr/bildirim/tr-23-0293 | 2023-05-25T08:03:28.810Z | 2023-05-25T08:28:56.312Z | 2023-08-05T15:44:34.953Z | {'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'} |
CVE-2023-2702 | Authorization Bypass Through User-Controlled Key vulnerability in Finex Media Competition Management System allows Authentication Abuse, Authentication Bypass.This issue affects Competition Management System: before 23.07.
| https://www.usom.gov.tr/bildirim/tr-23-0283 | 2023-05-15T11:02:24.164Z | 2023-05-23T19:14:36.748Z | 2023-05-23T19:14:36.748Z | {'Vendor': 'Finex Media', 'Product': 'Competition Management System', 'Versions': '0'} |
CVE-2023-2352 | The CHP Ads Block Detector plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.9.4. This is due to missing or incorrect nonce validation on the chp_abd_action function. This makes it possible for unauthenticated attackers to update or reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e5a9cced-0e5e-4b6e-8291-0a862c9f9523?source=cve | 2023-04-27T15:54:41.964Z | 2023-08-31T05:33:13.592Z | 2023-08-31T05:33:13.592Z | {'Vendor': 'sureshchand12a', 'Product': 'CHP Ads Block Detector', 'Versions': '*'} |
CVE-2023-2647 | A vulnerability was found in Weaver E-Office 9.5 and classified as critical. Affected by this issue is some unknown functionality of the file /webroot/inc/utility_all.php of the component File Upload Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228776. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228776 | 2023-05-11T05:32:00.452Z | 2023-05-11T07:31:05.039Z | 2023-10-23T05:44:18.035Z | {'Vendor': 'Weaver', 'Product': 'E-Office', 'Versions': '9.5'} |
CVE-2023-2217 | A vulnerability, which was classified as critical, was found in SourceCodester Task Reminder System 1.0. This affects an unknown part of the file /admin/reminders/manage_reminder.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226983. | https://vuldb.com/?id.226983 | 2023-04-21T06:42:29.225Z | 2023-04-21T10:31:04.905Z | 2023-10-22T14:50:07.794Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-2094 | A vulnerability has been found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/mechanics/manage_mechanic.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226102 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226102 | 2023-04-15T09:11:40.071Z | 2023-04-15T10:31:04.007Z | 2023-10-22T14:06:11.031Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2978 | A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-230210 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230210 | 2023-05-30T13:30:34.971Z | 2023-05-30T14:00:05.299Z | 2023-10-23T07:25:34.783Z | {'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'} |
CVE-2023-2344 | A vulnerability has been found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=save_service of the component HTTP POST Request Handler. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227587. | https://vuldb.com/?id.227587 | 2023-04-27T13:37:53.193Z | 2023-04-27T14:00:06.340Z | 2023-10-22T16:02:35.454Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-2714 | The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_license' functions in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change the license key and support license key, but it can only be changed to a valid license key. | https://www.wordfence.com/threat-intel/vulnerabilities/id/29700844-b41d-4f10-90a7-06c8574d8d2a?source=cve | 2023-05-15T16:34:21.224Z | 2023-05-20T02:03:20.188Z | 2023-05-20T02:03:20.188Z | {'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'} |
CVE-2023-2201 | The Web Directory Free for WordPress is vulnerable to SQL Injection via the ‘post_id’ parameter in versions up to, and including, 1.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d831fa81-4714-4757-b75d-0a8f5edda910?source=cve | 2023-04-20T21:51:44.131Z | 2023-06-02T03:36:06.353Z | 2023-06-02T03:36:06.353Z | {'Vendor': 'mihail-chepovskiy', 'Product': 'Web Directory Free', 'Versions': '*'} |
CVE-2023-2981 | A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230213 was assigned to this vulnerability. | https://vuldb.com/?id.230213 | 2023-05-30T13:30:45.564Z | 2023-05-30T15:00:04.651Z | 2023-10-23T07:29:14.246Z | {'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'} |
CVE-2023-2578 | The Buy Me a Coffee WordPress plugin before 3.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/4dad1c0d-bcf9-4486-bd8e-387ac8e6c892 | 2023-05-08T12:29:01.605Z | 2023-07-10T12:40:13.155Z | 2023-07-10T13:05:41.607Z | {'Vendor': 'Unknown', 'Product': 'Buy Me a Coffee', 'Versions': '0'} |
CVE-2023-2082 | The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.6 due to insufficient sanitization and escaping on the 'text value set via the bmc_post_reception action. This makes it possible for authenticated attackers, with subscriber-level permissions, and above to inject arbitrary web scripts into pages that execute whenever a victim accesses a page with the injected scripts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9f8948-085b-4ac5-befd-c70085aa23cd?source=cve | 2023-04-14T19:26:48.435Z | 2023-07-14T04:38:53.836Z | 2023-07-14T04:38:53.836Z | {'Vendor': 'buymeacoffee', 'Product': 'Buy Me a Coffee – Button and Widget Plugin', 'Versions': '*'} |
CVE-2023-2597 | In Eclipse Openj9 before version 0.38.0, in the implementation of the shared cache (which is enabled by default in OpenJ9 builds) the size of a string is not properly checked against the size of the buffer. | https://github.com/eclipse-openj9/openj9/pull/17259 | 2023-05-09T00:00:00 | 2023-05-22T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'Eclipse Foundation', 'Product': 'Eclipse OpenJ9', 'Versions': 'unspecified'} |
CVE-2023-2743 | The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db | 2023-05-16T19:09:56.865Z | 2023-06-27T13:17:05.869Z | 2023-06-27T13:17:05.869Z | {'Vendor': 'Unknown', 'Product': 'WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting', 'Versions': '0'} |
CVE-2023-2313 | Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html | 2023-04-26T18:49:35.527Z | 2023-07-28T23:26:54.882Z | 2023-07-28T23:26:54.882Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'} |
CVE-2023-2606 | The WP Brutal AI WordPress plugin before 2.06 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/62deb3ed-a7e4-4cdc-a615-cad2ec2e1e8f | 2023-05-09T15:44:27.706Z | 2023-08-14T19:10:23.250Z | 2024-01-16T15:54:00.443Z | {'Vendor': 'Unknown', 'Product': 'WP Brutal AI', 'Versions': '0'} |
CVE-2023-2256 | The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting. | https://wpscan.com/vulnerability/1187e041-3be2-4613-8d56-c2394fcc75fb | 2023-04-24T16:39:13.446Z | 2023-05-30T07:49:09.041Z | 2023-05-30T07:49:09.041Z | {'Vendor': 'Unknown', 'Product': 'Product Addons & Fields for WooCommerce', 'Versions': '0'} |
CVE-2023-2485 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A malicious maintainer in a project can escalate other users to Owners in that project if they import members from another project that those other users are Owners of. | https://gitlab.com/gitlab-org/gitlab/-/issues/407830 | 2023-05-02T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=14.1, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2939 | Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:15.074Z | 2023-05-30T21:31:41.044Z | 2023-05-30T21:31:41.044Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2893 | The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_deactivate_product function. This makes it possible for unauthenticated attackers to deactivate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1268604c-08eb-4d86-8e97-9cdaa3e19c1f?source=cve | 2023-05-25T16:08:00.877Z | 2023-06-09T06:48:40.891Z | 2023-06-09T06:48:40.891Z | {'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'} |
CVE-2023-2190 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.10 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. It may be possible for users to view new commits to private projects in a fork created while the project was public. | https://gitlab.com/gitlab-org/gitlab/-/issues/408137 | 2023-04-19T22:23:17.062Z | 2023-07-13T02:00:02.797Z | 2023-07-13T02:00:02.797Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.10, 16.0, 16.1'} |
CVE-2023-2558 | The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcs_current_currency shortcode in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/be054481-89b4-47d8-ad06-8622edea367f?source=cve | 2023-05-05T19:52:19.525Z | 2023-06-09T05:33:31.519Z | 2023-06-09T05:33:31.519Z | {'Vendor': 'realmag777', 'Product': 'WPCS – WordPress Currency Switcher Professional', 'Versions': '*'} |
CVE-2023-2108 | A vulnerability has been found in SourceCodester Judging Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file edit_contestant.php. The manipulation of the argument contestant_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226147. | https://vuldb.com/?id.226147 | 2023-04-16T07:10:23.703Z | 2023-04-16T07:31:03.904Z | 2023-10-22T14:17:09.794Z | {'Vendor': 'SourceCodester', 'Product': 'Judging Management System', 'Versions': '1.0'} |
CVE-2023-2221 | The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin. | https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657 | 2023-04-21T08:04:23.888Z | 2023-06-19T10:52:42.024Z | 2023-06-19T10:52:42.024Z | {'Vendor': 'Unknown', 'Product': 'WP Custom Cursors | WordPress Cursor Plugin', 'Versions': '0'} |
CVE-2023-2671 | A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file classes/Master.php?f=save_inquiry of the component Contact Form. The manipulation of the argument fullname/contact/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228887. | https://vuldb.com/?id.228887 | 2023-05-12T06:01:28.767Z | 2023-05-12T08:31:03.243Z | 2023-10-23T06:02:36.611Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2364 | A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227640. | https://vuldb.com/?id.227640 | 2023-04-28T10:53:10.296Z | 2023-04-28T11:00:06.591Z | 2023-10-22T16:12:20.837Z | {'Vendor': 'SourceCodester', 'Product': 'Resort Reservation System', 'Versions': '1.0'} |
CVE-2023-2734 | The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.1. This is due to insufficient verification on the user being supplied during the cart sync from mobile REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5881d16c-84e8-4610-8233-cfa5a94fe3f9?source=cve | 2023-05-16T12:41:36.475Z | 2023-05-25T02:05:31.657Z | 2023-05-25T02:05:31.657Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-2626 | There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network.
This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
| https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi | 2023-05-10T11:35:38.314Z | 2023-07-25T17:07:02.960Z | 2023-08-14T16:07:51.627Z | {'Vendor': 'Google', 'Product': 'Nest Hub Max', 'Versions': '10.20221207.2.109'} |
CVE-2023-2276 | The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.10.7. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/42222c64-6492-4774-b5bc-8e62a1a328cf?source=cve | 2023-04-25T11:43:19.703Z | 2023-05-20T03:35:57.027Z | 2023-06-13T12:53:16.233Z | {'Vendor': 'wclovers', 'Product': 'WCFM Membership – WooCommerce Memberships for Multivendor Marketplace', 'Versions': '*'} |
CVE-2023-2763 | Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF file. | https://www.3ds.com/vulnerability/advisories | 2023-05-17T15:42:24.664Z | 2023-07-12T07:05:33.333Z | 2023-07-12T07:10:12.803Z | {'Vendor': 'Dassault Systèmes', 'Product': 'SOLIDWORKS Desktop', 'Versions': 'Release SOLIDWORKS 2021 Golden, Release SOLIDWORKS 2022 Golden, Release SOLIDWORKS 2023 Golden'} |
CVE-2023-2299 | The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized medication of data via the /wp-json/vcita-wordpress/v1/actions/auth REST-API endpoint in versions up to, and including, 4.2.10 due to a missing capability check on the processAction function. This makes it possible for unauthenticated attackers modify the plugin's settings. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4855627a-de56-49ee-b0b0-01b9735d8557?source=cve | 2023-04-26T12:12:34.510Z | 2023-06-03T04:35:14.168Z | 2023-06-03T04:35:14.168Z | {'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'} |
CVE-2023-2333 | The Ninja Forms Google Sheet Connector WordPress plugin before 1.2.7, gsheetconnector-ninja-forms-pro WordPress plugin through 1.2.7 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/13c4e065-fde6-41a4-a22b-bca1b10e0d30 | 2023-04-27T09:33:10.594Z | 2023-07-04T07:23:24.093Z | 2023-07-05T10:47:58.134Z | {'Vendor': 'Unknown', 'Product': 'Ninja Forms Google Sheet Connector', 'Versions': '0'} |
CVE-2023-2519 | A vulnerability has been found in Caton CTP Relay Server 1.2.9 and classified as critical. This vulnerability affects unknown code of the file /server/api/v1/login of the component API. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. VDB-228010 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228010 | 2023-05-04T15:56:24.118Z | 2023-05-04T16:31:03.917Z | 2023-10-23T05:19:54.230Z | {'Vendor': 'Caton', 'Product': 'CTP Relay Server', 'Versions': '1.2.9'} |
CVE-2023-2149 | A vulnerability classified as critical was found in Campcodes Online Thesis Archiving System 1.0. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226270 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226270 | 2023-04-18T10:47:20.454Z | 2023-04-18T12:31:03.850Z | 2023-10-22T14:25:42.339Z | {'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'} |
CVE-2023-2260 | Authorization Bypass Through User-Controlled Key in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304. | https://huntr.dev/bounties/649badc8-c935-4a84-8aa8-d3269ac54377 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'alfio-event', 'Product': 'alfio-event/alf.io', 'Versions': 'unspecified'} |
CVE-2023-2630 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2325 | Stored XSS Vulnerability in M-Files Classic Web versions before 23.10 and LTS Service Release Versions before 23.2 LTS SR4 and 23.8 LTS SR1allows attacker to execute script on users browser via stored HTML document.
| https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2325/ | 2023-04-27T08:15:36.501Z | 2023-10-20T06:39:44.747Z | 2023-10-20T06:39:44.747Z | {'Vendor': 'M-Files', 'Product': 'M-Files Web', 'Versions': '0, 23.2 LTS SR4, 23.8 LTS SR1'} |
CVE-2023-2775 | A vulnerability was found in code-projects Bus Dispatch and Information System 1.0. It has been classified as critical. This affects an unknown part of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229281 was assigned to this vulnerability. | https://vuldb.com/?id.229281 | 2023-05-17T16:58:20.946Z | 2023-05-17T20:00:04.432Z | 2023-10-23T06:38:01.022Z | {'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'} |
CVE-2023-2958 | Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.
| https://www.usom.gov.tr/bildirim/tr-23-0410 | 2023-05-29T11:48:11.080Z | 2023-07-17T14:16:26.447Z | 2023-07-26T09:07:14.271Z | {'Vendor': 'Origin Software', 'Product': 'ATS Pro', 'Versions': '0'} |
CVE-2023-2667 | A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228883. | https://vuldb.com/?id.228883 | 2023-05-12T06:01:10.919Z | 2023-05-12T06:31:04.065Z | 2023-10-23T05:57:43.076Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2237 | The WP Replicate Post plugin for WordPress is vulnerable to SQL Injection via the post_id parameter in versions up to, and including, 4.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for contributor-level attackers or higher to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/916e6f8b-cb29-4062-9a05-0337cfdb382a?source=cve | 2023-04-21T18:31:19.134Z | 2023-06-09T05:33:24.370Z | 2023-06-09T05:33:24.370Z | {'Vendor': 'yudiz', 'Product': 'WP Replicate Post', 'Versions': '*'} |
CVE-2023-2722 | Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html | 2023-05-15T21:16:58.051Z | 2023-05-16T18:45:33.967Z | 2023-05-16T18:45:33.967Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'} |
CVE-2023-2372 | A vulnerability, which was classified as problematic, has been found in SourceCodester Online DJ Management System 1.0. Affected by this issue is some unknown functionality of the file classes/Master.php?f=save_event. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227648. | https://vuldb.com/?id.227648 | 2023-04-28T11:19:23.462Z | 2023-04-28T14:00:06.010Z | 2023-10-22T18:29:25.106Z | {'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'} |
CVE-2023-2688 | The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root. | https://www.wordfence.com/threat-intel/vulnerabilities/id/abd6eeac-0a7e-4762-809f-593cd85f303d?source=cve | 2023-05-12T20:07:48.332Z | 2023-06-09T05:33:26.513Z | 2023-06-09T05:33:26.513Z | {'Vendor': 'nickboss', 'Product': 'WordPress File Upload', 'Versions': '*'} |
CVE-2023-2535 | null | null | 2023-05-05T06:51:51.620Z | 2023-05-05T07:22:47.045Z | 2023-05-05T08:21:05.943Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2866 |
If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01 | 2023-05-24T14:09:39.667Z | 2023-06-07T20:12:46.824Z | 2023-06-07T20:12:46.824Z | {'Vendor': 'Advantech', 'Product': 'WebAccess/SCADA', 'Versions': '8.4.5'} |
CVE-2023-2923 | A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230077 | 2023-05-27T07:05:26.469Z | 2023-05-27T07:31:04.328Z | 2023-10-23T07:12:09.723Z | {'Vendor': 'Tenda', 'Product': 'AC6', 'Versions': 'US_AC6V1.0BR_V15.03.05.19'} |
CVE-2023-2889 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veon Computer Service Tracking Software allows SQL Injection.This issue affects Service Tracking Software: through 20231122.
NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
| https://www.usom.gov.tr/bildirim/tr-23-0653 | 2023-05-25T13:56:00.519Z | 2023-11-22T13:30:44.973Z | 2023-11-22T13:30:44.973Z | {'Vendor': 'Veon Computer', 'Product': 'Service Tracking Software', 'Versions': '0'} |
CVE-2023-2020 | Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host. | https://checkmk.com/werk/13981 | 2023-04-13T08:38:39.338Z | 2023-04-18T11:09:09.107Z | 2023-04-18T11:09:09.107Z | {'Vendor': 'Tribe29', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0'} |
CVE-2023-2470 | The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | https://wpscan.com/vulnerability/de0adf26-8a0b-4b90-96d5-4bec6e770e04 | 2023-05-02T09:06:56.565Z | 2023-05-30T07:49:09.868Z | 2023-05-30T07:49:09.868Z | {'Vendor': 'Unknown', 'Product': 'Add to Feedly', 'Versions': '0'} |
CVE-2023-2759 | A hidden API exists in TapHome's core platform before version 2023.2 that allows an authenticated, low privileged user to change passwords of other users without any prior knowledge. The attacker may gain full access to the device by using this vulnerability. | https://claroty.com/team82/disclosure-dashboard/cve-2023-2759 | 2023-05-17T14:21:49.140Z | 2023-07-17T06:14:15.872Z | 2023-07-17T06:14:15.872Z | {'Vendor': 'TAPHOME', 'Product': 'Core Platform', 'Versions': '0.0'} |
CVE-2023-2309 | The wpForo Forum WordPress plugin before 2.1.9 does not escape some request parameters while in debug mode, leading to a Reflected Cross-Site Scripting vulnerability. | https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d | 2023-04-26T18:21:16.754Z | 2023-07-24T10:20:23.546Z | 2023-07-24T10:20:23.546Z | {'Vendor': 'Unknown', 'Product': 'wpForo Forum', 'Versions': '0'} |
CVE-2023-2831 | Mattermost fails to unescape Markdown strings in a memory-efficient way, allowing an attacker to cause a Denial of Service by sending a message containing a large number of escaped characters.
| https://mattermost.com/security-updates/ | 2023-05-22T09:30:20.884Z | 2023-06-16T09:06:15.292Z | 2023-06-16T09:06:15.292Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10 , 7.8.5, 7.9.4, 7.10.1'} |
CVE-2023-2562 | The Gallery Metabox for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the refresh_metabox function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to obtain a list of images attached to a post. | https://www.wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f?source=cve | 2023-05-06T14:33:02.501Z | 2023-07-12T04:38:47.479Z | 2023-07-12T04:38:47.479Z | {'Vendor': 'billerickson', 'Product': 'Gallery Metabox', 'Versions': '*'} |
CVE-2023-2098 | A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /inc/topBarNav.php. The manipulation of the argument search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226106 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226106 | 2023-04-15T09:11:59.138Z | 2023-04-15T11:31:03.247Z | 2023-10-22T14:11:03.940Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2132 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A DollarMathPostFilter Regular Expression Denial of Service in was possible by sending crafted payloads to the preview_markdown endpoint. | https://gitlab.com/gitlab-org/gitlab/-/issues/407586 | 2023-04-17T00:00:00 | 2023-06-06T00:00:00 | 2023-06-06T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.4.0, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2427 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d | 2023-04-30T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-2077 | A vulnerability, which was classified as problematic, has been found in Campcodes Online Traffic Offense Management System 1.0. This issue affects some unknown processing of the file /admin/offenses/view_details.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226055. | https://vuldb.com/?id.226055 | 2023-04-14T18:33:22.634Z | 2023-04-14T20:00:04.601Z | 2023-10-22T13:58:50.285Z | {'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'} |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 59