Dataset Viewer
Auto-converted to Parquet
CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2387
A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument winsServer1 leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227665
2023-04-28T11:48:36.408Z
2023-04-28T19:00:05.399Z
2023-10-22T18:47:42.601Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2738
A vulnerability classified as critical has been found in Tongda OA 11.10. This affects the function actionGetdata of the file GatewayController.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229149 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229149
2023-05-16T14:32:59.091Z
2023-05-16T15:00:04.971Z
2023-10-23T06:23:22.266Z
{'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '11.10'}
CVE-2023-2368
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php?page=manage_questionnaire. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227644.
https://vuldb.com/?id.227644
2023-04-28T11:08:18.422Z
2023-04-28T12:31:04.224Z
2023-10-22T18:24:32.512Z
{'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'}
CVE-2023-2692
A vulnerability has been found in SourceCodester ICT Laboratory Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file views/room_info.php of the component GET Parameter Handler. The manipulation of the argument name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228973 was assigned to this vulnerability.
https://vuldb.com/?id.228973
2023-05-14T07:47:36.240Z
2023-05-14T09:00:03.763Z
2023-10-23T06:13:36.029Z
{'Vendor': 'SourceCodester', 'Product': 'ICT Laboratory Management System', 'Versions': '1.0'}
CVE-2023-2942
Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.1.
https://github.com/openemr/openemr/commit/c1c0805696ca68577c37bf30e29f90e5f3e0f1a9
2023-05-27T00:00:00
2023-05-27T00:00:00
2023-05-27T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2041
A vulnerability classified as critical was found in novel-plus 3.6.2. Affected by this vulnerability is an unknown functionality of the file /category/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.225919
2023-04-14T06:30:56.860Z
2023-04-14T09:00:06.961Z
2023-10-22T09:47:40.025Z
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
CVE-2023-2411
A vulnerability was found in SourceCodester AC Repair and Services System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227705 was assigned to this vulnerability.
https://vuldb.com/?id.227705
2023-04-28T16:30:47.455Z
2023-04-28T23:00:06.229Z
2023-10-22T19:04:46.974Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-2104
Improper Access Control in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
https://huntr.dev/bounties/3099b8d1-c49c-41b8-a929-73ccded6fc7c
2023-04-15T00:00:00
2023-04-15T00:00:00
2023-04-15T00:00:00
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
CVE-2023-2554
External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0.
https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b
2023-05-05T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
CVE-2023-2807
Authentication Bypass by Spoofing vulnerability in the password reset process of Pandora FMS allows an unauthenticated attacker to initiate a password reset process for any user account without proper authentication. This issue affects PandoraFMS v771 and prior versions on all platforms.
https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/
2023-05-19T08:29:18.021Z
2023-06-13T11:10:59.966Z
2023-09-26T10:25:07.973Z
{'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'}
CVE-2023-2780
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1.
https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689
2023-05-17T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-2295
A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
https://bugzilla.redhat.com/show_bug.cgi?id=2189777
2023-04-26T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'libreswan', 'Versions': 'Affects libreswan v4.9-1.el8 and libreswan v4.9-1.el9, Fixed in libreswan v4.9-3.el8_8 and libreswan v4.9-4.el9_2'}
CVE-2023-2446
The UserPro plugin for WordPress is vulnerable to sensitive information disclosure via the 'userpro' shortcode in versions up to, and including 5.1.1. This is due to insufficient restriction on sensitive user meta values that can be called via that shortcode. This makes it possible for authenticated attackers, with subscriber-level permissions, and above to retrieve sensitive user meta that can be used to gain access to a high privileged user account.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4072ba5f-6385-4fa3-85b6-89dac7b60a92?source=cve
2023-05-01T14:17:16.045Z
2023-11-22T07:32:12.130Z
2023-11-22T07:32:12.130Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2915
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message resulting in a denial-of-service condition.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471
2023-05-26T13:45:57.862Z
2023-08-17T15:05:52.368Z
2023-08-17T15:05:52.368Z
{'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ThinServer', 'Versions': '11.0.0 - 11.2.6, 11.1.0 - 11.1.6, 11.2.0 - 11.2.7, 12.0.0 - 12.0.5, 12.1.0 - 12.1.6, 13.0.0 - 13.0.2, 13.1.0'}
CVE-2023-2850
NodeBB is affected by a Cross-Site WebSocket Hijacking vulnerability due to missing validation of the request origin. Exploitation of this vulnerability allows certain user information to be extracted by attacker.
https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j
2023-05-23T11:27:01.949Z
2023-07-25T11:13:18.100Z
2023-07-25T13:42:38.643Z
{'Vendor': 'NodeBB', 'Product': 'NodeBB', 'Versions': '< 2.8.13, >= 3.0.0, < 3.1.3'}
CVE-2023-2503
The 10Web Social Post Feed WordPress plugin before 1.2.9 does not sanitise and escape some parameter before outputting it back in a page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/07b1caf1-d00b-4075-b71a-0516d5604286
2023-05-03T15:15:59.963Z
2023-06-05T13:38:58.202Z
2023-06-05T13:38:58.202Z
{'Vendor': 'Unknown', 'Product': '10Web Social Post Feed', 'Versions': '0'}
CVE-2023-2153
A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php of the component POST Parameter Handler. The manipulation of the argument value with the input 1><script>alert(666)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226274 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226274
2023-04-18T10:56:14.857Z
2023-04-18T14:00:05.924Z
2023-10-22T14:30:34.999Z
{'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'}
CVE-2023-2796
The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.
https://wpscan.com/vulnerability/e9ef793c-e5a3-4c55-beee-56b0909f7a0d
2023-05-18T13:09:17.354Z
2023-07-10T12:40:07.475Z
2023-07-10T12:40:07.475Z
{'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'}
CVE-2023-2779
The Social Share, Social Login and Social Comments WordPress plugin before 7.13.52 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/fe9b7696-3b0e-42e2-9dbc-55167605f5c5
2023-05-17T19:48:16.127Z
2023-06-19T10:52:39.566Z
2023-06-19T10:52:39.566Z
{'Vendor': 'Unknown', 'Product': 'Social Share, Social Login and Social Comments Plugin', 'Versions': '0'}
CVE-2023-2283
A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.
https://access.redhat.com/security/cve/CVE-2023-2283
2023-04-25T00:00:00
2023-05-26T00:00:00
2023-12-22T10:06:16.415494
{'Vendor': 'n/a', 'Product': 'libssh', 'Versions': 'libssh-2'}
CVE-2023-2329
The WooCommerce Google Sheet Connector WordPress plugin before 1.3.6 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack
https://wpscan.com/vulnerability/6e58f099-e8d6-49e4-9f02-d6a556c5b1d2
2023-04-27T09:07:06.197Z
2023-07-17T13:29:48.544Z
2023-08-08T08:04:24.970Z
{'Vendor': 'Unknown', 'Product': 'WooCommerce Google Sheet Connector', 'Versions': '0'}
CVE-2023-2903
A vulnerability classified as problematic has been found in NFine Rapid Development Platform 20230511. This affects an unknown part of the file /SystemManage/Role/GetGridJson?keyword=&page=1&rows=20. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229977
2023-05-25T20:36:45.522Z
2023-05-25T22:31:03.689Z
2023-10-23T07:09:43.326Z
{'Vendor': 'NFine', 'Product': 'Rapid Development Platform', 'Versions': '20230511'}
CVE-2023-2000
Mattermost Desktop App fails to validate a mattermost server redirection and navigates to an arbitrary website
https://mattermost.com/security-updates
2023-04-12T09:56:00.685Z
2023-05-02T08:57:39.331Z
2023-05-02T08:57:39.331Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 5.3.0'}
CVE-2023-2450
The FiboSearch - AJAX Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.23.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/880573d8-6dad-4a1b-a5db-33e1dc243062?source=cve
2023-05-01T14:58:53.154Z
2023-06-09T05:33:23.112Z
2023-06-09T05:33:23.112Z
{'Vendor': 'damian-gora', 'Product': 'FiboSearch – Ajax Search for WooCommerce', 'Versions': '1.23.0'}
CVE-2023-2145
A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been classified as critical. Affected is an unknown function of the file projects_per_curriculum.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226266 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226266
2023-04-18T10:47:06.396Z
2023-04-18T11:00:07.358Z
2023-10-22T14:20:49.368Z
{'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'}
CVE-2023-2515
Mattermost fails to restrict a user with permissions to edit other users and to create personal access tokens from elevating their privileges to system admin
https://mattermost.com/security-updates
2023-05-04T11:36:47.883Z
2023-05-12T08:53:44.111Z
2023-05-12T08:53:44.111Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.1.8, 7.7.4, 7.8.3, 7.9.2'}
CVE-2023-2846
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets.
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-005_en.pdf
2023-05-23T07:15:33.185Z
2023-06-30T04:05:26.423Z
2023-06-30T04:05:26.423Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MELSEC-F Series FX3U-16MR/ES', 'Versions': 'all versions'}
CVE-2023-2391
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. This issue affects some unknown processing of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ntp.server2 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227669 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227669
2023-04-28T11:48:52.572Z
2023-04-28T20:31:04.092Z
2023-10-22T18:52:35.209Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2684
The File Renaming on Upload WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/42b1f017-c497-4825-b12a-8dce3e108a55
2023-05-12T15:02:36.630Z
2023-06-19T10:52:40.415Z
2023-06-19T10:52:40.415Z
{'Vendor': 'Unknown', 'Product': 'File Renaming on Upload', 'Versions': '0'}
CVE-2023-2407
The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments – Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Cross-Site Request Forgery. This is due to missing nonce validation in the ls_parse_vcita_callback() function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/207b40fa-2062-48d6-990b-f05cbbf8fb8e?source=cve
2023-04-28T16:12:20.755Z
2023-06-03T04:35:13.332Z
2023-06-03T04:35:13.332Z
{'Vendor': 'vcita', 'Product': 'Event Registration Calendar By vcita', 'Versions': '*'}
CVE-2023-2057
A vulnerability was found in EyouCms 1.5.4. It has been classified as problematic. Affected is an unknown function of the file login.php?m=admin&c=Arctype&a=edit of the component New Picture Handler. The manipulation of the argument litpic_loca leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225942 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225942
2023-04-14T08:33:41.592Z
2023-04-14T13:31:04.204Z
2023-10-22T10:04:44.772Z
{'Vendor': 'n/a', 'Product': 'EyouCms', 'Versions': '1.5.4'}
CVE-2023-2954
Cross-site Scripting (XSS) - Stored in GitHub repository liangliangyy/djangoblog prior to master.
https://huntr.dev/bounties/47f08086-aaae-4ca7-b0ca-24c616d3ad7d
2023-05-29T00:00:00
2023-05-29T00:00:00
2023-05-29T00:00:00
{'Vendor': 'liangliangyy', 'Product': 'liangliangyy/djangoblog', 'Versions': 'unspecified'}
CVE-2023-2811
The AI ChatBot WordPress plugin before 4.5.6 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks to all admin when setting chatbot and all client when using chatbot
https://wpscan.com/vulnerability/82a81721-0435-45a6-bd5b-dc90186cf803
2023-05-19T13:17:23.743Z
2023-06-19T10:52:41.241Z
2023-06-19T10:52:41.241Z
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
CVE-2023-2112
Desktop component service allows lateral movement between sessions in M-Files before 23.4.12455.0. 
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2112/
2023-04-17T08:52:30.318Z
2023-04-20T08:05:52.085Z
2023-04-20T08:05:52.085Z
{'Vendor': 'M-Files', 'Product': 'M-Files Desktop', 'Versions': '0'}
CVE-2023-2305
The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdm_members', 'wpdm_login_form', 'wpdm_reg_form' shortcodes in versions up to, and including, 3.2.70 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a66bc196-e5f8-46b4-a81c-c888eb64021c?source=cve
2023-04-26T13:52:44.616Z
2023-06-09T05:33:25.665Z
2023-06-09T05:33:25.665Z
{'Vendor': 'codename065', 'Product': 'Download Manager', 'Versions': '*'}
CVE-2023-2240
Improper Privilege Management in GitHub repository microweber/microweber prior to 1.3.4.
https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203
2023-04-22T00:00:00
2023-04-22T00:00:00
2023-04-22T00:00:00
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-2610
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532.
https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d
2023-05-09T00:00:00
2023-05-09T00:00:00
2023-12-23T07:06:26.300355
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-2539
null
null
2023-05-05T08:21:24.484Z
2023-05-05T08:25:33.868Z
2023-05-05T08:26:16.959Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2169
The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Related Posts functionality in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/52574d99-1ffe-4152-bf13-9cdd11d7300a?source=cve
2023-04-18T20:38:56.206Z
2023-04-19T09:38:19.339Z
2023-04-19T09:38:19.339Z
{'Vendor': 'stevejburge', 'Product': 'TaxoPress is the WordPress Tag, Category, and Taxonomy Manager', 'Versions': '*'}
CVE-2023-2493
The All In One Redirection WordPress plugin before 2.2.0 does not properly sanitise and escape multiple parameters before using them in an SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
https://wpscan.com/vulnerability/a9a205a4-eef9-4f30-877a-4c562930650c
2023-05-03T13:44:36.032Z
2023-07-10T12:40:10.450Z
2023-07-10T13:05:41.028Z
{'Vendor': 'Unknown', 'Product': 'All In One Redirection', 'Versions': '0'}
CVE-2023-2186
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly crash the GTWWebMonitor.exe process to DoS the Web Monitor. Furthermore, an authenticated user can leverage this vulnerability to leak memory from the GTWWebMonitor.exe process. This could be leveraged in an exploit chain to gain code execution.
https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html
2023-04-19T15:35:06.060Z
2023-06-07T06:37:33.280Z
2023-06-07T06:37:33.280Z
{'Vendor': 'Triangle MicroWorks', 'Product': 'SCADA Data Gateway', 'Versions': '5.01.03'}
CVE-2023-2885
Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability in CBOT Chatbot allows Adversary in the Middle (AiTM).This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
https://www.usom.gov.tr/bildirim/tr-23-0293
2023-05-25T08:03:28.810Z
2023-05-25T08:28:56.312Z
2023-08-05T15:44:34.953Z
{'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'}
CVE-2023-2702
Authorization Bypass Through User-Controlled Key vulnerability in Finex Media Competition Management System allows Authentication Abuse, Authentication Bypass.This issue affects Competition Management System: before 23.07.
https://www.usom.gov.tr/bildirim/tr-23-0283
2023-05-15T11:02:24.164Z
2023-05-23T19:14:36.748Z
2023-05-23T19:14:36.748Z
{'Vendor': 'Finex Media', 'Product': 'Competition Management System', 'Versions': '0'}
CVE-2023-2352
The CHP Ads Block Detector plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.9.4. This is due to missing or incorrect nonce validation on the chp_abd_action function. This makes it possible for unauthenticated attackers to update or reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e5a9cced-0e5e-4b6e-8291-0a862c9f9523?source=cve
2023-04-27T15:54:41.964Z
2023-08-31T05:33:13.592Z
2023-08-31T05:33:13.592Z
{'Vendor': 'sureshchand12a', 'Product': 'CHP Ads Block Detector', 'Versions': '*'}
CVE-2023-2647
A vulnerability was found in Weaver E-Office 9.5 and classified as critical. Affected by this issue is some unknown functionality of the file /webroot/inc/utility_all.php of the component File Upload Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228776. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228776
2023-05-11T05:32:00.452Z
2023-05-11T07:31:05.039Z
2023-10-23T05:44:18.035Z
{'Vendor': 'Weaver', 'Product': 'E-Office', 'Versions': '9.5'}
CVE-2023-2217
A vulnerability, which was classified as critical, was found in SourceCodester Task Reminder System 1.0. This affects an unknown part of the file /admin/reminders/manage_reminder.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226983.
https://vuldb.com/?id.226983
2023-04-21T06:42:29.225Z
2023-04-21T10:31:04.905Z
2023-10-22T14:50:07.794Z
{'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'}
CVE-2023-2094
A vulnerability has been found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/mechanics/manage_mechanic.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226102 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226102
2023-04-15T09:11:40.071Z
2023-04-15T10:31:04.007Z
2023-10-22T14:06:11.031Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2978
A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. VDB-230210 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230210
2023-05-30T13:30:34.971Z
2023-05-30T14:00:05.299Z
2023-10-23T07:25:34.783Z
{'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'}
CVE-2023-2344
A vulnerability has been found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=save_service of the component HTTP POST Request Handler. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227587.
https://vuldb.com/?id.227587
2023-04-27T13:37:53.193Z
2023-04-27T14:00:06.340Z
2023-10-22T16:02:35.454Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-2714
The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_license' functions in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change the license key and support license key, but it can only be changed to a valid license key.
https://www.wordfence.com/threat-intel/vulnerabilities/id/29700844-b41d-4f10-90a7-06c8574d8d2a?source=cve
2023-05-15T16:34:21.224Z
2023-05-20T02:03:20.188Z
2023-05-20T02:03:20.188Z
{'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'}
CVE-2023-2201
The Web Directory Free for WordPress is vulnerable to SQL Injection via the ‘post_id’ parameter in versions up to, and including, 1.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d831fa81-4714-4757-b75d-0a8f5edda910?source=cve
2023-04-20T21:51:44.131Z
2023-06-02T03:36:06.353Z
2023-06-02T03:36:06.353Z
{'Vendor': 'mihail-chepovskiy', 'Product': 'Web Directory Free', 'Versions': '*'}
CVE-2023-2981
A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230213 was assigned to this vulnerability.
https://vuldb.com/?id.230213
2023-05-30T13:30:45.564Z
2023-05-30T15:00:04.651Z
2023-10-23T07:29:14.246Z
{'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'}
CVE-2023-2578
The Buy Me a Coffee WordPress plugin before 3.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/4dad1c0d-bcf9-4486-bd8e-387ac8e6c892
2023-05-08T12:29:01.605Z
2023-07-10T12:40:13.155Z
2023-07-10T13:05:41.607Z
{'Vendor': 'Unknown', 'Product': 'Buy Me a Coffee', 'Versions': '0'}
CVE-2023-2082
The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.6 due to insufficient sanitization and escaping on the 'text value set via the bmc_post_reception action. This makes it possible for authenticated attackers, with subscriber-level permissions, and above to inject arbitrary web scripts into pages that execute whenever a victim accesses a page with the injected scripts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9f8948-085b-4ac5-befd-c70085aa23cd?source=cve
2023-04-14T19:26:48.435Z
2023-07-14T04:38:53.836Z
2023-07-14T04:38:53.836Z
{'Vendor': 'buymeacoffee', 'Product': 'Buy Me a Coffee – Button and Widget Plugin', 'Versions': '*'}
CVE-2023-2597
In Eclipse Openj9 before version 0.38.0, in the implementation of the shared cache (which is enabled by default in OpenJ9 builds) the size of a string is not properly checked against the size of the buffer.
https://github.com/eclipse-openj9/openj9/pull/17259
2023-05-09T00:00:00
2023-05-22T00:00:00
2023-05-24T00:00:00
{'Vendor': 'Eclipse Foundation', 'Product': 'Eclipse OpenJ9', 'Versions': 'unspecified'}
CVE-2023-2743
The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db
2023-05-16T19:09:56.865Z
2023-06-27T13:17:05.869Z
2023-06-27T13:17:05.869Z
{'Vendor': 'Unknown', 'Product': 'WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting', 'Versions': '0'}
CVE-2023-2313
Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-26T18:49:35.527Z
2023-07-28T23:26:54.882Z
2023-07-28T23:26:54.882Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-2606
The WP Brutal AI WordPress plugin before 2.06 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/62deb3ed-a7e4-4cdc-a615-cad2ec2e1e8f
2023-05-09T15:44:27.706Z
2023-08-14T19:10:23.250Z
2024-01-16T15:54:00.443Z
{'Vendor': 'Unknown', 'Product': 'WP Brutal AI', 'Versions': '0'}
CVE-2023-2256
The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting.
https://wpscan.com/vulnerability/1187e041-3be2-4613-8d56-c2394fcc75fb
2023-04-24T16:39:13.446Z
2023-05-30T07:49:09.041Z
2023-05-30T07:49:09.041Z
{'Vendor': 'Unknown', 'Product': 'Product Addons & Fields for WooCommerce', 'Versions': '0'}
CVE-2023-2485
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A malicious maintainer in a project can escalate other users to Owners in that project if they import members from another project that those other users are Owners of.
https://gitlab.com/gitlab-org/gitlab/-/issues/407830
2023-05-02T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=14.1, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2939
Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:15.074Z
2023-05-30T21:31:41.044Z
2023-05-30T21:31:41.044Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2893
The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_deactivate_product function. This makes it possible for unauthenticated attackers to deactivate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1268604c-08eb-4d86-8e97-9cdaa3e19c1f?source=cve
2023-05-25T16:08:00.877Z
2023-06-09T06:48:40.891Z
2023-06-09T06:48:40.891Z
{'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'}
CVE-2023-2190
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.10 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. It may be possible for users to view new commits to private projects in a fork created while the project was public.
https://gitlab.com/gitlab-org/gitlab/-/issues/408137
2023-04-19T22:23:17.062Z
2023-07-13T02:00:02.797Z
2023-07-13T02:00:02.797Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.10, 16.0, 16.1'}
CVE-2023-2558
The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcs_current_currency shortcode in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/be054481-89b4-47d8-ad06-8622edea367f?source=cve
2023-05-05T19:52:19.525Z
2023-06-09T05:33:31.519Z
2023-06-09T05:33:31.519Z
{'Vendor': 'realmag777', 'Product': 'WPCS – WordPress Currency Switcher Professional', 'Versions': '*'}
CVE-2023-2108
A vulnerability has been found in SourceCodester Judging Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file edit_contestant.php. The manipulation of the argument contestant_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226147.
https://vuldb.com/?id.226147
2023-04-16T07:10:23.703Z
2023-04-16T07:31:03.904Z
2023-10-22T14:17:09.794Z
{'Vendor': 'SourceCodester', 'Product': 'Judging Management System', 'Versions': '1.0'}
CVE-2023-2221
The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin.
https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657
2023-04-21T08:04:23.888Z
2023-06-19T10:52:42.024Z
2023-06-19T10:52:42.024Z
{'Vendor': 'Unknown', 'Product': 'WP Custom Cursors | WordPress Cursor Plugin', 'Versions': '0'}
CVE-2023-2671
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file classes/Master.php?f=save_inquiry of the component Contact Form. The manipulation of the argument fullname/contact/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228887.
https://vuldb.com/?id.228887
2023-05-12T06:01:28.767Z
2023-05-12T08:31:03.243Z
2023-10-23T06:02:36.611Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-2364
A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227640.
https://vuldb.com/?id.227640
2023-04-28T10:53:10.296Z
2023-04-28T11:00:06.591Z
2023-10-22T16:12:20.837Z
{'Vendor': 'SourceCodester', 'Product': 'Resort Reservation System', 'Versions': '1.0'}
CVE-2023-2734
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.1. This is due to insufficient verification on the user being supplied during the cart sync from mobile REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5881d16c-84e8-4610-8233-cfa5a94fe3f9?source=cve
2023-05-16T12:41:36.475Z
2023-05-25T02:05:31.657Z
2023-05-25T02:05:31.657Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-2626
There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the Thread network. This provides a pathway for an attacker to send/receive arbitrary IPv6 packets to devices on the LAN, potentially exploiting them if they lack additional authentication or contain any network vulnerabilities that would normally be mitigated by the home router’s NAT firewall. Effected devices have been mitigated through an automatic update beyond the affected range.
https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi
2023-05-10T11:35:38.314Z
2023-07-25T17:07:02.960Z
2023-08-14T16:07:51.627Z
{'Vendor': 'Google', 'Product': 'Nest Hub Max', 'Versions': '10.20221207.2.109'}
CVE-2023-2276
The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.10.7. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/42222c64-6492-4774-b5bc-8e62a1a328cf?source=cve
2023-04-25T11:43:19.703Z
2023-05-20T03:35:57.027Z
2023-06-13T12:53:16.233Z
{'Vendor': 'wclovers', 'Product': 'WCFM Membership – WooCommerce Memberships for Multivendor Marketplace', 'Versions': '*'}
CVE-2023-2763
Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF file.
https://www.3ds.com/vulnerability/advisories
2023-05-17T15:42:24.664Z
2023-07-12T07:05:33.333Z
2023-07-12T07:10:12.803Z
{'Vendor': 'Dassault Systèmes', 'Product': 'SOLIDWORKS Desktop', 'Versions': 'Release SOLIDWORKS 2021 Golden, Release SOLIDWORKS 2022 Golden, Release SOLIDWORKS 2023 Golden'}
CVE-2023-2299
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized medication of data via the /wp-json/vcita-wordpress/v1/actions/auth REST-API endpoint in versions up to, and including, 4.2.10 due to a missing capability check on the processAction function. This makes it possible for unauthenticated attackers modify the plugin's settings.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4855627a-de56-49ee-b0b0-01b9735d8557?source=cve
2023-04-26T12:12:34.510Z
2023-06-03T04:35:14.168Z
2023-06-03T04:35:14.168Z
{'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'}
CVE-2023-2333
The Ninja Forms Google Sheet Connector WordPress plugin before 1.2.7, gsheetconnector-ninja-forms-pro WordPress plugin through 1.2.7 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/13c4e065-fde6-41a4-a22b-bca1b10e0d30
2023-04-27T09:33:10.594Z
2023-07-04T07:23:24.093Z
2023-07-05T10:47:58.134Z
{'Vendor': 'Unknown', 'Product': 'Ninja Forms Google Sheet Connector', 'Versions': '0'}
CVE-2023-2519
A vulnerability has been found in Caton CTP Relay Server 1.2.9 and classified as critical. This vulnerability affects unknown code of the file /server/api/v1/login of the component API. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. VDB-228010 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228010
2023-05-04T15:56:24.118Z
2023-05-04T16:31:03.917Z
2023-10-23T05:19:54.230Z
{'Vendor': 'Caton', 'Product': 'CTP Relay Server', 'Versions': '1.2.9'}
CVE-2023-2149
A vulnerability classified as critical was found in Campcodes Online Thesis Archiving System 1.0. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226270 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226270
2023-04-18T10:47:20.454Z
2023-04-18T12:31:03.850Z
2023-10-22T14:25:42.339Z
{'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'}
CVE-2023-2260
Authorization Bypass Through User-Controlled Key in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304.
https://huntr.dev/bounties/649badc8-c935-4a84-8aa8-d3269ac54377
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-05-10T00:00:00
{'Vendor': 'alfio-event', 'Product': 'alfio-event/alf.io', 'Versions': 'unspecified'}
CVE-2023-2630
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e
2023-05-10T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2325
Stored XSS Vulnerability in M-Files Classic Web versions before 23.10 and LTS Service Release Versions before 23.2 LTS SR4 and 23.8 LTS SR1allows attacker to execute script on users browser via stored HTML document.
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2325/
2023-04-27T08:15:36.501Z
2023-10-20T06:39:44.747Z
2023-10-20T06:39:44.747Z
{'Vendor': 'M-Files', 'Product': 'M-Files Web', 'Versions': '0, 23.2 LTS SR4, 23.8 LTS SR1'}
CVE-2023-2775
A vulnerability was found in code-projects Bus Dispatch and Information System 1.0. It has been classified as critical. This affects an unknown part of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229281 was assigned to this vulnerability.
https://vuldb.com/?id.229281
2023-05-17T16:58:20.946Z
2023-05-17T20:00:04.432Z
2023-10-23T06:38:01.022Z
{'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'}
CVE-2023-2958
Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.
https://www.usom.gov.tr/bildirim/tr-23-0410
2023-05-29T11:48:11.080Z
2023-07-17T14:16:26.447Z
2023-07-26T09:07:14.271Z
{'Vendor': 'Origin Software', 'Product': 'ATS Pro', 'Versions': '0'}
CVE-2023-2667
A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228883.
https://vuldb.com/?id.228883
2023-05-12T06:01:10.919Z
2023-05-12T06:31:04.065Z
2023-10-23T05:57:43.076Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-2237
The WP Replicate Post plugin for WordPress is vulnerable to SQL Injection via the post_id parameter in versions up to, and including, 4.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for contributor-level attackers or higher to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/916e6f8b-cb29-4062-9a05-0337cfdb382a?source=cve
2023-04-21T18:31:19.134Z
2023-06-09T05:33:24.370Z
2023-06-09T05:33:24.370Z
{'Vendor': 'yudiz', 'Product': 'WP Replicate Post', 'Versions': '*'}
CVE-2023-2722
Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html
2023-05-15T21:16:58.051Z
2023-05-16T18:45:33.967Z
2023-05-16T18:45:33.967Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'}
CVE-2023-2372
A vulnerability, which was classified as problematic, has been found in SourceCodester Online DJ Management System 1.0. Affected by this issue is some unknown functionality of the file classes/Master.php?f=save_event. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227648.
https://vuldb.com/?id.227648
2023-04-28T11:19:23.462Z
2023-04-28T14:00:06.010Z
2023-10-22T18:29:25.106Z
{'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'}
CVE-2023-2688
The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root.
https://www.wordfence.com/threat-intel/vulnerabilities/id/abd6eeac-0a7e-4762-809f-593cd85f303d?source=cve
2023-05-12T20:07:48.332Z
2023-06-09T05:33:26.513Z
2023-06-09T05:33:26.513Z
{'Vendor': 'nickboss', 'Product': 'WordPress File Upload', 'Versions': '*'}
CVE-2023-2535
null
null
2023-05-05T06:51:51.620Z
2023-05-05T07:22:47.045Z
2023-05-05T08:21:05.943Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2866
If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01
2023-05-24T14:09:39.667Z
2023-06-07T20:12:46.824Z
2023-06-07T20:12:46.824Z
{'Vendor': 'Advantech', 'Product': 'WebAccess/SCADA', 'Versions': '8.4.5'}
CVE-2023-2923
A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230077 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230077
2023-05-27T07:05:26.469Z
2023-05-27T07:31:04.328Z
2023-10-23T07:12:09.723Z
{'Vendor': 'Tenda', 'Product': 'AC6', 'Versions': 'US_AC6V1.0BR_V15.03.05.19'}
CVE-2023-2889
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veon Computer Service Tracking Software allows SQL Injection.This issue affects Service Tracking Software: through 20231122.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://www.usom.gov.tr/bildirim/tr-23-0653
2023-05-25T13:56:00.519Z
2023-11-22T13:30:44.973Z
2023-11-22T13:30:44.973Z
{'Vendor': 'Veon Computer', 'Product': 'Service Tracking Software', 'Versions': '0'}
CVE-2023-2020
Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host.
https://checkmk.com/werk/13981
2023-04-13T08:38:39.338Z
2023-04-18T11:09:09.107Z
2023-04-18T11:09:09.107Z
{'Vendor': 'Tribe29', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0'}
CVE-2023-2470
The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
https://wpscan.com/vulnerability/de0adf26-8a0b-4b90-96d5-4bec6e770e04
2023-05-02T09:06:56.565Z
2023-05-30T07:49:09.868Z
2023-05-30T07:49:09.868Z
{'Vendor': 'Unknown', 'Product': 'Add to Feedly', 'Versions': '0'}
CVE-2023-2759
A hidden API exists in TapHome's core platform before version 2023.2 that allows an authenticated, low privileged user to change passwords of other users without any prior knowledge. The attacker may gain full access to the device by using this vulnerability.
https://claroty.com/team82/disclosure-dashboard/cve-2023-2759
2023-05-17T14:21:49.140Z
2023-07-17T06:14:15.872Z
2023-07-17T06:14:15.872Z
{'Vendor': 'TAPHOME', 'Product': 'Core Platform', 'Versions': '0.0'}
CVE-2023-2309
The wpForo Forum WordPress plugin before 2.1.9 does not escape some request parameters while in debug mode, leading to a Reflected Cross-Site Scripting vulnerability.
https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d
2023-04-26T18:21:16.754Z
2023-07-24T10:20:23.546Z
2023-07-24T10:20:23.546Z
{'Vendor': 'Unknown', 'Product': 'wpForo Forum', 'Versions': '0'}
CVE-2023-2831
Mattermost fails to unescape Markdown strings in a memory-efficient way, allowing an attacker to cause a Denial of Service by sending a message containing a large number of escaped characters.
https://mattermost.com/security-updates/
2023-05-22T09:30:20.884Z
2023-06-16T09:06:15.292Z
2023-06-16T09:06:15.292Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10 , 7.8.5, 7.9.4, 7.10.1'}
CVE-2023-2562
The Gallery Metabox for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the refresh_metabox function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to obtain a list of images attached to a post.
https://www.wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f?source=cve
2023-05-06T14:33:02.501Z
2023-07-12T04:38:47.479Z
2023-07-12T04:38:47.479Z
{'Vendor': 'billerickson', 'Product': 'Gallery Metabox', 'Versions': '*'}
CVE-2023-2098
A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /inc/topBarNav.php. The manipulation of the argument search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226106 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226106
2023-04-15T09:11:59.138Z
2023-04-15T11:31:03.247Z
2023-10-22T14:11:03.940Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2132
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A DollarMathPostFilter Regular Expression Denial of Service in was possible by sending crafted payloads to the preview_markdown endpoint.
https://gitlab.com/gitlab-org/gitlab/-/issues/407586
2023-04-17T00:00:00
2023-06-06T00:00:00
2023-06-06T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.4.0, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2427
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d
2023-04-30T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-2077
A vulnerability, which was classified as problematic, has been found in Campcodes Online Traffic Offense Management System 1.0. This issue affects some unknown processing of the file /admin/offenses/view_details.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226055.
https://vuldb.com/?id.226055
2023-04-14T18:33:22.634Z
2023-04-14T20:00:04.601Z
2023-10-22T13:58:50.285Z
{'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'}
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
59