CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-7170
The EventON-RSVP WordPress plugin before 2.9.5 does not sanitise and escape some parameters before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/218fb3af-3a40-486f-8ea9-80211a986fb3/
2023-12-29T11:13:41.668Z
2024-01-22T19:14:23.385Z
2024-01-22T19:14:23.385Z
{'Vendor': 'Unknown', 'Product': 'EventON-RSVP', 'Versions': '0'}
CVE-2023-7222
A vulnerability was found in Totolink X2000R 1.0.0-B20221212.1452. It has been declared as critical. This vulnerability affects the function formTmultiAP of the file /bin/boa of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249856. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249856
2024-01-07T08:50:07.428Z
2024-01-09T15:31:03.585Z
2024-01-09T15:31:03.585Z
{'Vendor': 'Totolink', 'Product': 'X2000R', 'Versions': '1.0.0-B20221212.1452'}
CVE-2023-7019
The LightStart – Maintenance Mode, Coming Soon and Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the insert_template function in all versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to change page designs.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b57d3d1d-dcdb-4f11-82d8-183778baa075?source=cve
2023-12-20T16:28:37.402Z
2024-01-11T08:32:53.047Z
2024-01-11T08:32:53.047Z
{'Vendor': 'themeisle', 'Product': 'LightStart – Maintenance Mode, Coming Soon and Landing Page Builder', 'Versions': '*'}
CVE-2023-7234
OPCUAServerToolkit will write a log message once an OPC UA client has successfully connected containing the client's self-defined description field.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-016-02
2024-01-15T22:26:10.572Z
2024-01-16T18:11:50.146Z
2024-01-16T18:11:50.146Z
{'Vendor': 'Integration Objects', 'Product': 'OPC UA Server Toolkit', 'Versions': 'all versions'}
CVE-2023-7058
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument page leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248749 was assigned to this vulnerability.
https://vuldb.com/?id.248749
2023-12-21T16:26:53.547Z
2023-12-22T04:31:04.566Z
2023-12-22T04:31:04.566Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'}
CVE-2023-7059
A vulnerability was found in SourceCodester School Visitor Log e-Book 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file log-book.php. The manipulation of the argument Full Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248750 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248750
2023-12-21T16:28:44.250Z
2023-12-22T05:00:05.078Z
2023-12-22T05:00:05.078Z
{'Vendor': 'SourceCodester', 'Product': 'School Visitor Log e-Book', 'Versions': '1.0'}
CVE-2023-7018
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.
https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c
2023-12-20T16:12:41.491Z
2023-12-20T16:13:01.023Z
2023-12-20T16:13:01.023Z
{'Vendor': 'huggingface', 'Product': 'huggingface/transformers', 'Versions': 'unspecified'}
CVE-2023-7223
A vulnerability classified as problematic has been found in Totolink T6 4.1.9cu.5241_B20210923. This affects an unknown part of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input showSyslog leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249867. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249867
2024-01-07T19:50:14.789Z
2024-01-09T15:31:04.597Z
2024-01-09T15:31:04.597Z
{'Vendor': 'Totolink', 'Product': 'T6', 'Versions': '4.1.9cu.5241_B20210923'}
CVE-2023-7171
A vulnerability was found in Novel-Plus up to 4.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named d6093d8182362422370d7eaf6c53afde9ee45215. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-249307.
https://vuldb.com/?id.249307
2023-12-29T12:12:00.956Z
2023-12-29T17:31:03.304Z
2023-12-29T17:31:03.304Z
{'Vendor': 'n/a', 'Product': 'Novel-Plus', 'Versions': '4.0, 4.1, 4.2'}
CVE-2023-7063
The WPForms Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form submission parameters in all versions up to, and including, 1.8.5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/31c080b8-ba00-4e96-8961-2a1c3a017004?source=cve
2023-12-21T18:09:00.474Z
2024-01-20T08:38:28.800Z
2024-01-20T08:38:28.800Z
{'Vendor': 'WPForms', 'Product': 'WPForms Pro', 'Versions': '*'}
CVE-2023-7126
A vulnerability classified as critical has been found in code-projects Automated Voting System 1.0. This affects an unknown part of the file /admin/ of the component Admin Login. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249129 was assigned to this vulnerability.
https://vuldb.com/?id.249129
2023-12-28T07:47:04.926Z
2023-12-28T14:00:05.757Z
2023-12-28T14:00:05.757Z
{'Vendor': 'code-projects', 'Product': 'Automated Voting System', 'Versions': '1.0'}
CVE-2023-7075
A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /main/checkout.php. The manipulation of the argument pt leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248846 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248846
2023-12-22T06:33:17.230Z
2023-12-22T12:00:07.412Z
2023-12-22T12:00:07.412Z
{'Vendor': 'code-projects', 'Product': 'Point of Sales and Inventory Management System', 'Versions': '1.0'}
CVE-2023-7130
A vulnerability has been found in code-projects College Notes Gallery 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument user leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249133 was assigned to this vulnerability.
https://vuldb.com/?id.249133
2023-12-28T07:52:02.219Z
2023-12-31T08:48:28.662Z
2023-12-31T08:48:28.662Z
{'Vendor': 'code-projects', 'Product': 'College Notes Gallery', 'Versions': '2.0'}
CVE-2023-7219
A vulnerability has been found in Totolink N350RT 9.3.5u.6139_B202012 and classified as critical. Affected by this vulnerability is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249853
2024-01-07T08:37:42.953Z
2024-01-09T06:00:06.219Z
2024-01-09T06:00:06.219Z
{'Vendor': 'Totolink', 'Product': 'N350RT', 'Versions': '9.3.5u.6139_B202012'}
CVE-2023-7022
A vulnerability was found in Tongda OA 2017 up to 11.9. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file general/work_plan/manage/delete_all.php. The manipulation of the argument DELETE_STR leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248569 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248569
2023-12-20T17:01:14.402Z
2023-12-21T01:31:04.718Z
2023-12-21T01:31:04.718Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-7188
A vulnerability classified as critical has been found in Shipping 100 Fahuo100 up to 1.1. Affected is an unknown function of the file member/login.php. The manipulation of the argument M_pwd leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-249390 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249390
2023-12-30T16:45:12.696Z
2023-12-31T14:31:03.814Z
2023-12-31T14:31:03.814Z
{'Vendor': 'Shipping 100', 'Product': 'Fahuo100', 'Versions': '1.0, 1.1'}
CVE-2023-7110
A vulnerability, which was classified as critical, has been found in code-projects Library Management System 2.0. This issue affects some unknown processing of the file login.php. The manipulation of the argument student leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249005 was assigned to this vulnerability.
https://vuldb.com/?id.249005
2023-12-25T14:16:18.674Z
2023-12-26T02:00:06.004Z
2023-12-26T02:00:06.004Z
{'Vendor': 'code-projects', 'Product': 'Library Management System', 'Versions': '2.0'}
CVE-2023-7055
A vulnerability classified as problematic has been found in PHPGurukul Online Notes Sharing System 1.0. Affected is an unknown function of the file /user/profile.php of the component Contact Information Handler. The manipulation of the argument mobilenumber leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-248742 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248742
2023-12-21T16:13:22.013Z
2023-12-22T02:31:04.126Z
2023-12-22T02:31:04.126Z
{'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'}
CVE-2023-7147
A vulnerability, which was classified as critical, was found in gopeak MasterLab up to 3.3.10. Affected is the function base64ImageContent of the file app/ctrl/User.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-249150 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249150
2023-12-28T08:33:49.319Z
2023-12-29T02:31:04.681Z
2023-12-29T02:31:04.681Z
{'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'}
CVE-2023-7002
The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve
2023-12-20T14:55:56.413Z
2023-12-23T01:59:51.281Z
2023-12-23T01:59:51.281Z
{'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '*'}
CVE-2023-7151
The Product Enquiry for WooCommerce WordPress plugin before 3.2 does not sanitise and escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/4992a4a9-f21a-46e2-babf-954acfc7c5b4/
2023-12-28T10:26:09.076Z
2024-01-16T15:57:52.755Z
2024-01-16T15:57:52.755Z
{'Vendor': 'Unknown', 'Product': 'Product Enquiry for WooCommerce', 'Versions': '0'}
CVE-2023-7106
A vulnerability was found in code-projects E-Commerce Website 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file product_details.php?prod_id=11. The manipulation of the argument prod_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249001 was assigned to this vulnerability.
https://vuldb.com/?id.249001
2023-12-25T14:10:07.221Z
2023-12-25T23:00:06.432Z
2023-12-25T23:00:06.432Z
{'Vendor': 'code-projects', 'Product': 'E-Commerce Website', 'Versions': '1.0'}
CVE-2023-7038
A vulnerability was found in automad up to 1.10.9. It has been rated as problematic. This issue affects some unknown processing of the file /dashboard?controller=UserCollection::createUser of the component User Creation Handler. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248687. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248687
2023-12-21T08:19:06.084Z
2023-12-21T17:31:04.314Z
2023-12-21T17:31:04.314Z
{'Vendor': 'n/a', 'Product': 'automad', 'Versions': '1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9'}
CVE-2023-7192
A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.
https://access.redhat.com/security/cve/CVE-2023-7192
2023-12-30T18:12:05.167Z
2024-01-02T19:02:45.371Z
2024-01-25T20:40:10.547Z
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.3-rc1'}
CVE-2023-7080
The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. wrangler dev would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate Origin/Host headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability to run code. If wrangler dev --remote was being used, an attacker could access production resources if they were bound to the worker. This issue was fixed in [email protected] and [email protected]. Whilst wrangler dev's inspector server listens on local interfaces by default as of [email protected], an SSRF vulnerability in miniflare https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-fwvg-2739-22v7  (CVE-2023-7078) allowed access from the local network until [email protected]. [email protected] and [email protected] introduced validation for the Origin/Host headers.
https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf
2023-12-22T09:59:52.954Z
2023-12-29T11:58:36.214Z
2023-12-29T12:08:25.935Z
{'Vendor': 'Cloudflare', 'Product': 'wrangler', 'Versions': '0, 0, 0, 0'}
CVE-2023-7215
A vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. This issue affects some unknown processing. The manipulation of the argument Description with the input <image src onerror=prompt(document.domain)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249779.
https://vuldb.com/?id.249779
2024-01-05T12:56:44.805Z
2024-01-08T01:31:03.607Z
2024-01-08T01:31:03.607Z
{'Vendor': 'Chanzhaoyu', 'Product': 'chatgpt-web', 'Versions': '2.11.1'}
CVE-2023-7079
Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.
https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828
2023-12-22T09:59:49.428Z
2023-12-29T11:54:08.925Z
2023-12-29T12:08:49.883Z
{'Vendor': 'Cloudflare', 'Product': 'wrangler', 'Versions': '0, 0'}
CVE-2023-7096
A vulnerability was found in code-projects Faculty Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/php/crud.php. The manipulation of the argument fieldname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248948.
https://vuldb.com/?id.248948
2023-12-24T11:01:26.127Z
2023-12-25T01:00:06.137Z
2023-12-25T01:00:06.137Z
{'Vendor': 'code-projects', 'Product': 'Faculty Management System', 'Versions': '1.0'}
CVE-2023-7184
A vulnerability was found in 7-card Fakabao up to 1.0_build20230805 and classified as critical. Affected by this issue is some unknown functionality of the file shop/notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249386 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249386
2023-12-30T16:38:39.930Z
2023-12-31T11:00:05.504Z
2023-12-31T11:00:05.504Z
{'Vendor': '7-card', 'Product': 'Fakabao', 'Versions': '1.0_build20230805'}
CVE-2023-7025
A vulnerability was found in KylinSoft hedron-domain-hook up to 3.8.0.12-0k0.5. It has been declared as critical. This vulnerability affects the function init_kcm of the component DBus Handler. The manipulation leads to improper access controls. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-248578 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248578
2023-12-20T17:48:39.593Z
2023-12-21T03:00:05.997Z
2023-12-21T03:00:05.997Z
{'Vendor': 'KylinSoft', 'Product': 'hedron-domain-hook', 'Versions': '3.8.0.12-0k0.0, 3.8.0.12-0k0.1, 3.8.0.12-0k0.2, 3.8.0.12-0k0.3, 3.8.0.12-0k0.4, 3.8.0.12-0k0.5'}
CVE-2023-7160
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add Engineer Handler. The manipulation of the argument first name/last name with the input <script>alert(0)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249182 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249182
2023-12-28T14:45:26.016Z
2023-12-29T07:31:04.215Z
2023-12-29T07:31:04.215Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-7137
A vulnerability, which was classified as critical, has been found in code-projects Client Details System 1.0. Affected by this issue is some unknown functionality of the component HTTP POST Request Handler. The manipulation of the argument uemail leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249140.
https://vuldb.com/?id.249140
2023-12-28T08:22:48.248Z
2023-12-28T21:31:04.884Z
2023-12-28T21:31:04.884Z
{'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'}
CVE-2023-7208
A vulnerability classified as critical was found in Totolink X2000R_V2 2.0.0-B20230727.10434. This vulnerability affects the function formTmultiAP of the file /bin/boa. The manipulation leads to buffer overflow. VDB-249742 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249742
2024-01-05T09:20:03.714Z
2024-01-07T07:00:05.477Z
2024-01-07T07:00:05.477Z
{'Vendor': 'Totolink', 'Product': 'X2000R_V2', 'Versions': '2.0.0-B20230727.10434'}
CVE-2023-7176
A vulnerability classified as critical has been found in Campcodes Online College Library System 1.0. This affects an unknown part of the file /admin/return_add.php of the component HTTP POST Request Handler. The manipulation of the argument student leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249363.
https://vuldb.com/?id.249363
2023-12-29T22:09:58.843Z
2023-12-30T15:31:04.094Z
2023-12-30T15:31:04.094Z
{'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'}
CVE-2023-7224
OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable
https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/
2024-01-08T12:17:14.800Z
2024-01-08T13:55:20.160Z
2024-01-08T13:55:20.160Z
{'Vendor': 'OpenVPN', 'Product': 'OpenVPN Connect', 'Versions': '3.0'}
CVE-2023-7048
The My Sticky Bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.6. This is due to missing or incorrect nonce validation in mystickymenu-contact-leads.php. This makes it possible for unauthenticated attackers to trigger the export of a CSV file containing contact leads via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Because the CSV file is exported to a public location, it can be downloaded during a very short window of time before it is automatically deleted by the export function.
https://www.wordfence.com/threat-intel/vulnerabilities/id/be0ab40f-cff7-48bd-8dae-cc50af047151?source=cve
2023-12-21T15:18:38.389Z
2024-01-11T08:32:55.514Z
2024-01-11T08:32:55.514Z
{'Vendor': 'galdub', 'Product': 'Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme – My Sticky Bar (formerly myStickymenu)', 'Versions': '*'}
CVE-2023-7183
A vulnerability has been found in 7-card Fakabao up to 1.0_build20230805 and classified as critical. Affected by this vulnerability is an unknown functionality of the file shop/alipay_notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249385 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249385
2023-12-30T16:38:36.322Z
2023-12-31T10:31:03.773Z
2023-12-31T10:31:03.773Z
{'Vendor': '7-card', 'Product': 'Fakabao', 'Versions': '1.0_build20230805'}
CVE-2023-7091
A vulnerability was found in Dreamer CMS 4.1.3. It has been declared as problematic. This vulnerability affects unknown code of the file /upload/uploadFile. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-248938 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248938
2023-12-24T07:57:30.458Z
2023-12-24T21:00:05.391Z
2023-12-24T21:00:05.391Z
{'Vendor': 'Dreamer', 'Product': 'CMS', 'Versions': '4.1.3'}
CVE-2023-7212
A vulnerability classified as critical has been found in DeDeCMS up to 5.7.112. Affected is an unknown function of the file file_class.php of the component Backend. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249768. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249768
2024-01-05T10:57:59.580Z
2024-01-07T16:31:03.923Z
2024-01-07T16:31:03.923Z
{'Vendor': 'n/a', 'Product': 'DeDeCMS', 'Versions': '5.7.112'}
CVE-2023-7068
The WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on theprint_packinglist action in all versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to export orders which can contain sensitive information.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5abc282d-68c9-423c-a15c-d4d3f7035661?source=cve
2023-12-21T20:54:43.255Z
2024-01-03T08:29:48.196Z
2024-01-10T18:28:35.240Z
{'Vendor': 'webtoffee', 'Product': 'WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels', 'Versions': '*'}
CVE-2023-7101
Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
2023-12-24T16:23:02.000Z
2023-12-24T21:34:46.527Z
2024-01-03T16:54:52.650Z
{'Vendor': 'Douglas Wilson', 'Product': 'Spreadsheet::ParseExcel', 'Versions': '0.65'}
CVE-2023-7044
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom ID in all versions up to, and including, 5.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access and higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6e770e98-3c13-4e37-b51b-4c39bce2cb42?source=cve
2023-12-21T13:23:45.144Z
2024-01-04T09:31:03.919Z
2024-01-04T09:31:03.919Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders', 'Versions': '*'}
CVE-2023-7156
A vulnerability has been found in Campcodes Online College Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file index.php of the component Search. The manipulation of the argument category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249178 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249178
2023-12-28T14:23:24.846Z
2023-12-29T05:31:03.967Z
2023-12-29T05:31:03.967Z
{'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'}
CVE-2023-7140
A vulnerability was found in code-projects Client Details System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249143.
https://vuldb.com/?id.249143
2023-12-28T08:22:59.952Z
2023-12-28T23:00:05.970Z
2023-12-28T23:00:05.970Z
{'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'}
CVE-2023-7052
A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0. It has been classified as problematic. This affects an unknown part of the file /user/profile.php. The manipulation of the argument name leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248739.
https://vuldb.com/?id.248739
2023-12-21T16:07:40.471Z
2023-12-22T01:00:05.458Z
2023-12-22T01:00:05.458Z
{'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'}
CVE-2023-7116
A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249086
2023-12-27T10:39:52.272Z
2023-12-27T15:31:03.813Z
2023-12-27T15:31:03.813Z
{'Vendor': 'WeiYe-Jing', 'Product': 'datax-web', 'Versions': '2.1.2'}
CVE-2023-7053
A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user/signup.php. The manipulation leads to weak password requirements. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248740.
https://vuldb.com/?id.248740
2023-12-21T16:09:21.282Z
2023-12-22T01:31:04.354Z
2023-12-22T01:31:04.354Z
{'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'}
CVE-2023-7141
A vulnerability was found in code-projects Client Details System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/update-clients.php. The manipulation of the argument uid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249144.
https://vuldb.com/?id.249144
2023-12-28T08:23:05.506Z
2023-12-28T23:31:04.603Z
2023-12-28T23:31:04.603Z
{'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'}
CVE-2023-7157
A vulnerability was found in SourceCodester Free and Open Source Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /app/ajax/sell_return_data.php. The manipulation of the argument columns[0][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249179.
https://vuldb.com/?id.249179
2023-12-28T14:25:16.925Z
2023-12-29T06:00:05.751Z
2023-12-29T06:00:05.751Z
{'Vendor': 'SourceCodester', 'Product': 'Free and Open Source Inventory Management System', 'Versions': '1.0'}
CVE-2023-7100
A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/bwdates-report-details.php. The manipulation of the argument fdate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248952.
https://vuldb.com/?id.248952
2023-12-24T11:16:41.267Z
2023-12-25T03:00:05.608Z
2023-12-25T07:26:40.789Z
{'Vendor': 'PHPGurukul', 'Product': 'Restaurant Table Booking System', 'Versions': '1.0'}
CVE-2023-7194
The Meris WordPress theme through 1.1.2 does not sanitise and escape some parameters before outputting them back in the page, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/e20292af-939a-4cb1-91e4-5ff6aa0c7fbe
2024-01-01T13:25:37.511Z
2024-01-22T19:14:25.885Z
2024-01-22T19:14:25.885Z
{'Vendor': 'Unknown', 'Product': 'Meris', 'Versions': '0'}
CVE-2023-7213
A vulnerability classified as critical was found in Totolink N350RT 9.3.5u.6139_B20201216. Affected by this vulnerability is the function main of the file /cgi-bin/cstecgi.cgi?action=login&flag=1 of the component HTTP POST Request Handler. The manipulation of the argument v33 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249769 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249769
2024-01-05T11:10:17.724Z
2024-01-07T19:00:05.222Z
2024-01-07T19:00:05.222Z
{'Vendor': 'Totolink', 'Product': 'N350RT', 'Versions': '9.3.5u.6139_B20201216'}
CVE-2023-7090
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
https://access.redhat.com/security/cve/CVE-2023-7090
2023-12-23T19:25:33.533Z
2023-12-23T22:33:13.530Z
2024-01-23T01:02:18.116Z
{'Vendor': 'n/a', 'Product': 'sudo', 'Versions': '1.8.28'}
CVE-2023-7028
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
https://gitlab.com/gitlab-org/gitlab/-/issues/436084
2023-12-20T20:30:37.127Z
2024-01-12T13:56:41.726Z
2024-01-12T13:56:41.726Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.1, 16.2, 16.3, 16.4, 16.5, 16.6, 16.7'}
CVE-2023-7008
A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
https://access.redhat.com/security/cve/CVE-2023-7008
2023-12-20T15:28:32.966Z
2023-12-23T13:00:50.515Z
2023-12-23T13:00:50.515Z
{'Vendor': 'n/a', 'Product': 'systemd', 'Versions': '25X'}
CVE-2023-7032
A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker logged in with a user level account to gain higher privileges by providing a harmful serialized object.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-009-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-009-02.pdf
2023-12-20T22:29:58.270Z
2024-01-09T19:30:19.835Z
2024-01-09T19:30:19.835Z
{'Vendor': 'Schneider Electric', 'Product': 'Easergy Studio', 'Versions': 'All '}
CVE-2023-7177
A vulnerability classified as critical was found in Campcodes Online College Library System 1.0. This vulnerability affects unknown code of the file /admin/book_add.php of the component HTTP POST Request Handler. The manipulation of the argument category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249364.
https://vuldb.com/?id.249364
2023-12-29T22:10:02.241Z
2023-12-30T16:00:05.418Z
2023-12-30T16:00:05.418Z
{'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'}
CVE-2023-7209
A vulnerability was found in Uniway Router up to 2.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boaform/device_reset.cgi of the component Device Reset Handler. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249758 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249758
2024-01-05T09:52:49.832Z
2024-01-07T09:00:06.386Z
2024-01-07T09:00:06.386Z
{'Vendor': 'Uniway', 'Product': 'Router', 'Versions': '2.0'}
CVE-2023-7136
A vulnerability classified as problematic was found in code-projects Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /main/doctype.php of the component Document Type Handler. The manipulation of the argument docname with the input "><script src="https://js.rip/b23tmbxf49"></script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249139.
https://vuldb.com/?id.249139
2023-12-28T08:12:57.718Z
2023-12-28T21:00:05.791Z
2023-12-28T21:00:05.791Z
{'Vendor': 'code-projects', 'Product': 'Record Management System', 'Versions': '1.0'}
CVE-2023-7024
Heap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html
2023-12-20T17:02:13.094Z
2023-12-21T22:26:41.147Z
2023-12-21T22:26:41.147Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.129'}
CVE-2023-7161
A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3.1. This affects an unknown part of the file index.php?para=index of the component Login. The manipulation of the argument check_VirtualSiteId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249183.
https://vuldb.com/?id.249183
2023-12-28T14:49:57.264Z
2023-12-29T08:00:05.846Z
2023-12-29T08:00:05.846Z
{'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3.1'}
CVE-2023-7158
A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.
https://vuldb.com/?id.249180
2023-12-28T14:29:26.171Z
2023-12-29T06:31:04.450Z
2023-12-29T06:31:04.450Z
{'Vendor': 'n/a', 'Product': 'MicroPython', 'Versions': '1.13.0, 1.14.0, 1.15.0, 1.16.0, 1.17.0, 1.18.0, 1.19.0, 1.20.0, 1.21.0'}
CVE-2023-7226
A vulnerability was found in meetyoucrop big-whale 1.1 and classified as critical. Affected by this issue is some unknown functionality of the file /auth/user/all.api of the component Admin Module. The manipulation of the argument id leads to improper ownership management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250232.
https://vuldb.com/?id.250232
2024-01-10T08:22:58.651Z
2024-01-11T20:31:05.095Z
2024-01-11T20:31:05.095Z
{'Vendor': 'meetyoucrop', 'Product': 'big-whale', 'Versions': '1.1'}
CVE-2023-7031
Insecure Direct Object Reference vulnerabilities were discovered in the Avaya Aura Experience Portal Manager which may allow partial information disclosure to an authenticated non-privileged user. Affected versions include 8.0.x and 8.1.x, prior to 8.1.2 patch 0402. Versions prior to 8.0 are end of manufacturer support.
https://support.avaya.com/css/public/documents/101088063
2023-12-20T21:44:13.722Z
2024-01-17T18:34:41.831Z
2024-01-17T18:34:41.831Z
{'Vendor': 'Avaya', 'Product': 'Experience Portal Manager', 'Versions': '8.x.x'}
CVE-2023-7123
A vulnerability, which was classified as critical, has been found in SourceCodester Medicine Tracking System 1.0. This issue affects some unknown processing of the file /classes/Master.php? f=save_medicine. The manipulation of the argument id/name/description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249095.
https://vuldb.com/?id.249095
2023-12-27T17:58:13.937Z
2023-12-27T23:31:04.138Z
2023-12-27T23:31:04.138Z
{'Vendor': 'SourceCodester', 'Product': 'Medicine Tracking System', 'Versions': '1.0'}
CVE-2023-7135
A vulnerability classified as problematic has been found in code-projects Record Management System 1.0. Affected is an unknown function of the file /main/offices.php of the component Offices Handler. The manipulation of the argument officename with the input "><script src="https://js.rip/b23tmbxf49"></script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249138 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249138
2023-12-28T08:12:54.301Z
2023-12-28T20:31:04.279Z
2023-12-28T20:31:04.279Z
{'Vendor': 'code-projects', 'Product': 'Record Management System', 'Versions': '1.0'}
CVE-2023-7070
The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's eeb_mailto shortcode in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f5afe6ea-93b8-4782-8593-76468e370a45?source=cve
2023-12-21T21:18:22.659Z
2024-01-11T08:33:09.043Z
2024-01-11T08:33:09.043Z
{'Vendor': 'ironikus', 'Product': 'Email Encoder – Protect Email Addresses and Phone Numbers', 'Versions': '*'}
CVE-2023-7027
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘device’ header in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8911a3-ce0f-420c-bf2a-1c2929d01cef?source=cve
2023-12-20T18:53:20.908Z
2024-01-03T04:29:34.469Z
2024-01-03T04:29:34.469Z
{'Vendor': 'wpexpertsio', 'Product': 'POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications', 'Versions': '*'}
CVE-2023-7050
A vulnerability has been found in PHPGurukul Online Notes Sharing System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file user/profile.php. The manipulation of the argument name/email leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248737 was assigned to this vulnerability.
https://vuldb.com/?id.248737
2023-12-21T16:05:05.503Z
2023-12-21T21:31:03.984Z
2023-12-21T21:31:03.984Z
{'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'}
CVE-2023-7142
A vulnerability was found in code-projects Client Details System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/clientview.php. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249145 was assigned to this vulnerability.
https://vuldb.com/?id.249145
2023-12-28T08:23:11.382Z
2023-12-29T00:00:07.718Z
2023-12-29T00:00:07.718Z
{'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'}
CVE-2023-7154
The Hubbub Lite (formerly Grow Social) WordPress plugin before 1.32.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/0ed423dd-4a38-45e0-8645-3f4215a3f15c/
2023-12-28T13:12:09.377Z
2024-01-16T15:57:02.896Z
2024-01-16T15:57:02.896Z
{'Vendor': 'Unknown', 'Product': 'Hubbub Lite (formerly Grow Social)', 'Versions': '0'}
CVE-2023-7178
A vulnerability, which was classified as critical, has been found in Campcodes Online College Library System 1.0. This issue affects some unknown processing of the file /admin/book_row.php of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249365 was assigned to this vulnerability.
https://vuldb.com/?id.249365
2023-12-29T22:10:06.066Z
2023-12-30T16:31:04.129Z
2023-12-30T16:31:04.129Z
{'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'}
CVE-2023-7206
In Horner Automation Cscape versions 9.90 SP10 and prior, local attackers are able to exploit this vulnerability if a user opens a malicious CSP file, which would result in execution of arbitrary code on affected installations of Cscape.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-04
2024-01-04T14:30:55.707Z
2024-01-15T22:22:01.676Z
2024-01-15T22:22:01.676Z
{'Vendor': 'Horner Automation', 'Product': 'Cscape', 'Versions': '0'}
CVE-2023-7210
A vulnerability was found in OneNav up to 0.9.33. It has been classified as critical. This affects an unknown part of the file /index.php?c=api of the component API. The manipulation of the argument X-Token leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249765 was assigned to this vulnerability.
https://vuldb.com/?id.249765
2024-01-05T10:43:05.819Z
2024-01-07T09:31:03.947Z
2024-01-07T09:31:03.947Z
{'Vendor': 'n/a', 'Product': 'OneNav', 'Versions': '0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.9.6, 0.9.7, 0.9.8, 0.9.9, 0.9.10, 0.9.11, 0.9.12, 0.9.13, 0.9.14, 0.9.15, 0.9.16, 0.9.17, 0.9.18, 0.9.19, 0.9.20, 0.9.21, 0.9.22, 0.9.23, 0.9.24, 0.9.25, 0.9.26, 0.9.27, 0.9.28, 0.9.29, 0.9.30, 0.9.31, 0.9.32, 0.9.33'}
CVE-2023-7139
A vulnerability has been found in code-projects Client Details System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/regester.php of the component HTTP POST Request Handler. The manipulation of the argument fname/lname/email/contact leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249142 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249142
2023-12-28T08:22:53.866Z
2023-12-28T22:31:04.756Z
2023-12-28T22:31:04.756Z
{'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'}
CVE-2023-7093
A vulnerability classified as critical has been found in KylinSoft kylin-system-updater up to 2.0.5.16-0k2.33. Affected is an unknown function of the file /usr/share/kylin-system-updater/SystemUpdater/UpgradeStrategiesDbus.py of the component com.kylin.systemupgrade Service. The manipulation of the argument SetDownloadspeedMax leads to os command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248940. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248940
2023-12-24T08:03:50.706Z
2023-12-24T23:31:04.019Z
2023-12-24T23:31:04.019Z
{'Vendor': 'KylinSoft', 'Product': 'kylin-system-updater', 'Versions': '2.0.5.16-0k2.0, 2.0.5.16-0k2.1, 2.0.5.16-0k2.2, 2.0.5.16-0k2.3, 2.0.5.16-0k2.4, 2.0.5.16-0k2.5, 2.0.5.16-0k2.6, 2.0.5.16-0k2.7, 2.0.5.16-0k2.8, 2.0.5.16-0k2.9, 2.0.5.16-0k2.10, 2.0.5.16-0k2.11, 2.0.5.16-0k2.12, 2.0.5.16-0k2.13, 2.0.5.16-0k2.14, 2.0.5.16-0k2.15, 2.0.5.16-0k2.16, 2.0.5.16-0k2.17, 2.0.5.16-0k2.18, 2.0.5.16-0k2.19, 2.0.5.16-0k2.20, 2.0.5.16-0k2.21, 2.0.5.16-0k2.22, 2.0.5.16-0k2.23, 2.0.5.16-0k2.24, 2.0.5.16-0k2.25, 2.0.5.16-0k2.26, 2.0.5.16-0k2.27, 2.0.5.16-0k2.28, 2.0.5.16-0k2.29, 2.0.5.16-0k2.30, 2.0.5.16-0k2.31, 2.0.5.16-0k2.32, 2.0.5.16-0k2.33'}
CVE-2023-7181
A vulnerability was found in Muyun DedeBIZ up to 6.2.12 and classified as critical. Affected by this issue is some unknown functionality of the component Add Attachment Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249368. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249368
2023-12-29T22:19:46.703Z
2023-12-30T18:00:05.216Z
2023-12-30T18:00:05.216Z
{'Vendor': 'Muyun', 'Product': 'DedeBIZ', 'Versions': '6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.2.9, 6.2.10, 6.2.11, 6.2.12'}
CVE-2023-7180
A vulnerability has been found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this vulnerability is an unknown functionality of the file general/project/proj/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-249367. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249367
2023-12-29T22:15:37.836Z
2023-12-30T17:31:03.922Z
2023-12-30T17:31:03.922Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-7138
A vulnerability, which was classified as critical, was found in code-projects Client Details System 1.0. This affects an unknown part of the file /admin of the component HTTP POST Request Handler. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249141 was assigned to this vulnerability.
https://vuldb.com/?id.249141
2023-12-28T08:22:50.128Z
2023-12-28T22:00:05.688Z
2023-12-28T22:00:05.688Z
{'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'}
CVE-2023-7092
A vulnerability was found in Uniway UW-302VP 2.0. It has been rated as problematic. This issue affects some unknown processing of the file /boaform/wlan_basic_set.cgi of the component Admin Web Interface. The manipulation of the argument wlanssid/password leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248939. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248939
2023-12-24T08:00:44.926Z
2023-12-24T23:00:05.416Z
2023-12-24T23:00:05.416Z
{'Vendor': 'Uniway', 'Product': 'UW-302VP', 'Versions': '2.0'}
CVE-2023-7211
A vulnerability was found in Uniway Router 2.0. It has been declared as critical. This vulnerability affects unknown code of the component Administrative Web Interface. The manipulation leads to reliance on ip address for authentication. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-249766 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249766
2024-01-05T10:49:47.257Z
2024-01-07T10:00:05.512Z
2024-01-07T10:00:05.512Z
{'Vendor': 'Uniway', 'Product': 'Router', 'Versions': '2.0'}
CVE-2023-7084
The Voting Record WordPress plugin through 2.0 is missing sanitisation as well as escaping, which could allow any authenticated users, such as subscriber to perform Stored XSS attacks
https://wpscan.com/vulnerability/5e51e239-919b-4e74-a7ee-195f3817f907/
2023-12-22T19:02:36.893Z
2024-01-16T15:57:03.277Z
2024-01-16T15:57:03.277Z
{'Vendor': 'Unknown', 'Product': 'Voting Record', 'Versions': '0'}
CVE-2023-7207
Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628
2024-01-05T00:09:37.741Z
2024-01-05T00:39:49.690Z
2024-01-05T00:39:49.690Z
{'Vendor': 'Debian', 'Product': 'Debian cpio', 'Versions': '0'}
CVE-2023-7179
A vulnerability, which was classified as critical, was found in Campcodes Online College Library System 1.0. Affected is an unknown function of the file /admin/category_row.php of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249366 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249366
2023-12-29T22:10:09.616Z
2023-12-30T17:00:05.069Z
2023-12-30T17:00:05.069Z
{'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'}
CVE-2023-7047
Inadequate validation of permissions when employing remote tools and macros via the context menu within Devolutions Remote Desktop Manager versions 2023.3.31 and earlier permits a user to initiate a connection without proper execution rights via the remote tools feature. This affects only SQL data sources.
https://devolutions.net/security/advisories/DEVO-2023-0024/
2023-12-21T14:35:55.673Z
2023-12-21T14:42:58.084Z
2023-12-21T14:45:18.661Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-7102
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
https://www.barracuda.com/company/legal/esg-vulnerability
2023-12-24T17:32:25.423Z
2023-12-24T21:47:20.453Z
2023-12-26T19:23:33.832Z
{'Vendor': 'Barracuda Networks Inc.', 'Product': 'Barracuda ESG Appliance', 'Versions': '5.1.3.001'}
CVE-2023-7155
A vulnerability, which was classified as critical, was found in SourceCodester Free and Open Source Inventory Management System 1.0. This affects an unknown part of the file /ample/app/action/edit_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249177 was assigned to this vulnerability.
https://vuldb.com/?id.249177
2023-12-28T14:21:09.460Z
2023-12-29T05:00:05.287Z
2023-12-29T05:00:05.287Z
{'Vendor': 'SourceCodester', 'Product': 'Free and Open Source Inventory Management System', 'Versions': '1.0'}
CVE-2023-7143
A vulnerability was found in code-projects Client Details System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/regester.php. The manipulation of the argument fname/lname/email/contact leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249146 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249146
2023-12-28T08:23:16.938Z
2023-12-29T00:31:04.703Z
2023-12-29T00:31:04.703Z
{'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'}
CVE-2023-7051
A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/manage-notes.php of the component Notes Handler. The manipulation of the argument delid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248738 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248738
2023-12-21T16:06:17.413Z
2023-12-21T22:00:05.628Z
2023-12-21T22:00:05.628Z
{'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'}
CVE-2023-7114
Mattermost version 2.10.0 and earlier fails to sanitize deeplink paths, which allows an attacker to perform CSRF attacks against the server.
https://mattermost.com/security-updates
2023-12-26T10:45:27.420Z
2023-12-29T12:46:22.501Z
2023-12-29T12:46:22.501Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 2.10.1 '}
CVE-2023-7163
A security issue exists in D-Link D-View 8 v2.0.2.89 and prior that could allow an attacker to manipulate the probe inventory of the D-View service. This could result in the disclosure of information from other probes, denial of service conditions due to the probe inventory becoming full, or the execution of tasks on other probes.
https://tenable.com/security/research/tra-2023-43
2023-12-28T15:18:05.449Z
2023-12-28T15:37:35.707Z
2023-12-28T15:37:35.707Z
{'Vendor': 'D-Link', 'Product': 'D-View 8', 'Versions': '0'}
CVE-2023-7026
A vulnerability was found in Lightxun IPTV Gateway up to 20231208. It has been rated as problematic. This issue affects some unknown processing of the file /ZHGXTV/index.php/admin/index/web_upload_template.html. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248579.
https://vuldb.com/?id.248579
2023-12-20T17:50:52.833Z
2023-12-21T04:31:04.033Z
2023-12-21T04:31:04.033Z
{'Vendor': 'Lightxun', 'Product': 'IPTV Gateway', 'Versions': '20231208'}
CVE-2023-7134
A vulnerability was found in SourceCodester Medicine Tracking System 1.0. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument page leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249137 was assigned to this vulnerability.
https://vuldb.com/?id.249137
2023-12-28T08:05:08.534Z
2023-12-28T20:00:05.775Z
2023-12-28T20:00:05.775Z
{'Vendor': 'SourceCodester', 'Product': 'Medicine Tracking System', 'Versions': '1.0'}
CVE-2023-7071
The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table of Contents block in all versions up to, and including, 4.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f969cb24-734f-46e5-a74d-fddf8e61e096?source=cve
2023-12-21T21:34:48.129Z
2024-01-11T08:33:09.516Z
2024-01-11T08:33:09.516Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'}
CVE-2023-7175
A vulnerability was found in Campcodes Online College Library System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/borrow_add.php of the component HTTP POST Request Handler. The manipulation of the argument student leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249362 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249362
2023-12-29T22:09:56.417Z
2023-12-30T13:00:05.632Z
2023-12-30T13:00:05.632Z
{'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'}
CVE-2023-7227
SystemK NVR 504/508/516 versions 2.3.5SK.30084998 and prior are vulnerable to a command injection vulnerability in the dynamic domain name system (DDNS) settings that could allow an attacker to execute arbitrary commands with root privileges.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-02
2024-01-10T16:26:09.402Z
2024-01-25T18:21:39.427Z
2024-01-25T18:21:39.427Z
{'Vendor': 'SystemK ', 'Product': 'NVR 504', 'Versions': '2.3.5SK.30084998'}
CVE-2023-7159
A vulnerability was found in gopeak MasterLab up to 3.3.10. It has been declared as critical. Affected by this vulnerability is the function add/update of the file app/ctrl/admin/User.php. The manipulation of the argument avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249181 was assigned to this vulnerability.
https://vuldb.com/?id.249181
2023-12-28T14:39:02.258Z
2023-12-29T07:00:05.537Z
2023-12-29T07:00:05.537Z
{'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'}
CVE-2023-7056
A vulnerability classified as problematic was found in code-projects Faculty Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/pages/subjects.php. The manipulation of the argument Description/Units leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248743.
https://vuldb.com/?id.248743
2023-12-21T16:16:59.494Z
2023-12-22T03:00:05.677Z
2023-12-22T03:00:05.677Z
{'Vendor': 'code-projects', 'Product': 'Faculty Management System', 'Versions': '1.0'}
CVE-2023-7113
Mattermost version 8.1.6 and earlier fails to sanitize channel mention data in posts, which allows an attacker to inject markup in the web client.
https://mattermost.com/security-updates
2023-12-26T10:19:31.976Z
2023-12-29T12:46:13.932Z
2023-12-29T12:46:13.932Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.7, 9.2.0'}
CVE-2023-7144
A vulnerability classified as critical has been found in gopeak MasterLab up to 3.3.10. This affects the function sqlInject of the file app/ctrl/framework/Feature.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249147.
https://vuldb.com/?id.249147
2023-12-28T08:33:36.972Z
2023-12-29T01:00:04.653Z
2023-12-29T01:00:04.653Z
{'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'}