CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-7170 | The EventON-RSVP WordPress plugin before 2.9.5 does not sanitise and escape some parameters before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/218fb3af-3a40-486f-8ea9-80211a986fb3/ | 2023-12-29T11:13:41.668Z | 2024-01-22T19:14:23.385Z | 2024-01-22T19:14:23.385Z | {'Vendor': 'Unknown', 'Product': 'EventON-RSVP', 'Versions': '0'} |
CVE-2023-7222 | A vulnerability was found in Totolink X2000R 1.0.0-B20221212.1452. It has been declared as critical. This vulnerability affects the function formTmultiAP of the file /bin/boa of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249856. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249856 | 2024-01-07T08:50:07.428Z | 2024-01-09T15:31:03.585Z | 2024-01-09T15:31:03.585Z | {'Vendor': 'Totolink', 'Product': 'X2000R', 'Versions': '1.0.0-B20221212.1452'} |
CVE-2023-7019 | The LightStart – Maintenance Mode, Coming Soon and Landing Page Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the insert_template function in all versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to change page designs. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b57d3d1d-dcdb-4f11-82d8-183778baa075?source=cve | 2023-12-20T16:28:37.402Z | 2024-01-11T08:32:53.047Z | 2024-01-11T08:32:53.047Z | {'Vendor': 'themeisle', 'Product': 'LightStart – Maintenance Mode, Coming Soon and Landing Page Builder', 'Versions': '*'} |
CVE-2023-7234 |
OPCUAServerToolkit will write a log message once an OPC UA client has successfully connected containing the client's self-defined description field.
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-016-02 | 2024-01-15T22:26:10.572Z | 2024-01-16T18:11:50.146Z | 2024-01-16T18:11:50.146Z | {'Vendor': 'Integration Objects', 'Product': 'OPC UA Server Toolkit', 'Versions': 'all versions'} |
CVE-2023-7058 | A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument page leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248749 was assigned to this vulnerability. | https://vuldb.com/?id.248749 | 2023-12-21T16:26:53.547Z | 2023-12-22T04:31:04.566Z | 2023-12-22T04:31:04.566Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'} |
CVE-2023-7059 | A vulnerability was found in SourceCodester School Visitor Log e-Book 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file log-book.php. The manipulation of the argument Full Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248750 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248750 | 2023-12-21T16:28:44.250Z | 2023-12-22T05:00:05.078Z | 2023-12-22T05:00:05.078Z | {'Vendor': 'SourceCodester', 'Product': 'School Visitor Log e-Book', 'Versions': '1.0'} |
CVE-2023-7018 | Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | https://huntr.com/bounties/e1a3e548-e53a-48df-b708-9ee62140963c | 2023-12-20T16:12:41.491Z | 2023-12-20T16:13:01.023Z | 2023-12-20T16:13:01.023Z | {'Vendor': 'huggingface', 'Product': 'huggingface/transformers', 'Versions': 'unspecified'} |
CVE-2023-7223 | A vulnerability classified as problematic has been found in Totolink T6 4.1.9cu.5241_B20210923. This affects an unknown part of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument topicurl with the input showSyslog leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249867. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249867 | 2024-01-07T19:50:14.789Z | 2024-01-09T15:31:04.597Z | 2024-01-09T15:31:04.597Z | {'Vendor': 'Totolink', 'Product': 'T6', 'Versions': '4.1.9cu.5241_B20210923'} |
CVE-2023-7171 | A vulnerability was found in Novel-Plus up to 4.2.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file novel-admin/src/main/java/com/java2nb/novel/controller/FriendLinkController.java of the component Friendly Link Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named d6093d8182362422370d7eaf6c53afde9ee45215. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-249307. | https://vuldb.com/?id.249307 | 2023-12-29T12:12:00.956Z | 2023-12-29T17:31:03.304Z | 2023-12-29T17:31:03.304Z | {'Vendor': 'n/a', 'Product': 'Novel-Plus', 'Versions': '4.0, 4.1, 4.2'} |
CVE-2023-7063 | The WPForms Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form submission parameters in all versions up to, and including, 1.8.5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/31c080b8-ba00-4e96-8961-2a1c3a017004?source=cve | 2023-12-21T18:09:00.474Z | 2024-01-20T08:38:28.800Z | 2024-01-20T08:38:28.800Z | {'Vendor': 'WPForms', 'Product': 'WPForms Pro', 'Versions': '*'} |
CVE-2023-7126 | A vulnerability classified as critical has been found in code-projects Automated Voting System 1.0. This affects an unknown part of the file /admin/ of the component Admin Login. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249129 was assigned to this vulnerability. | https://vuldb.com/?id.249129 | 2023-12-28T07:47:04.926Z | 2023-12-28T14:00:05.757Z | 2023-12-28T14:00:05.757Z | {'Vendor': 'code-projects', 'Product': 'Automated Voting System', 'Versions': '1.0'} |
CVE-2023-7075 | A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /main/checkout.php. The manipulation of the argument pt leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248846 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248846 | 2023-12-22T06:33:17.230Z | 2023-12-22T12:00:07.412Z | 2023-12-22T12:00:07.412Z | {'Vendor': 'code-projects', 'Product': 'Point of Sales and Inventory Management System', 'Versions': '1.0'} |
CVE-2023-7130 | A vulnerability has been found in code-projects College Notes Gallery 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument user leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249133 was assigned to this vulnerability. | https://vuldb.com/?id.249133 | 2023-12-28T07:52:02.219Z | 2023-12-31T08:48:28.662Z | 2023-12-31T08:48:28.662Z | {'Vendor': 'code-projects', 'Product': 'College Notes Gallery', 'Versions': '2.0'} |
CVE-2023-7219 | A vulnerability has been found in Totolink N350RT 9.3.5u.6139_B202012 and classified as critical. Affected by this vulnerability is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249853 | 2024-01-07T08:37:42.953Z | 2024-01-09T06:00:06.219Z | 2024-01-09T06:00:06.219Z | {'Vendor': 'Totolink', 'Product': 'N350RT', 'Versions': '9.3.5u.6139_B202012'} |
CVE-2023-7022 | A vulnerability was found in Tongda OA 2017 up to 11.9. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file general/work_plan/manage/delete_all.php. The manipulation of the argument DELETE_STR leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248569 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248569 | 2023-12-20T17:01:14.402Z | 2023-12-21T01:31:04.718Z | 2023-12-21T01:31:04.718Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-7188 | A vulnerability classified as critical has been found in Shipping 100 Fahuo100 up to 1.1. Affected is an unknown function of the file member/login.php. The manipulation of the argument M_pwd leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-249390 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249390 | 2023-12-30T16:45:12.696Z | 2023-12-31T14:31:03.814Z | 2023-12-31T14:31:03.814Z | {'Vendor': 'Shipping 100', 'Product': 'Fahuo100', 'Versions': '1.0, 1.1'} |
CVE-2023-7110 | A vulnerability, which was classified as critical, has been found in code-projects Library Management System 2.0. This issue affects some unknown processing of the file login.php. The manipulation of the argument student leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249005 was assigned to this vulnerability. | https://vuldb.com/?id.249005 | 2023-12-25T14:16:18.674Z | 2023-12-26T02:00:06.004Z | 2023-12-26T02:00:06.004Z | {'Vendor': 'code-projects', 'Product': 'Library Management System', 'Versions': '2.0'} |
CVE-2023-7055 | A vulnerability classified as problematic has been found in PHPGurukul Online Notes Sharing System 1.0. Affected is an unknown function of the file /user/profile.php of the component Contact Information Handler. The manipulation of the argument mobilenumber leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-248742 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248742 | 2023-12-21T16:13:22.013Z | 2023-12-22T02:31:04.126Z | 2023-12-22T02:31:04.126Z | {'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'} |
CVE-2023-7147 | A vulnerability, which was classified as critical, was found in gopeak MasterLab up to 3.3.10. Affected is the function base64ImageContent of the file app/ctrl/User.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-249150 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249150 | 2023-12-28T08:33:49.319Z | 2023-12-29T02:31:04.681Z | 2023-12-29T02:31:04.681Z | {'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'} |
CVE-2023-7002 | The Backup Migration plugin for WordPress is vulnerable to OS Command Injection in all versions up to, and including, 1.3.9 via the 'url' parameter. This vulnerability allows authenticated attackers, with administrator-level permissions and above, to execute arbitrary commands on the host operating system. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cc49db10-988d-42bd-a9cf-9a86f4c79568?source=cve | 2023-12-20T14:55:56.413Z | 2023-12-23T01:59:51.281Z | 2023-12-23T01:59:51.281Z | {'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '*'} |
CVE-2023-7151 | The Product Enquiry for WooCommerce WordPress plugin before 3.2 does not sanitise and escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/4992a4a9-f21a-46e2-babf-954acfc7c5b4/ | 2023-12-28T10:26:09.076Z | 2024-01-16T15:57:52.755Z | 2024-01-16T15:57:52.755Z | {'Vendor': 'Unknown', 'Product': 'Product Enquiry for WooCommerce', 'Versions': '0'} |
CVE-2023-7106 | A vulnerability was found in code-projects E-Commerce Website 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file product_details.php?prod_id=11. The manipulation of the argument prod_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249001 was assigned to this vulnerability. | https://vuldb.com/?id.249001 | 2023-12-25T14:10:07.221Z | 2023-12-25T23:00:06.432Z | 2023-12-25T23:00:06.432Z | {'Vendor': 'code-projects', 'Product': 'E-Commerce Website', 'Versions': '1.0'} |
CVE-2023-7038 | A vulnerability was found in automad up to 1.10.9. It has been rated as problematic. This issue affects some unknown processing of the file /dashboard?controller=UserCollection::createUser of the component User Creation Handler. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248687. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248687 | 2023-12-21T08:19:06.084Z | 2023-12-21T17:31:04.314Z | 2023-12-21T17:31:04.314Z | {'Vendor': 'n/a', 'Product': 'automad', 'Versions': '1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9'} |
CVE-2023-7192 | A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow. | https://access.redhat.com/security/cve/CVE-2023-7192 | 2023-12-30T18:12:05.167Z | 2024-01-02T19:02:45.371Z | 2024-01-25T20:40:10.547Z | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.3-rc1'} |
CVE-2023-7080 | The V8 inspector intentionally allows arbitrary code execution within the Workers sandbox for debugging. wrangler dev would previously start an inspector server listening on all network interfaces. This would allow an attacker on the local network to connect to the inspector and run arbitrary code. Additionally, the inspector server did not validate Origin/Host headers, granting an attacker that can trick any user on the local network into opening a malicious website the ability to run code. If wrangler dev --remote was being used, an attacker could access production resources if they were bound to the worker.
This issue was fixed in [email protected] and [email protected]. Whilst wrangler dev's inspector server listens on local interfaces by default as of [email protected], an SSRF vulnerability in miniflare https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-fwvg-2739-22v7 (CVE-2023-7078) allowed access from the local network until [email protected]. [email protected] and [email protected] introduced validation for the Origin/Host headers.
| https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-f8mp-x433-5wpf | 2023-12-22T09:59:52.954Z | 2023-12-29T11:58:36.214Z | 2023-12-29T12:08:25.935Z | {'Vendor': 'Cloudflare', 'Product': 'wrangler', 'Versions': '0, 0, 0, 0'} |
CVE-2023-7215 | A vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. This issue affects some unknown processing. The manipulation of the argument Description with the input <image src onerror=prompt(document.domain)> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249779. | https://vuldb.com/?id.249779 | 2024-01-05T12:56:44.805Z | 2024-01-08T01:31:03.607Z | 2024-01-08T01:31:03.607Z | {'Vendor': 'Chanzhaoyu', 'Product': 'chatgpt-web', 'Versions': '2.11.1'} |
CVE-2023-7079 | Sending specially crafted HTTP requests and inspector messages to Wrangler's dev server could result in any file on the user's computer being accessible over the local network. An attacker that could trick any user on the local network into opening a malicious website could also read any file.
| https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-cfph-4qqh-w828 | 2023-12-22T09:59:49.428Z | 2023-12-29T11:54:08.925Z | 2023-12-29T12:08:49.883Z | {'Vendor': 'Cloudflare', 'Product': 'wrangler', 'Versions': '0, 0'} |
CVE-2023-7096 | A vulnerability was found in code-projects Faculty Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/php/crud.php. The manipulation of the argument fieldname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248948. | https://vuldb.com/?id.248948 | 2023-12-24T11:01:26.127Z | 2023-12-25T01:00:06.137Z | 2023-12-25T01:00:06.137Z | {'Vendor': 'code-projects', 'Product': 'Faculty Management System', 'Versions': '1.0'} |
CVE-2023-7184 | A vulnerability was found in 7-card Fakabao up to 1.0_build20230805 and classified as critical. Affected by this issue is some unknown functionality of the file shop/notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249386 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249386 | 2023-12-30T16:38:39.930Z | 2023-12-31T11:00:05.504Z | 2023-12-31T11:00:05.504Z | {'Vendor': '7-card', 'Product': 'Fakabao', 'Versions': '1.0_build20230805'} |
CVE-2023-7025 | A vulnerability was found in KylinSoft hedron-domain-hook up to 3.8.0.12-0k0.5. It has been declared as critical. This vulnerability affects the function init_kcm of the component DBus Handler. The manipulation leads to improper access controls. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-248578 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248578 | 2023-12-20T17:48:39.593Z | 2023-12-21T03:00:05.997Z | 2023-12-21T03:00:05.997Z | {'Vendor': 'KylinSoft', 'Product': 'hedron-domain-hook', 'Versions': '3.8.0.12-0k0.0, 3.8.0.12-0k0.1, 3.8.0.12-0k0.2, 3.8.0.12-0k0.3, 3.8.0.12-0k0.4, 3.8.0.12-0k0.5'} |
CVE-2023-7160 | A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Add Engineer Handler. The manipulation of the argument first name/last name with the input <script>alert(0)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249182 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249182 | 2023-12-28T14:45:26.016Z | 2023-12-29T07:31:04.215Z | 2023-12-29T07:31:04.215Z | {'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'} |
CVE-2023-7137 | A vulnerability, which was classified as critical, has been found in code-projects Client Details System 1.0. Affected by this issue is some unknown functionality of the component HTTP POST Request Handler. The manipulation of the argument uemail leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249140. | https://vuldb.com/?id.249140 | 2023-12-28T08:22:48.248Z | 2023-12-28T21:31:04.884Z | 2023-12-28T21:31:04.884Z | {'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'} |
CVE-2023-7208 | A vulnerability classified as critical was found in Totolink X2000R_V2 2.0.0-B20230727.10434. This vulnerability affects the function formTmultiAP of the file /bin/boa. The manipulation leads to buffer overflow. VDB-249742 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249742 | 2024-01-05T09:20:03.714Z | 2024-01-07T07:00:05.477Z | 2024-01-07T07:00:05.477Z | {'Vendor': 'Totolink', 'Product': 'X2000R_V2', 'Versions': '2.0.0-B20230727.10434'} |
CVE-2023-7176 | A vulnerability classified as critical has been found in Campcodes Online College Library System 1.0. This affects an unknown part of the file /admin/return_add.php of the component HTTP POST Request Handler. The manipulation of the argument student leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249363. | https://vuldb.com/?id.249363 | 2023-12-29T22:09:58.843Z | 2023-12-30T15:31:04.094Z | 2023-12-30T15:31:04.094Z | {'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'} |
CVE-2023-7224 | OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users to execute code in external third party libraries using the DYLD_INSERT_LIBRARIES environment variable | https://openvpn.net/vpn-server-resources/openvpn-connect-for-macos-change-log/ | 2024-01-08T12:17:14.800Z | 2024-01-08T13:55:20.160Z | 2024-01-08T13:55:20.160Z | {'Vendor': 'OpenVPN', 'Product': 'OpenVPN Connect', 'Versions': '3.0'} |
CVE-2023-7048 | The My Sticky Bar plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.6. This is due to missing or incorrect nonce validation in mystickymenu-contact-leads.php. This makes it possible for unauthenticated attackers to trigger the export of a CSV file containing contact leads via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Because the CSV file is exported to a public location, it can be downloaded during a very short window of time before it is automatically deleted by the export function. | https://www.wordfence.com/threat-intel/vulnerabilities/id/be0ab40f-cff7-48bd-8dae-cc50af047151?source=cve | 2023-12-21T15:18:38.389Z | 2024-01-11T08:32:55.514Z | 2024-01-11T08:32:55.514Z | {'Vendor': 'galdub', 'Product': 'Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme – My Sticky Bar (formerly myStickymenu)', 'Versions': '*'} |
CVE-2023-7183 | A vulnerability has been found in 7-card Fakabao up to 1.0_build20230805 and classified as critical. Affected by this vulnerability is an unknown functionality of the file shop/alipay_notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249385 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249385 | 2023-12-30T16:38:36.322Z | 2023-12-31T10:31:03.773Z | 2023-12-31T10:31:03.773Z | {'Vendor': '7-card', 'Product': 'Fakabao', 'Versions': '1.0_build20230805'} |
CVE-2023-7091 | A vulnerability was found in Dreamer CMS 4.1.3. It has been declared as problematic. This vulnerability affects unknown code of the file /upload/uploadFile. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-248938 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248938 | 2023-12-24T07:57:30.458Z | 2023-12-24T21:00:05.391Z | 2023-12-24T21:00:05.391Z | {'Vendor': 'Dreamer', 'Product': 'CMS', 'Versions': '4.1.3'} |
CVE-2023-7212 | A vulnerability classified as critical has been found in DeDeCMS up to 5.7.112. Affected is an unknown function of the file file_class.php of the component Backend. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249768. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249768 | 2024-01-05T10:57:59.580Z | 2024-01-07T16:31:03.923Z | 2024-01-07T16:31:03.923Z | {'Vendor': 'n/a', 'Product': 'DeDeCMS', 'Versions': '5.7.112'} |
CVE-2023-7068 | The WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on theprint_packinglist action in all versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to export orders which can contain sensitive information. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5abc282d-68c9-423c-a15c-d4d3f7035661?source=cve | 2023-12-21T20:54:43.255Z | 2024-01-03T08:29:48.196Z | 2024-01-10T18:28:35.240Z | {'Vendor': 'webtoffee', 'Product': 'WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels', 'Versions': '*'} |
CVE-2023-7101 | Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
| https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md | 2023-12-24T16:23:02.000Z | 2023-12-24T21:34:46.527Z | 2024-01-03T16:54:52.650Z | {'Vendor': 'Douglas Wilson', 'Product': 'Spreadsheet::ParseExcel', 'Versions': '0.65'} |
CVE-2023-7044 | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom ID in all versions up to, and including, 5.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor access and higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6e770e98-3c13-4e37-b51b-4c39bce2cb42?source=cve | 2023-12-21T13:23:45.144Z | 2024-01-04T09:31:03.919Z | 2024-01-04T09:31:03.919Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders', 'Versions': '*'} |
CVE-2023-7156 | A vulnerability has been found in Campcodes Online College Library System 1.0 and classified as critical. This vulnerability affects unknown code of the file index.php of the component Search. The manipulation of the argument category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-249178 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249178 | 2023-12-28T14:23:24.846Z | 2023-12-29T05:31:03.967Z | 2023-12-29T05:31:03.967Z | {'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'} |
CVE-2023-7140 | A vulnerability was found in code-projects Client Details System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/manage-users.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249143. | https://vuldb.com/?id.249143 | 2023-12-28T08:22:59.952Z | 2023-12-28T23:00:05.970Z | 2023-12-28T23:00:05.970Z | {'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'} |
CVE-2023-7052 | A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0. It has been classified as problematic. This affects an unknown part of the file /user/profile.php. The manipulation of the argument name leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248739. | https://vuldb.com/?id.248739 | 2023-12-21T16:07:40.471Z | 2023-12-22T01:00:05.458Z | 2023-12-22T01:00:05.458Z | {'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'} |
CVE-2023-7116 | A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249086 | 2023-12-27T10:39:52.272Z | 2023-12-27T15:31:03.813Z | 2023-12-27T15:31:03.813Z | {'Vendor': 'WeiYe-Jing', 'Product': 'datax-web', 'Versions': '2.1.2'} |
CVE-2023-7053 | A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user/signup.php. The manipulation leads to weak password requirements. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248740. | https://vuldb.com/?id.248740 | 2023-12-21T16:09:21.282Z | 2023-12-22T01:31:04.354Z | 2023-12-22T01:31:04.354Z | {'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'} |
CVE-2023-7141 | A vulnerability was found in code-projects Client Details System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/update-clients.php. The manipulation of the argument uid leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249144. | https://vuldb.com/?id.249144 | 2023-12-28T08:23:05.506Z | 2023-12-28T23:31:04.603Z | 2023-12-28T23:31:04.603Z | {'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'} |
CVE-2023-7157 | A vulnerability was found in SourceCodester Free and Open Source Inventory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /app/ajax/sell_return_data.php. The manipulation of the argument columns[0][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249179. | https://vuldb.com/?id.249179 | 2023-12-28T14:25:16.925Z | 2023-12-29T06:00:05.751Z | 2023-12-29T06:00:05.751Z | {'Vendor': 'SourceCodester', 'Product': 'Free and Open Source Inventory Management System', 'Versions': '1.0'} |
CVE-2023-7100 | A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/bwdates-report-details.php. The manipulation of the argument fdate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248952. | https://vuldb.com/?id.248952 | 2023-12-24T11:16:41.267Z | 2023-12-25T03:00:05.608Z | 2023-12-25T07:26:40.789Z | {'Vendor': 'PHPGurukul', 'Product': 'Restaurant Table Booking System', 'Versions': '1.0'} |
CVE-2023-7194 | The Meris WordPress theme through 1.1.2 does not sanitise and escape some parameters before outputting them back in the page, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/e20292af-939a-4cb1-91e4-5ff6aa0c7fbe | 2024-01-01T13:25:37.511Z | 2024-01-22T19:14:25.885Z | 2024-01-22T19:14:25.885Z | {'Vendor': 'Unknown', 'Product': 'Meris', 'Versions': '0'} |
CVE-2023-7213 | A vulnerability classified as critical was found in Totolink N350RT 9.3.5u.6139_B20201216. Affected by this vulnerability is the function main of the file /cgi-bin/cstecgi.cgi?action=login&flag=1 of the component HTTP POST Request Handler. The manipulation of the argument v33 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249769 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249769 | 2024-01-05T11:10:17.724Z | 2024-01-07T19:00:05.222Z | 2024-01-07T19:00:05.222Z | {'Vendor': 'Totolink', 'Product': 'N350RT', 'Versions': '9.3.5u.6139_B20201216'} |
CVE-2023-7090 | A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them. | https://access.redhat.com/security/cve/CVE-2023-7090 | 2023-12-23T19:25:33.533Z | 2023-12-23T22:33:13.530Z | 2024-01-23T01:02:18.116Z | {'Vendor': 'n/a', 'Product': 'sudo', 'Versions': '1.8.28'} |
CVE-2023-7028 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address. | https://gitlab.com/gitlab-org/gitlab/-/issues/436084 | 2023-12-20T20:30:37.127Z | 2024-01-12T13:56:41.726Z | 2024-01-12T13:56:41.726Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.1, 16.2, 16.3, 16.4, 16.5, 16.6, 16.7'} |
CVE-2023-7008 | A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records. | https://access.redhat.com/security/cve/CVE-2023-7008 | 2023-12-20T15:28:32.966Z | 2023-12-23T13:00:50.515Z | 2023-12-23T13:00:50.515Z | {'Vendor': 'n/a', 'Product': 'systemd', 'Versions': '25X'} |
CVE-2023-7032 |
A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker
logged in with a user level account to gain higher privileges by providing a harmful serialized
object.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-009-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-009-02.pdf | 2023-12-20T22:29:58.270Z | 2024-01-09T19:30:19.835Z | 2024-01-09T19:30:19.835Z | {'Vendor': 'Schneider Electric', 'Product': 'Easergy Studio', 'Versions': 'All '} |
CVE-2023-7177 | A vulnerability classified as critical was found in Campcodes Online College Library System 1.0. This vulnerability affects unknown code of the file /admin/book_add.php of the component HTTP POST Request Handler. The manipulation of the argument category leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249364. | https://vuldb.com/?id.249364 | 2023-12-29T22:10:02.241Z | 2023-12-30T16:00:05.418Z | 2023-12-30T16:00:05.418Z | {'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'} |
CVE-2023-7209 | A vulnerability was found in Uniway Router up to 2.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boaform/device_reset.cgi of the component Device Reset Handler. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249758 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249758 | 2024-01-05T09:52:49.832Z | 2024-01-07T09:00:06.386Z | 2024-01-07T09:00:06.386Z | {'Vendor': 'Uniway', 'Product': 'Router', 'Versions': '2.0'} |
CVE-2023-7136 | A vulnerability classified as problematic was found in code-projects Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /main/doctype.php of the component Document Type Handler. The manipulation of the argument docname with the input "><script src="https://js.rip/b23tmbxf49"></script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249139. | https://vuldb.com/?id.249139 | 2023-12-28T08:12:57.718Z | 2023-12-28T21:00:05.791Z | 2023-12-28T21:00:05.791Z | {'Vendor': 'code-projects', 'Product': 'Record Management System', 'Versions': '1.0'} |
CVE-2023-7024 | Heap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html | 2023-12-20T17:02:13.094Z | 2023-12-21T22:26:41.147Z | 2023-12-21T22:26:41.147Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.129'} |
CVE-2023-7161 | A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3.1. This affects an unknown part of the file index.php?para=index of the component Login. The manipulation of the argument check_VirtualSiteId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249183. | https://vuldb.com/?id.249183 | 2023-12-28T14:49:57.264Z | 2023-12-29T08:00:05.846Z | 2023-12-29T08:00:05.846Z | {'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3.1'} |
CVE-2023-7158 | A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180. | https://vuldb.com/?id.249180 | 2023-12-28T14:29:26.171Z | 2023-12-29T06:31:04.450Z | 2023-12-29T06:31:04.450Z | {'Vendor': 'n/a', 'Product': 'MicroPython', 'Versions': '1.13.0, 1.14.0, 1.15.0, 1.16.0, 1.17.0, 1.18.0, 1.19.0, 1.20.0, 1.21.0'} |
CVE-2023-7226 | A vulnerability was found in meetyoucrop big-whale 1.1 and classified as critical. Affected by this issue is some unknown functionality of the file /auth/user/all.api of the component Admin Module. The manipulation of the argument id leads to improper ownership management. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250232. | https://vuldb.com/?id.250232 | 2024-01-10T08:22:58.651Z | 2024-01-11T20:31:05.095Z | 2024-01-11T20:31:05.095Z | {'Vendor': 'meetyoucrop', 'Product': 'big-whale', 'Versions': '1.1'} |
CVE-2023-7031 | Insecure Direct Object Reference vulnerabilities were discovered in the Avaya Aura Experience Portal Manager which may allow partial information disclosure to an authenticated non-privileged user. Affected versions include 8.0.x and 8.1.x, prior to 8.1.2 patch 0402. Versions prior to 8.0 are end of manufacturer support. | https://support.avaya.com/css/public/documents/101088063 | 2023-12-20T21:44:13.722Z | 2024-01-17T18:34:41.831Z | 2024-01-17T18:34:41.831Z | {'Vendor': 'Avaya', 'Product': 'Experience Portal Manager', 'Versions': '8.x.x'} |
CVE-2023-7123 | A vulnerability, which was classified as critical, has been found in SourceCodester Medicine Tracking System 1.0. This issue affects some unknown processing of the file /classes/Master.php? f=save_medicine. The manipulation of the argument id/name/description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249095. | https://vuldb.com/?id.249095 | 2023-12-27T17:58:13.937Z | 2023-12-27T23:31:04.138Z | 2023-12-27T23:31:04.138Z | {'Vendor': 'SourceCodester', 'Product': 'Medicine Tracking System', 'Versions': '1.0'} |
CVE-2023-7135 | A vulnerability classified as problematic has been found in code-projects Record Management System 1.0. Affected is an unknown function of the file /main/offices.php of the component Offices Handler. The manipulation of the argument officename with the input "><script src="https://js.rip/b23tmbxf49"></script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249138 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249138 | 2023-12-28T08:12:54.301Z | 2023-12-28T20:31:04.279Z | 2023-12-28T20:31:04.279Z | {'Vendor': 'code-projects', 'Product': 'Record Management System', 'Versions': '1.0'} |
CVE-2023-7070 | The Email Encoder – Protect Email Addresses and Phone Numbers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's eeb_mailto shortcode in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f5afe6ea-93b8-4782-8593-76468e370a45?source=cve | 2023-12-21T21:18:22.659Z | 2024-01-11T08:33:09.043Z | 2024-01-11T08:33:09.043Z | {'Vendor': 'ironikus', 'Product': 'Email Encoder – Protect Email Addresses and Phone Numbers', 'Versions': '*'} |
CVE-2023-7027 | The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘device’ header in all versions up to, and including, 2.8.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7e8911a3-ce0f-420c-bf2a-1c2929d01cef?source=cve | 2023-12-20T18:53:20.908Z | 2024-01-03T04:29:34.469Z | 2024-01-03T04:29:34.469Z | {'Vendor': 'wpexpertsio', 'Product': 'POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications', 'Versions': '*'} |
CVE-2023-7050 | A vulnerability has been found in PHPGurukul Online Notes Sharing System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file user/profile.php. The manipulation of the argument name/email leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248737 was assigned to this vulnerability. | https://vuldb.com/?id.248737 | 2023-12-21T16:05:05.503Z | 2023-12-21T21:31:03.984Z | 2023-12-21T21:31:03.984Z | {'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'} |
CVE-2023-7142 | A vulnerability was found in code-projects Client Details System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/clientview.php. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249145 was assigned to this vulnerability. | https://vuldb.com/?id.249145 | 2023-12-28T08:23:11.382Z | 2023-12-29T00:00:07.718Z | 2023-12-29T00:00:07.718Z | {'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'} |
CVE-2023-7154 | The Hubbub Lite (formerly Grow Social) WordPress plugin before 1.32.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/0ed423dd-4a38-45e0-8645-3f4215a3f15c/ | 2023-12-28T13:12:09.377Z | 2024-01-16T15:57:02.896Z | 2024-01-16T15:57:02.896Z | {'Vendor': 'Unknown', 'Product': 'Hubbub Lite (formerly Grow Social)', 'Versions': '0'} |
CVE-2023-7178 | A vulnerability, which was classified as critical, has been found in Campcodes Online College Library System 1.0. This issue affects some unknown processing of the file /admin/book_row.php of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249365 was assigned to this vulnerability. | https://vuldb.com/?id.249365 | 2023-12-29T22:10:06.066Z | 2023-12-30T16:31:04.129Z | 2023-12-30T16:31:04.129Z | {'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'} |
CVE-2023-7206 |
In Horner Automation Cscape versions 9.90 SP10 and prior, local attackers are able to exploit this vulnerability if a user opens a malicious CSP file, which would result in execution of arbitrary code on affected installations of Cscape.
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-04 | 2024-01-04T14:30:55.707Z | 2024-01-15T22:22:01.676Z | 2024-01-15T22:22:01.676Z | {'Vendor': 'Horner Automation', 'Product': 'Cscape', 'Versions': '0'} |
CVE-2023-7210 | A vulnerability was found in OneNav up to 0.9.33. It has been classified as critical. This affects an unknown part of the file /index.php?c=api of the component API. The manipulation of the argument X-Token leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249765 was assigned to this vulnerability. | https://vuldb.com/?id.249765 | 2024-01-05T10:43:05.819Z | 2024-01-07T09:31:03.947Z | 2024-01-07T09:31:03.947Z | {'Vendor': 'n/a', 'Product': 'OneNav', 'Versions': '0.9.0, 0.9.1, 0.9.2, 0.9.3, 0.9.4, 0.9.5, 0.9.6, 0.9.7, 0.9.8, 0.9.9, 0.9.10, 0.9.11, 0.9.12, 0.9.13, 0.9.14, 0.9.15, 0.9.16, 0.9.17, 0.9.18, 0.9.19, 0.9.20, 0.9.21, 0.9.22, 0.9.23, 0.9.24, 0.9.25, 0.9.26, 0.9.27, 0.9.28, 0.9.29, 0.9.30, 0.9.31, 0.9.32, 0.9.33'} |
CVE-2023-7139 | A vulnerability has been found in code-projects Client Details System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/regester.php of the component HTTP POST Request Handler. The manipulation of the argument fname/lname/email/contact leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-249142 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249142 | 2023-12-28T08:22:53.866Z | 2023-12-28T22:31:04.756Z | 2023-12-28T22:31:04.756Z | {'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'} |
CVE-2023-7093 | A vulnerability classified as critical has been found in KylinSoft kylin-system-updater up to 2.0.5.16-0k2.33. Affected is an unknown function of the file /usr/share/kylin-system-updater/SystemUpdater/UpgradeStrategiesDbus.py of the component com.kylin.systemupgrade Service. The manipulation of the argument SetDownloadspeedMax leads to os command injection. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248940. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248940 | 2023-12-24T08:03:50.706Z | 2023-12-24T23:31:04.019Z | 2023-12-24T23:31:04.019Z | {'Vendor': 'KylinSoft', 'Product': 'kylin-system-updater', 'Versions': '2.0.5.16-0k2.0, 2.0.5.16-0k2.1, 2.0.5.16-0k2.2, 2.0.5.16-0k2.3, 2.0.5.16-0k2.4, 2.0.5.16-0k2.5, 2.0.5.16-0k2.6, 2.0.5.16-0k2.7, 2.0.5.16-0k2.8, 2.0.5.16-0k2.9, 2.0.5.16-0k2.10, 2.0.5.16-0k2.11, 2.0.5.16-0k2.12, 2.0.5.16-0k2.13, 2.0.5.16-0k2.14, 2.0.5.16-0k2.15, 2.0.5.16-0k2.16, 2.0.5.16-0k2.17, 2.0.5.16-0k2.18, 2.0.5.16-0k2.19, 2.0.5.16-0k2.20, 2.0.5.16-0k2.21, 2.0.5.16-0k2.22, 2.0.5.16-0k2.23, 2.0.5.16-0k2.24, 2.0.5.16-0k2.25, 2.0.5.16-0k2.26, 2.0.5.16-0k2.27, 2.0.5.16-0k2.28, 2.0.5.16-0k2.29, 2.0.5.16-0k2.30, 2.0.5.16-0k2.31, 2.0.5.16-0k2.32, 2.0.5.16-0k2.33'} |
CVE-2023-7181 | A vulnerability was found in Muyun DedeBIZ up to 6.2.12 and classified as critical. Affected by this issue is some unknown functionality of the component Add Attachment Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249368. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249368 | 2023-12-29T22:19:46.703Z | 2023-12-30T18:00:05.216Z | 2023-12-30T18:00:05.216Z | {'Vendor': 'Muyun', 'Product': 'DedeBIZ', 'Versions': '6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.2.9, 6.2.10, 6.2.11, 6.2.12'} |
CVE-2023-7180 | A vulnerability has been found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this vulnerability is an unknown functionality of the file general/project/proj/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-249367. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249367 | 2023-12-29T22:15:37.836Z | 2023-12-30T17:31:03.922Z | 2023-12-30T17:31:03.922Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-7138 | A vulnerability, which was classified as critical, was found in code-projects Client Details System 1.0. This affects an unknown part of the file /admin of the component HTTP POST Request Handler. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249141 was assigned to this vulnerability. | https://vuldb.com/?id.249141 | 2023-12-28T08:22:50.128Z | 2023-12-28T22:00:05.688Z | 2023-12-28T22:00:05.688Z | {'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'} |
CVE-2023-7092 | A vulnerability was found in Uniway UW-302VP 2.0. It has been rated as problematic. This issue affects some unknown processing of the file /boaform/wlan_basic_set.cgi of the component Admin Web Interface. The manipulation of the argument wlanssid/password leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248939. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248939 | 2023-12-24T08:00:44.926Z | 2023-12-24T23:00:05.416Z | 2023-12-24T23:00:05.416Z | {'Vendor': 'Uniway', 'Product': 'UW-302VP', 'Versions': '2.0'} |
CVE-2023-7211 | A vulnerability was found in Uniway Router 2.0. It has been declared as critical. This vulnerability affects unknown code of the component Administrative Web Interface. The manipulation leads to reliance on ip address for authentication. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-249766 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249766 | 2024-01-05T10:49:47.257Z | 2024-01-07T10:00:05.512Z | 2024-01-07T10:00:05.512Z | {'Vendor': 'Uniway', 'Product': 'Router', 'Versions': '2.0'} |
CVE-2023-7084 | The Voting Record WordPress plugin through 2.0 is missing sanitisation as well as escaping, which could allow any authenticated users, such as subscriber to perform Stored XSS attacks | https://wpscan.com/vulnerability/5e51e239-919b-4e74-a7ee-195f3817f907/ | 2023-12-22T19:02:36.893Z | 2024-01-16T15:57:03.277Z | 2024-01-16T15:57:03.277Z | {'Vendor': 'Unknown', 'Product': 'Voting Record', 'Versions': '0'} |
CVE-2023-7207 | Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames. | https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628 | 2024-01-05T00:09:37.741Z | 2024-01-05T00:39:49.690Z | 2024-01-05T00:39:49.690Z | {'Vendor': 'Debian', 'Product': 'Debian cpio', 'Versions': '0'} |
CVE-2023-7179 | A vulnerability, which was classified as critical, was found in Campcodes Online College Library System 1.0. Affected is an unknown function of the file /admin/category_row.php of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249366 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249366 | 2023-12-29T22:10:09.616Z | 2023-12-30T17:00:05.069Z | 2023-12-30T17:00:05.069Z | {'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'} |
CVE-2023-7047 |
Inadequate validation of permissions when employing remote tools and
macros via the context menu within Devolutions Remote Desktop Manager versions 2023.3.31 and
earlier permits a user to initiate a connection without proper execution
rights via the remote tools feature. This affects only SQL data sources.
| https://devolutions.net/security/advisories/DEVO-2023-0024/ | 2023-12-21T14:35:55.673Z | 2023-12-21T14:42:58.084Z | 2023-12-21T14:45:18.661Z | {'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'} |
CVE-2023-7102 | Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
| https://www.barracuda.com/company/legal/esg-vulnerability | 2023-12-24T17:32:25.423Z | 2023-12-24T21:47:20.453Z | 2023-12-26T19:23:33.832Z | {'Vendor': 'Barracuda Networks Inc.', 'Product': 'Barracuda ESG Appliance', 'Versions': '5.1.3.001'} |
CVE-2023-7155 | A vulnerability, which was classified as critical, was found in SourceCodester Free and Open Source Inventory Management System 1.0. This affects an unknown part of the file /ample/app/action/edit_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249177 was assigned to this vulnerability. | https://vuldb.com/?id.249177 | 2023-12-28T14:21:09.460Z | 2023-12-29T05:00:05.287Z | 2023-12-29T05:00:05.287Z | {'Vendor': 'SourceCodester', 'Product': 'Free and Open Source Inventory Management System', 'Versions': '1.0'} |
CVE-2023-7143 | A vulnerability was found in code-projects Client Details System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/regester.php. The manipulation of the argument fname/lname/email/contact leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249146 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249146 | 2023-12-28T08:23:16.938Z | 2023-12-29T00:31:04.703Z | 2023-12-29T00:31:04.703Z | {'Vendor': 'code-projects', 'Product': 'Client Details System', 'Versions': '1.0'} |
CVE-2023-7051 | A vulnerability was found in PHPGurukul Online Notes Sharing System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /user/manage-notes.php of the component Notes Handler. The manipulation of the argument delid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248738 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248738 | 2023-12-21T16:06:17.413Z | 2023-12-21T22:00:05.628Z | 2023-12-21T22:00:05.628Z | {'Vendor': 'PHPGurukul', 'Product': 'Online Notes Sharing System', 'Versions': '1.0'} |
CVE-2023-7114 | Mattermost version 2.10.0 and earlier fails to sanitize deeplink paths, which allows an attacker to perform CSRF attacks against the server.
| https://mattermost.com/security-updates | 2023-12-26T10:45:27.420Z | 2023-12-29T12:46:22.501Z | 2023-12-29T12:46:22.501Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 2.10.1 '} |
CVE-2023-7163 | A security issue exists in D-Link D-View 8 v2.0.2.89 and prior that could allow an attacker to manipulate the probe inventory of the D-View service. This could result in the disclosure of information from other probes, denial of service conditions due to the probe inventory becoming full, or the execution of tasks on other probes.
| https://tenable.com/security/research/tra-2023-43 | 2023-12-28T15:18:05.449Z | 2023-12-28T15:37:35.707Z | 2023-12-28T15:37:35.707Z | {'Vendor': 'D-Link', 'Product': 'D-View 8', 'Versions': '0'} |
CVE-2023-7026 | A vulnerability was found in Lightxun IPTV Gateway up to 20231208. It has been rated as problematic. This issue affects some unknown processing of the file /ZHGXTV/index.php/admin/index/web_upload_template.html. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248579. | https://vuldb.com/?id.248579 | 2023-12-20T17:50:52.833Z | 2023-12-21T04:31:04.033Z | 2023-12-21T04:31:04.033Z | {'Vendor': 'Lightxun', 'Product': 'IPTV Gateway', 'Versions': '20231208'} |
CVE-2023-7134 | A vulnerability was found in SourceCodester Medicine Tracking System 1.0. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument page leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249137 was assigned to this vulnerability. | https://vuldb.com/?id.249137 | 2023-12-28T08:05:08.534Z | 2023-12-28T20:00:05.775Z | 2023-12-28T20:00:05.775Z | {'Vendor': 'SourceCodester', 'Product': 'Medicine Tracking System', 'Versions': '1.0'} |
CVE-2023-7071 | The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table of Contents block in all versions up to, and including, 4.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f969cb24-734f-46e5-a74d-fddf8e61e096?source=cve | 2023-12-21T21:34:48.129Z | 2024-01-11T08:33:09.516Z | 2024-01-11T08:33:09.516Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'} |
CVE-2023-7175 | A vulnerability was found in Campcodes Online College Library System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/borrow_add.php of the component HTTP POST Request Handler. The manipulation of the argument student leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249362 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249362 | 2023-12-29T22:09:56.417Z | 2023-12-30T13:00:05.632Z | 2023-12-30T13:00:05.632Z | {'Vendor': 'Campcodes', 'Product': 'Online College Library System', 'Versions': '1.0'} |
CVE-2023-7227 |
SystemK NVR 504/508/516 versions 2.3.5SK.30084998 and prior are vulnerable to a command injection vulnerability in the dynamic domain name system (DDNS) settings that could allow an attacker to execute arbitrary commands with root privileges.
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-02 | 2024-01-10T16:26:09.402Z | 2024-01-25T18:21:39.427Z | 2024-01-25T18:21:39.427Z | {'Vendor': 'SystemK ', 'Product': 'NVR 504', 'Versions': '2.3.5SK.30084998'} |
CVE-2023-7159 | A vulnerability was found in gopeak MasterLab up to 3.3.10. It has been declared as critical. Affected by this vulnerability is the function add/update of the file app/ctrl/admin/User.php. The manipulation of the argument avatar leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249181 was assigned to this vulnerability. | https://vuldb.com/?id.249181 | 2023-12-28T14:39:02.258Z | 2023-12-29T07:00:05.537Z | 2023-12-29T07:00:05.537Z | {'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'} |
CVE-2023-7056 | A vulnerability classified as problematic was found in code-projects Faculty Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/pages/subjects.php. The manipulation of the argument Description/Units leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248743. | https://vuldb.com/?id.248743 | 2023-12-21T16:16:59.494Z | 2023-12-22T03:00:05.677Z | 2023-12-22T03:00:05.677Z | {'Vendor': 'code-projects', 'Product': 'Faculty Management System', 'Versions': '1.0'} |
CVE-2023-7113 | Mattermost version 8.1.6 and earlier fails to sanitize channel mention data in posts, which allows an attacker to inject markup in the web client.
| https://mattermost.com/security-updates | 2023-12-26T10:19:31.976Z | 2023-12-29T12:46:13.932Z | 2023-12-29T12:46:13.932Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.7, 9.2.0'} |
CVE-2023-7144 | A vulnerability classified as critical has been found in gopeak MasterLab up to 3.3.10. This affects the function sqlInject of the file app/ctrl/framework/Feature.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249147. | https://vuldb.com/?id.249147 | 2023-12-28T08:33:36.972Z | 2023-12-29T01:00:04.653Z | 2023-12-29T01:00:04.653Z | {'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'} |
Subsets and Splits