CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-7152 | A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.249158 | 2023-12-28T10:30:00.988Z | 2023-12-29T04:31:04.054Z | 2023-12-29T08:53:19.626Z | {'Vendor': 'n/a', 'Product': 'MicroPython', 'Versions': '1.21.0, 1.22.0-preview'} |
CVE-2023-7040 | A vulnerability classified as problematic was found in codelyfe Stupid Simple CMS up to 1.2.4. Affected by this vulnerability is an unknown functionality of the file /file-manager/rename.php. The manipulation of the argument oldName leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248689 was assigned to this vulnerability. | https://vuldb.com/?id.248689 | 2023-12-21T08:44:08.661Z | 2023-12-21T19:31:03.921Z | 2023-12-21T19:31:03.921Z | {'Vendor': 'codelyfe', 'Product': 'Stupid Simple CMS', 'Versions': '1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4'} |
CVE-2023-7105 | A vulnerability was found in code-projects E-Commerce Website 1.0. It has been classified as critical. Affected is an unknown function of the file index_search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249000. | https://vuldb.com/?id.249000 | 2023-12-25T14:10:04.776Z | 2023-12-25T22:31:04.133Z | 2023-12-25T22:31:04.133Z | {'Vendor': 'code-projects', 'Product': 'E-Commerce Website', 'Versions': '1.0'} |
CVE-2023-7191 | A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249393 | 2023-12-30T16:50:57.706Z | 2023-12-31T16:00:05.206Z | 2023-12-31T16:00:05.206Z | {'Vendor': 'n/a', 'Product': 'S-CMS', 'Versions': '2.0_build20220529-20231006'} |
CVE-2023-7083 | The Voting Record WordPress plugin through 2.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack | https://wpscan.com/vulnerability/ba77704a-32a1-494b-b2c0-e1c2a3f98adc/ | 2023-12-22T18:38:47.147Z | 2024-01-16T15:57:04.021Z | 2024-01-16T15:57:04.021Z | {'Vendor': 'Unknown', 'Product': 'Voting Record', 'Versions': '0'} |
CVE-2023-7129 | A vulnerability, which was classified as critical, was found in code-projects Voting System 1.0. Affected is an unknown function of the component Voters Login. The manipulation of the argument voter leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249132. | https://vuldb.com/?id.249132 | 2023-12-28T07:51:58.181Z | 2023-12-28T15:31:04.690Z | 2023-12-28T15:31:04.690Z | {'Vendor': 'code-projects', 'Product': 'Voting System', 'Versions': '1.0'} |
CVE-2023-7095 | A vulnerability, which was classified as critical, has been found in Totolink A7100RU 7.4cu.2313_B20191024. Affected by this issue is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248942 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248942 | 2023-12-24T08:10:53.292Z | 2023-12-25T00:31:04.022Z | 2023-12-25T00:31:04.022Z | {'Vendor': 'Totolink', 'Product': 'A7100RU', 'Versions': '7.4cu.2313_B20191024'} |
CVE-2023-7187 | A vulnerability was found in Totolink N350RT 9.3.5u.6139_B20201216. It has been rated as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi?action=login&flag=ie8 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The exploit has been disclosed to the public and may be used. The identifier VDB-249389 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249389 | 2023-12-30T16:42:04.960Z | 2023-12-31T14:00:04.569Z | 2023-12-31T14:00:04.569Z | {'Vendor': 'Totolink', 'Product': 'N350RT', 'Versions': '9.3.5u.6139_B20201216'} |
CVE-2023-7148 | A vulnerability has been found in ShifuML shifu 0.12.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file src/main/java/ml/shifu/shifu/core/DataPurifier.java of the component Java Expression Language Handler. The manipulation of the argument FilterExpression leads to code injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249151. | https://vuldb.com/?id.249151 | 2023-12-28T08:47:47.371Z | 2023-12-29T03:00:06.142Z | 2023-12-29T03:00:06.142Z | {'Vendor': 'ShifuML', 'Product': 'shifu', 'Versions': '0.12.0'} |
CVE-2023-7109 | A vulnerability classified as critical was found in code-projects Library Management System 2.0. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249004. | https://vuldb.com/?id.249004 | 2023-12-25T14:16:16.682Z | 2023-12-26T01:31:04.249Z | 2023-12-26T01:31:04.249Z | {'Vendor': 'code-projects', 'Product': 'Library Management System', 'Versions': '2.0'} |
CVE-2023-7220 | A vulnerability was found in Totolink NR1800X 9.1.0u.6279_B20210910 and classified as critical. Affected by this issue is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249854 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249854 | 2024-01-07T08:40:43.824Z | 2024-01-09T07:31:03.195Z | 2024-01-09T07:31:03.195Z | {'Vendor': 'Totolink', 'Product': 'NR1800X', 'Versions': '9.1.0u.6279_B20210910'} |
CVE-2023-7172 | A vulnerability, which was classified as critical, has been found in PHPGurukul Hospital Management System 1.0. Affected by this issue is some unknown functionality of the component Admin Dashboard. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249356. | https://vuldb.com/?id.249356 | 2023-12-29T19:46:30.464Z | 2023-12-30T09:00:06.365Z | 2024-01-02T09:17:22.501Z | {'Vendor': 'PHPGurukul', 'Product': 'Hospital Management System', 'Versions': '1.0'} |
CVE-2023-7037 | A vulnerability was found in automad up to 1.10.9. It has been declared as critical. This vulnerability affects the function import of the file FileController.php. The manipulation of the argument importUrl leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-248686 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248686 | 2023-12-21T08:18:59.376Z | 2023-12-21T17:00:05.727Z | 2023-12-21T17:00:05.727Z | {'Vendor': 'n/a', 'Product': 'automad', 'Versions': '1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9'} |
CVE-2023-7125 | The Community by PeepSo WordPress plugin before 6.3.1.2 does not have CSRF check when creating a user post (visible on their wall in their profile page), which could allow attackers to make logged in users perform such action via a CSRF attack | https://wpscan.com/vulnerability/cac12b64-ed25-4ee2-933f-8ff722605271/ | 2023-12-28T03:27:53.922Z | 2024-01-16T15:57:04.740Z | 2024-01-16T15:57:04.740Z | {'Vendor': 'Unknown', 'Product': 'Community by PeepSo', 'Versions': '0'} |
CVE-2023-7099 | A vulnerability, which was classified as critical, has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This issue affects some unknown processing of the file bwdates-report-result.php. The manipulation of the argument fromdate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248951. | https://vuldb.com/?id.248951 | 2023-12-24T11:12:45.328Z | 2023-12-25T02:31:04.313Z | 2023-12-25T02:31:04.313Z | {'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'} |
CVE-2023-7133 | A vulnerability was found in y_project RuoYi 4.7.8. It has been declared as problematic. This vulnerability affects unknown code of the file /login of the component HTTP POST Request Handler. The manipulation of the argument rememberMe with the input falsen3f0m<script>alert(1)</script>p86o0 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249136. | https://vuldb.com/?id.249136 | 2023-12-28T08:02:50.482Z | 2023-12-28T17:31:04.010Z | 2023-12-28T17:31:04.010Z | {'Vendor': 'y_project', 'Product': 'RuoYi', 'Versions': '4.7.8'} |
CVE-2023-7076 | A vulnerability was found in slawkens MyAAC up to 0.8.13. It has been declared as problematic. This vulnerability affects unknown code of the file system/pages/bugtracker.php. The manipulation of the argument bug[2]['subject']/bug[2]['text']/report['subject'] leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.8.14 is able to address this issue. The name of the patch is 83a91ec540072d319dd338abff45f8d5ebf48190. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248848. | https://vuldb.com/?id.248848 | 2023-12-22T06:47:53.750Z | 2023-12-22T14:00:05.523Z | 2023-12-22T14:00:05.523Z | {'Vendor': 'slawkens', 'Product': 'MyAAC', 'Versions': '0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 0.8.7, 0.8.8, 0.8.9, 0.8.10, 0.8.11, 0.8.12, 0.8.13'} |
CVE-2023-7021 | A vulnerability was found in Tongda OA 2017 up to 11.9. It has been classified as critical. Affected is an unknown function of the file general/vehicle/checkup/delete_search.php. The manipulation of the argument VU_ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248568. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248568 | 2023-12-20T17:01:12.166Z | 2023-12-21T00:31:04.571Z | 2023-12-21T00:31:04.571Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-7020 | A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. This issue affects some unknown processing of the file general/wiki/cp/ct/view.php. The manipulation of the argument TEMP_ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248567. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248567 | 2023-12-20T17:01:07.604Z | 2023-12-21T00:00:07.183Z | 2023-12-21T00:00:07.183Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-7098 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in icret EasyImages 2.8.3. This vulnerability affects unknown code of the file app/hide.php. The manipulation of the argument key leads to path traversal: '../filedir'. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-248950 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | https://vuldb.com/?id.248950 | 2023-12-24T11:07:19.480Z | 2023-12-25T02:00:05.851Z | 2023-12-25T02:00:05.851Z | {'Vendor': 'icret', 'Product': 'EasyImages', 'Versions': '2.8.3'} |
CVE-2023-7132 | A vulnerability was found in code-projects Intern Membership Management System 2.0. It has been classified as problematic. This affects an unknown part of the file /user_registration/ of the component User Registration. The manipulation of the argument userName/firstName/lastName/userEmail with the input "><ScRiPt>confirm(document.domain)</ScRiPt>h0la leads to cross site scripting. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249135. | https://vuldb.com/?id.249135 | 2023-12-28T07:54:50.761Z | 2023-12-28T17:00:06.478Z | 2023-12-28T17:00:06.478Z | {'Vendor': 'code-projects', 'Product': 'Intern Membership Management System', 'Versions': '2.0'} |
CVE-2023-7124 | A vulnerability, which was classified as problematic, was found in code-projects E-Commerce Site 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument keyword with the input <video/src=x onerror=alert(document.cookie)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249096. | https://vuldb.com/?id.249096 | 2023-12-27T18:00:16.908Z | 2023-12-28T02:31:04.389Z | 2023-12-28T02:31:04.389Z | {'Vendor': 'code-projects', 'Product': 'E-Commerce Site', 'Versions': '1.0'} |
CVE-2023-7173 | A vulnerability, which was classified as problematic, was found in PHPGurukul Hospital Management System 1.0. This affects an unknown part of the file registration.php. The manipulation of the argument First Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249357 was assigned to this vulnerability. | https://vuldb.com/?id.249357 | 2023-12-29T19:46:32.845Z | 2023-12-30T11:31:03.918Z | 2024-01-02T09:19:25.917Z | {'Vendor': 'PHPGurukul', 'Product': 'Hospital Management System', 'Versions': '1.0'} |
CVE-2023-7036 | A vulnerability was found in automad up to 1.10.9. It has been classified as problematic. This affects the function upload of the file FileCollectionController.php of the component Content Type Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248685 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248685 | 2023-12-21T08:18:57.395Z | 2023-12-21T16:00:04.741Z | 2023-12-21T16:00:04.741Z | {'Vendor': 'n/a', 'Product': 'automad', 'Versions': '1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9'} |
CVE-2023-7221 | A vulnerability was found in Totolink T6 4.1.9cu.5241_B20210923. It has been classified as critical. This affects the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument v41 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249855. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249855 | 2024-01-07T08:47:04.000Z | 2024-01-09T14:00:05.614Z | 2024-01-09T14:00:05.614Z | {'Vendor': 'Totolink', 'Product': 'T6', 'Versions': '4.1.9cu.5241_B20210923'} |
CVE-2023-7108 | A vulnerability classified as problematic has been found in code-projects E-Commerce Website 1.0. This affects an unknown part of the file user_signup.php. The manipulation of the argument firstname with the input <video/src=x onerror=alert(document.domain)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249003. | https://vuldb.com/?id.249003 | 2023-12-25T14:10:13.406Z | 2023-12-26T00:00:07.088Z | 2023-12-26T00:00:07.088Z | {'Vendor': 'code-projects', 'Product': 'E-Commerce Website', 'Versions': '1.0'} |
CVE-2023-7149 | A vulnerability was found in code-projects QR Code Generator 1.0. It has been classified as problematic. This affects an unknown part of the file /download.php?file=author.png. The manipulation of the argument file with the input "><iMg src=N onerror=alert(document.domain)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249153 was assigned to this vulnerability. | https://vuldb.com/?id.249153 | 2023-12-28T08:53:11.275Z | 2023-12-29T03:31:04.689Z | 2023-12-29T03:31:04.689Z | {'Vendor': 'code-projects', 'Product': 'QR Code Generator', 'Versions': '1.0'} |
CVE-2023-7237 |
Lantronix XPort sends weakly encoded credentials within web request headers.
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-05 | 2024-01-19T20:42:14.336Z | 2024-01-23T21:46:38.832Z | 2024-01-23T21:46:38.832Z | {'Vendor': 'Lantronix', 'Product': 'XPort', 'Versions': '2.0.0.13'} |
CVE-2023-7186 | A vulnerability was found in 7-card Fakabao up to 1.0_build20230805. It has been declared as critical. This vulnerability affects unknown code of the file member/notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249388 | 2023-12-30T16:38:46.320Z | 2023-12-31T13:00:04.987Z | 2023-12-31T13:00:04.987Z | {'Vendor': '7-card', 'Product': 'Fakabao', 'Versions': '1.0_build20230805'} |
CVE-2023-7094 | A vulnerability classified as problematic was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected by this vulnerability is an unknown functionality of the file /protocol/nsasg6.0.tgz. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248941 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248941 | 2023-12-24T08:06:38.813Z | 2023-12-25T00:00:06.687Z | 2023-12-25T00:00:06.687Z | {'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'} |
CVE-2023-7082 | The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution. | https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/ | 2023-12-22T16:03:38.577Z | 2024-01-22T19:14:29.189Z | 2024-01-22T19:14:29.189Z | {'Vendor': 'Unknown', 'Product': 'Import any XML or CSV File to WordPress', 'Versions': '0'} |
CVE-2023-7128 | A vulnerability, which was classified as critical, has been found in code-projects Voting System 1.0. This issue affects some unknown processing of the file /admin/ of the component Admin Login. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249131. | https://vuldb.com/?id.249131 | 2023-12-28T07:51:56.245Z | 2023-12-28T15:00:06.338Z | 2023-12-28T15:00:06.338Z | {'Vendor': 'code-projects', 'Product': 'Voting System', 'Versions': '1.0'} |
CVE-2023-7190 | A vulnerability, which was classified as critical, has been found in S-CMS up to 2.0_build20220529-20231006. Affected by this issue is some unknown functionality of the file /member/ad.php?action=ad. The manipulation of the argument A_text/A_url/A_contact leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249392. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.249392 | 2023-12-30T16:50:50.253Z | 2023-12-31T15:31:03.358Z | 2023-12-31T15:31:03.358Z | {'Vendor': 'n/a', 'Product': 'S-CMS', 'Versions': '2.0_build20220529-20231006'} |
CVE-2023-7041 | A vulnerability, which was classified as critical, has been found in codelyfe Stupid Simple CMS up to 1.2.4. Affected by this issue is some unknown functionality of the file /file-manager/rename.php. The manipulation of the argument newName leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248690 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248690 | 2023-12-21T08:44:11.025Z | 2023-12-21T20:00:06.529Z | 2023-12-21T20:00:06.529Z | {'Vendor': 'codelyfe', 'Product': 'Stupid Simple CMS', 'Versions': '1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4'} |
CVE-2023-7104 | A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. | https://vuldb.com/?id.248999 | 2023-12-25T14:00:48.991Z | 2023-12-25T21:00:05.997Z | 2023-12-29T09:44:27.826Z | {'Vendor': 'SQLite', 'Product': 'SQLite3', 'Versions': '3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 3.15, 3.16, 3.17, 3.18, 3.19, 3.20, 3.21, 3.22, 3.23, 3.24, 3.25, 3.26, 3.27, 3.28, 3.29, 3.30, 3.31, 3.32, 3.33, 3.34, 3.35, 3.36, 3.37, 3.38, 3.39, 3.40, 3.41, 3.42, 3.43'} |
CVE-2023-7153 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Macroturk Software and Internet Technologies Macro-Bel allows Reflected XSS.This issue affects Macro-Bel: before V.1.0.1.
| https://www.usom.gov.tr/bildirim/tr-24-0041 | 2023-12-28T12:48:36.378Z | 2024-01-18T14:38:14.808Z | 2024-01-18T14:38:14.808Z | {'Vendor': 'Macroturk Software and Internet Technologies', 'Product': 'Macro-Bel', 'Versions': '0'} |
CVE-2023-7145 | A vulnerability classified as critical was found in gopeak MasterLab up to 3.3.10. This vulnerability affects the function sqlInject of the file app/ctrl/Framework.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249148. | https://vuldb.com/?id.249148 | 2023-12-28T08:33:38.996Z | 2023-12-29T01:31:04.615Z | 2023-12-29T01:31:04.615Z | {'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'} |
CVE-2023-7057 | A vulnerability, which was classified as problematic, has been found in code-projects Faculty Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/pages/yearlevel.php. The manipulation of the argument Year Level/Section leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248744. | https://vuldb.com/?id.248744 | 2023-12-21T16:17:01.742Z | 2023-12-22T03:31:04.595Z | 2023-12-22T03:31:04.595Z | {'Vendor': 'code-projects', 'Product': 'Faculty Management System', 'Versions': '1.0'} |
CVE-2023-3596 |
Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010 | 2023-07-10T15:34:53.790Z | 2023-07-12T12:51:19.498Z | 2023-07-12T13:16:21.672Z | {'Vendor': 'Rockwell Automation', 'Product': '1756-EN4TR Series A', 'Versions': '<=5.001'} |
CVE-2023-3129 | The URL Shortify WordPress plugin before 1.7.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/5717d729-c24b-4415-bb99-fcdd259328c4 | 2023-06-06T18:17:39.349Z | 2023-07-10T12:40:04.686Z | 2023-07-10T13:05:39.918Z | {'Vendor': 'Unknown', 'Product': 'URL Shortify', 'Versions': '0'} |
CVE-2023-3579 | A vulnerability, which was classified as problematic, has been found in HadSky 7.11.8. Affected by this issue is some unknown functionality of the component User Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233372. | https://vuldb.com/?id.233372 | 2023-07-10T10:56:22.596Z | 2023-07-10T11:31:03.159Z | 2023-10-23T14:46:53.035Z | {'Vendor': 'n/a', 'Product': 'HadSky', 'Versions': '7.11.8'} |
CVE-2023-3083 | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab | 2023-06-03T00:00:00 | 2023-06-03T00:00:00 | 2023-06-03T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3980 | Cross-site Scripting (XSS) - Stored in GitHub repository omeka/omeka-s prior to 4.0.2. | https://huntr.dev/bounties/6eb3cb9a-5c78-451f-ae76-0b1e62fe5e54 | 2023-07-27T18:26:07.642Z | 2023-07-27T18:26:20.420Z | 2023-07-27T18:26:20.420Z | {'Vendor': 'omeka', 'Product': 'omeka/omeka-s', 'Versions': 'unspecified'} |
CVE-2023-3650 | The Bubble Menu WordPress plugin before 3.0.5 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). | https://wpscan.com/vulnerability/0a0ecdff-c961-4947-bf7e-bd2392501e33 | 2023-07-13T03:34:14.960Z | 2023-08-07T14:31:19.068Z | 2023-08-07T14:31:19.068Z | {'Vendor': 'Unknown', 'Product': 'Bubble Menu', 'Versions': '0'} |
CVE-2023-3200 | The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_new_order_message function. This makes it possible for unauthenticated attackers to update new order message via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/78f3c503-e255-44d2-8432-48dc2c5f553d?source=cve | 2023-06-12T13:58:58.631Z | 2023-06-14T01:47:49.257Z | 2023-06-14T01:47:49.257Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-3345 | The LMS by Masteriyo WordPress plugin before 1.6.8 does not properly safeguards sensitive user information, like other user's email addresses, making it possible for any students to leak them via some of the plugin's REST API endpoints. | https://wpscan.com/vulnerability/0d07423e-98d2-43a3-824d-562747a3d65a | 2023-06-20T19:06:59.169Z | 2023-07-31T09:37:36.423Z | 2023-07-31T09:37:36.423Z | {'Vendor': 'Unknown', 'Product': 'LMS by Masteriyo', 'Versions': '0'} |
CVE-2023-3191 | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | https://huntr.dev/bounties/19fed157-128d-4bfb-a30e-eadf748cbd1a | 2023-06-10T00:00:00 | 2023-06-10T00:00:00 | 2023-06-10T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3892 | Improper Restriction of XML External Entity Reference vulnerability in MIM Assistant and Client DICOM RTst Loading modules allows XML Entity Linking / XML External Entities Blowup.
In order to take advantage of this vulnerability, an attacker must
craft a malicious XML document, embed this document into specific 3rd
party private RTst metadata tags, transfer the now compromised
DICOM object to MIM, and force MIM to archive and load the data.
Users on either version are strongly encouraged to update to an unaffected version (7.2.11+, 7.3.4+).
This issue was found and analyzed by MIM Software's internal security team. We are unaware of any proof of concept or actual exploit available in the wild.
For more information, visit https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892
This issue affects MIM Assistant: 7.2.10, 7.3.3; MIM Client: 7.2.10, 7.3.3.
| https://www.mimsoftware.com/cve-2023-3892 | 2023-07-24T18:19:08.803Z | 2023-09-19T14:54:12.524Z | 2023-09-19T14:54:12.524Z | {'Vendor': 'MIM Software', 'Product': 'MIM Assistant', 'Versions': '7.2.10, 7.3.3'} |
CVE-2023-3484 | An issue has been discovered in GitLab EE affecting all versions starting from 12.8 before 15.11.11, all versions starting from 16.0 before 16.0.7, all versions starting from 16.1 before 16.1.2. An attacker could change the name or path of a public top-level group in certain situations. | https://gitlab.com/gitlab-org/gitlab/-/issues/416773 | 2023-06-30T17:18:21.746Z | 2023-07-21T13:01:03.770Z | 2023-07-21T13:01:03.770Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.8, 16.0, 16.1'} |
CVE-2023-3607 | A vulnerability was found in kodbox 1.26. It has been declared as critical. This vulnerability affects the function Execute of the file webconsole.php.txt of the component WebConsole Plug-In. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233476. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233476 | 2023-07-10T19:44:59.934Z | 2023-07-10T21:00:05.507Z | 2023-10-23T14:51:45.825Z | {'Vendor': 'n/a', 'Product': 'kodbox', 'Versions': '1.26'} |
CVE-2023-3312 | A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service. | https://patchwork.kernel.org/project/linux-pm/patch/20230323174026.950622-1-krzysztof.kozlowski%40linaro.org/ | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to 6.4-rc1'} |
CVE-2023-3742 | Insufficient policy enforcement in ADB in Google Chrome on ChromeOS prior to 114.0.5735.90 allowed a local attacker to bypass device policy restrictions via physical access to the device. (Chromium security severity: High) | https://bugs.chromium.org/p/chromium/issues/detail?id=1443292 | 2023-07-18T01:00:47.286Z | 2023-12-20T15:30:14.710Z | 2023-12-20T15:30:14.710Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-3884 | A vulnerability has been found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/edit_product.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235246 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235246 | 2023-07-24T16:52:34.355Z | 2023-07-25T06:00:04.974Z | 2023-10-24T07:13:22.287Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3187 | A vulnerability, which was classified as critical, has been found in PHPGurukul Teachers Record Management System 1.0. Affected by this issue is some unknown functionality of the file /changeimage.php of the component Profile Picture Handler. The manipulation of the argument newpic leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231176. | https://vuldb.com/?id.231176 | 2023-06-09T20:34:57.427Z | 2023-06-09T21:00:04.486Z | 2023-10-23T13:03:55.209Z | {'Vendor': 'PHPGurukul', 'Product': 'Teachers Record Management System', 'Versions': '1.0'} |
CVE-2023-3168 | The WP Reroute Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.4.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0e962b-b6a0-4179-91d0-5ede508a9895?source=cve | 2023-06-08T18:36:48.024Z | 2023-07-12T04:38:44.748Z | 2023-07-12T04:38:44.748Z | {'Vendor': 'msh134', 'Product': 'WP Reroute Email', 'Versions': '*'} |
CVE-2023-3492 | The WP Shopping Pages WordPress plugin through 1.14 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | https://wpscan.com/vulnerability/01b9b1c2-439e-44df-bf01-026cb13d7d40 | 2023-06-30T21:14:26.517Z | 2023-08-07T14:31:19.856Z | 2023-08-07T14:31:19.856Z | {'Vendor': 'Unknown', 'Product': 'WP Shopping Pages', 'Versions': '0'} |
CVE-2023-3538 | A vulnerability classified as problematic was found in SimplePHPscripts Photo Gallery PHP 2.0. This vulnerability affects unknown code of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-233290 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.233290 | 2023-07-07T11:59:18.682Z | 2023-07-07T14:00:04.620Z | 2023-10-23T14:14:42.303Z | {'Vendor': 'SimplePHPscripts', 'Product': 'Photo Gallery PHP', 'Versions': '2.0'} |
CVE-2023-3611 | An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.
The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.
We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64 | 2023-07-10T20:52:55.365Z | 2023-07-21T20:49:10.812Z | 2023-07-22T09:43:12.163Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '3.8'} |
CVE-2023-3241 | A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of the argument url leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231512. | https://vuldb.com/?id.231512 | 2023-06-14T06:12:47.461Z | 2023-06-14T09:00:03.857Z | 2023-10-23T13:21:00.110Z | {'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'} |
CVE-2023-3754 | A vulnerability, which was classified as problematic, was found in Creativeitem Ekushey Project Manager CRM 5.0. Affected is an unknown function of the file /index.php/client/message/message_read/xxxxxxxx[random-msg-hash]. The manipulation of the argument message leads to cross site scripting. It is possible to launch the attack remotely. VDB-234426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234426 | 2023-07-18T16:33:53.860Z | 2023-07-19T03:00:05.454Z | 2023-10-23T15:38:07.996Z | {'Vendor': 'Creativeitem', 'Product': 'Ekushey Project Manager CRM', 'Versions': '5.0'} |
CVE-2023-3304 | Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9. | https://huntr.dev/bounties/721fae61-3c8c-4e4b-8407-64321bc0ed17 | 2023-06-18T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'} |
CVE-2023-3580 | Improper Handling of Additional Special Element in GitHub repository squidex/squidex prior to 7.4.0. | https://huntr.dev/bounties/4eed53ca-06c2-43aa-aea8-c03ea5f13ce4 | 2023-07-10T11:38:10.402Z | 2023-07-10T11:38:22.090Z | 2023-07-10T11:38:22.090Z | {'Vendor': 'squidex', 'Product': 'squidex/squidex', 'Versions': 'unspecified'} |
CVE-2023-3979 | An issue has been discovered in GitLab affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with you on your branch get permission to write to the merge request’s source branch. | https://gitlab.com/gitlab-org/gitlab/-/issues/419972 | 2023-07-27T18:01:01.568Z | 2023-09-29T06:02:06.310Z | 2023-09-29T06:02:06.310Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.6, 16.3, 16.4'} |
CVE-2023-3996 | The ARMember Lite - Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.0.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c1022ac4-869e-415a-a7c8-3650421608ea?source=cve | 2023-07-28T14:08:18.410Z | 2023-10-20T07:29:30.155Z | 2023-10-20T07:29:30.155Z | {'Vendor': 'reputeinfosystems', 'Product': 'ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup', 'Versions': '*'} |
CVE-2023-3095 | Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4 | 2023-06-04T00:00:00 | 2023-06-04T00:00:00 | 2023-06-04T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3216 | Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html | 2023-06-13T00:12:15.493Z | 2023-06-13T17:51:08.949Z | 2023-06-13T17:51:08.949Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'} |
CVE-2023-3646 | On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.
| https://www.arista.com/en/support/advisories-notices/security-advisory/18042-security-advisory-0088 | 2023-07-12T17:53:27.986Z | 2023-08-29T16:31:57.668Z | 2023-08-29T16:31:57.668Z | {'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.28.2F, 4.29.0'} |
CVE-2023-3703 |
Proscend Advice ICR Series routers FW version 1.76 - CWE-1392: Use of Default Credentials | https://www.gov.il/en/Departments/faq/cve_advisories | 2023-07-17T09:45:14.295Z | 2023-09-03T14:19:26.169Z | 2023-09-03T14:19:26.169Z | {'Vendor': 'Proscend Advice', 'Product': 'ICR Series routers FW', 'Versions': 'version 1.76'} |
CVE-2023-3847 | A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-235198 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | https://vuldb.com/?id.235198 | 2023-07-22T13:57:34.647Z | 2023-07-23T07:31:03.861Z | 2023-10-24T06:39:12.219Z | {'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'} |
CVE-2023-3514 | Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and calling "AddModule" or "UninstallModules" command to execute arbitrary executable file.
| https://starlabs.sg/advisories/23/23-3514/ | 2023-07-05T08:39:06.564Z | 2023-07-14T04:53:31.771Z | 2023-07-14T04:53:31.771Z | {'Vendor': 'Razer', 'Product': 'Razer Central', 'Versions': '0'} |
CVE-2023-3144 | A vulnerability classified as problematic was found in SourceCodester Online Discussion Forum Site 1.0. Affected by this vulnerability is an unknown functionality of the file admin\posts\manage_post.php. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231013 was assigned to this vulnerability. | https://vuldb.com/?id.231013 | 2023-06-07T13:55:41.835Z | 2023-06-07T15:00:04.657Z | 2023-10-23T12:45:35.735Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3451 | null | null | 2023-06-28T17:42:02.786Z | null | 2023-07-26T22:55:02.316Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3001 |
A CWE-502: Deserialization of Untrusted Data vulnerability exists in the Dashboard module that
could cause an interpretation of malicious payload data, potentially leading to remote code
execution when an attacker gets the user to open a malicious file.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-164-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-164-02.pdf | 2023-05-31T06:57:45.859Z | 2023-06-14T07:40:16.412Z | 2023-06-14T07:40:16.412Z | {'Vendor': 'Schneider Electric', 'Product': 'IGSS Dashboard (DashBoard.exe)', 'Versions': 'v16.0.0.23130 and prior'} |
CVE-2023-3328 | The Custom Field For WP Job Manager WordPress plugin before 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/d8b76875-cf7f-43a9-b88b-d8aefefab131 | 2023-06-19T17:33:32.161Z | 2023-08-14T19:10:22.342Z | 2024-01-16T15:53:59.825Z | {'Vendor': 'Unknown', 'Product': 'Custom Field For WP Job Manager', 'Versions': '0'} |
CVE-2023-3282 | A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system enables a local attacker to execute programs with elevated privileges if the attacker has shell access to the engine. | https://security.paloaltonetworks.com/CVE-2023-3282 | 2023-06-15T23:55:45.258Z | 2023-11-08T17:22:58.976Z | 2023-11-08T17:22:58.976Z | {'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XSOAR', 'Versions': '6.10, 6.11, 6.12, 8'} |
CVE-2023-3797 | A vulnerability, which was classified as critical, was found in Gen Technology Four Mountain Torrent Disaster Prevention and Control of Monitoring and Early Warning System up to 20230712. This affects an unknown part of the file /Duty/AjaxHandle/UploadFloodPlanFileUpdate.ashx. The manipulation of the argument Filedata leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The identifier VDB-235065 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235065 | 2023-07-20T08:07:28.038Z | 2023-07-20T21:31:03.877Z | 2023-10-23T18:40:57.944Z | {'Vendor': 'Gen Technology', 'Product': 'Four Mountain Torrent Disaster Prevention and Control of Monitoring and Early Warning System', 'Versions': '20230712'} |
CVE-2023-3113 | An unauthenticated XML external entity injection (XXE) vulnerability exists in LXCA's Common Information Model (CIM) server that could result in read-only access to specific files. | https://support.lenovo.com/us/en/product_security/LEN-98715 | 2023-06-05T19:17:02.529Z | 2023-06-26T19:44:58.093Z | 2023-06-26T19:44:58.093Z | {'Vendor': 'Lenovo', 'Product': 'Lenovo XClarity Administrator', 'Versions': 'Versions prior to 4.0'} |
CVE-2023-3543 | A vulnerability was found in GZ Scripts Availability Booking Calendar PHP 1.8. It has been classified as problematic. This affects an unknown part of the file load.php of the component HTTP POST Request Handler. The manipulation of the argument cid/first_name/second_name/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233295. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233295 | 2023-07-07T12:13:37.340Z | 2023-07-07T16:31:03.363Z | 2023-10-23T14:20:48.802Z | {'Vendor': 'GZ Scripts', 'Product': 'Availability Booking Calendar PHP', 'Versions': '1.8'} |
CVE-2023-3810 | A vulnerability was found in Hospital Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file patientappointment.php. The manipulation of the argument loginid/password/mobileno/appointmentdate/appointmenttime/patiente/dob/doct/city leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235078 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235078 | 2023-07-20T08:44:16.580Z | 2023-07-21T04:00:05.955Z | 2023-10-24T06:09:55.839Z | {'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'} |
CVE-2023-3955 | A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes.
| https://github.com/kubernetes/kubernetes/issues/119595 | 2023-07-26T13:51:11.192Z | 2023-10-31T20:36:54.352Z | 2023-10-31T20:36:54.352Z | {'Vendor': 'Kubernetes', 'Product': 'kubelet', 'Versions': 'v1.28.0, v1.27.0, v1.26.0, v1.25.0, v1.28.1, v1.27.5, v1.26.8, v1.25.13, v1.24.17, 0'} |
CVE-2023-3056 | A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230542 | 2023-06-02T11:27:19.579Z | 2023-06-02T12:00:04.473Z | 2023-10-23T07:45:06.073Z | {'Vendor': 'n/a', 'Product': 'YFCMF', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4'} |
CVE-2023-3406 | Path Traversal issue in M-Files Classic Web versions below 23.6.12695.3 and LTS Service Release Versions before 23.2 LTS SR3 allows authenticated user to read some restricted files on the web server | https://www.m-files.com/about/trust-center/security-advisories/cve-2023-3406 | 2023-06-26T13:29:10.505Z | 2023-08-25T08:11:46.246Z | 2023-08-25T08:11:46.246Z | {'Vendor': 'M-Files', 'Product': 'M-Files Web', 'Versions': '0, 23.2.12340.14'} |
CVE-2023-3685 | A vulnerability was found in Nesote Inout Search Engine AI Edition 1.1. It has been classified as problematic. This affects an unknown part of the file /index.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234231. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234231 | 2023-07-15T16:16:23.152Z | 2023-07-16T11:00:04.669Z | 2023-10-23T15:22:16.242Z | {'Vendor': 'Nesote', 'Product': 'Inout Search Engine AI Edition', 'Versions': '1.1'} |
CVE-2023-3390 | A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.
Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.
We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97. | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 | 2023-06-23T13:45:16.519Z | 2023-06-28T20:02:07.389Z | 2023-06-28T20:02:07.389Z | {'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '3.16'} |
CVE-2023-3806 | A vulnerability, which was classified as critical, was found in SourceCodester House Rental and Property Listing System 1.0. Affected is an unknown function of the file btn_functions.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-235074 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235074 | 2023-07-20T08:35:45.767Z | 2023-07-21T02:00:05.253Z | 2023-10-24T06:05:03.156Z | {'Vendor': 'SourceCodester', 'Product': 'House Rental and Property Listing System', 'Versions': '1.0'} |
CVE-2023-3555 | A vulnerability was found in GZ Scripts PHP Vacation Rental Script 1.8. It has been classified as problematic. This affects an unknown part of the file /preview.php. The manipulation of the argument page/layout/sort_by/property_id leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-233349 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233349 | 2023-07-08T11:49:47.692Z | 2023-07-08T12:31:03.435Z | 2023-10-23T14:24:28.852Z | {'Vendor': 'GZ Scripts', 'Product': 'PHP Vacation Rental Script', 'Versions': '1.8'} |
CVE-2023-3105 | The LearnDash LMS plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.6.0. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for attackers with with existing account access at any level, to change user passwords and potentially take over administrator accounts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/2318b3e1-268d-45fa-83bf-c6e88f1b9013?source=cve | 2023-06-05T12:36:42.991Z | 2023-07-12T04:38:43.102Z | 2023-07-12T04:38:43.102Z | {'Vendor': 'n/a', 'Product': 'LearnDash LMS', 'Versions': '*'} |
CVE-2023-3040 | A debug function in the lua-resty-json package, up to commit id 3ef9492bd3a44d9e51301d6adc3cd1789c8f534a (merged in PR #14) contained an out of bounds access bug that could have allowed an attacker to launch a DoS if the function was used to parse untrusted input data. It is important to note that because this debug function was only used in tests and demos, it was not exploitable in a normal environment.
| https://github.com/cloudflare/lua-resty-json/pull/14 | 2023-06-01T15:55:07.745Z | 2023-06-14T11:54:51.131Z | 2023-06-14T11:55:19.181Z | {'Vendor': 'Cloudflare', 'Product': 'lua-resty-json', 'Versions': '1'} |
CVE-2023-3369 | The About Me 3000 widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/be6f660f-041a-42f2-ab5b-72aedf75727d?source=cve | 2023-06-22T12:18:32.600Z | 2023-07-12T04:38:48.300Z | 2023-07-12T04:38:48.300Z | {'Vendor': 'd3wp', 'Product': 'About Me 3000 widget', 'Versions': '*'} |
CVE-2023-3693 | A vulnerability classified as critical was found in SourceCodester Life Insurance Management System 1.0. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234244. | https://vuldb.com/?id.234244 | 2023-07-16T06:55:11.247Z | 2023-07-16T21:31:03.045Z | 2023-10-23T15:30:48.702Z | {'Vendor': 'SourceCodester', 'Product': 'Life Insurance Management System', 'Versions': '1.0'} |
CVE-2023-3739 | Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html | 2023-07-18T00:34:21.735Z | 2023-08-01T22:39:18.614Z | 2023-08-04T19:10:34.277Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.131'} |
CVE-2023-3386 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 Camera Trap Tracking System allows SQL Injection.This issue affects Camera Trap Tracking System: before 3.1905.
| https://www.usom.gov.tr/bildirim/tr-23-0444 | 2023-06-23T11:15:40.107Z | 2023-08-08T15:11:32.519Z | 2023-08-08T15:20:15.739Z | {'Vendor': 'a2', 'Product': 'Camera Trap Tracking System', 'Versions': '0'} |
CVE-2023-3152 | A vulnerability classified as critical has been found in SourceCodester Online Discussion Forum Site 1.0. This affects an unknown part of the file admin\posts\view_post.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231021 was assigned to this vulnerability. | https://vuldb.com/?id.231021 | 2023-06-07T13:56:37.876Z | 2023-06-07T18:00:04.528Z | 2023-10-23T12:55:21.697Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3502 | A vulnerability, which was classified as critical, was found in SourceCodester Shopping Website 1.0. Affected is an unknown function of the file search-result.php. The manipulation of the argument product leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232950 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.232950 | 2023-07-04T13:26:23.494Z | 2023-07-04T14:00:04.782Z | 2023-10-23T14:01:17.098Z | {'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'} |
CVE-2023-3914 | A business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects. | https://gitlab.com/gitlab-org/gitlab/-/issues/418115 | 2023-07-25T10:30:31.597Z | 2023-09-29T06:02:21.304Z | 2023-09-29T06:02:21.304Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.3, 16.4'} |
CVE-2023-3017 | A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/?page=user/manage_user of the component Manage User Page. The manipulation of the argument First Name/Middle Name/Last Name leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230361 was assigned to this vulnerability. | https://vuldb.com/?id.230361 | 2023-05-31T13:13:28.211Z | 2023-05-31T14:31:03.108Z | 2023-10-23T07:40:13.103Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-3447 | The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to LDAP Injection in versions up to, and including, 4.1.5. This is due to insufficient escaping on the supplied username value. This makes it possible for unauthenticated attackers to extract potentially sensitive information from the LDAP directory. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7553e8-e43d-4740-b2ee-e3d8dc351e53?source=cve | 2023-06-28T16:19:19.045Z | 2023-06-29T04:28:35.916Z | 2023-06-29T04:28:35.916Z | {'Vendor': 'cyberlord92', 'Product': 'Active Directory Integration / LDAP Integration', 'Versions': '*'} |
CVE-2023-3294 | Cross-site Scripting (XSS) - DOM in GitHub repository saleor/react-storefront prior to c29aab226f07ca980cc19787dcef101e11b83ef7. | https://huntr.dev/bounties/9d308ebb-4289-411f-ac22-990383d98932 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'saleor', 'Product': 'saleor/react-storefront', 'Versions': 'unspecified'} |
CVE-2023-3781 | there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
| https://source.android.com/security/bulletin/pixel/2023-10-01 | 2023-07-19T20:07:36.153Z | 2023-10-11T20:37:08.490Z | 2023-10-11T20:37:08.490Z | {'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'} |
CVE-2023-3349 | Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated user to retrieve sensitive information, such as usernames, IP addresses or SQL queries sent to the application. By accessing the URL /RPS2019Service/status.html, the application enables the logging mechanism by generating the log file, which can be downloaded. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019 | 2023-06-21T11:12:46.069Z | 2023-10-03T13:24:44.830Z | 2023-10-03T13:24:44.830Z | {'Vendor': 'IBERMATICA', 'Product': 'IBERMATICA RPS 2019', 'Versions': 'RPS 2019'} |
Subsets and Splits