CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-7152
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1.22.0-preview. Affected by this issue is the function poll_set_add_fd of the file extmod/modselect.c. The manipulation leads to use after free. The exploit has been disclosed to the public and may be used. The patch is identified as 8b24aa36ba978eafc6114b6798b47b7bfecdca26. It is recommended to apply a patch to fix this issue. VDB-249158 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.249158
2023-12-28T10:30:00.988Z
2023-12-29T04:31:04.054Z
2023-12-29T08:53:19.626Z
{'Vendor': 'n/a', 'Product': 'MicroPython', 'Versions': '1.21.0, 1.22.0-preview'}
CVE-2023-7040
A vulnerability classified as problematic was found in codelyfe Stupid Simple CMS up to 1.2.4. Affected by this vulnerability is an unknown functionality of the file /file-manager/rename.php. The manipulation of the argument oldName leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248689 was assigned to this vulnerability.
https://vuldb.com/?id.248689
2023-12-21T08:44:08.661Z
2023-12-21T19:31:03.921Z
2023-12-21T19:31:03.921Z
{'Vendor': 'codelyfe', 'Product': 'Stupid Simple CMS', 'Versions': '1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4'}
CVE-2023-7105
A vulnerability was found in code-projects E-Commerce Website 1.0. It has been classified as critical. Affected is an unknown function of the file index_search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249000.
https://vuldb.com/?id.249000
2023-12-25T14:10:04.776Z
2023-12-25T22:31:04.133Z
2023-12-25T22:31:04.133Z
{'Vendor': 'code-projects', 'Product': 'E-Commerce Website', 'Versions': '1.0'}
CVE-2023-7191
A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249393
2023-12-30T16:50:57.706Z
2023-12-31T16:00:05.206Z
2023-12-31T16:00:05.206Z
{'Vendor': 'n/a', 'Product': 'S-CMS', 'Versions': '2.0_build20220529-20231006'}
CVE-2023-7083
The Voting Record WordPress plugin through 2.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
https://wpscan.com/vulnerability/ba77704a-32a1-494b-b2c0-e1c2a3f98adc/
2023-12-22T18:38:47.147Z
2024-01-16T15:57:04.021Z
2024-01-16T15:57:04.021Z
{'Vendor': 'Unknown', 'Product': 'Voting Record', 'Versions': '0'}
CVE-2023-7129
A vulnerability, which was classified as critical, was found in code-projects Voting System 1.0. Affected is an unknown function of the component Voters Login. The manipulation of the argument voter leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249132.
https://vuldb.com/?id.249132
2023-12-28T07:51:58.181Z
2023-12-28T15:31:04.690Z
2023-12-28T15:31:04.690Z
{'Vendor': 'code-projects', 'Product': 'Voting System', 'Versions': '1.0'}
CVE-2023-7095
A vulnerability, which was classified as critical, has been found in Totolink A7100RU 7.4cu.2313_B20191024. Affected by this issue is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248942 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248942
2023-12-24T08:10:53.292Z
2023-12-25T00:31:04.022Z
2023-12-25T00:31:04.022Z
{'Vendor': 'Totolink', 'Product': 'A7100RU', 'Versions': '7.4cu.2313_B20191024'}
CVE-2023-7187
A vulnerability was found in Totolink N350RT 9.3.5u.6139_B20201216. It has been rated as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi?action=login&flag=ie8 of the component HTTP POST Request Handler. The manipulation leads to stack-based buffer overflow. The exploit has been disclosed to the public and may be used. The identifier VDB-249389 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249389
2023-12-30T16:42:04.960Z
2023-12-31T14:00:04.569Z
2023-12-31T14:00:04.569Z
{'Vendor': 'Totolink', 'Product': 'N350RT', 'Versions': '9.3.5u.6139_B20201216'}
CVE-2023-7148
A vulnerability has been found in ShifuML shifu 0.12.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file src/main/java/ml/shifu/shifu/core/DataPurifier.java of the component Java Expression Language Handler. The manipulation of the argument FilterExpression leads to code injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249151.
https://vuldb.com/?id.249151
2023-12-28T08:47:47.371Z
2023-12-29T03:00:06.142Z
2023-12-29T03:00:06.142Z
{'Vendor': 'ShifuML', 'Product': 'shifu', 'Versions': '0.12.0'}
CVE-2023-7109
A vulnerability classified as critical was found in code-projects Library Management System 2.0. This vulnerability affects unknown code of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249004.
https://vuldb.com/?id.249004
2023-12-25T14:16:16.682Z
2023-12-26T01:31:04.249Z
2023-12-26T01:31:04.249Z
{'Vendor': 'code-projects', 'Product': 'Library Management System', 'Versions': '2.0'}
CVE-2023-7220
A vulnerability was found in Totolink NR1800X 9.1.0u.6279_B20210910 and classified as critical. Affected by this issue is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249854 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249854
2024-01-07T08:40:43.824Z
2024-01-09T07:31:03.195Z
2024-01-09T07:31:03.195Z
{'Vendor': 'Totolink', 'Product': 'NR1800X', 'Versions': '9.1.0u.6279_B20210910'}
CVE-2023-7172
A vulnerability, which was classified as critical, has been found in PHPGurukul Hospital Management System 1.0. Affected by this issue is some unknown functionality of the component Admin Dashboard. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249356.
https://vuldb.com/?id.249356
2023-12-29T19:46:30.464Z
2023-12-30T09:00:06.365Z
2024-01-02T09:17:22.501Z
{'Vendor': 'PHPGurukul', 'Product': 'Hospital Management System', 'Versions': '1.0'}
CVE-2023-7037
A vulnerability was found in automad up to 1.10.9. It has been declared as critical. This vulnerability affects the function import of the file FileController.php. The manipulation of the argument importUrl leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-248686 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248686
2023-12-21T08:18:59.376Z
2023-12-21T17:00:05.727Z
2023-12-21T17:00:05.727Z
{'Vendor': 'n/a', 'Product': 'automad', 'Versions': '1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9'}
CVE-2023-7125
The Community by PeepSo WordPress plugin before 6.3.1.2 does not have CSRF check when creating a user post (visible on their wall in their profile page), which could allow attackers to make logged in users perform such action via a CSRF attack
https://wpscan.com/vulnerability/cac12b64-ed25-4ee2-933f-8ff722605271/
2023-12-28T03:27:53.922Z
2024-01-16T15:57:04.740Z
2024-01-16T15:57:04.740Z
{'Vendor': 'Unknown', 'Product': 'Community by PeepSo', 'Versions': '0'}
CVE-2023-7099
A vulnerability, which was classified as critical, has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This issue affects some unknown processing of the file bwdates-report-result.php. The manipulation of the argument fromdate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248951.
https://vuldb.com/?id.248951
2023-12-24T11:12:45.328Z
2023-12-25T02:31:04.313Z
2023-12-25T02:31:04.313Z
{'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'}
CVE-2023-7133
A vulnerability was found in y_project RuoYi 4.7.8. It has been declared as problematic. This vulnerability affects unknown code of the file /login of the component HTTP POST Request Handler. The manipulation of the argument rememberMe with the input falsen3f0m<script>alert(1)</script>p86o0 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249136.
https://vuldb.com/?id.249136
2023-12-28T08:02:50.482Z
2023-12-28T17:31:04.010Z
2023-12-28T17:31:04.010Z
{'Vendor': 'y_project', 'Product': 'RuoYi', 'Versions': '4.7.8'}
CVE-2023-7076
A vulnerability was found in slawkens MyAAC up to 0.8.13. It has been declared as problematic. This vulnerability affects unknown code of the file system/pages/bugtracker.php. The manipulation of the argument bug[2]['subject']/bug[2]['text']/report['subject'] leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.8.14 is able to address this issue. The name of the patch is 83a91ec540072d319dd338abff45f8d5ebf48190. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248848.
https://vuldb.com/?id.248848
2023-12-22T06:47:53.750Z
2023-12-22T14:00:05.523Z
2023-12-22T14:00:05.523Z
{'Vendor': 'slawkens', 'Product': 'MyAAC', 'Versions': '0.8.0, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 0.8.7, 0.8.8, 0.8.9, 0.8.10, 0.8.11, 0.8.12, 0.8.13'}
CVE-2023-7021
A vulnerability was found in Tongda OA 2017 up to 11.9. It has been classified as critical. Affected is an unknown function of the file general/vehicle/checkup/delete_search.php. The manipulation of the argument VU_ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248568. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248568
2023-12-20T17:01:12.166Z
2023-12-21T00:31:04.571Z
2023-12-21T00:31:04.571Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-7020
A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. This issue affects some unknown processing of the file general/wiki/cp/ct/view.php. The manipulation of the argument TEMP_ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248567. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248567
2023-12-20T17:01:07.604Z
2023-12-21T00:00:07.183Z
2023-12-21T00:00:07.183Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-7098
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in icret EasyImages 2.8.3. This vulnerability affects unknown code of the file app/hide.php. The manipulation of the argument key leads to path traversal: '../filedir'. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-248950 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://vuldb.com/?id.248950
2023-12-24T11:07:19.480Z
2023-12-25T02:00:05.851Z
2023-12-25T02:00:05.851Z
{'Vendor': 'icret', 'Product': 'EasyImages', 'Versions': '2.8.3'}
CVE-2023-7132
A vulnerability was found in code-projects Intern Membership Management System 2.0. It has been classified as problematic. This affects an unknown part of the file /user_registration/ of the component User Registration. The manipulation of the argument userName/firstName/lastName/userEmail with the input "><ScRiPt>confirm(document.domain)</ScRiPt>h0la leads to cross site scripting. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249135.
https://vuldb.com/?id.249135
2023-12-28T07:54:50.761Z
2023-12-28T17:00:06.478Z
2023-12-28T17:00:06.478Z
{'Vendor': 'code-projects', 'Product': 'Intern Membership Management System', 'Versions': '2.0'}
CVE-2023-7124
A vulnerability, which was classified as problematic, was found in code-projects E-Commerce Site 1.0. Affected is an unknown function of the file search.php. The manipulation of the argument keyword with the input <video/src=x onerror=alert(document.cookie)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249096.
https://vuldb.com/?id.249096
2023-12-27T18:00:16.908Z
2023-12-28T02:31:04.389Z
2023-12-28T02:31:04.389Z
{'Vendor': 'code-projects', 'Product': 'E-Commerce Site', 'Versions': '1.0'}
CVE-2023-7173
A vulnerability, which was classified as problematic, was found in PHPGurukul Hospital Management System 1.0. This affects an unknown part of the file registration.php. The manipulation of the argument First Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249357 was assigned to this vulnerability.
https://vuldb.com/?id.249357
2023-12-29T19:46:32.845Z
2023-12-30T11:31:03.918Z
2024-01-02T09:19:25.917Z
{'Vendor': 'PHPGurukul', 'Product': 'Hospital Management System', 'Versions': '1.0'}
CVE-2023-7036
A vulnerability was found in automad up to 1.10.9. It has been classified as problematic. This affects the function upload of the file FileCollectionController.php of the component Content Type Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248685 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248685
2023-12-21T08:18:57.395Z
2023-12-21T16:00:04.741Z
2023-12-21T16:00:04.741Z
{'Vendor': 'n/a', 'Product': 'automad', 'Versions': '1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.10.5, 1.10.6, 1.10.7, 1.10.8, 1.10.9'}
CVE-2023-7221
A vulnerability was found in Totolink T6 4.1.9cu.5241_B20210923. It has been classified as critical. This affects the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument v41 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249855. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249855
2024-01-07T08:47:04.000Z
2024-01-09T14:00:05.614Z
2024-01-09T14:00:05.614Z
{'Vendor': 'Totolink', 'Product': 'T6', 'Versions': '4.1.9cu.5241_B20210923'}
CVE-2023-7108
A vulnerability classified as problematic has been found in code-projects E-Commerce Website 1.0. This affects an unknown part of the file user_signup.php. The manipulation of the argument firstname with the input <video/src=x onerror=alert(document.domain)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249003.
https://vuldb.com/?id.249003
2023-12-25T14:10:13.406Z
2023-12-26T00:00:07.088Z
2023-12-26T00:00:07.088Z
{'Vendor': 'code-projects', 'Product': 'E-Commerce Website', 'Versions': '1.0'}
CVE-2023-7149
A vulnerability was found in code-projects QR Code Generator 1.0. It has been classified as problematic. This affects an unknown part of the file /download.php?file=author.png. The manipulation of the argument file with the input "><iMg src=N onerror=alert(document.domain)> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249153 was assigned to this vulnerability.
https://vuldb.com/?id.249153
2023-12-28T08:53:11.275Z
2023-12-29T03:31:04.689Z
2023-12-29T03:31:04.689Z
{'Vendor': 'code-projects', 'Product': 'QR Code Generator', 'Versions': '1.0'}
CVE-2023-7237
Lantronix XPort sends weakly encoded credentials within web request headers.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-05
2024-01-19T20:42:14.336Z
2024-01-23T21:46:38.832Z
2024-01-23T21:46:38.832Z
{'Vendor': 'Lantronix', 'Product': 'XPort', 'Versions': '2.0.0.13'}
CVE-2023-7186
A vulnerability was found in 7-card Fakabao up to 1.0_build20230805. It has been declared as critical. This vulnerability affects unknown code of the file member/notify.php. The manipulation of the argument out_trade_no leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249388. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249388
2023-12-30T16:38:46.320Z
2023-12-31T13:00:04.987Z
2023-12-31T13:00:04.987Z
{'Vendor': '7-card', 'Product': 'Fakabao', 'Versions': '1.0_build20230805'}
CVE-2023-7094
A vulnerability classified as problematic was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected by this vulnerability is an unknown functionality of the file /protocol/nsasg6.0.tgz. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248941 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248941
2023-12-24T08:06:38.813Z
2023-12-25T00:00:06.687Z
2023-12-25T00:00:06.687Z
{'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'}
CVE-2023-7082
The Import any XML or CSV File to WordPress plugin before 3.7.3 accepts all zip files and automatically extracts the zip file into a publicly accessible directory without sufficiently validating the extracted file type. This may allows high privilege users such as administrator to upload an executable file type leading to remote code execution.
https://wpscan.com/vulnerability/7f947305-7a72-4c59-9ae8-193f437fd04e/
2023-12-22T16:03:38.577Z
2024-01-22T19:14:29.189Z
2024-01-22T19:14:29.189Z
{'Vendor': 'Unknown', 'Product': 'Import any XML or CSV File to WordPress', 'Versions': '0'}
CVE-2023-7128
A vulnerability, which was classified as critical, has been found in code-projects Voting System 1.0. This issue affects some unknown processing of the file /admin/ of the component Admin Login. The manipulation of the argument username leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249131.
https://vuldb.com/?id.249131
2023-12-28T07:51:56.245Z
2023-12-28T15:00:06.338Z
2023-12-28T15:00:06.338Z
{'Vendor': 'code-projects', 'Product': 'Voting System', 'Versions': '1.0'}
CVE-2023-7190
A vulnerability, which was classified as critical, has been found in S-CMS up to 2.0_build20220529-20231006. Affected by this issue is some unknown functionality of the file /member/ad.php?action=ad. The manipulation of the argument A_text/A_url/A_contact leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249392. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.249392
2023-12-30T16:50:50.253Z
2023-12-31T15:31:03.358Z
2023-12-31T15:31:03.358Z
{'Vendor': 'n/a', 'Product': 'S-CMS', 'Versions': '2.0_build20220529-20231006'}
CVE-2023-7041
A vulnerability, which was classified as critical, has been found in codelyfe Stupid Simple CMS up to 1.2.4. Affected by this issue is some unknown functionality of the file /file-manager/rename.php. The manipulation of the argument newName leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248690 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248690
2023-12-21T08:44:11.025Z
2023-12-21T20:00:06.529Z
2023-12-21T20:00:06.529Z
{'Vendor': 'codelyfe', 'Product': 'Stupid Simple CMS', 'Versions': '1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4'}
CVE-2023-7104
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
https://vuldb.com/?id.248999
2023-12-25T14:00:48.991Z
2023-12-25T21:00:05.997Z
2023-12-29T09:44:27.826Z
{'Vendor': 'SQLite', 'Product': 'SQLite3', 'Versions': '3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 3.15, 3.16, 3.17, 3.18, 3.19, 3.20, 3.21, 3.22, 3.23, 3.24, 3.25, 3.26, 3.27, 3.28, 3.29, 3.30, 3.31, 3.32, 3.33, 3.34, 3.35, 3.36, 3.37, 3.38, 3.39, 3.40, 3.41, 3.42, 3.43'}
CVE-2023-7153
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Macroturk Software and Internet Technologies Macro-Bel allows Reflected XSS.This issue affects Macro-Bel: before V.1.0.1.
https://www.usom.gov.tr/bildirim/tr-24-0041
2023-12-28T12:48:36.378Z
2024-01-18T14:38:14.808Z
2024-01-18T14:38:14.808Z
{'Vendor': 'Macroturk Software and Internet Technologies', 'Product': 'Macro-Bel', 'Versions': '0'}
CVE-2023-7145
A vulnerability classified as critical was found in gopeak MasterLab up to 3.3.10. This vulnerability affects the function sqlInject of the file app/ctrl/Framework.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249148.
https://vuldb.com/?id.249148
2023-12-28T08:33:38.996Z
2023-12-29T01:31:04.615Z
2023-12-29T01:31:04.615Z
{'Vendor': 'gopeak', 'Product': 'MasterLab', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'}
CVE-2023-7057
A vulnerability, which was classified as problematic, has been found in code-projects Faculty Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/pages/yearlevel.php. The manipulation of the argument Year Level/Section leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248744.
https://vuldb.com/?id.248744
2023-12-21T16:17:01.742Z
2023-12-22T03:31:04.595Z
2023-12-22T03:31:04.595Z
{'Vendor': 'code-projects', 'Product': 'Faculty Management System', 'Versions': '1.0'}
CVE-2023-3596
Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010
2023-07-10T15:34:53.790Z
2023-07-12T12:51:19.498Z
2023-07-12T13:16:21.672Z
{'Vendor': 'Rockwell Automation', 'Product': '1756-EN4TR Series A', 'Versions': '<=5.001'}
CVE-2023-3129
The URL Shortify WordPress plugin before 1.7.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/5717d729-c24b-4415-bb99-fcdd259328c4
2023-06-06T18:17:39.349Z
2023-07-10T12:40:04.686Z
2023-07-10T13:05:39.918Z
{'Vendor': 'Unknown', 'Product': 'URL Shortify', 'Versions': '0'}
CVE-2023-3579
A vulnerability, which was classified as problematic, has been found in HadSky 7.11.8. Affected by this issue is some unknown functionality of the component User Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233372.
https://vuldb.com/?id.233372
2023-07-10T10:56:22.596Z
2023-07-10T11:31:03.159Z
2023-10-23T14:46:53.035Z
{'Vendor': 'n/a', 'Product': 'HadSky', 'Versions': '7.11.8'}
CVE-2023-3083
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab
2023-06-03T00:00:00
2023-06-03T00:00:00
2023-06-03T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3980
Cross-site Scripting (XSS) - Stored in GitHub repository omeka/omeka-s prior to 4.0.2.
https://huntr.dev/bounties/6eb3cb9a-5c78-451f-ae76-0b1e62fe5e54
2023-07-27T18:26:07.642Z
2023-07-27T18:26:20.420Z
2023-07-27T18:26:20.420Z
{'Vendor': 'omeka', 'Product': 'omeka/omeka-s', 'Versions': 'unspecified'}
CVE-2023-3650
The Bubble Menu WordPress plugin before 3.0.5 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
https://wpscan.com/vulnerability/0a0ecdff-c961-4947-bf7e-bd2392501e33
2023-07-13T03:34:14.960Z
2023-08-07T14:31:19.068Z
2023-08-07T14:31:19.068Z
{'Vendor': 'Unknown', 'Product': 'Bubble Menu', 'Versions': '0'}
CVE-2023-3200
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_new_order_message function. This makes it possible for unauthenticated attackers to update new order message via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/78f3c503-e255-44d2-8432-48dc2c5f553d?source=cve
2023-06-12T13:58:58.631Z
2023-06-14T01:47:49.257Z
2023-06-14T01:47:49.257Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-3345
The LMS by Masteriyo WordPress plugin before 1.6.8 does not properly safeguards sensitive user information, like other user's email addresses, making it possible for any students to leak them via some of the plugin's REST API endpoints.
https://wpscan.com/vulnerability/0d07423e-98d2-43a3-824d-562747a3d65a
2023-06-20T19:06:59.169Z
2023-07-31T09:37:36.423Z
2023-07-31T09:37:36.423Z
{'Vendor': 'Unknown', 'Product': 'LMS by Masteriyo', 'Versions': '0'}
CVE-2023-3191
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
https://huntr.dev/bounties/19fed157-128d-4bfb-a30e-eadf748cbd1a
2023-06-10T00:00:00
2023-06-10T00:00:00
2023-06-10T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3892
Improper Restriction of XML External Entity Reference vulnerability in MIM Assistant and Client DICOM RTst Loading modules allows XML Entity Linking / XML External Entities Blowup. In order to take advantage of this vulnerability, an attacker must craft a malicious XML document, embed this document into specific 3rd party private RTst metadata tags, transfer the now compromised DICOM object to MIM, and force MIM to archive and load the data. Users on either version are strongly encouraged to update to an unaffected version (7.2.11+, 7.3.4+). This issue was found and analyzed by MIM Software's internal security team.  We are unaware of any proof of concept or actual exploit available in the wild. For more information, visit https://www.mimsoftware.com/cve-2023-3892 https://www.mimsoftware.com/cve-2023-3892 This issue affects MIM Assistant: 7.2.10, 7.3.3; MIM Client: 7.2.10, 7.3.3.
https://www.mimsoftware.com/cve-2023-3892
2023-07-24T18:19:08.803Z
2023-09-19T14:54:12.524Z
2023-09-19T14:54:12.524Z
{'Vendor': 'MIM Software', 'Product': 'MIM Assistant', 'Versions': '7.2.10, 7.3.3'}
CVE-2023-3484
An issue has been discovered in GitLab EE affecting all versions starting from 12.8 before 15.11.11, all versions starting from 16.0 before 16.0.7, all versions starting from 16.1 before 16.1.2. An attacker could change the name or path of a public top-level group in certain situations.
https://gitlab.com/gitlab-org/gitlab/-/issues/416773
2023-06-30T17:18:21.746Z
2023-07-21T13:01:03.770Z
2023-07-21T13:01:03.770Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.8, 16.0, 16.1'}
CVE-2023-3607
A vulnerability was found in kodbox 1.26. It has been declared as critical. This vulnerability affects the function Execute of the file webconsole.php.txt of the component WebConsole Plug-In. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233476. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233476
2023-07-10T19:44:59.934Z
2023-07-10T21:00:05.507Z
2023-10-23T14:51:45.825Z
{'Vendor': 'n/a', 'Product': 'kodbox', 'Versions': '1.26'}
CVE-2023-3312
A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service.
https://patchwork.kernel.org/project/linux-pm/patch/20230323174026.950622-1-krzysztof.kozlowski%40linaro.org/
2023-06-19T00:00:00
2023-06-19T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to 6.4-rc1'}
CVE-2023-3742
Insufficient policy enforcement in ADB in Google Chrome on ChromeOS prior to 114.0.5735.90 allowed a local attacker to bypass device policy restrictions via physical access to the device. (Chromium security severity: High)
https://bugs.chromium.org/p/chromium/issues/detail?id=1443292
2023-07-18T01:00:47.286Z
2023-12-20T15:30:14.710Z
2023-12-20T15:30:14.710Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-3884
A vulnerability has been found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/edit_product.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235246 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235246
2023-07-24T16:52:34.355Z
2023-07-25T06:00:04.974Z
2023-10-24T07:13:22.287Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3187
A vulnerability, which was classified as critical, has been found in PHPGurukul Teachers Record Management System 1.0. Affected by this issue is some unknown functionality of the file /changeimage.php of the component Profile Picture Handler. The manipulation of the argument newpic leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231176.
https://vuldb.com/?id.231176
2023-06-09T20:34:57.427Z
2023-06-09T21:00:04.486Z
2023-10-23T13:03:55.209Z
{'Vendor': 'PHPGurukul', 'Product': 'Teachers Record Management System', 'Versions': '1.0'}
CVE-2023-3168
The WP Reroute Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.4.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4a0e962b-b6a0-4179-91d0-5ede508a9895?source=cve
2023-06-08T18:36:48.024Z
2023-07-12T04:38:44.748Z
2023-07-12T04:38:44.748Z
{'Vendor': 'msh134', 'Product': 'WP Reroute Email', 'Versions': '*'}
CVE-2023-3492
The WP Shopping Pages WordPress plugin through 1.14 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
https://wpscan.com/vulnerability/01b9b1c2-439e-44df-bf01-026cb13d7d40
2023-06-30T21:14:26.517Z
2023-08-07T14:31:19.856Z
2023-08-07T14:31:19.856Z
{'Vendor': 'Unknown', 'Product': 'WP Shopping Pages', 'Versions': '0'}
CVE-2023-3538
A vulnerability classified as problematic was found in SimplePHPscripts Photo Gallery PHP 2.0. This vulnerability affects unknown code of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-233290 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.233290
2023-07-07T11:59:18.682Z
2023-07-07T14:00:04.620Z
2023-10-23T14:14:42.303Z
{'Vendor': 'SimplePHPscripts', 'Product': 'Photo Gallery PHP', 'Versions': '2.0'}
CVE-2023-3611
An out-of-bounds write vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. The qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks. We recommend upgrading past commit 3e337087c3b5805fe0b8a46ba622a962880b5d64.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
2023-07-10T20:52:55.365Z
2023-07-21T20:49:10.812Z
2023-07-22T09:43:12.163Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '3.8'}
CVE-2023-3241
A vulnerability was found in OTCMS up to 6.62 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/read.php?mudi=announContent. The manipulation of the argument url leads to path traversal. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231512.
https://vuldb.com/?id.231512
2023-06-14T06:12:47.461Z
2023-06-14T09:00:03.857Z
2023-10-23T13:21:00.110Z
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'}
CVE-2023-3754
A vulnerability, which was classified as problematic, was found in Creativeitem Ekushey Project Manager CRM 5.0. Affected is an unknown function of the file /index.php/client/message/message_read/xxxxxxxx[random-msg-hash]. The manipulation of the argument message leads to cross site scripting. It is possible to launch the attack remotely. VDB-234426 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234426
2023-07-18T16:33:53.860Z
2023-07-19T03:00:05.454Z
2023-10-23T15:38:07.996Z
{'Vendor': 'Creativeitem', 'Product': 'Ekushey Project Manager CRM', 'Versions': '5.0'}
CVE-2023-3304
Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9.
https://huntr.dev/bounties/721fae61-3c8c-4e4b-8407-64321bc0ed17
2023-06-18T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'}
CVE-2023-3580
Improper Handling of Additional Special Element in GitHub repository squidex/squidex prior to 7.4.0.
https://huntr.dev/bounties/4eed53ca-06c2-43aa-aea8-c03ea5f13ce4
2023-07-10T11:38:10.402Z
2023-07-10T11:38:22.090Z
2023-07-10T11:38:22.090Z
{'Vendor': 'squidex', 'Product': 'squidex/squidex', 'Versions': 'unspecified'}
CVE-2023-3979
An issue has been discovered in GitLab affecting all versions starting from 10.6 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that upstream members to collaborate with you on your branch get permission to write to the merge request’s source branch.
https://gitlab.com/gitlab-org/gitlab/-/issues/419972
2023-07-27T18:01:01.568Z
2023-09-29T06:02:06.310Z
2023-09-29T06:02:06.310Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.6, 16.3, 16.4'}
CVE-2023-3996
The ARMember Lite - Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.0.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1022ac4-869e-415a-a7c8-3650421608ea?source=cve
2023-07-28T14:08:18.410Z
2023-10-20T07:29:30.155Z
2023-10-20T07:29:30.155Z
{'Vendor': 'reputeinfosystems', 'Product': 'ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup', 'Versions': '*'}
CVE-2023-3095
Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
https://huntr.dev/bounties/35c899a9-40a0-4e17-bfb5-2a1430bc83c4
2023-06-04T00:00:00
2023-06-04T00:00:00
2023-06-04T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3216
Type confusion in V8 in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
2023-06-13T00:12:15.493Z
2023-06-13T17:51:08.949Z
2023-06-13T17:51:08.949Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'}
CVE-2023-3646
On affected platforms running Arista EOS with mirroring to multiple destinations configured, an internal system error may trigger a kernel panic and cause system reload.
https://www.arista.com/en/support/advisories-notices/security-advisory/18042-security-advisory-0088
2023-07-12T17:53:27.986Z
2023-08-29T16:31:57.668Z
2023-08-29T16:31:57.668Z
{'Vendor': 'Arista Networks', 'Product': 'EOS', 'Versions': '4.28.2F, 4.29.0'}
CVE-2023-3703
Proscend Advice ICR Series routers FW version 1.76 - CWE-1392: Use of Default Credentials
https://www.gov.il/en/Departments/faq/cve_advisories
2023-07-17T09:45:14.295Z
2023-09-03T14:19:26.169Z
2023-09-03T14:19:26.169Z
{'Vendor': 'Proscend Advice', 'Product': 'ICR Series routers FW', 'Versions': 'version 1.76'}
CVE-2023-3847
A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-235198 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
https://vuldb.com/?id.235198
2023-07-22T13:57:34.647Z
2023-07-23T07:31:03.861Z
2023-10-24T06:39:12.219Z
{'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'}
CVE-2023-3514
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and calling "AddModule" or "UninstallModules" command to execute arbitrary executable file.
https://starlabs.sg/advisories/23/23-3514/
2023-07-05T08:39:06.564Z
2023-07-14T04:53:31.771Z
2023-07-14T04:53:31.771Z
{'Vendor': 'Razer', 'Product': 'Razer Central', 'Versions': '0'}
CVE-2023-3144
A vulnerability classified as problematic was found in SourceCodester Online Discussion Forum Site 1.0. Affected by this vulnerability is an unknown functionality of the file admin\posts\manage_post.php. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231013 was assigned to this vulnerability.
https://vuldb.com/?id.231013
2023-06-07T13:55:41.835Z
2023-06-07T15:00:04.657Z
2023-10-23T12:45:35.735Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3451
null
null
2023-06-28T17:42:02.786Z
null
2023-07-26T22:55:02.316Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3001
A CWE-502: Deserialization of Untrusted Data vulnerability exists in the Dashboard module that could cause an interpretation of malicious payload data, potentially leading to remote code execution when an attacker gets the user to open a malicious file.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-164-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-164-02.pdf
2023-05-31T06:57:45.859Z
2023-06-14T07:40:16.412Z
2023-06-14T07:40:16.412Z
{'Vendor': 'Schneider Electric', 'Product': 'IGSS Dashboard (DashBoard.exe)', 'Versions': 'v16.0.0.23130 and prior'}
CVE-2023-3328
The Custom Field For WP Job Manager WordPress plugin before 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/d8b76875-cf7f-43a9-b88b-d8aefefab131
2023-06-19T17:33:32.161Z
2023-08-14T19:10:22.342Z
2024-01-16T15:53:59.825Z
{'Vendor': 'Unknown', 'Product': 'Custom Field For WP Job Manager', 'Versions': '0'}
CVE-2023-3282
A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system enables a local attacker to execute programs with elevated privileges if the attacker has shell access to the engine.
https://security.paloaltonetworks.com/CVE-2023-3282
2023-06-15T23:55:45.258Z
2023-11-08T17:22:58.976Z
2023-11-08T17:22:58.976Z
{'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XSOAR', 'Versions': '6.10, 6.11, 6.12, 8'}
CVE-2023-3797
A vulnerability, which was classified as critical, was found in Gen Technology Four Mountain Torrent Disaster Prevention and Control of Monitoring and Early Warning System up to 20230712. This affects an unknown part of the file /Duty/AjaxHandle/UploadFloodPlanFileUpdate.ashx. The manipulation of the argument Filedata leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The identifier VDB-235065 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235065
2023-07-20T08:07:28.038Z
2023-07-20T21:31:03.877Z
2023-10-23T18:40:57.944Z
{'Vendor': 'Gen Technology', 'Product': 'Four Mountain Torrent Disaster Prevention and Control of Monitoring and Early Warning System', 'Versions': '20230712'}
CVE-2023-3113
An unauthenticated XML external entity injection (XXE) vulnerability exists in LXCA's Common Information Model (CIM) server that could result in read-only access to specific files.
https://support.lenovo.com/us/en/product_security/LEN-98715
2023-06-05T19:17:02.529Z
2023-06-26T19:44:58.093Z
2023-06-26T19:44:58.093Z
{'Vendor': 'Lenovo', 'Product': 'Lenovo XClarity Administrator', 'Versions': 'Versions prior to 4.0'}
CVE-2023-3543
A vulnerability was found in GZ Scripts Availability Booking Calendar PHP 1.8. It has been classified as problematic. This affects an unknown part of the file load.php of the component HTTP POST Request Handler. The manipulation of the argument cid/first_name/second_name/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233295. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233295
2023-07-07T12:13:37.340Z
2023-07-07T16:31:03.363Z
2023-10-23T14:20:48.802Z
{'Vendor': 'GZ Scripts', 'Product': 'Availability Booking Calendar PHP', 'Versions': '1.8'}
CVE-2023-3810
A vulnerability was found in Hospital Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file patientappointment.php. The manipulation of the argument loginid/password/mobileno/appointmentdate/appointmenttime/patiente/dob/doct/city leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235078 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235078
2023-07-20T08:44:16.580Z
2023-07-21T04:00:05.955Z
2023-10-24T06:09:55.839Z
{'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'}
CVE-2023-3955
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
https://github.com/kubernetes/kubernetes/issues/119595
2023-07-26T13:51:11.192Z
2023-10-31T20:36:54.352Z
2023-10-31T20:36:54.352Z
{'Vendor': 'Kubernetes', 'Product': 'kubelet', 'Versions': 'v1.28.0, v1.27.0, v1.26.0, v1.25.0, v1.28.1, v1.27.5, v1.26.8, v1.25.13, v1.24.17, 0'}
CVE-2023-3056
A vulnerability was found in YFCMF up to 3.0.4. It has been declared as problematic. This vulnerability affects unknown code of the file index.php. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230542 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230542
2023-06-02T11:27:19.579Z
2023-06-02T12:00:04.473Z
2023-10-23T07:45:06.073Z
{'Vendor': 'n/a', 'Product': 'YFCMF', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4'}
CVE-2023-3406
Path Traversal issue in M-Files Classic Web versions below 23.6.12695.3 and LTS Service Release Versions before 23.2 LTS SR3 allows authenticated user to read some restricted files on the web server
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-3406
2023-06-26T13:29:10.505Z
2023-08-25T08:11:46.246Z
2023-08-25T08:11:46.246Z
{'Vendor': 'M-Files', 'Product': 'M-Files Web', 'Versions': '0, 23.2.12340.14'}
CVE-2023-3685
A vulnerability was found in Nesote Inout Search Engine AI Edition 1.1. It has been classified as problematic. This affects an unknown part of the file /index.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234231. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234231
2023-07-15T16:16:23.152Z
2023-07-16T11:00:04.669Z
2023-10-23T15:22:16.242Z
{'Vendor': 'Nesote', 'Product': 'Inout Search Engine AI Edition', 'Versions': '1.1'}
CVE-2023-3390
A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c. Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue. We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
2023-06-23T13:45:16.519Z
2023-06-28T20:02:07.389Z
2023-06-28T20:02:07.389Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '3.16'}
CVE-2023-3806
A vulnerability, which was classified as critical, was found in SourceCodester House Rental and Property Listing System 1.0. Affected is an unknown function of the file btn_functions.php. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-235074 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235074
2023-07-20T08:35:45.767Z
2023-07-21T02:00:05.253Z
2023-10-24T06:05:03.156Z
{'Vendor': 'SourceCodester', 'Product': 'House Rental and Property Listing System', 'Versions': '1.0'}
CVE-2023-3555
A vulnerability was found in GZ Scripts PHP Vacation Rental Script 1.8. It has been classified as problematic. This affects an unknown part of the file /preview.php. The manipulation of the argument page/layout/sort_by/property_id leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-233349 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233349
2023-07-08T11:49:47.692Z
2023-07-08T12:31:03.435Z
2023-10-23T14:24:28.852Z
{'Vendor': 'GZ Scripts', 'Product': 'PHP Vacation Rental Script', 'Versions': '1.8'}
CVE-2023-3105
The LearnDash LMS plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.6.0. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for attackers with with existing account access at any level, to change user passwords and potentially take over administrator accounts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/2318b3e1-268d-45fa-83bf-c6e88f1b9013?source=cve
2023-06-05T12:36:42.991Z
2023-07-12T04:38:43.102Z
2023-07-12T04:38:43.102Z
{'Vendor': 'n/a', 'Product': 'LearnDash LMS', 'Versions': '*'}
CVE-2023-3040
A debug function in the lua-resty-json package, up to commit id 3ef9492bd3a44d9e51301d6adc3cd1789c8f534a (merged in PR #14) contained an out of bounds access bug that could have allowed an attacker to launch a DoS if the function was used to parse untrusted input data. It is important to note that because this debug function was only used in tests and demos, it was not exploitable in a normal environment.
https://github.com/cloudflare/lua-resty-json/pull/14
2023-06-01T15:55:07.745Z
2023-06-14T11:54:51.131Z
2023-06-14T11:55:19.181Z
{'Vendor': 'Cloudflare', 'Product': 'lua-resty-json', 'Versions': '1'}
CVE-2023-3369
The About Me 3000 widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/be6f660f-041a-42f2-ab5b-72aedf75727d?source=cve
2023-06-22T12:18:32.600Z
2023-07-12T04:38:48.300Z
2023-07-12T04:38:48.300Z
{'Vendor': 'd3wp', 'Product': 'About Me 3000 widget', 'Versions': '*'}
CVE-2023-3693
A vulnerability classified as critical was found in SourceCodester Life Insurance Management System 1.0. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234244.
https://vuldb.com/?id.234244
2023-07-16T06:55:11.247Z
2023-07-16T21:31:03.045Z
2023-10-23T15:30:48.702Z
{'Vendor': 'SourceCodester', 'Product': 'Life Insurance Management System', 'Versions': '1.0'}
CVE-2023-3739
Insufficient validation of untrusted input in Chromad in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker to execute arbitrary code via a crafted shell script. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html
2023-07-18T00:34:21.735Z
2023-08-01T22:39:18.614Z
2023-08-04T19:10:34.277Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.131'}
CVE-2023-3386
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 Camera Trap Tracking System allows SQL Injection.This issue affects Camera Trap Tracking System: before 3.1905.
https://www.usom.gov.tr/bildirim/tr-23-0444
2023-06-23T11:15:40.107Z
2023-08-08T15:11:32.519Z
2023-08-08T15:20:15.739Z
{'Vendor': 'a2', 'Product': 'Camera Trap Tracking System', 'Versions': '0'}
CVE-2023-3152
A vulnerability classified as critical has been found in SourceCodester Online Discussion Forum Site 1.0. This affects an unknown part of the file admin\posts\view_post.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231021 was assigned to this vulnerability.
https://vuldb.com/?id.231021
2023-06-07T13:56:37.876Z
2023-06-07T18:00:04.528Z
2023-10-23T12:55:21.697Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3502
A vulnerability, which was classified as critical, was found in SourceCodester Shopping Website 1.0. Affected is an unknown function of the file search-result.php. The manipulation of the argument product leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232950 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.232950
2023-07-04T13:26:23.494Z
2023-07-04T14:00:04.782Z
2023-10-23T14:01:17.098Z
{'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'}
CVE-2023-3914
A business logic error in GitLab EE affecting all versions prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1 allows access to internal projects. A service account is not deleted when a namespace is deleted, allowing access to internal projects.
https://gitlab.com/gitlab-org/gitlab/-/issues/418115
2023-07-25T10:30:31.597Z
2023-09-29T06:02:21.304Z
2023-09-29T06:02:21.304Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.3, 16.4'}
CVE-2023-3017
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/?page=user/manage_user of the component Manage User Page. The manipulation of the argument First Name/Middle Name/Last Name leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230361 was assigned to this vulnerability.
https://vuldb.com/?id.230361
2023-05-31T13:13:28.211Z
2023-05-31T14:31:03.108Z
2023-10-23T07:40:13.103Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-3447
The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to LDAP Injection in versions up to, and including, 4.1.5. This is due to insufficient escaping on the supplied username value. This makes it possible for unauthenticated attackers to extract potentially sensitive information from the LDAP directory.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7553e8-e43d-4740-b2ee-e3d8dc351e53?source=cve
2023-06-28T16:19:19.045Z
2023-06-29T04:28:35.916Z
2023-06-29T04:28:35.916Z
{'Vendor': 'cyberlord92', 'Product': 'Active Directory Integration / LDAP Integration', 'Versions': '*'}
CVE-2023-3294
Cross-site Scripting (XSS) - DOM in GitHub repository saleor/react-storefront prior to c29aab226f07ca980cc19787dcef101e11b83ef7.
https://huntr.dev/bounties/9d308ebb-4289-411f-ac22-990383d98932
2023-06-16T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'saleor', 'Product': 'saleor/react-storefront', 'Versions': 'unspecified'}
CVE-2023-3781
there is a possible use-after-free write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-10-01
2023-07-19T20:07:36.153Z
2023-10-11T20:37:08.490Z
2023-10-11T20:37:08.490Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-3349
Information exposure vulnerability in IBERMATICA RPS 2019, which exploitation could allow an unauthenticated user to retrieve sensitive information, such as usernames, IP addresses or SQL queries sent to the application. By accessing the URL /RPS2019Service/status.html, the application enables the logging mechanism by generating the log file, which can be downloaded.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019
2023-06-21T11:12:46.069Z
2023-10-03T13:24:44.830Z
2023-10-03T13:24:44.830Z
{'Vendor': 'IBERMATICA', 'Product': 'IBERMATICA RPS 2019', 'Versions': 'RPS 2019'}