CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3430
A vulnerability was found in OpenImageIO, where a heap buffer overflow exists in the src/gif.imageio/gifinput.cpp file. This flaw allows a remote attacker to pass a specially crafted file to the application, which triggers a heap-based buffer overflow and could cause a crash, leading to a denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=2218380
2023-06-27T13:55:43.943Z
2023-12-18T13:40:05.145Z
2023-12-18T13:40:05.145Z
{'Vendor': 'n/a', 'Product': 'OpenImageIO', 'Versions': '2.4.12.0'}
CVE-2023-3060
A vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as problematic. This vulnerability affects the function doAddQuestion of the file btn_functions.php. The manipulation of the argument Question leads to cross site scripting. The attack can be initiated remotely. VDB-230566 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230566
2023-06-02T12:46:16.259Z
2023-06-02T13:31:03.690Z
2023-10-23T07:49:58.887Z
{'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'}
CVE-2023-3826
A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=recruit/resume/edit&op=status of the component Interview Handler. The manipulation of the argument resumeid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235147. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235147
2023-07-21T20:23:05.432Z
2023-07-22T06:27:31.560Z
2023-10-24T06:13:35.467Z
{'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'}
CVE-2023-3575
The Quiz And Survey Master WordPress plugin before 8.1.11 does not properly sanitize and escape question titles, which could allow users with the Contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/6f884688-2c0d-4844-bd31-ef7085edf112
2023-07-10T09:02:10.344Z
2023-08-07T14:31:20.665Z
2023-10-11T08:42:41.211Z
{'Vendor': 'Unknown', 'Product': 'Quiz And Survey Master', 'Versions': '0'}
CVE-2023-3125
The B2BKing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'b2bking_save_price_import' function in versions up to, and including, 4.6.00. This makes it possible for Authenticated attackers with subscriber or customer-level permissions to modify the pricing of any product on the site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f2c4c3-73d6-4b3b-8eb3-c494f52dc183?source=cve
2023-06-06T13:12:53.381Z
2023-06-07T01:51:40.160Z
2023-06-07T01:51:40.160Z
{'Vendor': 'webwizardsdev', 'Product': 'B2BKing — Ultimate WooCommerce Wholesale and B2B Solution', 'Versions': '*'}
CVE-2023-3037
Improper authorization vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to access the platform without authentication and retrieve personal data via the jsonGrid parameter.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community
2023-06-01T14:15:05.441Z
2023-10-04T11:10:09.394Z
2023-10-04T11:10:09.394Z
{'Vendor': 'HelpDezk', 'Product': 'HelpDezk Community', 'Versions': '1.1.10'}
CVE-2023-3467
Privilege Escalation to root administrator (nsroot)
https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
2023-06-29T21:04:13.952Z
2023-07-19T18:35:56.843Z
2023-07-19T18:35:56.843Z
{'Vendor': 'Citrix', 'Product': 'NetScaler ADC\u202f', 'Versions': '13.1, 13.0, 13.1-FIPS, 12.1-FIPS, 12.1-NDcPP'}
CVE-2023-3172
Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20.
https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e
2023-06-09T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-3488
Uninitialized buffer in GBL parser in Silicon Labs GSDK v4.3.0 and earlier allows attacker to leak data from Secure stack via malformed GBL file.
https://github.com/SiliconLabs/gecko_sdk/releases
2023-06-30T18:47:17.761Z
2023-07-28T15:36:29.124Z
2023-07-28T15:36:29.124Z
{'Vendor': 'silabs.com', 'Product': 'Gecko Bootloader', 'Versions': '0'}
CVE-2023-3522
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 License Portal System allows SQL Injection.This issue affects License Portal System: before 1.48.
https://www.usom.gov.tr/bildirim/tr-23-0445
2023-07-06T07:20:46.184Z
2023-08-08T15:13:35.989Z
2023-08-08T15:19:27.867Z
{'Vendor': 'a2', 'Product': 'License Portal System', 'Versions': '0'}
CVE-2023-3871
A vulnerability classified as critical has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235233 was assigned to this vulnerability.
https://vuldb.com/?id.235233
2023-07-24T16:38:38.601Z
2023-07-24T21:31:03.873Z
2023-10-24T06:57:30.867Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3308
A vulnerability classified as problematic has been found in whaleal IceFrog 1.1.8. Affected is an unknown function of the component Aviator Template Engine. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231804.
https://vuldb.com/?id.231804
2023-06-18T07:49:21.370Z
2023-06-18T09:00:03.513Z
2023-10-23T13:29:32.675Z
{'Vendor': 'whaleal', 'Product': 'IceFrog', 'Versions': '1.1.8'}
CVE-2023-3471
Buffer overflow vulnerability in Panasonic KW Watcher versions 1.00 through 2.82 may allow attackers to execute arbitrary code.
https://www3.panasonic.biz/ac/e/fasys/software_info/eco/kwwatcher_versioninfo.jsp
2023-06-30T05:37:43.856Z
2023-09-06T04:04:41.149Z
2023-09-06T04:04:41.149Z
{'Vendor': 'Panasonic', 'Product': 'KW Watcher', 'Versions': '1.00'}
CVE-2023-3021
Cross-site Scripting (XSS) - Stored in GitHub repository mkucej/i-librarian-free prior to 5.10.4.
https://huntr.dev/bounties/9d289d3a-2931-4e94-b61c-449581736eff
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'mkucej', 'Product': 'mkucej/i-librarian-free', 'Versions': 'unspecified'}
CVE-2023-3888
A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-235250 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235250
2023-07-24T16:56:39.462Z
2023-07-25T08:00:04.292Z
2023-10-24T07:45:36.771Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3922
An issue has been discovered in GitLab affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page.
https://gitlab.com/gitlab-org/gitlab/-/issues/394770
2023-07-25T10:30:45.145Z
2023-09-29T07:30:50.402Z
2023-09-29T07:30:50.402Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.3, 16.4'}
CVE-2023-3534
A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233286 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.233286
2023-07-07T11:51:04.463Z
2023-07-07T12:00:04.953Z
2023-10-23T14:09:49.310Z
{'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'}
CVE-2023-3164
A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
https://access.redhat.com/security/cve/CVE-2023-3164
2023-06-08T13:31:04.848Z
2023-11-02T11:26:28.533Z
2023-12-08T11:23:19.581Z
{'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': ''}
CVE-2023-3975
OS Command Injection in GitHub repository jgraph/drawio prior to 21.5.0.
https://huntr.dev/bounties/4da96d20-78ac-462e-910c-a14db9062161
2023-07-27T14:34:05.900Z
2023-07-27T14:34:10.847Z
2023-07-27T14:34:10.847Z
{'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'}
CVE-2023-3076
The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features.
https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b
2023-06-02T19:43:51.327Z
2023-07-10T12:40:16.209Z
2023-07-19T07:50:08.150Z
{'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'}
CVE-2023-3426
The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations.
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3426
2023-06-27T05:43:01.235Z
2023-08-02T09:40:28.090Z
2023-08-02T09:40:28.090Z
{'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.4.13.u81'}
CVE-2023-3133
The Tutor LMS WordPress plugin before 2.2.1 does not implement adequate permission checks for REST API endpoints, allowing unauthenticated attackers to access information from Lessons that should not be publicly available.
https://wpscan.com/vulnerability/3b6969a7-5cbc-4e16-8f27-5dde481237f5
2023-06-06T20:09:27.235Z
2023-07-04T07:23:24.882Z
2023-07-05T10:47:59.427Z
{'Vendor': 'Unknown', 'Product': 'Tutor LMS', 'Versions': '0'}
CVE-2023-3563
A vulnerability was found in GZ Scripts GZ E Learning Platform 1.8 and classified as problematic. This issue affects some unknown processing of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-233357 was assigned to this vulnerability.
https://vuldb.com/?id.233357
2023-07-08T13:23:23.690Z
2023-07-08T16:31:03.315Z
2023-10-23T14:42:00.330Z
{'Vendor': 'GZ Scripts', 'Product': 'GZ E Learning Platform', 'Versions': '1.8'}
CVE-2023-3099
A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function delete_file in the library dbus.SystemBus of the component Arbitrary File Handler. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.2-0kylin6k70-23 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230689 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230689
2023-06-05T05:07:56.586Z
2023-06-05T07:00:04.362Z
2023-10-23T12:38:16.737Z
{'Vendor': 'KylinSoft', 'Product': 'youker-assistant', 'Versions': 'n/a'}
CVE-2023-3830
A vulnerability was found in Bug Finder SASS BILLER 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /company/store. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235151. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235151
2023-07-21T20:32:22.415Z
2023-07-22T14:31:03.964Z
2023-10-24T06:18:28.164Z
{'Vendor': 'Bug Finder', 'Product': 'SASS BILLER', 'Versions': '1.0'}
CVE-2023-3774
An unhandled error in Vault Enterprise's namespace creation may cause the Vault process to crash, potentially resulting in denial of service. Fixed in 1.14.1, 1.13.5, and 1.12.9.
https://discuss.hashicorp.com/t/hcsec-2023-23-vault-enterprise-namespace-creation-may-lead-to-denial-of-service/56617
2023-07-19T14:24:44.833Z
2023-07-28T00:45:04.379Z
2023-07-28T00:45:04.379Z
{'Vendor': 'HashiCorp', 'Product': 'Vault Enterprise', 'Versions': '1.14.0, 1.13.4, 1.12.8'}
CVE-2023-3324
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590
2023-06-19T15:47:23.648Z
2023-07-24T17:20:49.522Z
2024-01-24T11:49:17.721Z
{'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build'}
CVE-2023-3631
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Medart Health Services Medart Notification Panel allows SQL Injection.This issue affects Medart Notification Panel: through 20231123.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://https://www.usom.gov.tr/bildirim/tr-23-0656
2023-07-12T07:28:20.249Z
2023-11-23T09:13:25.667Z
2023-11-23T09:13:25.667Z
{'Vendor': 'Medart Health Services', 'Product': 'Medart Notification Panel', 'Versions': '0'}
CVE-2023-3261
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier contains a buffer overflow vulnerability in the librta.so.0.0.0 library.Successful exploitation could cause denial of service or unexpected behavior with respect to all interactions relying on the targeted vulnerable binary, including the ability to log in via the web server.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:23.491Z
2023-08-14T03:53:59.429Z
2023-08-25T05:07:39.859Z
{'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'}
CVE-2023-3148
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0 and classified as critical. This issue affects some unknown processing of the file admin\posts\manage_post.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231017 was assigned to this vulnerability.
https://vuldb.com/?id.231017
2023-06-07T13:55:56.490Z
2023-06-07T16:31:03.185Z
2023-10-23T12:50:28.817Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3518
HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.
https://discuss.hashicorp.com/t/hcsec-2023-25-consul-jwt-auth-in-l7-intentions-allow-for-mismatched-service-identity-and-jwt-providers/57004
2023-07-05T21:02:24.890Z
2023-08-09T15:06:52.406Z
2023-08-09T15:06:52.406Z
{'Vendor': 'HashiCorp', 'Product': 'Consul', 'Versions': '1.16.0'}
CVE-2023-3373
Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it.
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf
2023-06-23T01:32:29.994Z
2023-08-03T23:44:40.341Z
2023-08-03T23:44:40.341Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GOT2000 Series GT21 model', 'Versions': '01.49.000 and prior'}
CVE-2023-3689
A vulnerability classified as critical was found in Bylancer QuickQR 6.3.7. Affected by this vulnerability is an unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-234235. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234235
2023-07-15T16:26:09.864Z
2023-07-16T15:31:03.673Z
2023-10-23T15:27:09.039Z
{'Vendor': 'Bylancer', 'Product': 'QuickQR', 'Versions': '6.3.7'}
CVE-2023-3236
A vulnerability classified as critical has been found in mccms up to 2.6.5. This affects the function pic_save of the file sys/apps/controllers/admin/Comic.php. The manipulation of the argument pic leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231507.
https://vuldb.com/?id.231507
2023-06-14T05:48:17.365Z
2023-06-14T07:00:06.331Z
2023-10-23T13:14:54.003Z
{'Vendor': 'n/a', 'Product': 'mccms', 'Versions': '2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5'}
CVE-2023-3959
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220, CB6231, B8520, B8220, and CD321 IP Cameras with firmware version M2.1.6.05 are vulnerable to multiple instances of stack-based overflows. While processing XML elements from incoming network requests, the product does not sufficiently check or validate allocated buffer size. This may lead to remote code execution.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03
2023-07-26T18:38:50.354Z
2023-11-08T23:02:55.581Z
2023-11-08T23:02:55.581Z
{'Vendor': 'Zavio', 'Product': 'IP Camera CF7500', 'Versions': 'version M2.1.6.05'}
CVE-2023-3735
Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:20.929Z
2023-08-01T22:39:17.904Z
2023-08-01T22:39:17.904Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3365
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.14 does not have authorisation when deleting shipment, allowing any authenticated users, such as subscriber to delete arbitrary shipment
https://wpscan.com/vulnerability/21ce5baa-8085-4053-8d8b-f7d3e2ae70c1
2023-06-22T08:51:03.247Z
2023-08-07T14:31:21.483Z
2023-08-07T14:31:21.483Z
{'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'}
CVE-2023-3670
In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.
https://cert.vde.com/en/advisories/VDE-2023-024
2023-07-14T07:43:16.307Z
2023-07-28T07:52:33.639Z
2023-07-28T07:52:33.639Z
{'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.5.9.0'}
CVE-2023-3220
An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93340e10b9c5fc86730d149636e0aa8b47bb5a34
2023-06-13T00:00:00
2023-06-20T00:00:00
2023-06-20T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': '6.2.0-rc2'}
CVE-2023-3109
Cross-site Scripting (XSS) - Stored in GitHub repository admidio/admidio prior to 4.2.8.
https://huntr.dev/bounties/6fa6070e-8f7f-43ae-8a84-e36b28256123
2023-06-05T00:00:00
2023-06-05T00:00:00
2023-06-05T00:00:00
{'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'}
CVE-2023-3559
A vulnerability classified as problematic was found in GZ Scripts PHP GZ Appointment Scheduling Script 1.8. Affected by this vulnerability is an unknown functionality of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233353 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233353
2023-07-08T11:55:08.407Z
2023-07-08T14:31:03.417Z
2023-10-23T14:29:21.520Z
{'Vendor': 'GZ Scripts', 'Product': 'PHP GZ Appointment Scheduling Script', 'Versions': '1.8'}
CVE-2023-3332
Improper Neutralization of Input During Web Page Generation vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to  execute an arbitrary script, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.
https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
2023-06-20T01:14:10.138Z
2023-06-28T01:25:03.905Z
2023-07-03T02:10:55.668Z
{'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'}
CVE-2023-3762
A vulnerability was found in Intergard SGS 8.7.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to cleartext storage of sensitive information in memory. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-234447. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234447
2023-07-18T19:29:30.097Z
2023-07-19T06:31:03.558Z
2023-10-23T17:36:24.565Z
{'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'}
CVE-2023-3277
The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address. We are disclosing this issue as the developer has not yet released a patch, but continues to release updates and we escalated this issue to the plugin's team 30 days ago.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c0c35-5f44-488f-9fe1-269ea4a73854?source=cve
2023-06-15T13:27:17.682Z
2023-11-03T11:29:49.440Z
2023-11-03T11:29:49.440Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-3627
Cross-Site Request Forgery (CSRF) in GitHub repository salesagility/suitecrm-core prior to 8.3.1.
https://huntr.dev/bounties/558b3dce-db03-47ba-b60b-c6eb578e04f1
2023-07-11T16:08:45.598Z
2023-07-11T16:08:59.618Z
2023-07-11T16:08:59.618Z
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm-core', 'Versions': 'unspecified'}
CVE-2023-3333
Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities.
https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
2023-06-20T01:14:11.982Z
2023-06-28T01:33:27.976Z
2023-07-03T02:11:31.242Z
{'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'}
CVE-2023-3763
A vulnerability was found in Intergard SGS 8.7.0. It has been declared as problematic. This vulnerability affects unknown code of the component SQL Query Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234448. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234448
2023-07-18T19:29:58.633Z
2023-07-19T07:00:05.033Z
2023-10-23T17:37:37.701Z
{'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'}
CVE-2023-3299
HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.
https://discuss.hashicorp.com/t/hcsec-2023-21-nomad-caller-acl-tokens-secret-id-is-exposed-to-sentinel/56271
2023-06-16T18:47:08.212Z
2023-07-19T23:35:12.990Z
2023-07-19T23:35:12.990Z
{'Vendor': 'HashiCorp', 'Product': 'Nomad Enterprise', 'Versions': '1.2.11, 1.2.11'}
CVE-2023-3276
A vulnerability, which was classified as problematic, has been found in Dromara HuTool up to 5.8.19. Affected by this issue is the function readBySax of the file XmlUtil.java of the component XML Parsing Module. The manipulation leads to xml external entity reference. The exploit has been disclosed to the public and may be used. VDB-231626 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.231626
2023-06-15T12:16:46.960Z
2023-06-15T13:00:03.622Z
2023-10-23T13:24:39.577Z
{'Vendor': 'Dromara', 'Product': 'HuTool', 'Versions': '5.8.0, 5.8.1, 5.8.2, 5.8.3, 5.8.4, 5.8.5, 5.8.6, 5.8.7, 5.8.8, 5.8.9, 5.8.10, 5.8.11, 5.8.12, 5.8.13, 5.8.14, 5.8.15, 5.8.16, 5.8.17, 5.8.18, 5.8.19'}
CVE-2023-3626
A vulnerability, which was classified as critical, has been found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230706. This issue affects some unknown processing of the file /Duty/AjaxHandle/UpLoadFloodPlanFile.ashx of the component UpLoadFloodPlanFile. The manipulation of the argument Filedata leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233579. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233579
2023-07-11T15:33:15.320Z
2023-07-11T18:00:04.259Z
2023-10-23T15:01:31.467Z
{'Vendor': 'Suncreate', 'Product': 'Mountain Flood Disaster Prevention Monitoring and Early Warning System', 'Versions': '20230706'}
CVE-2023-3108
A flaw was found in the subsequent get_user_pages_fast in the Linux kernel’s interface for symmetric key cipher algorithms in the skcipher_recvmsg of crypto/algif_skcipher.c function. This flaw allows a local user to crash the system.
https://access.redhat.com/security/cve/CVE-2023-3108
2023-06-05T14:35:45.680Z
2023-07-11T15:45:03.258Z
2024-01-23T02:25:15.765Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '4.0-rc1'}
CVE-2023-3558
A vulnerability classified as problematic has been found in GZ Scripts Event Booking Calendar 1.8. Affected is an unknown function of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-233352. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233352
2023-07-08T11:53:56.686Z
2023-07-08T14:00:04.816Z
2023-10-23T14:28:08.354Z
{'Vendor': 'GZ Scripts', 'Product': 'Event Booking Calendar', 'Versions': '1.8'}
CVE-2023-3734
Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:20.827Z
2023-08-01T22:39:17.738Z
2023-08-01T22:39:17.738Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3364
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.14 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use AutolinkFilter to the preview_markdown endpoint.
https://gitlab.com/gitlab-org/gitlab/-/issues/415995
2023-06-22T07:15:42.079Z
2023-08-01T23:36:00.662Z
2023-08-01T23:36:00.662Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '8.14, 16.1, 16.2'}
CVE-2023-3671
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.4 does not sanitise and escape various parameters before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/8b765f39-38e0-49c7-843a-a5b9375a32e7
2023-07-14T08:38:19.749Z
2023-08-07T14:31:22.330Z
2023-08-07T14:31:22.330Z
{'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'}
CVE-2023-3221
User enumeration vulnerability in Password Recovery plugin 1.2 version for Roundcube, which could allow a remote attacker to create a test script against the password recovery function to enumerate all users in the database.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-roundcube-password-recovery-plugin
2023-06-13T15:40:01.925Z
2023-09-04T12:31:30.699Z
2023-09-04T12:31:30.699Z
{'Vendor': 'AlfnRU', 'Product': 'Password Recovery Plugin', 'Versions': '1.2'}
CVE-2023-3958
The WP Remote Users Sync plugin for WordPress is vulnerable to Server Side Request Forgery via the 'notify_ping_remote' AJAX function in versions up to, and including, 1.2.12. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. This was partially patched in version 1.2.12 and fully patched in version 1.2.13.
https://www.wordfence.com/threat-intel/vulnerabilities/id/2e78c759-4a54-4ee4-8eff-df91fe9dad46?source=cve
2023-07-26T18:07:16.600Z
2023-08-16T04:36:00.625Z
2023-08-16T04:36:00.625Z
{'Vendor': 'frogerme', 'Product': 'WP Remote Users Sync', 'Versions': '*'}
CVE-2023-3372
The Lana Shortcodes WordPress plugin before 1.2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which allows users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/3396b734-9a10-4070-802d-f9d01cc6eb74/
2023-06-22T19:47:05.619Z
2024-01-16T15:55:36.145Z
2024-01-16T15:55:36.145Z
{'Vendor': 'Unknown', 'Product': 'Lana Shortcodes', 'Versions': '0'}
CVE-2023-3688
A vulnerability classified as critical has been found in Bylancer QuickJob 6.1. Affected is an unknown function of the component GET Parameter Handler. The manipulation of the argument keywords/gender leads to sql injection. It is possible to launch the attack remotely. VDB-234234 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234234
2023-07-15T16:24:04.104Z
2023-07-16T14:31:02.872Z
2023-10-23T15:25:55.877Z
{'Vendor': 'Bylancer', 'Product': 'QuickJob', 'Versions': '6.1'}
CVE-2023-3722
An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.
https://download.avaya.com/css/public/documents/101076366
2023-07-17T19:33:59.907Z
2023-07-19T19:56:52.681Z
2023-07-19T19:56:52.681Z
{'Vendor': 'Avaya', 'Product': 'Aura Device Services', 'Versions': '0'}
CVE-2023-3237
A vulnerability classified as critical was found in OTCMS up to 6.62. This vulnerability affects unknown code. The manipulation of the argument username/password with the input admin leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231508.
https://vuldb.com/?id.231508
2023-06-14T06:12:33.580Z
2023-06-14T07:31:03.348Z
2023-10-23T13:16:07.171Z
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'}
CVE-2023-3667
The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/9f2f3f85-6812-46b5-9175-c56f6852afd7
2023-07-13T18:34:15.748Z
2023-08-21T12:29:48.158Z
2023-08-21T12:29:48.158Z
{'Vendor': 'Unknown', 'Product': 'Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget', 'Versions': '0'}
CVE-2023-3149
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file admin\user\manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-231018 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.231018
2023-06-07T13:56:00.201Z
2023-06-07T17:00:03.574Z
2023-10-23T12:51:42.006Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3519
Unauthenticated remote code execution
https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
2023-07-05T22:22:26.251Z
2023-07-19T17:51:39.739Z
2023-07-19T17:51:39.739Z
{'Vendor': 'Citrix', 'Product': 'NetScaler ADC\u202f', 'Versions': '13.1, 13.0, 13.1-FIPS, 12.1-FIPS, 12.1-NDcPP'}
CVE-2023-3775
A Vault Enterprise Sentinel Role Governing Policy created by an operator to restrict access to resources in one namespace can be applied to requests outside in another non-descendant namespace, potentially resulting in denial of service. Fixed in Vault Enterprise 1.15.0, 1.14.4, 1.13.8.
https://discuss.hashicorp.com/t/hcsec-2023-29-vault-enterprise-s-sentinel-rgp-policies-allowed-for-cross-namespace-denial-of-service/58653
2023-07-19T14:34:43.733Z
2023-09-28T23:17:24.349Z
2023-09-28T23:17:24.349Z
{'Vendor': 'HashiCorp', 'Product': 'Vault Enterprise', 'Versions': '1.14.0, 1.13.0, 0.11.0'}
CVE-2023-3325
The CMS Commander plugin for WordPress is vulnerable to authorization bypass due to the use of an insufficiently unique cryptographic signature on the 'cmsc_add_site' function in versions up to, and including, 2.287. This makes it possible for unauthenticated attackers to the plugin to change the '_cmsc_public_key' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation. This can only be exploited if the plugin has not been configured yet, however, if combined with another arbitrary plugin installation and activation vulnerability, the impact can be severe.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ca37d453-9f9a-46b2-a17f-65a16e3e2ed1?source=cve
2023-06-19T16:11:05.271Z
2023-06-20T04:27:34.647Z
2023-06-20T04:27:34.647Z
{'Vendor': 'thoefter', 'Product': 'CMS Commander – Manage Multiple Sites', 'Versions': '*'}
CVE-2023-3260
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to command injection via the `user-name` URL parameter. An authenticated malicious agent can exploit this vulnerability to execute arbitrary command on the underlying Linux operating system.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:21.260Z
2023-08-14T03:51:52.015Z
2023-08-25T05:06:44.868Z
{'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'}
CVE-2023-3974
OS Command Injection in GitHub repository jgraph/drawio prior to 21.4.0.
https://huntr.dev/bounties/ce75aa04-e4d6-4e0a-9db0-ae84c46ae9e2
2023-07-27T14:33:26.406Z
2023-07-27T14:33:31.671Z
2023-07-27T14:33:31.671Z
{'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'}
CVE-2023-3077
The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin.
https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432
2023-06-02T20:28:25.930Z
2023-07-10T12:40:19.779Z
2023-07-10T13:05:42.696Z
{'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'}
CVE-2023-3427
The Salon Booking System plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.4.6. This is due to missing or incorrect nonce validation on the 'save_customer' function. This makes it possible for unauthenticated attackers to change the admin role to customer or change the user meta to arbitrary values via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/93875f19-d9b9-4e33-bba9-afc75cf26bf2?source=cve
2023-06-27T11:48:55.558Z
2023-06-28T01:48:22.850Z
2023-06-28T01:48:22.850Z
{'Vendor': 'wordpresschef', 'Product': 'Salon booking system', 'Versions': '*'}
CVE-2023-3132
The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including the entire installations database if a backup occurs and the deletion of the back-up files fail.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414?source=cve
2023-06-06T19:42:36.573Z
2023-06-27T02:54:08.748Z
2023-06-27T02:54:08.748Z
{'Vendor': 'mainwp', 'Product': 'MainWP Child – Securely Connects Sites to the MainWP WordPress Manager Dashboard', 'Versions': '*'}
CVE-2023-3562
A vulnerability has been found in GZ Scripts PHP CRM Platform 1.8 and classified as problematic. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument action leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-233356. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233356
2023-07-08T13:21:32.754Z
2023-07-08T16:00:05.017Z
2023-10-23T14:33:01.051Z
{'Vendor': 'GZ Scripts', 'Product': 'PHP CRM Platform', 'Versions': '1.8'}
CVE-2023-3098
A vulnerability classified as critical has been found in KylinSoft youker-assistant on KylinOS. Affected is the function restore_all_sound_file. The manipulation leads to path traversal: '../filedir'. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.2-0kylin6k70-23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230688. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230688
2023-06-05T05:07:52.876Z
2023-06-05T06:31:03.614Z
2023-10-23T12:37:03.553Z
{'Vendor': 'KylinSoft', 'Product': 'youker-assistant', 'Versions': 'n/a'}
CVE-2023-3831
A vulnerability was found in Bug Finder Finounce 1.0 and classified as problematic. This issue affects some unknown processing of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235157
2023-07-21T20:39:43.243Z
2023-07-22T15:00:05.545Z
2023-10-24T06:19:41.314Z
{'Vendor': 'Bug Finder', 'Product': 'Finounce', 'Versions': '1.0'}
CVE-2023-3470
Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account.  The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with physical access to the FIPS HSM, the information required to generate the correct password.  On vCMP systems, all Guests share the same deterministic password, allowing those with TMSH access on one Guest to access keys of a different Guest. The following BIG-IP hardware platforms are affected: 10350v-F, i5820-DF, i7820-DF, i15820-DF, 5250v-F, 7200v-F, 10200v-F, 6900-F, 8900-F, 11000-F, and 11050-F. The BIG-IP rSeries r5920-DF and r10920-DF are not affected, nor does the issue affect software FIPS implementations or network HSM configurations. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
https://my.f5.com/manage/s/article/K000135449
2023-06-30T00:29:46.174Z
2023-08-02T15:54:14.218Z
2023-08-02T15:54:14.218Z
{'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '16.0.0, 15.1.0, 14.1.0, 13.1.0'}
CVE-2023-3020
Cross-site Scripting (XSS) - Reflected in GitHub repository mkucej/i-librarian-free prior to 5.10.4.
https://huntr.dev/bounties/92cbe37c-33fa-43bf-8d5b-69aebf51d32c
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'mkucej', 'Product': 'mkucej/i-librarian-free', 'Versions': 'unspecified'}
CVE-2023-3889
A local non-privileged user can make improper GPU memory processing operations. If the operations are carefully prepared, then they could be used to gain access to already freed memory.
https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities
2023-07-24T16:57:36.839Z
2023-11-07T15:28:43.500Z
2023-11-14T22:27:03.983Z
{'Vendor': 'Arm Ltd', 'Product': 'Valhall GPU Kernel Driver', 'Versions': 'r38p0'}
CVE-2023-3535
A vulnerability was found in SimplePHPscripts FAQ Script PHP 2.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233287.
https://vuldb.com/?id.233287
2023-07-07T11:56:13.678Z
2023-07-07T12:31:03.141Z
2023-10-23T14:11:02.800Z
{'Vendor': 'SimplePHPscripts', 'Product': 'FAQ Script PHP', 'Versions': '2.3'}
CVE-2023-3165
A vulnerability was found in SourceCodester Life Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file insertNominee.php of the component POST Parameter Handler. The manipulation of the argument nominee_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231109 was assigned to this vulnerability.
https://vuldb.com/?id.231109
2023-06-08T16:47:09.600Z
2023-06-08T17:00:04.954Z
2023-10-23T12:57:48.030Z
{'Vendor': 'SourceCodester', 'Product': 'Life Insurance Management System', 'Versions': '1.0'}
CVE-2023-3309
A vulnerability classified as problematic was found in SourceCodester Resort Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file ?page=rooms of the component Manage Room Page. The manipulation of the argument Cottage Number leads to cross site scripting. The attack can be launched remotely. The identifier VDB-231805 was assigned to this vulnerability.
https://vuldb.com/?id.231805
2023-06-18T11:23:26.924Z
2023-06-18T11:31:03.536Z
2023-10-23T13:30:45.859Z
{'Vendor': 'SourceCodester', 'Product': 'Resort Reservation System', 'Versions': '1.0'}
CVE-2023-3759
A vulnerability, which was classified as critical, was found in Intergard SGS 8.7.0. Affected is an unknown function. The manipulation leads to permission issues. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234444. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234444
2023-07-18T19:27:52.196Z
2023-07-19T05:00:04.934Z
2023-10-23T17:32:44.992Z
{'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'}
CVE-2023-3935
A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf
2023-07-25T13:02:40.206Z
2023-09-13T13:19:18.392Z
2023-09-19T07:00:20.911Z
{'Vendor': 'Wibu', 'Product': 'CodeMeter Runtime', 'Versions': '0.0'}
CVE-2023-3036
An unchecked read in NTP server in github.com/cloudflare/cfnts prior to commit 783490b https://github.com/cloudflare/cfnts/commit/783490b913f05e508a492cd7b02e3c4ec2297b71  enabled a remote attacker to trigger a panic by sending an NTSAuthenticator packet with extension length longer than the packet contents.
https://github.com/cloudflare/cfnts/security/advisories/GHSA-pwx6-gw47-96cp
2023-06-01T13:38:17.881Z
2023-06-14T11:08:08.969Z
2023-06-14T11:08:28.361Z
{'Vendor': 'Cloudflare', 'Product': 'cfnts', 'Versions': '0'}
CVE-2023-3466
Reflected Cross-Site Scripting (XSS)
https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467
2023-06-29T21:03:53.903Z
2023-07-19T18:21:05.262Z
2023-07-19T18:21:05.262Z
{'Vendor': 'Citrix', 'Product': 'NetScaler ADC\u202f', 'Versions': '13.1, 13.0, 13.1-FIPS, 12.1-FIPS , 12.1-NDcPP'}
CVE-2023-3173
Improper Restriction of Excessive Authentication Attempts in GitHub repository froxlor/froxlor prior to 2.0.20.
https://huntr.dev/bounties/4d715f76-950d-4251-8139-3dffea798f14
2023-06-09T00:00:00
2023-06-09T00:00:00
2023-06-09T00:00:00
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-3489
The firmwaredownload command on Brocade Fabric OS v9.2.0 could log the FTP/SFTP/SCP server password in clear text in the SupportSave file when performing a downgrade from Fabric OS v9.2.0 to any earlier version of Fabric OS.
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510
2023-06-30T20:35:33.224Z
2023-08-30T23:56:07.070Z
2023-08-30T23:56:18.010Z
{'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'Brocade Fabric OS v9.2.0'}
CVE-2023-3523
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac
2023-07-06T09:53:37.081Z
2023-07-06T09:53:48.451Z
2023-07-06T09:53:48.451Z
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-3870
null
null
2023-07-24T16:20:21.832Z
2023-07-24T16:49:18.201Z
2023-07-24T16:57:24.698Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3431
Improper Access Control in GitHub repository plantuml/plantuml prior to 1.2023.9.
https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c
2023-06-27T14:28:22.500Z
2023-06-27T14:28:33.739Z
2023-06-27T14:28:33.739Z
{'Vendor': 'plantuml', 'Product': 'plantuml/plantuml', 'Versions': 'unspecified'}
CVE-2023-3061
A vulnerability was found in code-projects Agro-School Management System 1.0 and classified as critical. This issue affects some unknown processing of the file btn_functions.php of the component Attachment Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-230567.
https://vuldb.com/?id.230567
2023-06-02T12:46:18.368Z
2023-06-02T14:00:04.355Z
2023-10-23T07:51:12.053Z
{'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'}
CVE-2023-3962
The Winters theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8b75a1-f0f2-445b-a1c7-1628916470d3?source=cve
2023-07-26T21:37:15.085Z
2023-10-20T15:06:22.488Z
2023-10-20T15:06:22.488Z
{'Vendor': 'myshopkit', 'Product': 'Winters - WordPress Blog Theme', 'Versions': '*'}
CVE-2023-3827
A vulnerability was found in Bug Finder Listplace Directory Listing Platform 3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /listplace/user/ticket/create of the component HTTP POST Request Handler. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235148. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235148
2023-07-21T20:25:37.628Z
2023-07-22T09:00:05.183Z
2023-10-24T06:14:48.604Z
{'Vendor': 'Bug Finder', 'Product': 'Listplace Directory Listing Platform', 'Versions': '3.0'}
CVE-2023-3574
Improper Authorization in GitHub repository pimcore/customer-data-framework prior to 3.4.1.
https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6
2023-07-10T08:48:21.236Z
2023-07-10T08:48:31.650Z
2023-07-10T08:48:31.650Z
{'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'}
CVE-2023-3124
The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6. This makes it possible for authenticated attackers with subscriber-level capabilities to update arbitrary site options, which can lead to privilege escalation.
https://www.wordfence.com/threat-intel/vulnerabilities/id/570474f2-c118-45e1-a237-c70b849b2d3c?source=cve
2023-06-06T12:43:23.617Z
2023-06-07T01:51:20.759Z
2023-06-07T01:51:20.759Z
{'Vendor': 'https://elementor.com/', 'Product': 'Elementor Website Builder Pro', 'Versions': '*'}
CVE-2023-3348
The Wrangler command line tool  (<[email protected] or <[email protected]) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.
https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp
2023-06-21T07:20:37.335Z
2023-08-03T13:47:07.296Z
2023-08-29T09:17:49.419Z
{'Vendor': 'Cloudflare', 'Product': 'Wrangler', 'Versions': '3, 2'}
CVE-2023-3718
An authenticated command injection vulnerability exists in the AOS-CX command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands on the underlying operating system as a privileged user on the affected switch. This allows an attacker to fully compromise the underlying operating system on the device running AOS-CX.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-010.txt
2023-07-17T17:36:17.204Z
2023-08-01T18:25:10.262Z
2023-08-01T18:25:10.262Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba CX Switches', 'Versions': 'AOS-CX 10.11.xxxx: 10.11.1010 and below, AOS-CX 10.10.xxxx: 10.10.1050 and below'}
CVE-2023-3295
The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) for WordPress is vulnerable to arbitrary file uploads due to missing file type validation of files in the file manager functionality in versions up to, and including, 1.5.66 . This makes it possible for authenticated attackers, with contributor-level permissions and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The issue was partially patched in version 1.5.66 and fully patched in 1.5.67
https://www.wordfence.com/threat-intel/vulnerabilities/id/ce1ac711-6026-49ef-b66b-2cc199697942?source=cve
2023-06-16T12:36:31.620Z
2023-06-17T01:48:18.106Z
2023-06-17T01:48:18.106Z
{'Vendor': 'unitecms', 'Product': 'Unlimited Elements For Elementor (Free Widgets, Addons, Templates)', 'Versions': '*'}
CVE-2023-3153
A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.
https://access.redhat.com/security/cve/CVE-2023-3153
2023-06-07T18:04:42.140Z
2023-10-04T11:13:40.083Z
2023-10-04T11:13:40.083Z
{'Vendor': 'n/a', 'Product': 'ovn', 'Versions': '22.12.1, 22.03.3, 23.06.1, 23.03.1, 22.09.2'}
CVE-2023-3503
A vulnerability has been found in SourceCodester Shopping Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file insert-product.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232951.
https://vuldb.com/?id.232951
2023-07-04T13:26:25.621Z
2023-07-04T14:31:03.508Z
2023-10-23T14:02:30.253Z
{'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'}
CVE-2023-3850
A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_category of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The identifier VDB-235201 was assigned to this vulnerability.
https://vuldb.com/?id.235201
2023-07-22T18:28:43.333Z
2023-07-23T10:00:05.905Z
2023-10-24T06:42:51.724Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}