CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3430 | A vulnerability was found in OpenImageIO, where a heap buffer overflow exists in the src/gif.imageio/gifinput.cpp file. This flaw allows a remote attacker to pass a specially crafted file to the application, which triggers a heap-based buffer overflow and could cause a crash, leading to a denial of service. | https://bugzilla.redhat.com/show_bug.cgi?id=2218380 | 2023-06-27T13:55:43.943Z | 2023-12-18T13:40:05.145Z | 2023-12-18T13:40:05.145Z | {'Vendor': 'n/a', 'Product': 'OpenImageIO', 'Versions': '2.4.12.0'} |
CVE-2023-3060 | A vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as problematic. This vulnerability affects the function doAddQuestion of the file btn_functions.php. The manipulation of the argument Question leads to cross site scripting. The attack can be initiated remotely. VDB-230566 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230566 | 2023-06-02T12:46:16.259Z | 2023-06-02T13:31:03.690Z | 2023-10-23T07:49:58.887Z | {'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'} |
CVE-2023-3826 | A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=recruit/resume/edit&op=status of the component Interview Handler. The manipulation of the argument resumeid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235147. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235147 | 2023-07-21T20:23:05.432Z | 2023-07-22T06:27:31.560Z | 2023-10-24T06:13:35.467Z | {'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'} |
CVE-2023-3575 | The Quiz And Survey Master WordPress plugin before 8.1.11 does not properly sanitize and escape question titles, which could allow users with the Contributor role and above to perform Stored Cross-Site Scripting attacks | https://wpscan.com/vulnerability/6f884688-2c0d-4844-bd31-ef7085edf112 | 2023-07-10T09:02:10.344Z | 2023-08-07T14:31:20.665Z | 2023-10-11T08:42:41.211Z | {'Vendor': 'Unknown', 'Product': 'Quiz And Survey Master', 'Versions': '0'} |
CVE-2023-3125 | The B2BKing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'b2bking_save_price_import' function in versions up to, and including, 4.6.00. This makes it possible for Authenticated attackers with subscriber or customer-level permissions to modify the pricing of any product on the site. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f2c4c3-73d6-4b3b-8eb3-c494f52dc183?source=cve | 2023-06-06T13:12:53.381Z | 2023-06-07T01:51:40.160Z | 2023-06-07T01:51:40.160Z | {'Vendor': 'webwizardsdev', 'Product': 'B2BKing — Ultimate WooCommerce Wholesale and B2B Solution', 'Versions': '*'} |
CVE-2023-3037 | Improper authorization vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to access the platform without authentication and retrieve personal data via the jsonGrid parameter. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community | 2023-06-01T14:15:05.441Z | 2023-10-04T11:10:09.394Z | 2023-10-04T11:10:09.394Z | {'Vendor': 'HelpDezk', 'Product': 'HelpDezk Community', 'Versions': '1.1.10'} |
CVE-2023-3467 | Privilege Escalation to root administrator (nsroot)
| https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467 | 2023-06-29T21:04:13.952Z | 2023-07-19T18:35:56.843Z | 2023-07-19T18:35:56.843Z | {'Vendor': 'Citrix', 'Product': 'NetScaler ADC\u202f', 'Versions': '13.1, 13.0, 13.1-FIPS, 12.1-FIPS, 12.1-NDcPP'} |
CVE-2023-3172 | Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20. | https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e | 2023-06-09T00:00:00 | 2023-06-09T00:00:00 | 2023-06-09T00:00:00 | {'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'} |
CVE-2023-3488 | Uninitialized buffer in GBL parser in Silicon Labs GSDK v4.3.0 and earlier allows attacker to leak data from Secure stack via malformed GBL file.
| https://github.com/SiliconLabs/gecko_sdk/releases | 2023-06-30T18:47:17.761Z | 2023-07-28T15:36:29.124Z | 2023-07-28T15:36:29.124Z | {'Vendor': 'silabs.com', 'Product': 'Gecko Bootloader', 'Versions': '0'} |
CVE-2023-3522 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in a2 License Portal System allows SQL Injection.This issue affects License Portal System: before 1.48.
| https://www.usom.gov.tr/bildirim/tr-23-0445 | 2023-07-06T07:20:46.184Z | 2023-08-08T15:13:35.989Z | 2023-08-08T15:19:27.867Z | {'Vendor': 'a2', 'Product': 'License Portal System', 'Versions': '0'} |
CVE-2023-3871 | A vulnerability classified as critical has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235233 was assigned to this vulnerability. | https://vuldb.com/?id.235233 | 2023-07-24T16:38:38.601Z | 2023-07-24T21:31:03.873Z | 2023-10-24T06:57:30.867Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3308 | A vulnerability classified as problematic has been found in whaleal IceFrog 1.1.8. Affected is an unknown function of the component Aviator Template Engine. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231804. | https://vuldb.com/?id.231804 | 2023-06-18T07:49:21.370Z | 2023-06-18T09:00:03.513Z | 2023-10-23T13:29:32.675Z | {'Vendor': 'whaleal', 'Product': 'IceFrog', 'Versions': '1.1.8'} |
CVE-2023-3471 | Buffer overflow vulnerability in Panasonic KW Watcher versions 1.00 through 2.82 may allow attackers to execute arbitrary code. | https://www3.panasonic.biz/ac/e/fasys/software_info/eco/kwwatcher_versioninfo.jsp | 2023-06-30T05:37:43.856Z | 2023-09-06T04:04:41.149Z | 2023-09-06T04:04:41.149Z | {'Vendor': 'Panasonic', 'Product': 'KW Watcher', 'Versions': '1.00'} |
CVE-2023-3021 | Cross-site Scripting (XSS) - Stored in GitHub repository mkucej/i-librarian-free prior to 5.10.4. | https://huntr.dev/bounties/9d289d3a-2931-4e94-b61c-449581736eff | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'mkucej', 'Product': 'mkucej/i-librarian-free', 'Versions': 'unspecified'} |
CVE-2023-3888 | A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-235250 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235250 | 2023-07-24T16:56:39.462Z | 2023-07-25T08:00:04.292Z | 2023-10-24T07:45:36.771Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3922 | An issue has been discovered in GitLab affecting all versions starting from 8.15 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible to hijack some links and buttons on the GitLab UI to a malicious page. | https://gitlab.com/gitlab-org/gitlab/-/issues/394770 | 2023-07-25T10:30:45.145Z | 2023-09-29T07:30:50.402Z | 2023-09-29T07:30:50.402Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.3, 16.4'} |
CVE-2023-3534 | A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file check_availability.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233286 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.233286 | 2023-07-07T11:51:04.463Z | 2023-07-07T12:00:04.953Z | 2023-10-23T14:09:49.310Z | {'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'} |
CVE-2023-3164 | A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file. | https://access.redhat.com/security/cve/CVE-2023-3164 | 2023-06-08T13:31:04.848Z | 2023-11-02T11:26:28.533Z | 2023-12-08T11:23:19.581Z | {'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': ''} |
CVE-2023-3975 | OS Command Injection in GitHub repository jgraph/drawio prior to 21.5.0. | https://huntr.dev/bounties/4da96d20-78ac-462e-910c-a14db9062161 | 2023-07-27T14:34:05.900Z | 2023-07-27T14:34:10.847Z | 2023-07-27T14:34:10.847Z | {'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'} |
CVE-2023-3076 | The MStore API WordPress plugin before 3.9.9 does not prevent visitors from creating user accounts with the role of their choice via their wholesale REST API endpoint. This is only exploitable if the site owner paid to access the plugin's pro features. | https://wpscan.com/vulnerability/ac662436-29d7-4ea6-84e1-f9e229b44f5b | 2023-06-02T19:43:51.327Z | 2023-07-10T12:40:16.209Z | 2023-07-19T07:50:08.150Z | {'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'} |
CVE-2023-3426 | The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations. | https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3426 | 2023-06-27T05:43:01.235Z | 2023-08-02T09:40:28.090Z | 2023-08-02T09:40:28.090Z | {'Vendor': 'Liferay', 'Product': 'DXP', 'Versions': '7.4.13.u81'} |
CVE-2023-3133 | The Tutor LMS WordPress plugin before 2.2.1 does not implement adequate permission checks for REST API endpoints, allowing unauthenticated attackers to access information from Lessons that should not be publicly available. | https://wpscan.com/vulnerability/3b6969a7-5cbc-4e16-8f27-5dde481237f5 | 2023-06-06T20:09:27.235Z | 2023-07-04T07:23:24.882Z | 2023-07-05T10:47:59.427Z | {'Vendor': 'Unknown', 'Product': 'Tutor LMS', 'Versions': '0'} |
CVE-2023-3563 | A vulnerability was found in GZ Scripts GZ E Learning Platform 1.8 and classified as problematic. This issue affects some unknown processing of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-233357 was assigned to this vulnerability. | https://vuldb.com/?id.233357 | 2023-07-08T13:23:23.690Z | 2023-07-08T16:31:03.315Z | 2023-10-23T14:42:00.330Z | {'Vendor': 'GZ Scripts', 'Product': 'GZ E Learning Platform', 'Versions': '1.8'} |
CVE-2023-3099 | A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function delete_file in the library dbus.SystemBus of the component Arbitrary File Handler. The manipulation leads to improper access controls. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.2-0kylin6k70-23 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-230689 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230689 | 2023-06-05T05:07:56.586Z | 2023-06-05T07:00:04.362Z | 2023-10-23T12:38:16.737Z | {'Vendor': 'KylinSoft', 'Product': 'youker-assistant', 'Versions': 'n/a'} |
CVE-2023-3830 | A vulnerability was found in Bug Finder SASS BILLER 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /company/store. The manipulation of the argument name leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235151. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235151 | 2023-07-21T20:32:22.415Z | 2023-07-22T14:31:03.964Z | 2023-10-24T06:18:28.164Z | {'Vendor': 'Bug Finder', 'Product': 'SASS BILLER', 'Versions': '1.0'} |
CVE-2023-3774 | An unhandled error in Vault Enterprise's namespace creation may cause the Vault process to crash, potentially resulting in denial of service. Fixed in 1.14.1, 1.13.5, and 1.12.9. | https://discuss.hashicorp.com/t/hcsec-2023-23-vault-enterprise-namespace-creation-may-lead-to-denial-of-service/56617 | 2023-07-19T14:24:44.833Z | 2023-07-28T00:45:04.379Z | 2023-07-28T00:45:04.379Z | {'Vendor': 'HashiCorp', 'Product': 'Vault Enterprise', 'Versions': '1.14.0, 1.13.4, 1.12.8'} |
CVE-2023-3324 |
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
| https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 | 2023-06-19T15:47:23.648Z | 2023-07-24T17:20:49.522Z | 2024-01-24T11:49:17.721Z | {'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build'} |
CVE-2023-3631 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Medart Health Services Medart Notification Panel allows SQL Injection.This issue affects Medart Notification Panel: through 20231123.
NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
| https://https://www.usom.gov.tr/bildirim/tr-23-0656 | 2023-07-12T07:28:20.249Z | 2023-11-23T09:13:25.667Z | 2023-11-23T09:13:25.667Z | {'Vendor': 'Medart Health Services', 'Product': 'Medart Notification Panel', 'Versions': '0'} |
CVE-2023-3261 | The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier contains a buffer overflow vulnerability in the librta.so.0.0.0 library.Successful exploitation could cause denial of service or unexpected behavior with respect to all interactions relying on the targeted vulnerable binary, including the ability to log in via the web server. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:23.491Z | 2023-08-14T03:53:59.429Z | 2023-08-25T05:07:39.859Z | {'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'} |
CVE-2023-3148 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0 and classified as critical. This issue affects some unknown processing of the file admin\posts\manage_post.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231017 was assigned to this vulnerability. | https://vuldb.com/?id.231017 | 2023-06-07T13:55:56.490Z | 2023-06-07T16:31:03.185Z | 2023-10-23T12:50:28.817Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3518 | HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1. | https://discuss.hashicorp.com/t/hcsec-2023-25-consul-jwt-auth-in-l7-intentions-allow-for-mismatched-service-identity-and-jwt-providers/57004 | 2023-07-05T21:02:24.890Z | 2023-08-09T15:06:52.406Z | 2023-08-09T15:06:52.406Z | {'Vendor': 'HashiCorp', 'Product': 'Consul', 'Versions': '1.16.0'} |
CVE-2023-3373 | Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it. | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-006_en.pdf | 2023-06-23T01:32:29.994Z | 2023-08-03T23:44:40.341Z | 2023-08-03T23:44:40.341Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GOT2000 Series GT21 model', 'Versions': '01.49.000 and prior'} |
CVE-2023-3689 | A vulnerability classified as critical was found in Bylancer QuickQR 6.3.7. Affected by this vulnerability is an unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-234235. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234235 | 2023-07-15T16:26:09.864Z | 2023-07-16T15:31:03.673Z | 2023-10-23T15:27:09.039Z | {'Vendor': 'Bylancer', 'Product': 'QuickQR', 'Versions': '6.3.7'} |
CVE-2023-3236 | A vulnerability classified as critical has been found in mccms up to 2.6.5. This affects the function pic_save of the file sys/apps/controllers/admin/Comic.php. The manipulation of the argument pic leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231507. | https://vuldb.com/?id.231507 | 2023-06-14T05:48:17.365Z | 2023-06-14T07:00:06.331Z | 2023-10-23T13:14:54.003Z | {'Vendor': 'n/a', 'Product': 'mccms', 'Versions': '2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5'} |
CVE-2023-3959 | Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,
CB6231, B8520, B8220, and CD321
IP Cameras
with firmware version M2.1.6.05 are
vulnerable to multiple instances of stack-based overflows. While
processing XML elements from incoming network requests, the product does
not sufficiently check or validate allocated buffer size. This may lead
to remote code execution.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03 | 2023-07-26T18:38:50.354Z | 2023-11-08T23:02:55.581Z | 2023-11-08T23:02:55.581Z | {'Vendor': 'Zavio', 'Product': 'IP Camera CF7500', 'Versions': 'version M2.1.6.05'} |
CVE-2023-3735 | Inappropriate implementation in Web API Permission Prompts in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:20.929Z | 2023-08-01T22:39:17.904Z | 2023-08-01T22:39:17.904Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3365 | The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.14 does not have authorisation when deleting shipment, allowing any authenticated users, such as subscriber to delete arbitrary shipment | https://wpscan.com/vulnerability/21ce5baa-8085-4053-8d8b-f7d3e2ae70c1 | 2023-06-22T08:51:03.247Z | 2023-08-07T14:31:21.483Z | 2023-08-07T14:31:21.483Z | {'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'} |
CVE-2023-3670 | In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users. | https://cert.vde.com/en/advisories/VDE-2023-024 | 2023-07-14T07:43:16.307Z | 2023-07-28T07:52:33.639Z | 2023-07-28T07:52:33.639Z | {'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.5.9.0'} |
CVE-2023-3220 | An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93340e10b9c5fc86730d149636e0aa8b47bb5a34 | 2023-06-13T00:00:00 | 2023-06-20T00:00:00 | 2023-06-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': '6.2.0-rc2'} |
CVE-2023-3109 | Cross-site Scripting (XSS) - Stored in GitHub repository admidio/admidio prior to 4.2.8. | https://huntr.dev/bounties/6fa6070e-8f7f-43ae-8a84-e36b28256123 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | {'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'} |
CVE-2023-3559 | A vulnerability classified as problematic was found in GZ Scripts PHP GZ Appointment Scheduling Script 1.8. Affected by this vulnerability is an unknown functionality of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233353 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233353 | 2023-07-08T11:55:08.407Z | 2023-07-08T14:31:03.417Z | 2023-10-23T14:29:21.520Z | {'Vendor': 'GZ Scripts', 'Product': 'PHP GZ Appointment Scheduling Script', 'Versions': '1.8'} |
CVE-2023-3332 | Improper Neutralization of Input During Web Page Generation vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to
execute an arbitrary script, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities. | https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html | 2023-06-20T01:14:10.138Z | 2023-06-28T01:25:03.905Z | 2023-07-03T02:10:55.668Z | {'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'} |
CVE-2023-3762 | A vulnerability was found in Intergard SGS 8.7.0. It has been classified as problematic. This affects an unknown part. The manipulation leads to cleartext storage of sensitive information in memory. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-234447. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234447 | 2023-07-18T19:29:30.097Z | 2023-07-19T06:31:03.558Z | 2023-10-23T17:36:24.565Z | {'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'} |
CVE-2023-3277 | The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address. We are disclosing this issue as the developer has not yet released a patch, but continues to release updates and we escalated this issue to the plugin's team 30 days ago. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1c7c0c35-5f44-488f-9fe1-269ea4a73854?source=cve | 2023-06-15T13:27:17.682Z | 2023-11-03T11:29:49.440Z | 2023-11-03T11:29:49.440Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-3627 | Cross-Site Request Forgery (CSRF) in GitHub repository salesagility/suitecrm-core prior to 8.3.1. | https://huntr.dev/bounties/558b3dce-db03-47ba-b60b-c6eb578e04f1 | 2023-07-11T16:08:45.598Z | 2023-07-11T16:08:59.618Z | 2023-07-11T16:08:59.618Z | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm-core', 'Versions': 'unspecified'} |
CVE-2023-3333 | Improper Neutralization of Special Elements used in an OS Command vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to execute an arbitrary OS command with the root privilege, after obtaining a high privilege exploiting CVE-2023-3330 and CVE-2023-3331 vulnerabilities. | https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html | 2023-06-20T01:14:11.982Z | 2023-06-28T01:33:27.976Z | 2023-07-03T02:11:31.242Z | {'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'} |
CVE-2023-3763 | A vulnerability was found in Intergard SGS 8.7.0. It has been declared as problematic. This vulnerability affects unknown code of the component SQL Query Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234448. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234448 | 2023-07-18T19:29:58.633Z | 2023-07-19T07:00:05.033Z | 2023-10-23T17:37:37.701Z | {'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'} |
CVE-2023-3299 |
HashiCorp Nomad Enterprise 1.2.11 up to 1.5.6, and 1.4.10 ACL policies using a block without a label generates unexpected results. Fixed in 1.6.0, 1.5.7, and 1.4.11.
| https://discuss.hashicorp.com/t/hcsec-2023-21-nomad-caller-acl-tokens-secret-id-is-exposed-to-sentinel/56271 | 2023-06-16T18:47:08.212Z | 2023-07-19T23:35:12.990Z | 2023-07-19T23:35:12.990Z | {'Vendor': 'HashiCorp', 'Product': 'Nomad Enterprise', 'Versions': '1.2.11, 1.2.11'} |
CVE-2023-3276 | A vulnerability, which was classified as problematic, has been found in Dromara HuTool up to 5.8.19. Affected by this issue is the function readBySax of the file XmlUtil.java of the component XML Parsing Module. The manipulation leads to xml external entity reference. The exploit has been disclosed to the public and may be used. VDB-231626 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.231626 | 2023-06-15T12:16:46.960Z | 2023-06-15T13:00:03.622Z | 2023-10-23T13:24:39.577Z | {'Vendor': 'Dromara', 'Product': 'HuTool', 'Versions': '5.8.0, 5.8.1, 5.8.2, 5.8.3, 5.8.4, 5.8.5, 5.8.6, 5.8.7, 5.8.8, 5.8.9, 5.8.10, 5.8.11, 5.8.12, 5.8.13, 5.8.14, 5.8.15, 5.8.16, 5.8.17, 5.8.18, 5.8.19'} |
CVE-2023-3626 | A vulnerability, which was classified as critical, has been found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230706. This issue affects some unknown processing of the file /Duty/AjaxHandle/UpLoadFloodPlanFile.ashx of the component UpLoadFloodPlanFile. The manipulation of the argument Filedata leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233579. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233579 | 2023-07-11T15:33:15.320Z | 2023-07-11T18:00:04.259Z | 2023-10-23T15:01:31.467Z | {'Vendor': 'Suncreate', 'Product': 'Mountain Flood Disaster Prevention Monitoring and Early Warning System', 'Versions': '20230706'} |
CVE-2023-3108 | A flaw was found in the subsequent get_user_pages_fast in the Linux kernel’s interface for symmetric key cipher algorithms in the skcipher_recvmsg of crypto/algif_skcipher.c function. This flaw allows a local user to crash the system. | https://access.redhat.com/security/cve/CVE-2023-3108 | 2023-06-05T14:35:45.680Z | 2023-07-11T15:45:03.258Z | 2024-01-23T02:25:15.765Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '4.0-rc1'} |
CVE-2023-3558 | A vulnerability classified as problematic has been found in GZ Scripts Event Booking Calendar 1.8. Affected is an unknown function of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-233352. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233352 | 2023-07-08T11:53:56.686Z | 2023-07-08T14:00:04.816Z | 2023-10-23T14:28:08.354Z | {'Vendor': 'GZ Scripts', 'Product': 'Event Booking Calendar', 'Versions': '1.8'} |
CVE-2023-3734 | Inappropriate implementation in Picture In Picture in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:20.827Z | 2023-08-01T22:39:17.738Z | 2023-08-01T22:39:17.738Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3364 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.14 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use AutolinkFilter to the preview_markdown endpoint. | https://gitlab.com/gitlab-org/gitlab/-/issues/415995 | 2023-06-22T07:15:42.079Z | 2023-08-01T23:36:00.662Z | 2023-08-01T23:36:00.662Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '8.14, 16.1, 16.2'} |
CVE-2023-3671 | The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.4 does not sanitise and escape various parameters before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/8b765f39-38e0-49c7-843a-a5b9375a32e7 | 2023-07-14T08:38:19.749Z | 2023-08-07T14:31:22.330Z | 2023-08-07T14:31:22.330Z | {'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'} |
CVE-2023-3221 | User enumeration vulnerability in Password Recovery plugin 1.2 version for Roundcube, which could allow a remote attacker to create a test script against the password recovery function to enumerate all users in the database. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-roundcube-password-recovery-plugin | 2023-06-13T15:40:01.925Z | 2023-09-04T12:31:30.699Z | 2023-09-04T12:31:30.699Z | {'Vendor': 'AlfnRU', 'Product': 'Password Recovery Plugin', 'Versions': '1.2'} |
CVE-2023-3958 | The WP Remote Users Sync plugin for WordPress is vulnerable to Server Side Request Forgery via the 'notify_ping_remote' AJAX function in versions up to, and including, 1.2.12. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. This was partially patched in version 1.2.12 and fully patched in version 1.2.13. | https://www.wordfence.com/threat-intel/vulnerabilities/id/2e78c759-4a54-4ee4-8eff-df91fe9dad46?source=cve | 2023-07-26T18:07:16.600Z | 2023-08-16T04:36:00.625Z | 2023-08-16T04:36:00.625Z | {'Vendor': 'frogerme', 'Product': 'WP Remote Users Sync', 'Versions': '*'} |
CVE-2023-3372 | The Lana Shortcodes WordPress plugin before 1.2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which allows users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | https://wpscan.com/vulnerability/3396b734-9a10-4070-802d-f9d01cc6eb74/ | 2023-06-22T19:47:05.619Z | 2024-01-16T15:55:36.145Z | 2024-01-16T15:55:36.145Z | {'Vendor': 'Unknown', 'Product': 'Lana Shortcodes', 'Versions': '0'} |
CVE-2023-3688 | A vulnerability classified as critical has been found in Bylancer QuickJob 6.1. Affected is an unknown function of the component GET Parameter Handler. The manipulation of the argument keywords/gender leads to sql injection. It is possible to launch the attack remotely. VDB-234234 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234234 | 2023-07-15T16:24:04.104Z | 2023-07-16T14:31:02.872Z | 2023-10-23T15:25:55.877Z | {'Vendor': 'Bylancer', 'Product': 'QuickJob', 'Versions': '6.1'} |
CVE-2023-3722 | An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier. | https://download.avaya.com/css/public/documents/101076366 | 2023-07-17T19:33:59.907Z | 2023-07-19T19:56:52.681Z | 2023-07-19T19:56:52.681Z | {'Vendor': 'Avaya', 'Product': 'Aura Device Services', 'Versions': '0'} |
CVE-2023-3237 | A vulnerability classified as critical was found in OTCMS up to 6.62. This vulnerability affects unknown code. The manipulation of the argument username/password with the input admin leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231508. | https://vuldb.com/?id.231508 | 2023-06-14T06:12:33.580Z | 2023-06-14T07:31:03.348Z | 2023-10-23T13:16:07.171Z | {'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'} |
CVE-2023-3667 | The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/9f2f3f85-6812-46b5-9175-c56f6852afd7 | 2023-07-13T18:34:15.748Z | 2023-08-21T12:29:48.158Z | 2023-08-21T12:29:48.158Z | {'Vendor': 'Unknown', 'Product': 'Chat Button: WhatsApp Chat, Facebook Messenger, Telegram Chat, WeChat, Line Chat, Discord Chat for Customer Support Chat with floating Chat Widget', 'Versions': '0'} |
CVE-2023-3149 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been classified as critical. Affected is an unknown function of the file admin\user\manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-231018 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.231018 | 2023-06-07T13:56:00.201Z | 2023-06-07T17:00:03.574Z | 2023-10-23T12:51:42.006Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3519 | Unauthenticated remote code execution
| https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467 | 2023-07-05T22:22:26.251Z | 2023-07-19T17:51:39.739Z | 2023-07-19T17:51:39.739Z | {'Vendor': 'Citrix', 'Product': 'NetScaler ADC\u202f', 'Versions': '13.1, 13.0, 13.1-FIPS, 12.1-FIPS, 12.1-NDcPP'} |
CVE-2023-3775 | A Vault Enterprise Sentinel Role Governing Policy created by an operator to restrict access to resources in one namespace can be applied to requests outside in another non-descendant namespace, potentially resulting in denial of service. Fixed in Vault Enterprise 1.15.0, 1.14.4, 1.13.8. | https://discuss.hashicorp.com/t/hcsec-2023-29-vault-enterprise-s-sentinel-rgp-policies-allowed-for-cross-namespace-denial-of-service/58653 | 2023-07-19T14:34:43.733Z | 2023-09-28T23:17:24.349Z | 2023-09-28T23:17:24.349Z | {'Vendor': 'HashiCorp', 'Product': 'Vault Enterprise', 'Versions': '1.14.0, 1.13.0, 0.11.0'} |
CVE-2023-3325 | The CMS Commander plugin for WordPress is vulnerable to authorization bypass due to the use of an insufficiently unique cryptographic signature on the 'cmsc_add_site' function in versions up to, and including, 2.287. This makes it possible for unauthenticated attackers to the plugin to change the '_cmsc_public_key' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation. This can only be exploited if the plugin has not been configured yet, however, if combined with another arbitrary plugin installation and activation vulnerability, the impact can be severe. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ca37d453-9f9a-46b2-a17f-65a16e3e2ed1?source=cve | 2023-06-19T16:11:05.271Z | 2023-06-20T04:27:34.647Z | 2023-06-20T04:27:34.647Z | {'Vendor': 'thoefter', 'Product': 'CMS Commander – Manage Multiple Sites', 'Versions': '*'} |
CVE-2023-3260 | The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to command injection via the `user-name` URL parameter. An authenticated malicious agent can exploit this vulnerability to execute arbitrary command on the underlying Linux operating system. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:21.260Z | 2023-08-14T03:51:52.015Z | 2023-08-25T05:06:44.868Z | {'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'} |
CVE-2023-3974 | OS Command Injection in GitHub repository jgraph/drawio prior to 21.4.0. | https://huntr.dev/bounties/ce75aa04-e4d6-4e0a-9db0-ae84c46ae9e2 | 2023-07-27T14:33:26.406Z | 2023-07-27T14:33:31.671Z | 2023-07-27T14:33:31.671Z | {'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'} |
CVE-2023-3077 | The MStore API WordPress plugin before 3.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to a Blind SQL injection exploitable by unauthenticated users. This is only exploitable if the site owner elected to pay to get access to the plugins' pro features, and uses the woocommerce-appointments plugin. | https://wpscan.com/vulnerability/9480d0b5-97da-467d-98f6-71a32599a432 | 2023-06-02T20:28:25.930Z | 2023-07-10T12:40:19.779Z | 2023-07-10T13:05:42.696Z | {'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'} |
CVE-2023-3427 | The Salon Booking System plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 8.4.6. This is due to missing or incorrect nonce validation on the 'save_customer' function. This makes it possible for unauthenticated attackers to change the admin role to customer or change the user meta to arbitrary values via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/93875f19-d9b9-4e33-bba9-afc75cf26bf2?source=cve | 2023-06-27T11:48:55.558Z | 2023-06-28T01:48:22.850Z | 2023-06-28T01:48:22.850Z | {'Vendor': 'wordpresschef', 'Product': 'Salon booking system', 'Versions': '*'} |
CVE-2023-3132 | The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including the entire installations database if a backup occurs and the deletion of the back-up files fail. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a1fadba1-674f-4f3d-997f-d29d3a887414?source=cve | 2023-06-06T19:42:36.573Z | 2023-06-27T02:54:08.748Z | 2023-06-27T02:54:08.748Z | {'Vendor': 'mainwp', 'Product': 'MainWP Child – Securely Connects Sites to the MainWP WordPress Manager Dashboard', 'Versions': '*'} |
CVE-2023-3562 | A vulnerability has been found in GZ Scripts PHP CRM Platform 1.8 and classified as problematic. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument action leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-233356. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233356 | 2023-07-08T13:21:32.754Z | 2023-07-08T16:00:05.017Z | 2023-10-23T14:33:01.051Z | {'Vendor': 'GZ Scripts', 'Product': 'PHP CRM Platform', 'Versions': '1.8'} |
CVE-2023-3098 | A vulnerability classified as critical has been found in KylinSoft youker-assistant on KylinOS. Affected is the function restore_all_sound_file. The manipulation leads to path traversal: '../filedir'. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.2-0kylin6k70-23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230688. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230688 | 2023-06-05T05:07:52.876Z | 2023-06-05T06:31:03.614Z | 2023-10-23T12:37:03.553Z | {'Vendor': 'KylinSoft', 'Product': 'youker-assistant', 'Versions': 'n/a'} |
CVE-2023-3831 | A vulnerability was found in Bug Finder Finounce 1.0 and classified as problematic. This issue affects some unknown processing of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235157 | 2023-07-21T20:39:43.243Z | 2023-07-22T15:00:05.545Z | 2023-10-24T06:19:41.314Z | {'Vendor': 'Bug Finder', 'Product': 'Finounce', 'Versions': '1.0'} |
CVE-2023-3470 |
Specific F5 BIG-IP platforms with Cavium Nitrox FIPS HSM cards generate a deterministic password for the Crypto User account. The predictable nature of the password allows an authenticated user with TMSH access to the BIG-IP system, or anyone with physical access to the FIPS HSM, the information required to generate the correct password. On vCMP systems, all Guests share the same deterministic password, allowing those with TMSH access on one Guest to access keys of a different Guest.
The following BIG-IP hardware platforms are affected: 10350v-F, i5820-DF, i7820-DF, i15820-DF, 5250v-F, 7200v-F, 10200v-F, 6900-F, 8900-F, 11000-F, and 11050-F.
The BIG-IP rSeries r5920-DF and r10920-DF are not affected, nor does the issue affect software FIPS implementations or network HSM configurations.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| https://my.f5.com/manage/s/article/K000135449 | 2023-06-30T00:29:46.174Z | 2023-08-02T15:54:14.218Z | 2023-08-02T15:54:14.218Z | {'Vendor': 'F5', 'Product': 'BIG-IP', 'Versions': '16.0.0, 15.1.0, 14.1.0, 13.1.0'} |
CVE-2023-3020 | Cross-site Scripting (XSS) - Reflected in GitHub repository mkucej/i-librarian-free prior to 5.10.4. | https://huntr.dev/bounties/92cbe37c-33fa-43bf-8d5b-69aebf51d32c | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'mkucej', 'Product': 'mkucej/i-librarian-free', 'Versions': 'unspecified'} |
CVE-2023-3889 | A local non-privileged user can make improper GPU memory processing operations. If the operations are carefully prepared, then they could be used to gain access to already freed memory.
| https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities | 2023-07-24T16:57:36.839Z | 2023-11-07T15:28:43.500Z | 2023-11-14T22:27:03.983Z | {'Vendor': 'Arm Ltd', 'Product': 'Valhall GPU Kernel Driver', 'Versions': 'r38p0'} |
CVE-2023-3535 | A vulnerability was found in SimplePHPscripts FAQ Script PHP 2.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233287. | https://vuldb.com/?id.233287 | 2023-07-07T11:56:13.678Z | 2023-07-07T12:31:03.141Z | 2023-10-23T14:11:02.800Z | {'Vendor': 'SimplePHPscripts', 'Product': 'FAQ Script PHP', 'Versions': '2.3'} |
CVE-2023-3165 | A vulnerability was found in SourceCodester Life Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file insertNominee.php of the component POST Parameter Handler. The manipulation of the argument nominee_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231109 was assigned to this vulnerability. | https://vuldb.com/?id.231109 | 2023-06-08T16:47:09.600Z | 2023-06-08T17:00:04.954Z | 2023-10-23T12:57:48.030Z | {'Vendor': 'SourceCodester', 'Product': 'Life Insurance Management System', 'Versions': '1.0'} |
CVE-2023-3309 | A vulnerability classified as problematic was found in SourceCodester Resort Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file ?page=rooms of the component Manage Room Page. The manipulation of the argument Cottage Number leads to cross site scripting. The attack can be launched remotely. The identifier VDB-231805 was assigned to this vulnerability. | https://vuldb.com/?id.231805 | 2023-06-18T11:23:26.924Z | 2023-06-18T11:31:03.536Z | 2023-10-23T13:30:45.859Z | {'Vendor': 'SourceCodester', 'Product': 'Resort Reservation System', 'Versions': '1.0'} |
CVE-2023-3759 | A vulnerability, which was classified as critical, was found in Intergard SGS 8.7.0. Affected is an unknown function. The manipulation leads to permission issues. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234444. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234444 | 2023-07-18T19:27:52.196Z | 2023-07-19T05:00:04.934Z | 2023-10-23T17:32:44.992Z | {'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'} |
CVE-2023-3935 | A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system. | https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf | 2023-07-25T13:02:40.206Z | 2023-09-13T13:19:18.392Z | 2023-09-19T07:00:20.911Z | {'Vendor': 'Wibu', 'Product': 'CodeMeter Runtime', 'Versions': '0.0'} |
CVE-2023-3036 | An unchecked read in NTP server in github.com/cloudflare/cfnts prior to commit 783490b https://github.com/cloudflare/cfnts/commit/783490b913f05e508a492cd7b02e3c4ec2297b71 enabled a remote attacker to trigger a panic by sending an NTSAuthenticator packet with extension length longer than the packet contents.
| https://github.com/cloudflare/cfnts/security/advisories/GHSA-pwx6-gw47-96cp | 2023-06-01T13:38:17.881Z | 2023-06-14T11:08:08.969Z | 2023-06-14T11:08:28.361Z | {'Vendor': 'Cloudflare', 'Product': 'cfnts', 'Versions': '0'} |
CVE-2023-3466 | Reflected Cross-Site Scripting (XSS)
| https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467 | 2023-06-29T21:03:53.903Z | 2023-07-19T18:21:05.262Z | 2023-07-19T18:21:05.262Z | {'Vendor': 'Citrix', 'Product': 'NetScaler ADC\u202f', 'Versions': '13.1, 13.0, 13.1-FIPS, 12.1-FIPS , 12.1-NDcPP'} |
CVE-2023-3173 | Improper Restriction of Excessive Authentication Attempts in GitHub repository froxlor/froxlor prior to 2.0.20. | https://huntr.dev/bounties/4d715f76-950d-4251-8139-3dffea798f14 | 2023-06-09T00:00:00 | 2023-06-09T00:00:00 | 2023-06-09T00:00:00 | {'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'} |
CVE-2023-3489 | The
firmwaredownload command on Brocade Fabric OS v9.2.0 could log the
FTP/SFTP/SCP server password in clear text in the SupportSave file when
performing a downgrade from Fabric OS v9.2.0 to any earlier version of
Fabric OS.
| https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/22510 | 2023-06-30T20:35:33.224Z | 2023-08-30T23:56:07.070Z | 2023-08-30T23:56:18.010Z | {'Vendor': 'Brocade', 'Product': 'Fabric OS', 'Versions': 'Brocade Fabric OS v9.2.0'} |
CVE-2023-3523 | Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/57e0be03-8484-415e-8b5c-c1fe4546eaac | 2023-07-06T09:53:37.081Z | 2023-07-06T09:53:48.451Z | 2023-07-06T09:53:48.451Z | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-3870 | null | null | 2023-07-24T16:20:21.832Z | 2023-07-24T16:49:18.201Z | 2023-07-24T16:57:24.698Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3431 | Improper Access Control in GitHub repository plantuml/plantuml prior to 1.2023.9. | https://huntr.dev/bounties/fa741f95-b53c-4ed7-b157-e32c5145164c | 2023-06-27T14:28:22.500Z | 2023-06-27T14:28:33.739Z | 2023-06-27T14:28:33.739Z | {'Vendor': 'plantuml', 'Product': 'plantuml/plantuml', 'Versions': 'unspecified'} |
CVE-2023-3061 | A vulnerability was found in code-projects Agro-School Management System 1.0 and classified as critical. This issue affects some unknown processing of the file btn_functions.php of the component Attachment Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-230567. | https://vuldb.com/?id.230567 | 2023-06-02T12:46:18.368Z | 2023-06-02T14:00:04.355Z | 2023-10-23T07:51:12.053Z | {'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'} |
CVE-2023-3962 | The Winters theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8b75a1-f0f2-445b-a1c7-1628916470d3?source=cve | 2023-07-26T21:37:15.085Z | 2023-10-20T15:06:22.488Z | 2023-10-20T15:06:22.488Z | {'Vendor': 'myshopkit', 'Product': 'Winters - WordPress Blog Theme', 'Versions': '*'} |
CVE-2023-3827 | A vulnerability was found in Bug Finder Listplace Directory Listing Platform 3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /listplace/user/ticket/create of the component HTTP POST Request Handler. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235148. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235148 | 2023-07-21T20:25:37.628Z | 2023-07-22T09:00:05.183Z | 2023-10-24T06:14:48.604Z | {'Vendor': 'Bug Finder', 'Product': 'Listplace Directory Listing Platform', 'Versions': '3.0'} |
CVE-2023-3574 | Improper Authorization in GitHub repository pimcore/customer-data-framework prior to 3.4.1. | https://huntr.dev/bounties/1dcb4f01-e668-4aa3-a6a3-838532e500c6 | 2023-07-10T08:48:21.236Z | 2023-07-10T08:48:31.650Z | 2023-07-10T08:48:31.650Z | {'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'} |
CVE-2023-3124 | The Elementor Pro plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the update_page_option function in versions up to, and including, 3.11.6. This makes it possible for authenticated attackers with subscriber-level capabilities to update arbitrary site options, which can lead to privilege escalation. | https://www.wordfence.com/threat-intel/vulnerabilities/id/570474f2-c118-45e1-a237-c70b849b2d3c?source=cve | 2023-06-06T12:43:23.617Z | 2023-06-07T01:51:20.759Z | 2023-06-07T01:51:20.759Z | {'Vendor': 'https://elementor.com/', 'Product': 'Elementor Website Builder Pro', 'Versions': '*'} |
CVE-2023-3348 | The Wrangler command line tool (<[email protected] or <[email protected]) was affected by a directory traversal vulnerability when running a local development server for Pages (wrangler pages dev command). This vulnerability enabled an attacker in the same network as the victim to connect to the local development server and access the victim's files present outside of the directory for the development server.
| https://github.com/cloudflare/workers-sdk/security/advisories/GHSA-8c93-4hch-xgxp | 2023-06-21T07:20:37.335Z | 2023-08-03T13:47:07.296Z | 2023-08-29T09:17:49.419Z | {'Vendor': 'Cloudflare', 'Product': 'Wrangler', 'Versions': '3, 2'} |
CVE-2023-3718 |
An authenticated command injection vulnerability exists in the AOS-CX command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands on the underlying operating system as a privileged user on the affected switch. This allows an attacker to fully compromise the underlying operating system on the device running AOS-CX.
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-010.txt | 2023-07-17T17:36:17.204Z | 2023-08-01T18:25:10.262Z | 2023-08-01T18:25:10.262Z | {'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba CX Switches', 'Versions': 'AOS-CX 10.11.xxxx: 10.11.1010 and below, AOS-CX 10.10.xxxx: 10.10.1050 and below'} |
CVE-2023-3295 | The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) for WordPress is vulnerable to arbitrary file uploads due to missing file type validation of files in the file manager functionality in versions up to, and including, 1.5.66 . This makes it possible for authenticated attackers, with contributor-level permissions and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The issue was partially patched in version 1.5.66 and fully patched in 1.5.67 | https://www.wordfence.com/threat-intel/vulnerabilities/id/ce1ac711-6026-49ef-b66b-2cc199697942?source=cve | 2023-06-16T12:36:31.620Z | 2023-06-17T01:48:18.106Z | 2023-06-17T01:48:18.106Z | {'Vendor': 'unitecms', 'Product': 'Unlimited Elements For Elementor (Free Widgets, Addons, Templates)', 'Versions': '*'} |
CVE-2023-3153 | A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured. | https://access.redhat.com/security/cve/CVE-2023-3153 | 2023-06-07T18:04:42.140Z | 2023-10-04T11:13:40.083Z | 2023-10-04T11:13:40.083Z | {'Vendor': 'n/a', 'Product': 'ovn', 'Versions': '22.12.1, 22.03.3, 23.06.1, 23.03.1, 22.09.2'} |
CVE-2023-3503 | A vulnerability has been found in SourceCodester Shopping Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file insert-product.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232951. | https://vuldb.com/?id.232951 | 2023-07-04T13:26:25.621Z | 2023-07-04T14:31:03.508Z | 2023-10-23T14:02:30.253Z | {'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'} |
CVE-2023-3850 | A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_category of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The identifier VDB-235201 was assigned to this vulnerability. | https://vuldb.com/?id.235201 | 2023-07-22T18:28:43.333Z | 2023-07-23T10:00:05.905Z | 2023-10-24T06:42:51.724Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
Subsets and Splits