CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3915
An issue has been discovered in GitLab EE affecting all versions starting from 16.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. If an external user is given an owner role on any group, that external user may escalate their privileges on the instance by creating a service account in that group. This service account is not classified as external and may be used to access internal projects.
https://gitlab.com/gitlab-org/gitlab/-/issues/417664
2023-07-25T10:30:31.836Z
2023-09-01T10:01:16.853Z
2023-09-01T10:01:16.853Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.1, 16.2, 16.3'}
CVE-2023-3016
A vulnerability was found in yiwent Vip Video Analysis 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/admincore.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230360.
https://vuldb.com/?id.230360
2023-05-31T13:04:16.550Z
2023-05-31T14:00:05.898Z
2023-10-23T07:38:59.946Z
{'Vendor': 'yiwent', 'Product': 'Vip Video Analysis', 'Versions': '1.0'}
CVE-2023-3446
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the '-check' option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
https://www.openssl.org/news/secadv/20230719.txt
2023-06-28T14:21:39.968Z
2023-07-19T11:31:34.994Z
2023-07-19T11:31:34.994Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0, 1.1.1, 1.0.2'}
CVE-2023-3368
Command injection in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. This is a bypass of CVE-2023-34960.
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-121-2023-07-05-Critical-impact-High-risk-Unauthenticated-Command-Injection-CVE-2023-3368
2023-06-22T10:57:37.330Z
2023-11-28T07:05:26.659Z
2023-11-28T07:05:26.659Z
{'Vendor': 'Chamilo', 'Product': 'Chamilo', 'Versions': '0'}
CVE-2023-3692
Unrestricted Upload of File with Dangerous Type in GitHub repository admidio/admidio prior to 4.2.10.
https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12
2023-07-16T00:00:06.691Z
2023-07-16T00:00:20.410Z
2023-07-16T00:00:20.410Z
{'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'}
CVE-2023-3738
Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:21.446Z
2023-08-01T22:39:18.419Z
2023-08-01T22:39:18.419Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3387
The Lana Text to Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'lana_text_to_image' and 'lana_text_to_img' shortcode in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8acb7893-85b2-404a-b3fe-b4c1a835b3eb?source=cve
2023-06-23T12:27:17.412Z
2023-06-24T02:00:19.324Z
2023-06-24T02:00:19.324Z
{'Vendor': 'lanacodes', 'Product': 'Lana Text to Image', 'Versions': '*'}
CVE-2023-3807
A vulnerability has been found in Campcodes Beauty Salon Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file edit_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235075.
https://vuldb.com/?id.235075
2023-07-20T08:38:26.821Z
2023-07-21T02:31:03.744Z
2023-10-24T06:06:16.332Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3554
A vulnerability was found in GZ Scripts GZ Forum Script 1.8 and classified as problematic. Affected by this issue is some unknown functionality of the file /preview.php. The manipulation of the argument catid/topicid/topic/topic_message/free_name leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-233348. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233348
2023-07-08T11:48:29.396Z
2023-07-08T12:00:05.148Z
2023-10-23T14:23:15.644Z
{'Vendor': 'GZ Scripts', 'Product': 'GZ Forum Script', 'Versions': '1.8'}
CVE-2023-3104
Lack of authentication vulnerability. An unauthenticated local user is able to see through the cameras using the web server due to the lack of any form of authentication.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-unitree-robotics-a1
2023-06-05T12:33:14.940Z
2023-11-22T11:54:30.983Z
2023-11-22T11:54:30.983Z
{'Vendor': 'Unitree Robotics', 'Product': 'A1', 'Versions': '1.16'}
CVE-2023-3411
The Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.0. This is due to missing nonce validation on the ajax_store_save() function. This makes it possible for unauthenticated attackers to modify plugin settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/63e108f4-5d9d-4bcf-aef9-aa856f4241ea?source=cve
2023-06-26T14:55:57.771Z
2023-06-27T03:28:27.320Z
2023-06-27T03:28:27.320Z
{'Vendor': 'webcraftplugins', 'Product': 'Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite', 'Versions': '*'}
CVE-2023-3041
The Autochat Automatic Conversation WordPress plugin through 1.1.7 does not sanitise and escape user input before outputting it back on the page, leading to a cross-site Scripting attack.
https://wpscan.com/vulnerability/93cad990-b6be-4ee1-9cdf-0211a7fe6c96
2023-06-01T17:19:11.315Z
2023-07-17T13:29:50.069Z
2023-07-17T13:29:50.069Z
{'Vendor': 'Unknown', 'Product': 'Autochat Automatic Conversation', 'Versions': '0'}
CVE-2023-3684
A vulnerability was found in LivelyWorks Articart 2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /change-language/de_DE of the component Base64 Encoding Handler. The manipulation of the argument redirectTo leads to open redirect. The attack may be launched remotely. VDB-234230 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234230
2023-07-15T16:13:46.901Z
2023-07-16T10:31:03.666Z
2023-10-23T15:21:03.050Z
{'Vendor': 'LivelyWorks', 'Product': 'Articart', 'Versions': '2.0.1'}
CVE-2023-3391
A vulnerability was found in SourceCodester Human Resource Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file detailview.php. The manipulation of the argument employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232288.
https://vuldb.com/?id.232288
2023-06-23T15:28:39.361Z
2023-06-23T16:00:03.694Z
2023-10-23T13:44:11.062Z
{'Vendor': 'SourceCodester', 'Product': 'Human Resource Management System', 'Versions': '1.0'}
CVE-2023-3112
A vulnerability was reported in Elliptic Labs Virtual Lock Sensor for ThinkPad T14 Gen 3 that could allow an attacker with local access to execute code with elevated privileges.
https://support.lenovo.com/us/en/product_security/LEN-128081
2023-06-05T19:13:51.840Z
2023-10-24T20:31:09.667Z
2023-10-24T20:31:09.667Z
{'Vendor': 'Lenovo', 'Product': 'Elliptic Labs Virtual Lock Sensor', 'Versions': 'All versions prior to 3.1.50719.1'}
CVE-2023-3542
A vulnerability was found in ThinuTech ThinuCMS 1.5 and classified as problematic. Affected by this issue is some unknown functionality of the file /contact.php. The manipulation of the argument name/body leads to cross site scripting. The attack may be launched remotely. VDB-233294 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.233294
2023-07-07T12:08:20.225Z
2023-07-07T16:00:04.384Z
2023-10-23T14:19:35.518Z
{'Vendor': 'ThinuTech', 'Product': 'ThinuCMS', 'Versions': '1.5'}
CVE-2023-3811
A vulnerability was found in Hospital Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file patientprofile.php. The manipulation of the argument address leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235079.
https://vuldb.com/?id.235079
2023-07-20T08:44:21.807Z
2023-07-21T04:31:03.748Z
2023-10-24T06:11:09.106Z
{'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'}
CVE-2023-3954
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/b463ccbb-2dc1-479f-bc88-becd204b2dc0
2023-07-26T08:31:36.896Z
2023-08-21T12:29:48.909Z
2023-08-21T12:29:48.909Z
{'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '1.15.2'}
CVE-2023-3057
A vulnerability was found in YFCMF up to 3.0.4. It has been rated as problematic. This issue affects some unknown processing of the file app/admin/controller/Ajax.php. The manipulation of the argument controllername leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230543.
https://vuldb.com/?id.230543
2023-06-02T11:27:21.701Z
2023-06-02T12:31:03.252Z
2023-10-23T07:46:19.377Z
{'Vendor': 'n/a', 'Product': 'YFCMF', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4'}
CVE-2023-3407
The Subscribe2 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 10.40. This is due to missing or incorrect nonce validation when sending test emails. This makes it possible for unauthenticated attackers to send test emails with custom content to users on sites running a vulnerable version of this plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/92b4d800-2895-4f7b-8b3b-ee6df75a7908?source=cve
2023-06-26T13:34:36.164Z
2023-06-28T02:34:22.840Z
2023-06-28T02:34:22.840Z
{'Vendor': 'wedevs', 'Product': 'Subscribe2 – Form, Email Subscribers & Newsletters', 'Versions': '*'}
CVE-2023-3329
SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-03
2023-06-19T17:52:02.498Z
2023-08-02T22:26:07.157Z
2023-08-02T22:26:07.157Z
{'Vendor': 'iniNet', 'Product': 'SCADAWebServer', 'Versions': '0'}
CVE-2023-3779
The Essential Addons For Elementor plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 5.8.1 due to the plugin adding the API key to the source code of any page running the MailChimp block. This makes it possible for unauthenticated attackers to obtain a site's MailChimp API key. We recommend resetting any MailChimp API keys if running a vulnerable version of this plugin with the MailChimp block enabled as the API key may have been compromised. This only affects sites running the premium version of the plugin and that have the Mailchimp block enabled on a page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e007c713-74bc-4ff5-a198-70dcc8a8ee68?source=cve
2023-07-19T16:39:15.319Z
2023-07-20T05:38:59.848Z
2023-07-20T05:38:59.848Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Addons for Elementor', 'Versions': '*'}
CVE-2023-3796
A vulnerability, which was classified as problematic, has been found in Bug Finder Foody Friend 1.0. Affected by this issue is some unknown functionality of the file /user/profile of the component Profile Picture Handler. The manipulation of the argument profile_picture leads to unrestricted upload. The attack may be launched remotely. The identifier of this vulnerability is VDB-235064. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235064
2023-07-20T07:59:31.840Z
2023-07-20T21:00:04.735Z
2023-10-23T18:39:44.519Z
{'Vendor': 'Bug Finder', 'Product': 'Foody Friend', 'Versions': '1.0'}
CVE-2023-3846
A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235197 was assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
https://vuldb.com/?id.235197
2023-07-22T13:57:29.509Z
2023-07-23T07:00:05.025Z
2023-10-24T06:37:59.103Z
{'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'}
CVE-2023-3515
Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4.
https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053
2023-07-05T14:12:20.176Z
2023-07-05T14:12:33.673Z
2023-07-05T14:12:33.673Z
{'Vendor': 'go-gitea', 'Product': 'go-gitea/gitea', 'Versions': 'unspecified'}
CVE-2023-3145
A vulnerability, which was classified as critical, has been found in SourceCodester Online Discussion Forum Site 1.0. Affected by this issue is some unknown functionality of the file classes\Users.php?f=registration. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231014 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.231014
2023-06-07T13:55:44.073Z
2023-06-07T15:00:05.675Z
2023-10-23T12:46:48.906Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3450
A vulnerability was found in Ruijie RG-BCR860 2.5.13 and classified as critical. This issue affects some unknown processing of the component Network Diagnostic Page. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232547. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.232547
2023-06-28T17:18:36.439Z
2023-06-28T18:00:04.678Z
2023-10-23T13:47:50.786Z
{'Vendor': 'Ruijie', 'Product': 'RG-BCR860', 'Versions': '2.5.13'}
CVE-2023-3000
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Erikoglu Technology ErMon allows Command Line Execution through SQL Injection, Authentication Bypass.This issue affects ErMon: before 230602.
https://www.usom.gov.tr/bildirim/tr-23-0315
2023-05-31T06:46:57.267Z
2023-06-02T07:52:38.500Z
2023-06-02T07:52:38.500Z
{'Vendor': 'Erikoglu Technology', 'Product': 'ErMon', 'Versions': '0'}
CVE-2023-3217
Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
2023-06-13T00:12:15.668Z
2023-06-13T17:51:09.218Z
2023-06-13T17:51:09.218Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'}
CVE-2023-3647
The IURNY by INDIGITALL WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/6df05333-b1f1-4324-a1ba-dd36fbf1778c/
2023-07-12T21:28:17.502Z
2024-01-16T15:54:00.796Z
2024-01-16T15:54:00.796Z
{'Vendor': 'Unknown', 'Product': 'IURNY by INDIGITALL', 'Versions': '0'}
CVE-2023-3581
Mattermost fails to properly validate the origin of a websocket connection allowing a MITM attacker on Mattermost to access the websocket APIs.
https://mattermost.com/security-updates
2023-07-10T12:32:13.548Z
2023-07-17T15:20:00.186Z
2023-07-17T15:20:00.186Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, \xa07.10.3'}
CVE-2023-3978
Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
https://go.dev/issue/61615
2023-07-27T17:05:38.856Z
2023-08-02T19:48:56.676Z
2023-08-02T19:48:56.676Z
{'Vendor': 'golang.org/x/net', 'Product': 'golang.org/x/net/html', 'Versions': '0'}
CVE-2023-3997
Splunk SOAR versions lower than 6.1.0 are indirectly affected by a potential vulnerability accessed through the user’s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user’s action.
https://advisory.splunk.com/advisories/SVD-2023-0702
2023-07-28T17:28:28.614Z
2023-07-31T16:16:19.911Z
2024-01-24T18:29:50.952Z
{'Vendor': 'Splunk', 'Product': 'Splunk SOAR (On-premises)', 'Versions': '-'}
CVE-2023-3094
A vulnerability classified as critical has been found in code-projects Agro-School Management System 1.0. Affected is the function doUpdateQuestion of the file btn_functions.php. The manipulation of the argument question_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230670 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230670
2023-06-04T08:38:27.084Z
2023-06-04T09:00:04.748Z
2023-10-23T07:57:18.008Z
{'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'}
CVE-2023-3610
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered. We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=4bedf9eee016286c835e3d8fa981ddece5338795
2023-07-10T20:52:54.602Z
2023-07-21T20:48:13.121Z
2023-07-21T20:48:13.121Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.9'}
CVE-2023-3240
A vulnerability has been found in OTCMS up to 6.62 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file usersNews_deal.php. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231511.
https://vuldb.com/?id.231511
2023-06-14T06:12:42.962Z
2023-06-14T08:31:04.377Z
2023-10-23T13:19:46.698Z
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'}
CVE-2023-3755
A vulnerability has been found in Creativeitem Atlas Business Directory Listing 2.13 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /home/filter_listings. The manipulation of the argument price-range leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-234427. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234427
2023-07-18T16:36:33.003Z
2023-07-19T03:31:03.904Z
2023-10-23T17:29:05.440Z
{'Vendor': 'Creativeitem', 'Product': 'Atlas Business Directory Listing', 'Versions': '2.13'}
CVE-2023-3305
A vulnerability was found in C-DATA Web Management System up to 20230607. It has been classified as critical. This affects an unknown part of the file /cgi-bin/jumpto.php?class=user&page=config_save&isphp=1 of the component User Creation Handler. The manipulation of the argument user/newpassword leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231801 was assigned to this vulnerability.
https://vuldb.com/?id.231801
2023-06-18T06:57:12.240Z
2023-06-18T07:31:03.795Z
2023-10-23T13:25:52.871Z
{'Vendor': 'C-DATA', 'Product': 'Web Management System', 'Versions': '20230607'}
CVE-2023-3885
A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/edit_category.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235247.
https://vuldb.com/?id.235247
2023-07-24T16:53:31.484Z
2023-07-25T06:31:03.926Z
2023-10-24T07:14:35.591Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3186
The Popup by Supsystic WordPress plugin before 1.10.19 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties into Object.prototype.
https://wpscan.com/vulnerability/545007fc-3173-47b1-82c4-ed3fd1247b9c
2023-06-09T18:23:05.240Z
2023-07-17T13:29:50.962Z
2023-07-17T13:29:50.962Z
{'Vendor': 'Unknown', 'Product': 'Popup by Supsystic', 'Versions': '0'}
CVE-2023-3169
The tagDiv Composer WordPress plugin before 4.2, used as a companion by the Newspaper and Newsmag themes from tagDiv, does not have authorisation in a REST route and does not validate as well as escape some parameters when outputting them back, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/e6d8216d-ace4-48ba-afca-74da0dc5abb5
2023-06-08T18:39:59.929Z
2023-09-11T19:46:07.392Z
2023-09-11T19:46:07.392Z
{'Vendor': 'Unknown', 'Product': 'tagDiv Composer', 'Versions': '0'}
CVE-2023-3493
Improper Neutralization of Formula Elements in a CSV File in GitHub repository fossbilling/fossbilling prior to 0.5.3.
https://huntr.dev/bounties/e9a272ca-b050-441d-a8cb-4fdecb76ccce
2023-06-30T21:14:42.846Z
2023-06-30T21:14:49.035Z
2023-06-30T21:14:49.035Z
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3539
A vulnerability, which was classified as problematic, has been found in SimplePHPscripts Simple Forum PHP 2.7. This issue affects some unknown processing of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-233291.
https://vuldb.com/?id.233291
2023-07-07T12:00:25.751Z
2023-07-07T14:31:03.314Z
2023-10-23T14:15:55.503Z
{'Vendor': 'SimplePHPscripts', 'Product': 'Simple Forum PHP', 'Versions': '2.7'}
CVE-2023-3256
Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-02
2023-06-14T22:19:56.799Z
2023-06-22T16:21:25.727Z
2023-06-22T16:21:25.727Z
{'Vendor': 'Advantech ', 'Product': 'R-SeeNet', 'Versions': '0'}
CVE-2023-3606
A vulnerability was found in TamronOS up to 20230703. It has been classified as critical. This affects an unknown part of the file /api/ping. The manipulation of the argument host leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233475. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233475
2023-07-10T19:37:54.234Z
2023-07-10T20:31:03.571Z
2023-10-23T14:50:32.647Z
{'Vendor': 'n/a', 'Product': 'TamronOS', 'Versions': '20230703'}
CVE-2023-3313
An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.
https://kcm.trellix.com/corporate/index?page=content&id=SB10403
2023-06-19T08:42:42.658Z
2023-07-03T07:53:15.697Z
2023-07-03T07:53:15.697Z
{'Vendor': 'Trellix', 'Product': 'Enterprise Security Manager', 'Versions': '11.6.3'}
CVE-2023-3743
Ap Page Builder, in versions lower than 1.7.8.2, could allow a remote attacker to send a specially crafted SQL query to the product_one_img parameter to retrieve the information stored in the database.
https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-leothemes-ap-page-builder
2023-07-18T07:09:37.463Z
2023-07-18T11:56:05.572Z
2023-07-18T11:56:05.572Z
{'Vendor': 'LeoTheme', 'Product': 'Ap Page Builder', 'Versions': '0'}
CVE-2023-3190
Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
https://github.com/nilsteampassnet/teampass/commit/241dbd4159a5d63b55af426464d30dbb53925705
2023-06-10T00:00:00
2023-06-10T00:00:00
2023-06-10T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3893
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes running kubernetes-csi-proxy may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes running kubernetes-csi-proxy.
https://github.com/kubernetes/kubernetes/issues/119594
2023-07-24T20:24:06.695Z
2023-11-03T17:34:10.188Z
2023-11-03T17:34:10.188Z
{'Vendor': 'Kubernetes', 'Product': 'csi-proxy', 'Versions': 'v2.0.0-alpha.0, 0, v2.0.0-alpha.1, v1.1.3'}
CVE-2023-3485
Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the normal Temporal server flow. It requires the namespace UUID and information from the workflow history for the target namespace. Under these conditions, it is possible to interfere with pending tasks in other namespaces, such as marking a task failed or completed. If a task is targeted for completion by the attacker, the targeted namespace must also be using the same data converter configuration as the initial, valid, namespace for the task completion payload to be decoded by workers in the target namespace.
https://github.com/temporalio/temporal/releases/tag/v1.20.0
2023-06-30T17:29:17.808Z
2023-06-30T17:37:57.772Z
2023-06-30T17:38:22.233Z
{'Vendor': 'Temporal Technologies Inc.', 'Product': 'Temporal Server', 'Versions': '1.9.1'}
CVE-2023-3651
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Digital Ant E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: before 11.
https://https://www.usom.gov.tr/bildirim/tr-23-0443
2023-07-13T06:19:02.367Z
2023-08-08T14:39:15.109Z
2023-08-08T14:39:15.109Z
{'Vendor': 'Digital Ant', 'Product': 'E-Commerce Software', 'Versions': '0'}
CVE-2023-3201
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_new_order_title function. This makes it possible for unauthenticated attackers to update new order title via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5cb1a5-30d2-434f-90f9-d37aecfbe158?source=cve
2023-06-12T14:00:33.263Z
2023-06-14T01:47:50.095Z
2023-06-14T01:47:50.095Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-3714
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'edit_group' handler in versions up to, and including, 5.5.2. This makes it possible for authenticated attackers, with group ownership, to update group options, including the 'associate_role' parameter, which defines the member's role. This issue was partially patched in version 5.5.2 preventing privilege escalation, however, it was fully patched in 5.5.3.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a4766651-92a6-42c9-81bc-7ea25350f561?source=cve
2023-07-17T14:18:56.033Z
2023-07-18T02:39:25.531Z
2023-07-18T02:39:25.531Z
{'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'}
CVE-2023-3344
The Auto Location for WP Job Manager via Google WordPress plugin before 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/d27bc628-3de1-421e-8a67-150e9d7a96dd
2023-06-20T17:36:43.887Z
2023-07-24T10:20:24.383Z
2023-07-24T10:20:24.383Z
{'Vendor': 'Unknown', 'Product': 'Auto Location for WP Job Manager via Google', 'Versions': '0'}
CVE-2023-3128
Grafana is validating Azure AD accounts based on the email claim. On Azure AD, the profile email field is not unique and can be easily modified. This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
https://grafana.com/security/security-advisories/cve-2023-3128/
2023-06-06T15:02:55.259Z
2023-06-22T20:14:00.805Z
2023-07-06T08:24:09.716Z
{'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '9.5.0, 9.4.0, 9.3.0, 9.2.0, 6.7.0'}
CVE-2023-3578
A vulnerability classified as critical was found in DedeCMS 5.7.109. Affected by this vulnerability is an unknown functionality of the file co_do.php. The manipulation of the argument rssurl leads to server-side request forgery. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233371.
https://vuldb.com/?id.233371
2023-07-10T10:54:39.221Z
2023-07-10T11:00:04.835Z
2023-10-23T14:45:39.843Z
{'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.109'}
CVE-2023-3082
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6ecd0fa6-4fdb-4780-9560-0bb126800685?source=cve
2023-06-03T03:15:56.101Z
2023-07-12T04:38:45.662Z
2023-07-12T04:38:45.662Z
{'Vendor': 'wpexpertsio', 'Product': 'POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress', 'Versions': '*'}
CVE-2023-3981
Server-Side Request Forgery (SSRF) in GitHub repository omeka/omeka-s prior to 4.0.2.
https://huntr.dev/bounties/f5018226-0063-415d-9675-d7e30934ff78
2023-07-27T18:28:03.518Z
2023-07-27T18:28:11.153Z
2023-07-27T18:28:11.153Z
{'Vendor': 'omeka', 'Product': 'omeka/omeka-s', 'Versions': 'unspecified'}
CVE-2023-3965
The nsc theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5909513d-8877-40ff-bee9-d565141b7ed2?source=cve
2023-07-26T22:51:39.344Z
2023-10-20T15:06:11.641Z
2023-10-20T15:06:11.641Z
{'Vendor': 'National Show Centre', 'Product': 'NSC WordPress Theme', 'Versions': '*'}
CVE-2023-3436
Xpdf 4.04 will deadlock on a PDF object stream whose "Length" field is itself in another object stream.
https://forum.xpdfreader.com/viewtopic.php?t=42618
2023-06-27T20:43:04.057Z
2023-06-27T20:55:21.049Z
2023-06-27T20:55:27.693Z
{'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'}
CVE-2023-3066
Incorrect Authorization vulnerability in Mobatime mobile application AMXGT100 allows a low-privileged user to impersonate anyone else, including administratorsThis issue affects Mobatime mobile application AMXGT100: through 1.3.20.
https://borelenzo.github.io/stuff/2023/06/02/cve-2023-3064_65_66.html
2023-06-02T14:24:19.100Z
2023-06-05T08:27:49.960Z
2023-06-05T08:27:49.960Z
{'Vendor': 'Mobatime', 'Product': 'Mobatime mobile application AMXGT100', 'Versions': '0'}
CVE-2023-3573
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device.
https://cert.vde.com/en/advisories/VDE-2023-018/
2023-07-10T07:53:14.441Z
2023-08-08T06:51:34.335Z
2023-08-25T06:08:43.409Z
{'Vendor': 'PHOENIX CONTACT', 'Product': 'WP 6070-WVPS', 'Versions': '0'}
CVE-2023-3089
A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
https://access.redhat.com/security/cve/CVE-2023-3089
2023-06-03T17:29:23.874Z
2023-07-05T12:21:03.036Z
2023-07-05T12:21:03.036Z
{'Vendor': 'n/a', 'Product': 'openshift', 'Versions': '4.12.0'}
CVE-2023-3123
null
null
2023-06-06T12:23:21.907Z
null
2023-06-06T13:14:53.643Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3820
SQL Injection in GitHub repository pimcore/pimcore prior to 10.6.4.
https://huntr.dev/bounties/b00a38b6-d040-494d-bf46-38f46ac1a1db
2023-07-21T14:44:31.494Z
2023-07-21T14:44:44.799Z
2023-07-21T14:44:44.799Z
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-3748
A flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to enter an infinite loop and cause a denial of service.
https://access.redhat.com/security/cve/CVE-2023-3748
2023-07-18T12:45:44.867Z
2023-07-24T15:19:20.511Z
2024-01-23T01:05:10.544Z
{'Vendor': 'n/a', 'Product': 'frr', 'Versions': '8.5'}
CVE-2023-3318
A vulnerability was found in SourceCodester Resort Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231937 was assigned to this vulnerability.
https://vuldb.com/?id.231937
2023-06-19T11:57:40.666Z
2023-06-19T12:31:02.959Z
2023-10-23T13:34:25.329Z
{'Vendor': 'SourceCodester', 'Product': 'Resort Management System', 'Versions': '1.0'}
CVE-2023-3031
Improper Limitation of a Pathname leads to a Path Traversal vulnerability in the module King-Avis for Prestashop, allowing a user knowing the download token to read arbitrary local files.This issue affects King-Avis: before 17.3.15.
https://borelenzo.github.io/stuff/2023/06/01/cve-2023-3031.html
2023-06-01T08:47:15.058Z
2023-06-02T12:42:11.842Z
2023-06-05T08:20:59.295Z
{'Vendor': 'Webbax', 'Product': 'King-Avis', 'Versions': '0'}
CVE-2023-3932
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies.
https://gitlab.com/gitlab-org/gitlab/-/issues/417594
2023-07-25T11:01:19.577Z
2023-08-03T04:01:58.186Z
2023-10-04T05:49:05.353Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.12, 16.1.0, 16.2.0'}
CVE-2023-3898
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mAyaNet E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: before 1.1.
https://www.usom.gov.tr/bildirim/tr-23-0440
2023-07-25T06:29:54.658Z
2023-08-08T08:55:44.939Z
2023-08-08T08:55:44.939Z
{'Vendor': 'mAyaNet', 'Product': 'E-Commerce Software', 'Versions': '0'}
CVE-2023-3877
A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument cost leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235239.
https://vuldb.com/?id.235239
2023-07-24T16:45:44.187Z
2023-07-25T02:31:03.934Z
2023-10-24T07:04:49.790Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3524
The WPCode WordPress plugin before 2.0.13.1 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting
https://wpscan.com/vulnerability/89570379-769b-4684-b8a7-28c37b408e5d
2023-07-06T12:27:28.744Z
2023-08-07T14:31:23.140Z
2023-08-07T14:31:23.140Z
{'Vendor': 'Unknown', 'Product': 'WPCode', 'Versions': '0'}
CVE-2023-3477
A vulnerability was found in RocketSoft Rocket LMS 1.7. It has been declared as problematic. This vulnerability affects unknown code of the file /contact/store of the component Contact Form. The manipulation of the argument name/subject/message leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-232756.
https://vuldb.com/?id.232756
2023-06-30T06:41:27.203Z
2023-06-30T07:31:03.883Z
2023-10-23T13:58:49.499Z
{'Vendor': 'RocketSoft', 'Product': 'Rocket LMS', 'Versions': '1.7'}
CVE-2023-3027
The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created policy. This feature does not restrict properly to lookup content from the namespace where the policy was created.
https://bugzilla.redhat.com/show_bug.cgi?id=2211468#c0
2023-06-01T00:00:00
2023-06-05T00:00:00
2023-06-05T00:00:00
{'Vendor': 'n/a', 'Product': 'RHACM', 'Versions': '2.5, 2.6, 2.7'}
CVE-2023-3532
Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1.
https://huntr.dev/bounties/ebd2428a-e2cb-480e-ba37-dd89ad62cf1b
2023-07-07T02:21:48.590Z
2023-07-07T02:22:00.164Z
2023-07-07T02:22:00.164Z
{'Vendor': 'outline', 'Product': 'outline/outline', 'Versions': 'unspecified'}
CVE-2023-3162
The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.7.7. This is due to insufficient verification on the user being supplied during a Stripe checkout through the plugin. This allows unauthenticated attackers to log in as users who have orders, who are typically customers.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4d052f3e-8554-43f0-a5ae-1de09c198d7b?source=cve
2023-06-08T12:39:24.512Z
2023-08-31T05:33:07.144Z
2023-08-31T05:33:07.144Z
{'Vendor': 'webtoffee', 'Product': 'Stripe Payment Plugin for WooCommerce', 'Versions': '*'}
CVE-2023-3861
A vulnerability was found in phpscriptpoint Insurance 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /search.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The identifier VDB-235213 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235213
2023-07-23T13:16:16.302Z
2023-07-24T03:00:05.021Z
2023-10-24T06:55:04.506Z
{'Vendor': 'phpscriptpoint', 'Product': 'Insurance', 'Versions': '1.2'}
CVE-2023-3709
The Royal Elementor Addons plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 1.3.70 due to the plugin adding the API key to the source code of any page running the MailChimp block. This makes it possible for unauthenticated attackers to obtain a site's MailChimp API key. We recommend resetting any MailChimp API keys if running a vulnerable version of this plugin with the MailChimp block enabled as the API key may have been compromised.
https://www.wordfence.com/threat-intel/vulnerabilities/id/86c9bcf1-c69e-47ca-b74b-8ce6157f520b?source=cve
2023-07-17T13:09:15.062Z
2023-07-18T02:01:08.770Z
2023-07-18T02:01:08.770Z
{'Vendor': 'wproyal', 'Product': 'Royal Elementor Addons and Templates', 'Versions': '*'}
CVE-2023-3359
An issue was discovered in the Linux kernel brcm_nvram_parse in drivers/nvmem/brcm_nvram.c. Lacks for the check of the return value of kzalloc() can cause the NULL Pointer Dereference.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b0576ade3aaf24b376ea1a4406ae138e2a22b0c0
2023-06-21T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'kernel 6.1-rc8'}
CVE-2023-3070
Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8.
https://huntr.dev/bounties/e193068e-0b95-403a-8453-e015241b8f1b
2023-06-02T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'}
CVE-2023-3420
Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
2023-06-26T18:54:52.068Z
2023-06-26T20:40:11.837Z
2023-06-26T20:40:11.837Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.198'}
CVE-2023-3973
Cross-site Scripting (XSS) - Reflected in GitHub repository jgraph/drawio prior to 21.6.3.
https://huntr.dev/bounties/4c1c5db5-210f-4d7e-8380-b95f88fdb78d
2023-07-27T14:32:56.314Z
2023-07-27T14:33:11.271Z
2023-07-27T14:33:11.271Z
{'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'}
CVE-2023-3836
A vulnerability classified as critical was found in Dahua Smart Park Management up to 20230713. This vulnerability affects unknown code of the file /emap/devicePoint_addImgIco?hasSubsystem=true. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235162
2023-07-21T20:50:50.266Z
2023-07-22T18:00:05.786Z
2023-10-24T06:25:47.211Z
{'Vendor': 'Dahua', 'Product': 'Smart Park Management', 'Versions': '20230713'}
CVE-2023-3135
The Mailtree Log Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/24d0229c-0f1b-42df-b89a-ce0b8a3fda7e?source=cve
2023-06-06T22:18:53.085Z
2023-07-12T04:38:43.927Z
2023-07-12T04:38:43.927Z
{'Vendor': 'oacstudio', 'Product': 'Mailtree Log Mail', 'Versions': '*'}
CVE-2023-3565
Cross-site Scripting (XSS) - Generic in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
https://huntr.dev/bounties/fcf46e1f-2ab6-4057-9d25-cf493ab09530
2023-07-08T13:24:20.783Z
2023-07-08T13:24:33.695Z
2023-07-08T13:24:33.695Z
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3772
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.
http://www.openwall.com/lists/oss-security/2023/08/10/1
2023-07-19T13:55:07.799Z
2023-07-25T15:47:40.183Z
2024-01-25T20:44:12.817Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-3322
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590
2023-06-19T15:47:19.574Z
2023-07-24T17:12:37.224Z
2023-07-24T17:12:37.224Z
{'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build '}
CVE-2023-3637
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
https://access.redhat.com/errata/RHSA-2023:4283
2023-07-12T13:34:14.699Z
2023-07-25T12:47:31.531Z
2024-01-23T01:03:28.208Z
{'Vendor': 'n/a', 'Product': 'openstack-neutron', 'Versions': ''}
CVE-2023-3267
When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:38.458Z
2023-08-14T04:11:06.644Z
2023-08-14T04:11:06.644Z
{'Vendor': 'CyberPower', 'Product': 'PowerPanel Enterprise', 'Versions': 'v2.6.0'}
CVE-2023-3375
Unrestricted Upload of File with Dangerous Type vulnerability in Unisign Bookreen allows OS Command Injection.This issue affects Bookreen: before 3.0.0.
https://www.usom.gov.tr/bildirim/tr-23-0489
2023-06-23T06:30:36.245Z
2023-09-05T16:35:31.190Z
2023-10-18T07:38:02.770Z
{'Vendor': 'Unisign', 'Product': 'Bookreen', 'Versions': '0'}
CVE-2023-3725
Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3
2023-07-17T21:35:36.647Z
2023-10-06T20:10:11.543Z
2023-10-06T20:10:11.543Z
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
CVE-2023-3230
Missing Authorization in GitHub repository fossbilling/fossbilling prior to 0.5.0.
https://huntr.dev/bounties/390643f0-106b-4424-835d-52610aefa4c7
2023-06-14T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3660
A vulnerability was found in Campcodes Retro Cellphone Online Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/add_user_modal.php. The manipulation of the argument un leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-234014 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.234014
2023-07-13T09:50:50.092Z
2023-07-13T11:31:03.319Z
2023-10-23T15:11:17.258Z
{'Vendor': 'Campcodes', 'Product': 'Retro Cellphone Online Store', 'Versions': '1.0'}
CVE-2023-3119
A vulnerability, which was classified as critical, has been found in SourceCodester Service Provider Management System 1.0. Affected by this issue is some unknown functionality of the file view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230798 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230798
2023-06-06T10:03:38.069Z
2023-06-06T10:31:03.265Z
2023-10-23T12:40:43.046Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-3733
Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:20.717Z
2023-08-01T22:39:17.582Z
2023-08-01T22:39:17.582Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3363
An information disclosure issue in Gitlab CE/EE affecting all versions from 13.6 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1, resulted in the Sidekiq log including webhook tokens when the log format was set to `default`.
https://gitlab.com/gitlab-org/gitlab/-/issues/409034
2023-06-22T01:14:48.593Z
2023-07-13T02:08:35.069Z
2023-07-13T02:08:35.069Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.6, 16.0, 16.1'}
CVE-2023-3699
An Improper Privilege Management vulnerability was found in ASUSTOR Data Master (ADM) allows an unprivileged local users to modify the storage devices configuration. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
https://www.asustor.com/security/security_advisory_detail?id=29
2023-07-17T06:12:32.684Z
2023-08-22T08:57:21.718Z
2023-08-22T08:57:21.718Z
{'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'}
CVE-2023-3676
A security issue was discovered in Kubernetes where a user that can create pods on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they include Windows nodes.
https://github.com/kubernetes/kubernetes/issues/119339
2023-07-14T16:06:03.399Z
2023-10-31T20:22:53.620Z
2023-10-31T20:22:53.620Z
{'Vendor': 'Kubernetes', 'Product': 'kubelet', 'Versions': 'v1.28.0, v1.27.0, v1.26.0, v1.25.0, v1.28.1, v1.27.5, v1.26.8, v1.25.13, v1.24.17, 0'}
CVE-2023-3226
The Popup Builder WordPress plugin before 4.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/941a9aa7-f4b2-474a-84d9-9a74c99079e2
2023-06-14T03:43:36.231Z
2023-09-25T15:56:52.128Z
2023-12-15T10:10:42.533Z
{'Vendor': 'Unknown', 'Product': 'Popup Builder', 'Versions': '0'}
CVE-2023-3949
An issue has been discovered in GitLab affecting all versions starting from 11.3 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for unauthorized users to view a public projects' release descriptions via an atom endpoint when release access on the public was set to only project members.
https://gitlab.com/gitlab-org/gitlab/-/issues/419664
2023-07-25T16:06:09.992Z
2023-12-01T07:02:13.130Z
2023-12-01T07:02:13.130Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.3, 16.5, 16.6'}