CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3915 | An issue has been discovered in GitLab EE affecting all versions starting from 16.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. If an external user is given an owner role on any group, that external user may escalate their privileges on the instance by creating a service account in that group. This service account is not classified as external and may be used to access internal projects. | https://gitlab.com/gitlab-org/gitlab/-/issues/417664 | 2023-07-25T10:30:31.836Z | 2023-09-01T10:01:16.853Z | 2023-09-01T10:01:16.853Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.1, 16.2, 16.3'} |
CVE-2023-3016 | A vulnerability was found in yiwent Vip Video Analysis 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/admincore.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230360. | https://vuldb.com/?id.230360 | 2023-05-31T13:04:16.550Z | 2023-05-31T14:00:05.898Z | 2023-10-23T07:38:59.946Z | {'Vendor': 'yiwent', 'Product': 'Vip Video Analysis', 'Versions': '1.0'} |
CVE-2023-3446 | Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. One of those
checks confirms that the modulus ('p' parameter) is not too large. Trying to use
a very large modulus is slow and OpenSSL will not normally use a modulus which
is over 10,000 bits in length.
However the DH_check() function checks numerous aspects of the key or parameters
that have been supplied. Some of those checks use the supplied modulus value
even if it has already been found to be too large.
An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulernable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the '-check' option.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue. | https://www.openssl.org/news/secadv/20230719.txt | 2023-06-28T14:21:39.968Z | 2023-07-19T11:31:34.994Z | 2023-07-19T11:31:34.994Z | {'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0, 1.1.1, 1.0.2'} |
CVE-2023-3368 | Command injection in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. This is a bypass of CVE-2023-34960. | https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-121-2023-07-05-Critical-impact-High-risk-Unauthenticated-Command-Injection-CVE-2023-3368 | 2023-06-22T10:57:37.330Z | 2023-11-28T07:05:26.659Z | 2023-11-28T07:05:26.659Z | {'Vendor': 'Chamilo', 'Product': 'Chamilo', 'Versions': '0'} |
CVE-2023-3692 | Unrestricted Upload of File with Dangerous Type in GitHub repository admidio/admidio prior to 4.2.10. | https://huntr.dev/bounties/be6616eb-384d-40d6-b1fd-0ec9e4973f12 | 2023-07-16T00:00:06.691Z | 2023-07-16T00:00:20.410Z | 2023-07-16T00:00:20.410Z | {'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'} |
CVE-2023-3738 | Inappropriate implementation in Autofill in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:21.446Z | 2023-08-01T22:39:18.419Z | 2023-08-01T22:39:18.419Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3387 | The Lana Text to Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'lana_text_to_image' and 'lana_text_to_img' shortcode in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/8acb7893-85b2-404a-b3fe-b4c1a835b3eb?source=cve | 2023-06-23T12:27:17.412Z | 2023-06-24T02:00:19.324Z | 2023-06-24T02:00:19.324Z | {'Vendor': 'lanacodes', 'Product': 'Lana Text to Image', 'Versions': '*'} |
CVE-2023-3807 | A vulnerability has been found in Campcodes Beauty Salon Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file edit_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235075. | https://vuldb.com/?id.235075 | 2023-07-20T08:38:26.821Z | 2023-07-21T02:31:03.744Z | 2023-10-24T06:06:16.332Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3554 | A vulnerability was found in GZ Scripts GZ Forum Script 1.8 and classified as problematic. Affected by this issue is some unknown functionality of the file /preview.php. The manipulation of the argument catid/topicid/topic/topic_message/free_name leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-233348. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233348 | 2023-07-08T11:48:29.396Z | 2023-07-08T12:00:05.148Z | 2023-10-23T14:23:15.644Z | {'Vendor': 'GZ Scripts', 'Product': 'GZ Forum Script', 'Versions': '1.8'} |
CVE-2023-3104 | Lack of authentication vulnerability. An unauthenticated local user is able to see through the cameras using the web server due to the lack of any form of authentication. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-unitree-robotics-a1 | 2023-06-05T12:33:14.940Z | 2023-11-22T11:54:30.983Z | 2023-11-22T11:54:30.983Z | {'Vendor': 'Unitree Robotics', 'Product': 'A1', 'Versions': '1.16'} |
CVE-2023-3411 | The Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.0. This is due to missing nonce validation on the ajax_store_save() function. This makes it possible for unauthenticated attackers to modify plugin settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/63e108f4-5d9d-4bcf-aef9-aa856f4241ea?source=cve | 2023-06-26T14:55:57.771Z | 2023-06-27T03:28:27.320Z | 2023-06-27T03:28:27.320Z | {'Vendor': 'webcraftplugins', 'Product': 'Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite', 'Versions': '*'} |
CVE-2023-3041 | The Autochat Automatic Conversation WordPress plugin through 1.1.7 does not sanitise and escape user input before outputting it back on the page, leading to a cross-site Scripting attack. | https://wpscan.com/vulnerability/93cad990-b6be-4ee1-9cdf-0211a7fe6c96 | 2023-06-01T17:19:11.315Z | 2023-07-17T13:29:50.069Z | 2023-07-17T13:29:50.069Z | {'Vendor': 'Unknown', 'Product': 'Autochat Automatic Conversation', 'Versions': '0'} |
CVE-2023-3684 | A vulnerability was found in LivelyWorks Articart 2.0.1 and classified as problematic. Affected by this issue is some unknown functionality of the file /change-language/de_DE of the component Base64 Encoding Handler. The manipulation of the argument redirectTo leads to open redirect. The attack may be launched remotely. VDB-234230 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234230 | 2023-07-15T16:13:46.901Z | 2023-07-16T10:31:03.666Z | 2023-10-23T15:21:03.050Z | {'Vendor': 'LivelyWorks', 'Product': 'Articart', 'Versions': '2.0.1'} |
CVE-2023-3391 | A vulnerability was found in SourceCodester Human Resource Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file detailview.php. The manipulation of the argument employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232288. | https://vuldb.com/?id.232288 | 2023-06-23T15:28:39.361Z | 2023-06-23T16:00:03.694Z | 2023-10-23T13:44:11.062Z | {'Vendor': 'SourceCodester', 'Product': 'Human Resource Management System', 'Versions': '1.0'} |
CVE-2023-3112 | A vulnerability was reported in Elliptic Labs Virtual Lock Sensor for ThinkPad T14 Gen 3 that could allow an attacker with local access to execute code with elevated privileges. | https://support.lenovo.com/us/en/product_security/LEN-128081 | 2023-06-05T19:13:51.840Z | 2023-10-24T20:31:09.667Z | 2023-10-24T20:31:09.667Z | {'Vendor': 'Lenovo', 'Product': 'Elliptic Labs Virtual Lock Sensor', 'Versions': 'All versions prior to 3.1.50719.1'} |
CVE-2023-3542 | A vulnerability was found in ThinuTech ThinuCMS 1.5 and classified as problematic. Affected by this issue is some unknown functionality of the file /contact.php. The manipulation of the argument name/body leads to cross site scripting. The attack may be launched remotely. VDB-233294 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.233294 | 2023-07-07T12:08:20.225Z | 2023-07-07T16:00:04.384Z | 2023-10-23T14:19:35.518Z | {'Vendor': 'ThinuTech', 'Product': 'ThinuCMS', 'Versions': '1.5'} |
CVE-2023-3811 | A vulnerability was found in Hospital Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file patientprofile.php. The manipulation of the argument address leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235079. | https://vuldb.com/?id.235079 | 2023-07-20T08:44:21.807Z | 2023-07-21T04:31:03.748Z | 2023-10-24T06:11:09.106Z | {'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'} |
CVE-2023-3954 | The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/b463ccbb-2dc1-479f-bc88-becd204b2dc0 | 2023-07-26T08:31:36.896Z | 2023-08-21T12:29:48.909Z | 2023-08-21T12:29:48.909Z | {'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '1.15.2'} |
CVE-2023-3057 | A vulnerability was found in YFCMF up to 3.0.4. It has been rated as problematic. This issue affects some unknown processing of the file app/admin/controller/Ajax.php. The manipulation of the argument controllername leads to path traversal: '../filedir'. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230543. | https://vuldb.com/?id.230543 | 2023-06-02T11:27:21.701Z | 2023-06-02T12:31:03.252Z | 2023-10-23T07:46:19.377Z | {'Vendor': 'n/a', 'Product': 'YFCMF', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4'} |
CVE-2023-3407 | The Subscribe2 plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 10.40. This is due to missing or incorrect nonce validation when sending test emails. This makes it possible for unauthenticated attackers to send test emails with custom content to users on sites running a vulnerable version of this plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/92b4d800-2895-4f7b-8b3b-ee6df75a7908?source=cve | 2023-06-26T13:34:36.164Z | 2023-06-28T02:34:22.840Z | 2023-06-28T02:34:22.840Z | {'Vendor': 'wedevs', 'Product': 'Subscribe2 – Form, Email Subscribers & Newsletters', 'Versions': '*'} |
CVE-2023-3329 | SpiderControl SCADA Webserver versions 2.08 and prior are vulnerable to path traversal. An attacker with administrative privileges could overwrite files on the webserver using the HMI's upload file feature. This could create size zero files anywhere on the webserver, potentially overwriting system files and creating a denial-of-service condition. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-03 | 2023-06-19T17:52:02.498Z | 2023-08-02T22:26:07.157Z | 2023-08-02T22:26:07.157Z | {'Vendor': 'iniNet', 'Product': 'SCADAWebServer', 'Versions': '0'} |
CVE-2023-3779 | The Essential Addons For Elementor plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 5.8.1 due to the plugin adding the API key to the source code of any page running the MailChimp block. This makes it possible for unauthenticated attackers to obtain a site's MailChimp API key. We recommend resetting any MailChimp API keys if running a vulnerable version of this plugin with the MailChimp block enabled as the API key may have been compromised. This only affects sites running the premium version of the plugin and that have the Mailchimp block enabled on a page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e007c713-74bc-4ff5-a198-70dcc8a8ee68?source=cve | 2023-07-19T16:39:15.319Z | 2023-07-20T05:38:59.848Z | 2023-07-20T05:38:59.848Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Addons for Elementor', 'Versions': '*'} |
CVE-2023-3796 | A vulnerability, which was classified as problematic, has been found in Bug Finder Foody Friend 1.0. Affected by this issue is some unknown functionality of the file /user/profile of the component Profile Picture Handler. The manipulation of the argument profile_picture leads to unrestricted upload. The attack may be launched remotely. The identifier of this vulnerability is VDB-235064. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235064 | 2023-07-20T07:59:31.840Z | 2023-07-20T21:00:04.735Z | 2023-10-23T18:39:44.519Z | {'Vendor': 'Bug Finder', 'Product': 'Foody Friend', 'Versions': '1.0'} |
CVE-2023-3846 | A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235197 was assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | https://vuldb.com/?id.235197 | 2023-07-22T13:57:29.509Z | 2023-07-23T07:00:05.025Z | 2023-10-24T06:37:59.103Z | {'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'} |
CVE-2023-3515 | Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4. | https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053 | 2023-07-05T14:12:20.176Z | 2023-07-05T14:12:33.673Z | 2023-07-05T14:12:33.673Z | {'Vendor': 'go-gitea', 'Product': 'go-gitea/gitea', 'Versions': 'unspecified'} |
CVE-2023-3145 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Discussion Forum Site 1.0. Affected by this issue is some unknown functionality of the file classes\Users.php?f=registration. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231014 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.231014 | 2023-06-07T13:55:44.073Z | 2023-06-07T15:00:05.675Z | 2023-10-23T12:46:48.906Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3450 | A vulnerability was found in Ruijie RG-BCR860 2.5.13 and classified as critical. This issue affects some unknown processing of the component Network Diagnostic Page. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232547. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.232547 | 2023-06-28T17:18:36.439Z | 2023-06-28T18:00:04.678Z | 2023-10-23T13:47:50.786Z | {'Vendor': 'Ruijie', 'Product': 'RG-BCR860', 'Versions': '2.5.13'} |
CVE-2023-3000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Erikoglu Technology ErMon allows Command Line Execution through SQL Injection, Authentication Bypass.This issue affects ErMon: before 230602.
| https://www.usom.gov.tr/bildirim/tr-23-0315 | 2023-05-31T06:46:57.267Z | 2023-06-02T07:52:38.500Z | 2023-06-02T07:52:38.500Z | {'Vendor': 'Erikoglu Technology', 'Product': 'ErMon', 'Versions': '0'} |
CVE-2023-3217 | Use after free in WebXR in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html | 2023-06-13T00:12:15.668Z | 2023-06-13T17:51:09.218Z | 2023-06-13T17:51:09.218Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'} |
CVE-2023-3647 | The IURNY by INDIGITALL WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/6df05333-b1f1-4324-a1ba-dd36fbf1778c/ | 2023-07-12T21:28:17.502Z | 2024-01-16T15:54:00.796Z | 2024-01-16T15:54:00.796Z | {'Vendor': 'Unknown', 'Product': 'IURNY by INDIGITALL', 'Versions': '0'} |
CVE-2023-3581 | Mattermost fails to properly validate the origin of a websocket connection allowing a MITM attacker on Mattermost to access the websocket APIs.
| https://mattermost.com/security-updates | 2023-07-10T12:32:13.548Z | 2023-07-17T15:20:00.186Z | 2023-07-17T15:20:00.186Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, \xa07.10.3'} |
CVE-2023-3978 | Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack. | https://go.dev/issue/61615 | 2023-07-27T17:05:38.856Z | 2023-08-02T19:48:56.676Z | 2023-08-02T19:48:56.676Z | {'Vendor': 'golang.org/x/net', 'Product': 'golang.org/x/net/html', 'Versions': '0'} |
CVE-2023-3997 | Splunk SOAR versions lower than 6.1.0 are indirectly affected by a potential vulnerability accessed through the user’s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user’s action. | https://advisory.splunk.com/advisories/SVD-2023-0702 | 2023-07-28T17:28:28.614Z | 2023-07-31T16:16:19.911Z | 2024-01-24T18:29:50.952Z | {'Vendor': 'Splunk', 'Product': 'Splunk SOAR (On-premises)', 'Versions': '-'} |
CVE-2023-3094 | A vulnerability classified as critical has been found in code-projects Agro-School Management System 1.0. Affected is the function doUpdateQuestion of the file btn_functions.php. The manipulation of the argument question_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230670 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230670 | 2023-06-04T08:38:27.084Z | 2023-06-04T09:00:04.748Z | 2023-10-23T07:57:18.008Z | {'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'} |
CVE-2023-3610 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.
We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=4bedf9eee016286c835e3d8fa981ddece5338795 | 2023-07-10T20:52:54.602Z | 2023-07-21T20:48:13.121Z | 2023-07-21T20:48:13.121Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.9'} |
CVE-2023-3240 | A vulnerability has been found in OTCMS up to 6.62 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file usersNews_deal.php. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231511. | https://vuldb.com/?id.231511 | 2023-06-14T06:12:42.962Z | 2023-06-14T08:31:04.377Z | 2023-10-23T13:19:46.698Z | {'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'} |
CVE-2023-3755 | A vulnerability has been found in Creativeitem Atlas Business Directory Listing 2.13 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /home/filter_listings. The manipulation of the argument price-range leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-234427. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234427 | 2023-07-18T16:36:33.003Z | 2023-07-19T03:31:03.904Z | 2023-10-23T17:29:05.440Z | {'Vendor': 'Creativeitem', 'Product': 'Atlas Business Directory Listing', 'Versions': '2.13'} |
CVE-2023-3305 | A vulnerability was found in C-DATA Web Management System up to 20230607. It has been classified as critical. This affects an unknown part of the file /cgi-bin/jumpto.php?class=user&page=config_save&isphp=1 of the component User Creation Handler. The manipulation of the argument user/newpassword leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231801 was assigned to this vulnerability. | https://vuldb.com/?id.231801 | 2023-06-18T06:57:12.240Z | 2023-06-18T07:31:03.795Z | 2023-10-23T13:25:52.871Z | {'Vendor': 'C-DATA', 'Product': 'Web Management System', 'Versions': '20230607'} |
CVE-2023-3885 | A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/edit_category.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235247. | https://vuldb.com/?id.235247 | 2023-07-24T16:53:31.484Z | 2023-07-25T06:31:03.926Z | 2023-10-24T07:14:35.591Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3186 | The Popup by Supsystic WordPress plugin before 1.10.19 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties into Object.prototype. | https://wpscan.com/vulnerability/545007fc-3173-47b1-82c4-ed3fd1247b9c | 2023-06-09T18:23:05.240Z | 2023-07-17T13:29:50.962Z | 2023-07-17T13:29:50.962Z | {'Vendor': 'Unknown', 'Product': 'Popup by Supsystic', 'Versions': '0'} |
CVE-2023-3169 | The tagDiv Composer WordPress plugin before 4.2, used as a companion by the Newspaper and Newsmag themes from tagDiv, does not have authorisation in a REST route and does not validate as well as escape some parameters when outputting them back, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks. | https://wpscan.com/vulnerability/e6d8216d-ace4-48ba-afca-74da0dc5abb5 | 2023-06-08T18:39:59.929Z | 2023-09-11T19:46:07.392Z | 2023-09-11T19:46:07.392Z | {'Vendor': 'Unknown', 'Product': 'tagDiv Composer', 'Versions': '0'} |
CVE-2023-3493 | Improper Neutralization of Formula Elements in a CSV File in GitHub repository fossbilling/fossbilling prior to 0.5.3. | https://huntr.dev/bounties/e9a272ca-b050-441d-a8cb-4fdecb76ccce | 2023-06-30T21:14:42.846Z | 2023-06-30T21:14:49.035Z | 2023-06-30T21:14:49.035Z | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3539 | A vulnerability, which was classified as problematic, has been found in SimplePHPscripts Simple Forum PHP 2.7. This issue affects some unknown processing of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-233291. | https://vuldb.com/?id.233291 | 2023-07-07T12:00:25.751Z | 2023-07-07T14:31:03.314Z | 2023-10-23T14:15:55.503Z | {'Vendor': 'SimplePHPscripts', 'Product': 'Simple Forum PHP', 'Versions': '2.7'} |
CVE-2023-3256 | Advantech R-SeeNet
versions 2.4.22
allows low-level users to access and load the content of local files.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-02 | 2023-06-14T22:19:56.799Z | 2023-06-22T16:21:25.727Z | 2023-06-22T16:21:25.727Z | {'Vendor': 'Advantech ', 'Product': 'R-SeeNet', 'Versions': '0'} |
CVE-2023-3606 | A vulnerability was found in TamronOS up to 20230703. It has been classified as critical. This affects an unknown part of the file /api/ping. The manipulation of the argument host leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233475. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233475 | 2023-07-10T19:37:54.234Z | 2023-07-10T20:31:03.571Z | 2023-10-23T14:50:32.647Z | {'Vendor': 'n/a', 'Product': 'TamronOS', 'Versions': '20230703'} |
CVE-2023-3313 |
An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.
| https://kcm.trellix.com/corporate/index?page=content&id=SB10403 | 2023-06-19T08:42:42.658Z | 2023-07-03T07:53:15.697Z | 2023-07-03T07:53:15.697Z | {'Vendor': 'Trellix', 'Product': 'Enterprise Security Manager', 'Versions': '11.6.3'} |
CVE-2023-3743 | Ap Page Builder, in versions lower than 1.7.8.2, could allow a remote attacker to send a specially crafted SQL query to the product_one_img parameter to retrieve the information stored in the database.
| https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-leothemes-ap-page-builder | 2023-07-18T07:09:37.463Z | 2023-07-18T11:56:05.572Z | 2023-07-18T11:56:05.572Z | {'Vendor': 'LeoTheme', 'Product': 'Ap Page Builder', 'Versions': '0'} |
CVE-2023-3190 | Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | https://github.com/nilsteampassnet/teampass/commit/241dbd4159a5d63b55af426464d30dbb53925705 | 2023-06-10T00:00:00 | 2023-06-10T00:00:00 | 2023-06-10T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3893 | A security issue was discovered in Kubernetes where a user that can
create pods on Windows nodes running kubernetes-csi-proxy may be able to
escalate to admin privileges on those nodes. Kubernetes clusters are
only affected if they include Windows nodes running
kubernetes-csi-proxy.
| https://github.com/kubernetes/kubernetes/issues/119594 | 2023-07-24T20:24:06.695Z | 2023-11-03T17:34:10.188Z | 2023-11-03T17:34:10.188Z | {'Vendor': 'Kubernetes', 'Product': 'csi-proxy', 'Versions': 'v2.0.0-alpha.0, 0, v2.0.0-alpha.1, v1.1.3'} |
CVE-2023-3485 | Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the normal Temporal server flow. It requires the namespace UUID and information from the workflow history for the target namespace. Under these conditions, it is possible to interfere with pending tasks in other namespaces, such as marking a task failed or completed.
If a task is targeted for completion by the attacker, the targeted namespace must also be using the same data converter configuration as the initial, valid, namespace for the task completion payload to be decoded by workers in the target namespace.
| https://github.com/temporalio/temporal/releases/tag/v1.20.0 | 2023-06-30T17:29:17.808Z | 2023-06-30T17:37:57.772Z | 2023-06-30T17:38:22.233Z | {'Vendor': 'Temporal Technologies Inc.', 'Product': 'Temporal Server', 'Versions': '1.9.1'} |
CVE-2023-3651 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Digital Ant E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: before 11.
| https://https://www.usom.gov.tr/bildirim/tr-23-0443 | 2023-07-13T06:19:02.367Z | 2023-08-08T14:39:15.109Z | 2023-08-08T14:39:15.109Z | {'Vendor': 'Digital Ant', 'Product': 'E-Commerce Software', 'Versions': '0'} |
CVE-2023-3201 | The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_new_order_title function. This makes it possible for unauthenticated attackers to update new order title via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5cb1a5-30d2-434f-90f9-d37aecfbe158?source=cve | 2023-06-12T14:00:33.263Z | 2023-06-14T01:47:50.095Z | 2023-06-14T01:47:50.095Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-3714 | The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'edit_group' handler in versions up to, and including, 5.5.2. This makes it possible for authenticated attackers, with group ownership, to update group options, including the 'associate_role' parameter, which defines the member's role. This issue was partially patched in version 5.5.2 preventing privilege escalation, however, it was fully patched in 5.5.3. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a4766651-92a6-42c9-81bc-7ea25350f561?source=cve | 2023-07-17T14:18:56.033Z | 2023-07-18T02:39:25.531Z | 2023-07-18T02:39:25.531Z | {'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'} |
CVE-2023-3344 | The Auto Location for WP Job Manager via Google WordPress plugin before 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/d27bc628-3de1-421e-8a67-150e9d7a96dd | 2023-06-20T17:36:43.887Z | 2023-07-24T10:20:24.383Z | 2023-07-24T10:20:24.383Z | {'Vendor': 'Unknown', 'Product': 'Auto Location for WP Job Manager via Google', 'Versions': '0'} |
CVE-2023-3128 | Grafana is validating Azure AD accounts based on the email claim.
On Azure AD, the profile email field is not unique and can be easily modified.
This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
| https://grafana.com/security/security-advisories/cve-2023-3128/ | 2023-06-06T15:02:55.259Z | 2023-06-22T20:14:00.805Z | 2023-07-06T08:24:09.716Z | {'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '9.5.0, 9.4.0, 9.3.0, 9.2.0, 6.7.0'} |
CVE-2023-3578 | A vulnerability classified as critical was found in DedeCMS 5.7.109. Affected by this vulnerability is an unknown functionality of the file co_do.php. The manipulation of the argument rssurl leads to server-side request forgery. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233371. | https://vuldb.com/?id.233371 | 2023-07-10T10:54:39.221Z | 2023-07-10T11:00:04.835Z | 2023-10-23T14:45:39.843Z | {'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.109'} |
CVE-2023-3082 | The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6ecd0fa6-4fdb-4780-9560-0bb126800685?source=cve | 2023-06-03T03:15:56.101Z | 2023-07-12T04:38:45.662Z | 2023-07-12T04:38:45.662Z | {'Vendor': 'wpexpertsio', 'Product': 'POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress', 'Versions': '*'} |
CVE-2023-3981 | Server-Side Request Forgery (SSRF) in GitHub repository omeka/omeka-s prior to 4.0.2. | https://huntr.dev/bounties/f5018226-0063-415d-9675-d7e30934ff78 | 2023-07-27T18:28:03.518Z | 2023-07-27T18:28:11.153Z | 2023-07-27T18:28:11.153Z | {'Vendor': 'omeka', 'Product': 'omeka/omeka-s', 'Versions': 'unspecified'} |
CVE-2023-3965 | The nsc theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5909513d-8877-40ff-bee9-d565141b7ed2?source=cve | 2023-07-26T22:51:39.344Z | 2023-10-20T15:06:11.641Z | 2023-10-20T15:06:11.641Z | {'Vendor': 'National Show Centre', 'Product': 'NSC WordPress Theme', 'Versions': '*'} |
CVE-2023-3436 | Xpdf 4.04 will deadlock on a PDF object stream whose "Length" field is itself in another object stream.
| https://forum.xpdfreader.com/viewtopic.php?t=42618 | 2023-06-27T20:43:04.057Z | 2023-06-27T20:55:21.049Z | 2023-06-27T20:55:27.693Z | {'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'} |
CVE-2023-3066 | Incorrect Authorization vulnerability in Mobatime mobile application AMXGT100 allows a low-privileged user to impersonate anyone else, including administratorsThis issue affects Mobatime mobile application AMXGT100: through 1.3.20.
| https://borelenzo.github.io/stuff/2023/06/02/cve-2023-3064_65_66.html | 2023-06-02T14:24:19.100Z | 2023-06-05T08:27:49.960Z | 2023-06-05T08:27:49.960Z | {'Vendor': 'Mobatime', 'Product': 'Mobatime mobile application AMXGT100', 'Versions': '0'} |
CVE-2023-3573 | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device. | https://cert.vde.com/en/advisories/VDE-2023-018/ | 2023-07-10T07:53:14.441Z | 2023-08-08T06:51:34.335Z | 2023-08-25T06:08:43.409Z | {'Vendor': 'PHOENIX CONTACT', 'Product': 'WP 6070-WVPS', 'Versions': '0'} |
CVE-2023-3089 | A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated. | https://access.redhat.com/security/cve/CVE-2023-3089 | 2023-06-03T17:29:23.874Z | 2023-07-05T12:21:03.036Z | 2023-07-05T12:21:03.036Z | {'Vendor': 'n/a', 'Product': 'openshift', 'Versions': '4.12.0'} |
CVE-2023-3123 | null | null | 2023-06-06T12:23:21.907Z | null | 2023-06-06T13:14:53.643Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3820 | SQL Injection in GitHub repository pimcore/pimcore prior to 10.6.4. | https://huntr.dev/bounties/b00a38b6-d040-494d-bf46-38f46ac1a1db | 2023-07-21T14:44:31.494Z | 2023-07-21T14:44:44.799Z | 2023-07-21T14:44:44.799Z | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-3748 | A flaw was found in FRRouting when parsing certain babeld unicast hello messages that are intended to be ignored. This issue may allow an attacker to send specially crafted hello messages with the unicast flag set, the interval field set to 0, or any TLV that contains a sub-TLV with the Mandatory flag set to enter an infinite loop and cause a denial of service. | https://access.redhat.com/security/cve/CVE-2023-3748 | 2023-07-18T12:45:44.867Z | 2023-07-24T15:19:20.511Z | 2024-01-23T01:05:10.544Z | {'Vendor': 'n/a', 'Product': 'frr', 'Versions': '8.5'} |
CVE-2023-3318 | A vulnerability was found in SourceCodester Resort Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231937 was assigned to this vulnerability. | https://vuldb.com/?id.231937 | 2023-06-19T11:57:40.666Z | 2023-06-19T12:31:02.959Z | 2023-10-23T13:34:25.329Z | {'Vendor': 'SourceCodester', 'Product': 'Resort Management System', 'Versions': '1.0'} |
CVE-2023-3031 | Improper Limitation of a Pathname leads to a Path Traversal vulnerability in the module King-Avis for Prestashop, allowing a user knowing the download token to read arbitrary local files.This issue affects King-Avis: before 17.3.15.
| https://borelenzo.github.io/stuff/2023/06/01/cve-2023-3031.html | 2023-06-01T08:47:15.058Z | 2023-06-02T12:42:11.842Z | 2023-06-05T08:20:59.295Z | {'Vendor': 'Webbax', 'Product': 'King-Avis', 'Versions': '0'} |
CVE-2023-3932 | An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. | https://gitlab.com/gitlab-org/gitlab/-/issues/417594 | 2023-07-25T11:01:19.577Z | 2023-08-03T04:01:58.186Z | 2023-10-04T05:49:05.353Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.12, 16.1.0, 16.2.0'} |
CVE-2023-3898 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mAyaNet E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: before 1.1.
| https://www.usom.gov.tr/bildirim/tr-23-0440 | 2023-07-25T06:29:54.658Z | 2023-08-08T08:55:44.939Z | 2023-08-08T08:55:44.939Z | {'Vendor': 'mAyaNet', 'Product': 'E-Commerce Software', 'Versions': '0'} |
CVE-2023-3877 | A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/add-services.php. The manipulation of the argument cost leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235239. | https://vuldb.com/?id.235239 | 2023-07-24T16:45:44.187Z | 2023-07-25T02:31:03.934Z | 2023-10-24T07:04:49.790Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3524 | The WPCode WordPress plugin before 2.0.13.1 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting | https://wpscan.com/vulnerability/89570379-769b-4684-b8a7-28c37b408e5d | 2023-07-06T12:27:28.744Z | 2023-08-07T14:31:23.140Z | 2023-08-07T14:31:23.140Z | {'Vendor': 'Unknown', 'Product': 'WPCode', 'Versions': '0'} |
CVE-2023-3477 | A vulnerability was found in RocketSoft Rocket LMS 1.7. It has been declared as problematic. This vulnerability affects unknown code of the file /contact/store of the component Contact Form. The manipulation of the argument name/subject/message leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-232756. | https://vuldb.com/?id.232756 | 2023-06-30T06:41:27.203Z | 2023-06-30T07:31:03.883Z | 2023-10-23T13:58:49.499Z | {'Vendor': 'RocketSoft', 'Product': 'Rocket LMS', 'Versions': '1.7'} |
CVE-2023-3027 | The grc-policy-propagator allows security escalation within the cluster. The propagator allows policies which contain some dynamically obtained values (instead of the policy apply a static manifest on a managed cluster) of taking advantage of cluster scoped access in a created policy. This feature does not restrict properly to lookup content from the namespace where the policy was created. | https://bugzilla.redhat.com/show_bug.cgi?id=2211468#c0 | 2023-06-01T00:00:00 | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'RHACM', 'Versions': '2.5, 2.6, 2.7'} |
CVE-2023-3532 | Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to 0.70.1. | https://huntr.dev/bounties/ebd2428a-e2cb-480e-ba37-dd89ad62cf1b | 2023-07-07T02:21:48.590Z | 2023-07-07T02:22:00.164Z | 2023-07-07T02:22:00.164Z | {'Vendor': 'outline', 'Product': 'outline/outline', 'Versions': 'unspecified'} |
CVE-2023-3162 | The Stripe Payment Plugin for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.7.7. This is due to insufficient verification on the user being supplied during a Stripe checkout through the plugin. This allows unauthenticated attackers to log in as users who have orders, who are typically customers. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4d052f3e-8554-43f0-a5ae-1de09c198d7b?source=cve | 2023-06-08T12:39:24.512Z | 2023-08-31T05:33:07.144Z | 2023-08-31T05:33:07.144Z | {'Vendor': 'webtoffee', 'Product': 'Stripe Payment Plugin for WooCommerce', 'Versions': '*'} |
CVE-2023-3861 | A vulnerability was found in phpscriptpoint Insurance 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /search.php. The manipulation leads to cross site scripting. The attack can be launched remotely. The identifier VDB-235213 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235213 | 2023-07-23T13:16:16.302Z | 2023-07-24T03:00:05.021Z | 2023-10-24T06:55:04.506Z | {'Vendor': 'phpscriptpoint', 'Product': 'Insurance', 'Versions': '1.2'} |
CVE-2023-3709 | The Royal Elementor Addons plugin for WordPress is vulnerable to unauthenticated API key disclosure in versions up to, and including, 1.3.70 due to the plugin adding the API key to the source code of any page running the MailChimp block. This makes it possible for unauthenticated attackers to obtain a site's MailChimp API key. We recommend resetting any MailChimp API keys if running a vulnerable version of this plugin with the MailChimp block enabled as the API key may have been compromised. | https://www.wordfence.com/threat-intel/vulnerabilities/id/86c9bcf1-c69e-47ca-b74b-8ce6157f520b?source=cve | 2023-07-17T13:09:15.062Z | 2023-07-18T02:01:08.770Z | 2023-07-18T02:01:08.770Z | {'Vendor': 'wproyal', 'Product': 'Royal Elementor Addons and Templates', 'Versions': '*'} |
CVE-2023-3359 | An issue was discovered in the Linux kernel brcm_nvram_parse in drivers/nvmem/brcm_nvram.c. Lacks for the check of the return value of kzalloc() can cause the NULL Pointer Dereference. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b0576ade3aaf24b376ea1a4406ae138e2a22b0c0 | 2023-06-21T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'kernel 6.1-rc8'} |
CVE-2023-3070 | Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8. | https://huntr.dev/bounties/e193068e-0b95-403a-8453-e015241b8f1b | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'} |
CVE-2023-3420 | Type Confusion in V8 in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html | 2023-06-26T18:54:52.068Z | 2023-06-26T20:40:11.837Z | 2023-06-26T20:40:11.837Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.198'} |
CVE-2023-3973 | Cross-site Scripting (XSS) - Reflected in GitHub repository jgraph/drawio prior to 21.6.3. | https://huntr.dev/bounties/4c1c5db5-210f-4d7e-8380-b95f88fdb78d | 2023-07-27T14:32:56.314Z | 2023-07-27T14:33:11.271Z | 2023-07-27T14:33:11.271Z | {'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'} |
CVE-2023-3836 | A vulnerability classified as critical was found in Dahua Smart Park Management up to 20230713. This vulnerability affects unknown code of the file /emap/devicePoint_addImgIco?hasSubsystem=true. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235162 | 2023-07-21T20:50:50.266Z | 2023-07-22T18:00:05.786Z | 2023-10-24T06:25:47.211Z | {'Vendor': 'Dahua', 'Product': 'Smart Park Management', 'Versions': '20230713'} |
CVE-2023-3135 | The Mailtree Log Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/24d0229c-0f1b-42df-b89a-ce0b8a3fda7e?source=cve | 2023-06-06T22:18:53.085Z | 2023-07-12T04:38:43.927Z | 2023-07-12T04:38:43.927Z | {'Vendor': 'oacstudio', 'Product': 'Mailtree Log Mail', 'Versions': '*'} |
CVE-2023-3565 | Cross-site Scripting (XSS) - Generic in GitHub repository nilsteampassnet/teampass prior to 3.0.10. | https://huntr.dev/bounties/fcf46e1f-2ab6-4057-9d25-cf493ab09530 | 2023-07-08T13:24:20.783Z | 2023-07-08T13:24:33.695Z | 2023-07-08T13:24:33.695Z | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3772 | A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service. | http://www.openwall.com/lists/oss-security/2023/08/10/1 | 2023-07-19T13:55:07.799Z | 2023-07-25T15:47:40.183Z | 2024-01-25T20:44:12.817Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-3322 |
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
| https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 | 2023-06-19T15:47:19.574Z | 2023-07-24T17:12:37.224Z | 2023-07-24T17:12:37.224Z | {'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build '} |
CVE-2023-3637 | An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. | https://access.redhat.com/errata/RHSA-2023:4283 | 2023-07-12T13:34:14.699Z | 2023-07-25T12:47:31.531Z | 2024-01-23T01:03:28.208Z | {'Vendor': 'n/a', 'Product': 'openstack-neutron', 'Versions': ''} |
CVE-2023-3267 | When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:38.458Z | 2023-08-14T04:11:06.644Z | 2023-08-14T04:11:06.644Z | {'Vendor': 'CyberPower', 'Product': 'PowerPanel Enterprise', 'Versions': 'v2.6.0'} |
CVE-2023-3375 | Unrestricted Upload of File with Dangerous Type vulnerability in Unisign Bookreen allows OS Command Injection.This issue affects Bookreen: before 3.0.0.
| https://www.usom.gov.tr/bildirim/tr-23-0489 | 2023-06-23T06:30:36.245Z | 2023-09-05T16:35:31.190Z | 2023-10-18T07:38:02.770Z | {'Vendor': 'Unisign', 'Product': 'Bookreen', 'Versions': '0'} |
CVE-2023-3725 | Potential buffer overflow vulnerability in the Zephyr CAN bus subsystem | https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2g3m-p6c7-8rr3 | 2023-07-17T21:35:36.647Z | 2023-10-06T20:10:11.543Z | 2023-10-06T20:10:11.543Z | {'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'} |
CVE-2023-3230 | Missing Authorization in GitHub repository fossbilling/fossbilling prior to 0.5.0. | https://huntr.dev/bounties/390643f0-106b-4424-835d-52610aefa4c7 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3660 | A vulnerability was found in Campcodes Retro Cellphone Online Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/add_user_modal.php. The manipulation of the argument un leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-234014 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.234014 | 2023-07-13T09:50:50.092Z | 2023-07-13T11:31:03.319Z | 2023-10-23T15:11:17.258Z | {'Vendor': 'Campcodes', 'Product': 'Retro Cellphone Online Store', 'Versions': '1.0'} |
CVE-2023-3119 | A vulnerability, which was classified as critical, has been found in SourceCodester Service Provider Management System 1.0. Affected by this issue is some unknown functionality of the file view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230798 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230798 | 2023-06-06T10:03:38.069Z | 2023-06-06T10:31:03.265Z | 2023-10-23T12:40:43.046Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-3733 | Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:20.717Z | 2023-08-01T22:39:17.582Z | 2023-08-01T22:39:17.582Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3363 | An information disclosure issue in Gitlab CE/EE affecting all versions from 13.6 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1, resulted in the Sidekiq log including webhook tokens when the log format was set to `default`. | https://gitlab.com/gitlab-org/gitlab/-/issues/409034 | 2023-06-22T01:14:48.593Z | 2023-07-13T02:08:35.069Z | 2023-07-13T02:08:35.069Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.6, 16.0, 16.1'} |
CVE-2023-3699 | An Improper Privilege Management vulnerability was found in ASUSTOR Data Master (ADM) allows an unprivileged local users to modify the storage devices configuration. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
| https://www.asustor.com/security/security_advisory_detail?id=29 | 2023-07-17T06:12:32.684Z | 2023-08-22T08:57:21.718Z | 2023-08-22T08:57:21.718Z | {'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'} |
CVE-2023-3676 | A security issue was discovered in Kubernetes where a user
that can create pods on Windows nodes may be able to escalate to admin
privileges on those nodes. Kubernetes clusters are only affected if they
include Windows nodes.
| https://github.com/kubernetes/kubernetes/issues/119339 | 2023-07-14T16:06:03.399Z | 2023-10-31T20:22:53.620Z | 2023-10-31T20:22:53.620Z | {'Vendor': 'Kubernetes', 'Product': 'kubelet', 'Versions': 'v1.28.0, v1.27.0, v1.26.0, v1.25.0, v1.28.1, v1.27.5, v1.26.8, v1.25.13, v1.24.17, 0'} |
CVE-2023-3226 | The Popup Builder WordPress plugin before 4.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/941a9aa7-f4b2-474a-84d9-9a74c99079e2 | 2023-06-14T03:43:36.231Z | 2023-09-25T15:56:52.128Z | 2023-12-15T10:10:42.533Z | {'Vendor': 'Unknown', 'Product': 'Popup Builder', 'Versions': '0'} |
CVE-2023-3949 | An issue has been discovered in GitLab affecting all versions starting from 11.3 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for unauthorized users to view a public projects' release descriptions via an atom endpoint when release access on the public was set to only project members. | https://gitlab.com/gitlab-org/gitlab/-/issues/419664 | 2023-07-25T16:06:09.992Z | 2023-12-01T07:02:13.130Z | 2023-12-01T07:02:13.130Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.3, 16.5, 16.6'} |
Subsets and Splits