CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2955
A vulnerability, which was classified as critical, was found in SourceCodester Students Online Internship Timesheet System 1.0. Affected is an unknown function of the file rendered_report.php of the component GET Parameter Handler. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230142 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230142
2023-05-29T06:49:28.418Z
2023-05-29T07:00:03.704Z
2023-10-23T07:20:42.005Z
{'Vendor': 'SourceCodester', 'Product': 'Students Online Internship Timesheet System', 'Versions': '1.0'}
CVE-2023-2113
The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup.
https://wpscan.com/vulnerability/ddb4c95d-bbee-4095-aed6-25f6b8e63011
2023-04-17T09:11:02.125Z
2023-05-30T07:49:13.137Z
2023-05-30T07:49:13.137Z
{'Vendor': 'Unknown', 'Product': 'Autoptimize', 'Versions': '0'}
CVE-2023-2390
A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ntp.server1 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227668. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227668
2023-04-28T11:48:49.122Z
2023-04-28T20:00:07.146Z
2023-10-22T18:51:22.079Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2685
A vulnerability was found in AO-OPC server versions mentioned above. As the directory information for the service entry is not enclosed in quotation marks, potential attackers could possibly call up another application than the AO-OPC server by starting the service. The service might be started with system user privileges which could cause a shift in user access privileges. It is unlikely to exploit the vulnerability in well maintained Windows installations since the attacker would need write access to system folders. An update is available that resolves the vulnerability found during an internal review in the product AO-OPC = 3.2.1 
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108468A4093&LanguageCode=en&DocumentPartId=&Action=Launch
2023-05-12T15:05:29.236Z
2023-07-28T11:31:50.625Z
2023-07-28T11:31:50.625Z
{'Vendor': 'ABB', 'Product': 'AO-OPC', 'Versions': '1.0:0'}
CVE-2023-2902
A vulnerability was found in NFine Rapid Development Platform 20230511. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /SystemManage/Organize/GetTreeGridJson?_search=false&nd=1681813520783&rows=10000&page=1&sidx=&sord=asc. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229976. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229976
2023-05-25T20:36:41.883Z
2023-05-25T22:00:04.902Z
2023-10-23T07:08:30.194Z
{'Vendor': 'NFine', 'Product': 'Rapid Development Platform', 'Versions': '20230511'}
CVE-2023-2001
An issue has been discovered in GitLab CE/EE affecting all versions before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker was able to spoof protected tags, which could potentially lead a victim to download malicious code.
https://gitlab.com/gitlab-org/gitlab/-/issues/406764
2023-04-12T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=0.0, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2451
A vulnerability was found in SourceCodester Online DJ Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/bookings/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227795.
https://vuldb.com/?id.227795
2023-05-01T15:45:31.678Z
2023-05-01T16:00:06.478Z
2023-10-23T05:12:34.810Z
{'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'}
CVE-2023-2144
A vulnerability was found in Campcodes Online Thesis Archiving System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/departments/view_department.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226265 was assigned to this vulnerability.
https://vuldb.com/?id.226265
2023-04-18T10:47:04.313Z
2023-04-18T11:00:05.922Z
2023-10-22T14:19:36.218Z
{'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'}
CVE-2023-2514
Mattermost Sever fails to redact the DB username and password before emitting an application log during server initialization. 
https://mattermost.com/security-updates
2023-05-04T10:06:49.540Z
2023-05-12T08:56:56.250Z
2023-05-12T08:56:56.250Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.1.8, 7.7.4, 7.8.3, 7.9.2'}
CVE-2023-2847
During internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges. ESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.
https://support.eset.com/en/ca8447
2023-05-23T07:26:04.714Z
2023-06-15T07:46:47.134Z
2023-06-15T07:46:47.134Z
{'Vendor': 'ESET', 'Product': 'Server Security for Linux', 'Versions': '9.1.98.0, 9.0.466.0, 8.1.823.0'}
CVE-2023-2797
Mattermost fails to sanitize code permalinks, allowing an attacker to preview code from private repositories by posting a specially crafted permalink on a channel.
https://mattermost.com/security-updates/
2023-05-18T13:39:21.885Z
2023-06-16T09:03:17.656Z
2023-06-16T09:03:17.656Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost Github Plugin', 'Versions': '0, 0, 7.1.10, 7.8.5, 7.10.0, 7.10.1'}
CVE-2023-2778
A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. This vulnerability can be exploited by sending a modified packet to port 400. If exploited, the application could potentially crash or experience a high CPU or memory usage condition, causing intermittent application functionality issues. The application would need to be restarted to recover from the DoS.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139744
2023-05-17T18:40:49.427Z
2023-06-13T20:35:18.449Z
2023-06-13T20:35:18.449Z
{'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk Transaction Manager', 'Versions': '<=v13.10'}
CVE-2023-2282
Improper access control in the Web Login listener in Devolutions Remote Desktop Manager 2023.1.22 and earlier on Windows allows an authenticated user to bypass administrator-enforced Web Login restrictions and gain access to entries via an unexpected vector.
https://devolutions.net/security/advisories/DEVO-2023-0012
2023-04-25T15:07:46.309Z
2023-04-25T18:23:00.287Z
2023-04-25T18:23:00.287Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-2328
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2447
The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.1. This is due to missing or incorrect nonce validation on the 'export_users' function. This makes it possible for unauthenticated attackers to export the users to a csv file, granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0372efe4-b5be-4601-be43-5c12332ea1a5?source=cve
2023-05-01T14:18:29.917Z
2023-11-22T07:32:11.559Z
2023-11-22T07:32:11.559Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2017
Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.
https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023
2023-04-13T04:21:56.530Z
2023-04-17T10:18:27.543Z
2023-04-19T06:34:45.957Z
{'Vendor': 'Shopware AG', 'Product': 'Shopware 6', 'Versions': '0, 6.5.0.0-rc1'}
CVE-2023-2914
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471
2023-05-26T13:23:41.377Z
2023-08-17T15:01:25.994Z
2023-08-17T15:03:27.110Z
{'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ThinServer', 'Versions': '11.0.0 - 11.2.6, 11.1.0 - 11.1.6, 11.2.0 - 11.2.7, 12.0.0 - 12.0.5, 12.1.0 - 12.1.6, 13.0.0 - 13.0.2, 13.1.0'}
CVE-2023-2851
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AGT Tech Ceppatron allows Command Line Execution through SQL Injection, SQL Injection.This issue affects all versions of the sofware also EOS when CVE-ID assigned.
https://www.usom.gov.tr/bildirim/tr-23-0294
2023-05-23T18:25:17.566Z
2023-05-25T13:37:23.200Z
2023-07-26T09:05:07.059Z
{'Vendor': 'AGT Tech', 'Product': 'Ceppatron', 'Versions': '0'}
CVE-2023-2502
null
null
2023-05-03T00:00:00
null
2023-05-12T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2152
A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226273 was assigned to this vulnerability.
https://vuldb.com/?id.226273
2023-04-18T10:54:43.816Z
2023-04-18T13:31:03.309Z
2023-10-22T14:29:21.812Z
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
CVE-2023-2781
The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up to, and including, 3.5.0. This is due to a random token generation weakness in the resend_verification_email function. This allows unauthenticated attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Allow Automatic Login After Successful Verification setting to be enabled, which it is not by default.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f1e31357-7fbc-414b-a4f4-53fa5f2fc715?source=cve
2023-05-17T20:35:55.465Z
2023-06-02T23:37:56.873Z
2023-06-02T23:37:56.873Z
{'Vendor': 'sandeepsoni214', 'Product': 'User Email Verification for WooCommerce', 'Versions': '*'}
CVE-2023-2294
A vulnerability was found in UCMS 1.6.0. It has been classified as problematic. This affects an unknown part of the file saddpost.php of the component Column Configuration. The manipulation of the argument strorder leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227481 was assigned to this vulnerability.
https://vuldb.com/?id.227481
2023-04-26T05:25:56.826Z
2023-04-26T06:00:05.601Z
2023-10-22T16:01:22.308Z
{'Vendor': 'n/a', 'Product': 'UCMS', 'Versions': '1.6.0'}
CVE-2023-2943
Code Injection in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9
2023-05-27T00:00:00
2023-05-27T00:00:00
2023-05-27T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2040
A vulnerability classified as critical has been found in novel-plus 3.6.2. Affected is an unknown function of the file /news/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225918 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.225918
2023-04-14T06:30:52.583Z
2023-04-14T08:31:03.374Z
2023-10-22T09:46:26.826Z
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
CVE-2023-2410
A vulnerability has been found in SourceCodester AC Repair and Services System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/bookings/view_booking.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227704.
https://vuldb.com/?id.227704
2023-04-28T16:30:44.174Z
2023-04-28T23:00:04.960Z
2023-10-22T19:03:33.813Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-2105
Session Fixation in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
https://huntr.dev/bounties/de213e0b-a227-4fc3-bbe7-0b33fbf308e1
2023-04-15T00:00:00
2023-04-15T00:00:00
2023-04-15T00:00:00
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
CVE-2023-2555
The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the create function in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to create a custom drop-down currency switcher.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dd6b5d6d-5f5b-4b38-a25a-02cc1c041d37?source=cve
2023-05-05T18:58:52.106Z
2023-06-09T05:33:36.478Z
2023-06-09T05:33:36.478Z
{'Vendor': 'realmag777', 'Product': 'WPCS – WordPress Currency Switcher Professional', 'Versions': '*'}
CVE-2023-2806
A vulnerability classified as problematic was found in Weaver e-cology up to 9.0. Affected by this vulnerability is the function RequestInfoByXml of the component API. The manipulation leads to xml external entity reference. The associated identifier of this vulnerability is VDB-229411. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229411
2023-05-19T08:22:18.214Z
2023-05-19T08:31:02.728Z
2023-10-23T06:44:07.006Z
{'Vendor': 'Weaver', 'Product': 'e-cology', 'Versions': '9.0'}
CVE-2023-2386
A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.toAddr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227664
2023-04-28T11:48:32.429Z
2023-04-28T18:31:03.383Z
2023-10-22T18:46:29.472Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2739
A vulnerability classified as problematic was found in Gira HomeServer up to 4.12.0.220829 beta. This vulnerability affects unknown code of the file /hslist. The manipulation of the argument lst with the input debug%27"><img%20src=x%20onerror=alert(document.cookie)> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-229150 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229150
2023-05-16T14:35:47.074Z
2023-05-16T15:31:03.717Z
2023-10-23T06:24:35.499Z
{'Vendor': 'Gira', 'Product': 'HomeServer', 'Versions': '4.12.0.220829 beta'}
CVE-2023-2369
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/manage_restriction.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227645 was assigned to this vulnerability.
https://vuldb.com/?id.227645
2023-04-28T11:08:22.417Z
2023-04-28T13:00:04.508Z
2023-10-22T18:25:45.696Z
{'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'}
CVE-2023-2693
A vulnerability was found in SourceCodester Online Exam System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /mahasiswa/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228974 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228974
2023-05-14T07:52:31.843Z
2023-05-14T09:00:04.808Z
2023-10-23T06:14:49.211Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2948
Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.1.
https://github.com/openemr/openemr/commit/af1ecf78d1342519791bda9d3079e88f7d859015
2023-05-28T00:00:00
2023-05-28T00:00:00
2023-05-28T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2227
Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0.
https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3
2023-04-21T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-2677
A vulnerability, which was classified as critical, was found in SourceCodester Covid-19 Contact Tracing System 1.0. This affects an unknown part of the file admin/establishment/manage.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228891.
https://vuldb.com/?id.228891
2023-05-12T08:17:28.524Z
2023-05-12T09:31:03.678Z
2023-10-23T06:06:16.593Z
{'Vendor': 'SourceCodester', 'Product': 'Covid-19 Contact Tracing System', 'Versions': '1.0'}
CVE-2023-2362
The Float menu WordPress plugin before 5.0.2, Bubble Menu WordPress plugin before 3.0.4, Button Generator WordPress plugin before 2.3.5, Calculator Builder WordPress plugin before 1.5.1, Counter Box WordPress plugin before 1.2.2, Floating Button WordPress plugin before 5.3.1, Herd Effects WordPress plugin before 5.2.2, Popup Box WordPress plugin before 2.2.2, Side Menu Lite WordPress plugin before 4.0.2, Sticky Buttons WordPress plugin before 3.1.1, Wow Skype Buttons WordPress plugin before 4.0.2, WP Coder WordPress plugin before 2.5.6 do not escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/27e70507-fd68-4915-88cf-0b96ed55208e
2023-04-28T10:05:48.876Z
2023-06-12T17:28:22.661Z
2023-06-12T17:28:22.661Z
{'Vendor': 'Unknown', 'Product': 'Float menu', 'Versions': '0'}
CVE-2023-2698
A vulnerability classified as critical was found in SourceCodester Lost and Found Information System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=items/manage_item of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228979.
https://vuldb.com/?id.228979
2023-05-14T07:59:39.949Z
2023-05-14T11:31:04.283Z
2023-10-23T06:20:55.771Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-2732
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f00761a7-fe24-49a3-b3e3-a471e05815c1?source=cve
2023-05-16T12:26:28.503Z
2023-05-25T02:05:35.897Z
2023-05-25T02:05:35.897Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-2159
The CMP – Coming Soon & Maintenance plugin for WordPress is vulnerable to Maintenance Mode Bypass in versions up to, and including, 4.1.7. A correct cmp_bypass GET parameter in the URL (equal to the md5-hashed home_url in the default setting) allows users to visit a site placed in maintenance mode thus bypassing the plugin's provided feature.
https://www.wordfence.com/threat-intel/vulnerabilities/id/af955f69-b18c-446e-b05e-6a57a5f16dfa?source=cve
2023-04-18T14:09:08.727Z
2023-06-09T05:33:28.584Z
2023-06-09T05:33:28.584Z
{'Vendor': 'niteo', 'Product': 'CMP – Coming Soon & Maintenance Plugin by NiteoThemes', 'Versions': '*'}
CVE-2023-2509
A Cross-Site Scripting(XSS) vulnerability was found on ADM, LooksGood and SoundsGood Apps. An attacker can exploit this vulnerability to inject malicious scripts into the target applications to access any cookies or sensitive information retained by the browser and used with that application. Affected products and versions include: ADM 4.0.6.REG2, 4.1.0 and below as well as ADM 4.2.1.RGE2 and below, LooksGood 2.0.0.R129 and below and SoundsGood 2.3.0.r1027 and below.
https://www.asustor.com/security/security_advisory_detail?id=22
2023-05-04T03:31:16.029Z
2023-05-17T06:33:37.536Z
2023-05-18T01:34:00.464Z
{'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'}
CVE-2023-2620
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.1 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1. A maintainer could modify a webhook URL to leak masked webhook secrets by manipulating other masked portions. This addresses an incomplete fix for CVE-2023-0838.
https://gitlab.com/gitlab-org/gitlab/-/issues/410433
2023-05-10T05:22:00.071Z
2023-07-13T02:11:05.008Z
2023-07-13T02:11:05.008Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.1, 16.0, 16.1'}
CVE-2023-2270
The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.
https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2023-001
2023-04-25T05:16:46.270Z
2023-06-15T04:29:55.133Z
2023-06-15T04:30:03.092Z
{'Vendor': 'Netskope', 'Product': 'Netskope Client', 'Versions': '100;0'}
CVE-2023-2765
A vulnerability has been found in Weaver OA up to 9.5 and classified as problematic. This vulnerability affects unknown code of the file /E-mobile/App/System/File/downfile.php. The manipulation of the argument url leads to absolute path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-229270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229270
2023-05-17T16:05:00.734Z
2023-05-17T16:31:03.333Z
2023-10-23T06:27:02.236Z
{'Vendor': 'Weaver', 'Product': 'OA', 'Versions': '9.0, 9.1, 9.2, 9.3, 9.4, 9.5'}
CVE-2023-2335
Plaintext Password in Registry vulnerability in 42gears surelock windows surelockwinsetupv2.40.0.Exe on Windows (Registery modules) allows Retrieve Admin user credentials This issue affects surelock windows: from 2.3.12 through 2.40.0.
https://www.42gears.com/security-and-compliance/
2023-04-27T09:46:47.715Z
2023-04-27T17:55:49.876Z
2023-04-27T17:57:35.096Z
{'Vendor': '42gears', 'Product': 'surelock windows', 'Versions': '2.3.12'}
CVE-2023-2909
EZ Sync service fails to adequately handle user input, allowing an attacker to navigate beyond the intended directory structure and delete files. Affected products and versions include: ADM 4.0.6.REG2, 4.1.0 and below as well as ADM 4.2.1.RGE2 and below.
https://www.asustor.com/security/security_advisory_detail?id=25
2023-05-26T09:43:49.971Z
2023-05-31T09:26:31.581Z
2023-06-07T08:08:19.073Z
{'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'}
CVE-2023-2266
An Improper neutralization of input during web page generation in the Schweitzer Engineering Laboratories SEL-411L could allow an attacker to generate cross-site scripting based attacks against an authorized and authenticated user. See product Instruction Manual Appendix A dated 20230830 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:21:09.897Z
2023-11-30T16:57:34.955Z
2023-11-30T16:58:00.174Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'}
CVE-2023-2636
The AN_GradeBook WordPress plugin through 5.0.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber
https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5
2023-05-10T19:26:22.578Z
2023-07-17T13:29:51.763Z
2023-07-17T13:29:51.763Z
{'Vendor': 'Unknown', 'Product': 'AN_GradeBook', 'Versions': '0'}
CVE-2023-2323
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2773
A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279.
https://vuldb.com/?id.229279
2023-05-17T16:58:15.854Z
2023-05-17T19:00:05.244Z
2023-10-23T06:35:34.531Z
{'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'}
CVE-2023-2289
The wordpress vertical image slider plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘search_term’ parameter in versions up to, and including, 1.2.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c9983364-9b52-4acc-91d4-b352c6d24d52?source=cve
2023-04-25T19:35:37.833Z
2023-06-09T05:33:33.580Z
2023-06-09T05:33:33.580Z
{'Vendor': 'nik00726', 'Product': 'wordpress vertical image slider plugin', 'Versions': '*'}
CVE-2023-2118
Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints.
https://devolutions.net/security/advisories/DEVO-2023-0010
2023-04-17T12:42:59.155Z
2023-04-21T21:52:14.163Z
2023-06-12T19:48:35.982Z
{'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'}
CVE-2023-2548
The RegistrationMagic plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 5.2.0.5. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers, with administrator-level permissions and above, to change user passwords and potentially take over super-administrator accounts in multisite setup.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bfbc406b-49af-419e-adeb-0510794b7e3f?source=cve
2023-05-05T17:13:12.767Z
2023-05-16T08:40:01.773Z
2023-05-16T08:40:01.773Z
{'Vendor': 'metagauss', 'Product': 'RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login', 'Versions': '*'}
CVE-2023-2661
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228803.
https://vuldb.com/?id.228803
2023-05-11T13:01:43.979Z
2023-05-11T15:00:06.182Z
2023-10-23T05:56:29.883Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-2231
A vulnerability, which was classified as critical, was found in MAXTECH MAX-G866ac 0.4.1_TBRO_20160314. This affects an unknown part of the component Remote Management. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227001 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227001
2023-04-21T14:16:04.937Z
2023-04-21T14:31:03.678Z
2023-10-22T14:55:00.480Z
{'Vendor': 'MAXTECH', 'Product': 'MAX-G866ac', 'Versions': '0.4.1_TBRO_20160314'}
CVE-2023-2724
Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html
2023-05-15T21:16:58.324Z
2023-05-16T18:45:34.232Z
2023-05-16T18:45:34.232Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'}
CVE-2023-2374
A vulnerability has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument ecn-down leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227650 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227650
2023-04-28T11:29:52.832Z
2023-04-28T14:31:04.038Z
2023-10-22T18:31:51.401Z
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'}
CVE-2023-2860
An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.
https://access.redhat.com/security/cve/CVE-2023-2860
2023-05-24T07:11:24.194Z
2023-07-24T15:19:18.473Z
2024-01-23T03:20:36.395Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.0-rc5'}
CVE-2023-2163
Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed
2023-04-18T18:22:35.441Z
2023-09-20T05:02:38.155Z
2023-09-20T05:02:38.155Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '-, -'}
CVE-2023-2499
The RegistrationMagic plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.2.1.0. This is due to insufficient verification on the user being supplied during a Google social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
https://www.wordfence.com/threat-intel/vulnerabilities/id/87ec5542-b6e7-4b18-a3ec-c258e749d32e?source=cve
2023-05-03T14:48:17.108Z
2023-05-16T08:40:01.163Z
2023-05-16T08:40:01.163Z
{'Vendor': 'metagauss', 'Product': 'RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login', 'Versions': '*'}
CVE-2023-2533
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in PaperCut NG/MF, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. This could be exploited if the target is an admin with a current login session. Exploiting this would typically involve the possibility of deceiving an admin into clicking a specially crafted malicious link, potentially leading to unauthorized changes.
https://fluidattacks.com/advisories/arcangel/
2023-05-05T03:13:21.706Z
2023-06-20T14:45:14.102Z
2023-07-06T05:19:14.394Z
{'Vendor': 'PaperCut', 'Product': 'PaperCut NG/MF', 'Versions': '22.0.10, 21.2.12, 20.1.8'}
CVE-2023-2026
The Image Protector WordPress plugin through 1.1 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/2b59f640-5568-42bb-87b7-36eb448db5be
2023-04-13T15:49:26.919Z
2023-07-10T12:40:26.105Z
2023-07-10T13:05:43.819Z
{'Vendor': 'Unknown', 'Product': 'Image Protector', 'Versions': '0'}
CVE-2023-2476
A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument 系统工具/公告管理 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868.
https://vuldb.com/?id.227868
2023-05-02T12:01:35.109Z
2023-05-02T13:31:03.477Z
2023-10-23T05:17:27.842Z
{'Vendor': 'Dromara', 'Product': 'J2eeFAST', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6'}
CVE-2023-2925
A vulnerability, which was classified as problematic, was found in Webkul krayin crm 1.2.4. This affects an unknown part of the file /admin/contacts/organizations/edit/2 of the component Edit Person Page. The manipulation of the argument Organization leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230079. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230079
2023-05-27T07:17:47.638Z
2023-05-27T08:31:02.986Z
2023-10-23T07:14:36.008Z
{'Vendor': 'Webkul', 'Product': 'krayin crm', 'Versions': '1.2.4'}
CVE-2023-2564
OS Command Injection in GitHub repository sbs20/scanservjs prior to v2.27.0.
https://huntr.dev/bounties/d13113ad-a107-416b-acc1-01e4c16ec461
2023-05-07T00:00:00
2023-05-07T00:00:00
2023-10-10T07:18:26.553Z
{'Vendor': 'sbs20', 'Product': 'sbs20/scanservjs', 'Versions': 'unspecified'}
CVE-2023-2134
Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
2023-04-17T22:27:00.236Z
2023-04-19T03:40:26.081Z
2023-04-19T03:40:26.081Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'}
CVE-2023-2837
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17
2023-05-22T00:00:00
2023-05-22T00:00:00
2023-05-27T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-2972
Prototype Pollution in GitHub repository antfu/utils prior to 0.7.3.
https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef
2023-05-30T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'antfu', 'Product': 'antfu/utils', 'Versions': 'unspecified'}
CVE-2023-2421
A vulnerability classified as problematic has been found in Control iD RHiD 23.3.19.0. Affected is an unknown function of the file /v2/#/add/department. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-227718 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227718
2023-04-28T17:03:55.990Z
2023-04-29T01:31:04.560Z
2023-10-23T05:08:54.882Z
{'Vendor': 'Control iD', 'Product': 'RHiD', 'Versions': '23.3.19.0'}
CVE-2023-2071
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140724
2023-04-14T18:04:01.758Z
2023-09-12T13:12:42.386Z
2023-09-12T13:12:42.386Z
{'Vendor': 'Rockwell Automation', 'Product': 'Fa', 'Versions': '<=13.0'}
CVE-2023-2358
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.5.0.0 and 9.3.0.4, including 8.3.x.x, saves passwords of the Hadoop Copy Files step in plaintext. 
https://support.pentaho.com/hc/en-us/articles/19668208622221
2023-04-27T19:02:38.693Z
2023-09-26T21:34:06.878Z
2023-09-26T21:34:06.878Z
{'Vendor': 'Hitachi Vantara', 'Product': 'Pentaho Business Analytics Server', 'Versions': '1.0, 9.5.0.0'}
CVE-2023-2708
The Video Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘search_term’ parameter in versions up to, and including, 1.0.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8cfbad9f-61ba-4216-9078-c1e7e809899a?source=cve
2023-05-15T12:39:48.962Z
2023-05-16T02:04:27.089Z
2023-05-16T02:04:27.089Z
{'Vendor': 'nik00726', 'Product': 'Video Gallery', 'Versions': '*'}
CVE-2023-2122
The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitise and escape the iowd_tabs_active parameter before rendering it in the plugin admin panel, leading to a reflected Cross-Site Scripting vulnerability, allowing an attacker to trick a logged in admin to execute arbitrary javascript by clicking a link.
https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78
2023-04-17T15:15:20.988Z
2023-08-16T11:03:20.332Z
2023-08-16T11:03:20.332Z
{'Vendor': 'Unknown', 'Product': 'Image Optimizer by 10web', 'Versions': '0'}
CVE-2023-2572
The Survey Maker WordPress plugin before 3.4.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/2f7fe6e6-c3d0-4e27-8222-572d7a420153
2023-05-08T10:35:11.367Z
2023-06-05T13:38:59.749Z
2023-06-05T13:38:59.749Z
{'Vendor': 'Unknown', 'Product': 'Survey Maker', 'Versions': '0'}
CVE-2023-2088
A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.
https://security.openstack.org/ossa/OSSA-2023-003.html
2023-04-14T00:00:00
2023-05-12T00:00:00
2023-07-23T00:00:00
{'Vendor': 'n/a', 'Product': 'OpenStack', 'Versions': 'unknown'}
CVE-2023-2067
The Announcement & Notification Banner – Bulletin plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce validation on the 'bulletinwp_update_bulletin_status', 'bulletinwp_update_bulletin', 'bulletinwp_update_settings', 'bulletinwp_update_status', 'bulletinwp_export_bulletins', and 'bulletinwp_import_bulletins' functions in versions up to, and including, 3.7.0. This makes it possible for unauthenticated attackers to modify the plugin's settings, modify bulletins, create new bulletins, and more, via a forged request granted they can trick a site's user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b808450f-0ebf-4c49-a9e3-f1c1f2b1f632?source=cve
2023-04-14T13:39:20.309Z
2023-06-09T05:33:30.276Z
2023-06-09T05:33:30.276Z
{'Vendor': 'mikewire_rocksolid', 'Product': 'Announcement & Notification Banner – Bulletin', 'Versions': '*'}
CVE-2023-2437
The UserPro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.1.1. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. An attacker can leverage CVE-2023-2448 and CVE-2023-2446 to get the user's email address to successfully exploit this vulnerability.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b3cf9f38-c20e-40dc-a7a1-65b0c6ba7925?source=cve
2023-05-01T09:41:14.173Z
2023-11-22T15:33:33.084Z
2023-11-22T15:33:33.084Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2964
The Simple Iframe WordPress plugin before 1.2.0 does not properly validate one of its WordPress block attribute's content, which may allow users whose role is at least that of a contributor to conduct Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/97aac334-5323-41bb-90f0-d180bcc9162f
2023-05-29T18:00:39.299Z
2023-07-10T12:40:29.302Z
2023-07-10T13:05:44.376Z
{'Vendor': 'Unknown', 'Product': 'Simple Iframe', 'Versions': '0'}
CVE-2023-2876
Sensitive Cookie Without 'HttpOnly' Flag vulnerability in ABB REX640 PCL1 (firmware modules), ABB REX640 PCL2 (Firmware modules), ABB REX640 PCL3 (firmware modules) allows Cross-Site Scripting (XSS).This issue affects REX640 PCL1: from 1.0;0 before 1.0.8; REX640 PCL2: from 1.0;0 before 1.1.4; REX640 PCL3: from 1.0;0 before 1.2.1.
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001423&LanguageCode=en&DocumentPartId=&Action=Launch
2023-05-24T17:41:29.260Z
2023-06-13T03:52:12.002Z
2023-06-13T03:52:12.002Z
{'Vendor': 'ABB', 'Product': 'REX640 PCL1', 'Versions': '1.0;0'}
CVE-2023-2899
The Google Map Shortcode WordPress plugin through 3.1.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/92dcbeb3-17db-4d10-8ae7-c99acdb48c78
2023-05-25T19:53:03.218Z
2023-06-19T10:52:45.489Z
2023-06-19T10:52:45.489Z
{'Vendor': 'Unknown', 'Product': 'Google Map Shortcode', 'Versions': '0'}
CVE-2023-2933
Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:14.252Z
2023-05-30T21:31:39.451Z
2023-05-30T21:31:39.451Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2460
Insufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
2023-05-01T23:09:49.405Z
2023-05-02T23:47:57.740Z
2023-05-02T23:47:57.740Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'}
CVE-2023-2030
An issue has been discovered in GitLab CE/EE affecting all versions from 12.2 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which an attacker could potentially modify the metadata of signed commits.
https://gitlab.com/gitlab-org/gitlab/-/issues/407252
2023-04-13T18:20:57.328Z
2024-01-12T13:57:06.694Z
2024-01-12T13:57:06.694Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.2, 16.6, 16.7'}
CVE-2023-2319
It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.
https://bugzilla.redhat.com/show_bug.cgi?id=2190092
2023-04-27T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'pcs', 'Versions': 'Affects pcs v0.11.4-6.el9, Fixed in pcs v0.11.4-7.el9_2'}
CVE-2023-2749
Download Center fails to properly validate the file path submitted by a user, An attacker can exploit this vulnerability to gain unauthorized access to sensitive files or directories without appropriate permission restrictions. Download Center on ADM 4.0 and above will be affected. Affected products and versions include: Download Center 1.1.5.r1280 and below.
https://www.asustor.com/security/security_advisory_detail?id=24
2023-05-17T05:56:36.390Z
2023-05-31T08:36:37.182Z
2023-05-31T08:36:37.182Z
{'Vendor': 'ASUSTOR', 'Product': 'Download Center', 'Versions': '1.1.5'}
CVE-2023-2381
A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=bandwidth_profile.htm of the component Web Management Interface. The manipulation of the argument BandWidthProfile.ProfileName leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227659. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227659
2023-04-28T11:48:13.707Z
2023-04-28T17:00:05.464Z
2023-10-22T18:40:23.570Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2694
A vulnerability was found in SourceCodester Online Exam System 1.0. It has been classified as critical. This affects an unknown part of the file /dosen/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228975.
https://vuldb.com/?id.228975
2023-05-14T07:52:33.707Z
2023-05-14T10:00:04.635Z
2023-10-23T06:16:02.927Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2047
A vulnerability was found in Campcodes Advanced Online Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument voter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225932.
https://vuldb.com/?id.225932
2023-04-14T07:41:42.016Z
2023-04-14T10:31:03.924Z
2023-10-22T09:52:33.067Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2417
A vulnerability was found in ks-soft Advanced Host Monitor up to 12.56 and classified as problematic. Affected by this issue is some unknown functionality of the file C:\Program Files (x86)\HostMonitor\RMA-Win\rma_active.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. Upgrading to version 12.60 is able to address this issue. It is recommended to upgrade the affected component. VDB-227714 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227714
2023-04-28T16:48:47.231Z
2023-04-29T00:31:03.814Z
2023-10-22T19:08:26.626Z
{'Vendor': 'ks-soft', 'Product': 'Advanced Host Monitor', 'Versions': '12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, 12.10, 12.11, 12.12, 12.13, 12.14, 12.15, 12.16, 12.17, 12.18, 12.19, 12.20, 12.21, 12.22, 12.23, 12.24, 12.25, 12.26, 12.27, 12.28, 12.29, 12.30, 12.31, 12.32, 12.33, 12.34, 12.35, 12.36, 12.37, 12.38, 12.39, 12.40, 12.41, 12.42, 12.43, 12.44, 12.45, 12.46, 12.47, 12.48, 12.49, 12.50, 12.51, 12.52, 12.53, 12.54, 12.55, 12.56'}
CVE-2023-2944
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/0d67dcb1-acc0-4d5d-bb69-a09d1bc9fa1d
2023-05-27T00:00:00
2023-05-27T00:00:00
2023-05-27T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2801
Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly. This might enable malicious users to crash Grafana instances through that endpoint. Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.
https://grafana.com/security/security-advisories/cve-2023-2801/
2023-05-18T16:22:13.573Z
2023-06-06T18:03:32.459Z
2023-06-06T18:03:32.459Z
{'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '9.4.0, 9.5.0'}
CVE-2023-2102
Cross-site Scripting (XSS) - Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
https://huntr.dev/bounties/dd7c04a7-a984-4387-9ac4-24596e7ece44
2023-04-15T00:00:00
2023-04-15T00:00:00
2023-04-15T00:00:00
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
CVE-2023-2552
Cross-Site Request Forgery (CSRF) in GitHub repository unilogies/bumsys prior to 2.1.1.
https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32
2023-05-05T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
CVE-2023-2786
Mattermost fails to properly check the permissions when executing commands allowing a member with no permissions to post a message in a channel to actually post it by executing channel commands.
https://mattermost.com/security-updates
2023-05-18T10:49:51.062Z
2023-06-16T08:43:49.826Z
2023-06-16T08:43:49.826Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10, 7.8.5, 7.9.4, 7.10.1'}
CVE-2023-2339
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2769
A vulnerability classified as critical has been found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229275.
https://vuldb.com/?id.229275
2023-05-17T16:42:31.248Z
2023-05-17T17:31:03.343Z
2023-10-23T06:30:41.847Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-2293
A vulnerability was found in SourceCodester Purchase Order Management System 1.0. It has been classified as problematic. This affects an unknown part of the file classes/Master.php?f=save_item. The manipulation of the argument description with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227463.
https://vuldb.com/?id.227463
2023-04-25T20:49:31.057Z
2023-04-25T21:00:04.871Z
2023-10-22T16:00:09.154Z
{'Vendor': 'SourceCodester', 'Product': 'Purchase Order Management System', 'Versions': '1.0'}
CVE-2023-2913
An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140160
2023-05-26T13:21:35.457Z
2023-07-18T19:52:45.214Z
2023-07-18T19:55:22.920Z
{'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ThinServer', 'Versions': '13.0.0 - 13.0.2, 13.1.0'}
CVE-2023-2440
The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.1. This is due to missing nonce validation in the 'admin_page', 'userpro_verify_user' and 'verifyUnverifyAllUsers' functions. This makes it possible for unauthenticated attackers to modify the role of verified users to elevate verified user privileges to that of any user such as 'administrator' via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/73600498-f55c-4b8e-a625-4f292e58e0ee?source=cve
2023-05-01T09:54:33.228Z
2023-11-22T15:33:27.961Z
2023-11-22T15:33:27.961Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2010
The Forminator WordPress plugin before 1.24.1 does not use an atomic operation to check whether a user has already voted, and then update that information. This leads to a Race Condition that may allow a single user to vote multiple times on a poll.
https://wpscan.com/vulnerability/d0da4c0d-622f-4310-a867-6bfdb474073a
2023-04-12T16:22:26.910Z
2023-07-04T07:23:26.428Z
2023-07-05T10:47:52.992Z
{'Vendor': 'Unknown', 'Product': 'Forminator', 'Versions': '0'}
CVE-2023-2505
The affected products have a CSRF vulnerability that could allow an attacker to execute code and upload malicious files.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11
2023-05-03T15:24:23.176Z
2023-05-22T21:01:56.372Z
2023-05-22T21:05:35.109Z
{'Vendor': 'BirdDog', 'Product': 'STUDIO R3', 'Versions': '3.6.4'}