CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2955 | A vulnerability, which was classified as critical, was found in SourceCodester Students Online Internship Timesheet System 1.0. Affected is an unknown function of the file rendered_report.php of the component GET Parameter Handler. The manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230142 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230142 | 2023-05-29T06:49:28.418Z | 2023-05-29T07:00:03.704Z | 2023-10-23T07:20:42.005Z | {'Vendor': 'SourceCodester', 'Product': 'Students Online Internship Timesheet System', 'Versions': '1.0'} |
CVE-2023-2113 | The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup. | https://wpscan.com/vulnerability/ddb4c95d-bbee-4095-aed6-25f6b8e63011 | 2023-04-17T09:11:02.125Z | 2023-05-30T07:49:13.137Z | 2023-05-30T07:49:13.137Z | {'Vendor': 'Unknown', 'Product': 'Autoptimize', 'Versions': '0'} |
CVE-2023-2390 | A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ntp.server1 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227668. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227668 | 2023-04-28T11:48:49.122Z | 2023-04-28T20:00:07.146Z | 2023-10-22T18:51:22.079Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2685 | A vulnerability was found in AO-OPC server versions mentioned above. As the directory information for the service entry is not enclosed in quotation marks, potential attackers could possibly call up another application than the AO-OPC server by starting the service. The service might be started with system user privileges which could cause a shift in user access privileges.
It is unlikely to exploit the vulnerability in well maintained Windows installations since the attacker would need write access to system folders.
An update is available that resolves the vulnerability found during an internal review in the product AO-OPC = 3.2.1
| https://search.abb.com/library/Download.aspx?DocumentID=9AKK108468A4093&LanguageCode=en&DocumentPartId=&Action=Launch | 2023-05-12T15:05:29.236Z | 2023-07-28T11:31:50.625Z | 2023-07-28T11:31:50.625Z | {'Vendor': 'ABB', 'Product': 'AO-OPC', 'Versions': '1.0:0'} |
CVE-2023-2902 | A vulnerability was found in NFine Rapid Development Platform 20230511. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /SystemManage/Organize/GetTreeGridJson?_search=false&nd=1681813520783&rows=10000&page=1&sidx=&sord=asc. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229976. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229976 | 2023-05-25T20:36:41.883Z | 2023-05-25T22:00:04.902Z | 2023-10-23T07:08:30.194Z | {'Vendor': 'NFine', 'Product': 'Rapid Development Platform', 'Versions': '20230511'} |
CVE-2023-2001 | An issue has been discovered in GitLab CE/EE affecting all versions before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker was able to spoof protected tags, which could potentially lead a victim to download malicious code. | https://gitlab.com/gitlab-org/gitlab/-/issues/406764 | 2023-04-12T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=0.0, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2451 | A vulnerability was found in SourceCodester Online DJ Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/bookings/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227795. | https://vuldb.com/?id.227795 | 2023-05-01T15:45:31.678Z | 2023-05-01T16:00:06.478Z | 2023-10-23T05:12:34.810Z | {'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'} |
CVE-2023-2144 | A vulnerability was found in Campcodes Online Thesis Archiving System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/departments/view_department.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226265 was assigned to this vulnerability. | https://vuldb.com/?id.226265 | 2023-04-18T10:47:04.313Z | 2023-04-18T11:00:05.922Z | 2023-10-22T14:19:36.218Z | {'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'} |
CVE-2023-2514 | Mattermost Sever fails to redact the DB username and password before emitting an application log during server initialization.
| https://mattermost.com/security-updates | 2023-05-04T10:06:49.540Z | 2023-05-12T08:56:56.250Z | 2023-05-12T08:56:56.250Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.1.8, 7.7.4, 7.8.3, 7.9.2'} |
CVE-2023-2847 |
During internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges.
ESET remedied this possible attack vector and has prepared new builds of its products that are no longer susceptible to this vulnerability.
| https://support.eset.com/en/ca8447 | 2023-05-23T07:26:04.714Z | 2023-06-15T07:46:47.134Z | 2023-06-15T07:46:47.134Z | {'Vendor': 'ESET', 'Product': 'Server Security for Linux', 'Versions': '9.1.98.0, 9.0.466.0, 8.1.823.0'} |
CVE-2023-2797 | Mattermost fails to sanitize code permalinks, allowing an attacker to preview code from private repositories by posting a specially crafted permalink on a channel.
| https://mattermost.com/security-updates/ | 2023-05-18T13:39:21.885Z | 2023-06-16T09:03:17.656Z | 2023-06-16T09:03:17.656Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost Github Plugin', 'Versions': '0, 0, 7.1.10, 7.8.5, 7.10.0, 7.10.1'} |
CVE-2023-2778 |
A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. This vulnerability can be exploited by sending a modified packet to port 400. If exploited, the application could potentially crash or experience a high CPU or memory usage condition, causing intermittent application functionality issues. The application would need to be restarted to recover from the DoS. | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139744 | 2023-05-17T18:40:49.427Z | 2023-06-13T20:35:18.449Z | 2023-06-13T20:35:18.449Z | {'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk Transaction Manager', 'Versions': '<=v13.10'} |
CVE-2023-2282 | Improper access control in the Web Login listener in Devolutions Remote Desktop Manager 2023.1.22 and earlier on Windows allows an authenticated user to bypass administrator-enforced Web Login restrictions and gain access to entries via an unexpected vector.
| https://devolutions.net/security/advisories/DEVO-2023-0012 | 2023-04-25T15:07:46.309Z | 2023-04-25T18:23:00.287Z | 2023-04-25T18:23:00.287Z | {'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'} |
CVE-2023-2328 | Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/01a44584-e36b-46f4-ad94-53af488397f6 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2447 | The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.1. This is due to missing or incorrect nonce validation on the 'export_users' function. This makes it possible for unauthenticated attackers to export the users to a csv file, granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0372efe4-b5be-4601-be43-5c12332ea1a5?source=cve | 2023-05-01T14:18:29.917Z | 2023-11-22T07:32:11.559Z | 2023-11-22T07:32:11.559Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2017 | Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when referencing callables. Users are advised to upgrade to v6.4.20.1 to resolve this issue. This is a bypass of CVE-2023-22731.
| https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2023 | 2023-04-13T04:21:56.530Z | 2023-04-17T10:18:27.543Z | 2023-04-19T06:34:45.957Z | {'Vendor': 'Shopware AG', 'Product': 'Shopware 6', 'Versions': '0, 6.5.0.0-rc1'} |
CVE-2023-2914 | The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software. | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471 | 2023-05-26T13:23:41.377Z | 2023-08-17T15:01:25.994Z | 2023-08-17T15:03:27.110Z | {'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ThinServer', 'Versions': '11.0.0 - 11.2.6, 11.1.0 - 11.1.6, 11.2.0 - 11.2.7, 12.0.0 - 12.0.5, 12.1.0 - 12.1.6, 13.0.0 - 13.0.2, 13.1.0'} |
CVE-2023-2851 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AGT Tech Ceppatron allows Command Line Execution through SQL Injection, SQL Injection.This issue affects all versions of the sofware also EOS when CVE-ID assigned.
| https://www.usom.gov.tr/bildirim/tr-23-0294 | 2023-05-23T18:25:17.566Z | 2023-05-25T13:37:23.200Z | 2023-07-26T09:05:07.059Z | {'Vendor': 'AGT Tech', 'Product': 'Ceppatron', 'Versions': '0'} |
CVE-2023-2502 | null | null | 2023-05-03T00:00:00 | null | 2023-05-12T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2152 | A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226273 was assigned to this vulnerability. | https://vuldb.com/?id.226273 | 2023-04-18T10:54:43.816Z | 2023-04-18T13:31:03.309Z | 2023-10-22T14:29:21.812Z | {'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'} |
CVE-2023-2781 | The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up to, and including, 3.5.0. This is due to a random token generation weakness in the resend_verification_email function. This allows unauthenticated attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Allow Automatic Login After Successful Verification setting to be enabled, which it is not by default. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f1e31357-7fbc-414b-a4f4-53fa5f2fc715?source=cve | 2023-05-17T20:35:55.465Z | 2023-06-02T23:37:56.873Z | 2023-06-02T23:37:56.873Z | {'Vendor': 'sandeepsoni214', 'Product': 'User Email Verification for WooCommerce', 'Versions': '*'} |
CVE-2023-2294 | A vulnerability was found in UCMS 1.6.0. It has been classified as problematic. This affects an unknown part of the file saddpost.php of the component Column Configuration. The manipulation of the argument strorder leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227481 was assigned to this vulnerability. | https://vuldb.com/?id.227481 | 2023-04-26T05:25:56.826Z | 2023-04-26T06:00:05.601Z | 2023-10-22T16:01:22.308Z | {'Vendor': 'n/a', 'Product': 'UCMS', 'Versions': '1.6.0'} |
CVE-2023-2943 | Code Injection in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2040 | A vulnerability classified as critical has been found in novel-plus 3.6.2. Affected is an unknown function of the file /news/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225918 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.225918 | 2023-04-14T06:30:52.583Z | 2023-04-14T08:31:03.374Z | 2023-10-22T09:46:26.826Z | {'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'} |
CVE-2023-2410 | A vulnerability has been found in SourceCodester AC Repair and Services System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/bookings/view_booking.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227704. | https://vuldb.com/?id.227704 | 2023-04-28T16:30:44.174Z | 2023-04-28T23:00:04.960Z | 2023-10-22T19:03:33.813Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-2105 | Session Fixation in GitHub repository alextselegidis/easyappointments prior to 1.5.0. | https://huntr.dev/bounties/de213e0b-a227-4fc3-bbe7-0b33fbf308e1 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | {'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'} |
CVE-2023-2555 | The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the create function in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to create a custom drop-down currency switcher. | https://www.wordfence.com/threat-intel/vulnerabilities/id/dd6b5d6d-5f5b-4b38-a25a-02cc1c041d37?source=cve | 2023-05-05T18:58:52.106Z | 2023-06-09T05:33:36.478Z | 2023-06-09T05:33:36.478Z | {'Vendor': 'realmag777', 'Product': 'WPCS – WordPress Currency Switcher Professional', 'Versions': '*'} |
CVE-2023-2806 | A vulnerability classified as problematic was found in Weaver e-cology up to 9.0. Affected by this vulnerability is the function RequestInfoByXml of the component API. The manipulation leads to xml external entity reference. The associated identifier of this vulnerability is VDB-229411. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229411 | 2023-05-19T08:22:18.214Z | 2023-05-19T08:31:02.728Z | 2023-10-23T06:44:07.006Z | {'Vendor': 'Weaver', 'Product': 'e-cology', 'Versions': '9.0'} |
CVE-2023-2386 | A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.toAddr leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227664 | 2023-04-28T11:48:32.429Z | 2023-04-28T18:31:03.383Z | 2023-10-22T18:46:29.472Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2739 | A vulnerability classified as problematic was found in Gira HomeServer up to 4.12.0.220829 beta. This vulnerability affects unknown code of the file /hslist. The manipulation of the argument lst with the input debug%27"><img%20src=x%20onerror=alert(document.cookie)> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-229150 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229150 | 2023-05-16T14:35:47.074Z | 2023-05-16T15:31:03.717Z | 2023-10-23T06:24:35.499Z | {'Vendor': 'Gira', 'Product': 'HomeServer', 'Versions': '4.12.0.220829 beta'} |
CVE-2023-2369 | A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/manage_restriction.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227645 was assigned to this vulnerability. | https://vuldb.com/?id.227645 | 2023-04-28T11:08:22.417Z | 2023-04-28T13:00:04.508Z | 2023-10-22T18:25:45.696Z | {'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'} |
CVE-2023-2693 | A vulnerability was found in SourceCodester Online Exam System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /mahasiswa/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228974 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228974 | 2023-05-14T07:52:31.843Z | 2023-05-14T09:00:04.808Z | 2023-10-23T06:14:49.211Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2948 | Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.1. | https://github.com/openemr/openemr/commit/af1ecf78d1342519791bda9d3079e88f7d859015 | 2023-05-28T00:00:00 | 2023-05-28T00:00:00 | 2023-05-28T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2227 | Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0. | https://huntr.dev/bounties/351f9055-2008-4af0-b820-01ff66678bf3 | 2023-04-21T00:00:00 | 2023-04-21T00:00:00 | 2023-04-21T00:00:00 | {'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'} |
CVE-2023-2677 | A vulnerability, which was classified as critical, was found in SourceCodester Covid-19 Contact Tracing System 1.0. This affects an unknown part of the file admin/establishment/manage.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228891. | https://vuldb.com/?id.228891 | 2023-05-12T08:17:28.524Z | 2023-05-12T09:31:03.678Z | 2023-10-23T06:06:16.593Z | {'Vendor': 'SourceCodester', 'Product': 'Covid-19 Contact Tracing System', 'Versions': '1.0'} |
CVE-2023-2362 | The Float menu WordPress plugin before 5.0.2, Bubble Menu WordPress plugin before 3.0.4, Button Generator WordPress plugin before 2.3.5, Calculator Builder WordPress plugin before 1.5.1, Counter Box WordPress plugin before 1.2.2, Floating Button WordPress plugin before 5.3.1, Herd Effects WordPress plugin before 5.2.2, Popup Box WordPress plugin before 2.2.2, Side Menu Lite WordPress plugin before 4.0.2, Sticky Buttons WordPress plugin before 3.1.1, Wow Skype Buttons WordPress plugin before 4.0.2, WP Coder WordPress plugin before 2.5.6 do not escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/27e70507-fd68-4915-88cf-0b96ed55208e | 2023-04-28T10:05:48.876Z | 2023-06-12T17:28:22.661Z | 2023-06-12T17:28:22.661Z | {'Vendor': 'Unknown', 'Product': 'Float menu', 'Versions': '0'} |
CVE-2023-2698 | A vulnerability classified as critical was found in SourceCodester Lost and Found Information System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=items/manage_item of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228979. | https://vuldb.com/?id.228979 | 2023-05-14T07:59:39.949Z | 2023-05-14T11:31:04.283Z | 2023-10-23T06:20:55.771Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2732 | The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.2. This is due to insufficient verification on the user being supplied during the add listing REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f00761a7-fe24-49a3-b3e3-a471e05815c1?source=cve | 2023-05-16T12:26:28.503Z | 2023-05-25T02:05:35.897Z | 2023-05-25T02:05:35.897Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-2159 | The CMP – Coming Soon & Maintenance plugin for WordPress is vulnerable to Maintenance Mode Bypass in versions up to, and including, 4.1.7. A correct cmp_bypass GET parameter in the URL (equal to the md5-hashed home_url in the default setting) allows users to visit a site placed in maintenance mode thus bypassing the plugin's provided feature. | https://www.wordfence.com/threat-intel/vulnerabilities/id/af955f69-b18c-446e-b05e-6a57a5f16dfa?source=cve | 2023-04-18T14:09:08.727Z | 2023-06-09T05:33:28.584Z | 2023-06-09T05:33:28.584Z | {'Vendor': 'niteo', 'Product': 'CMP – Coming Soon & Maintenance Plugin by NiteoThemes', 'Versions': '*'} |
CVE-2023-2509 | A Cross-Site Scripting(XSS) vulnerability was found on ADM, LooksGood and SoundsGood Apps. An attacker can exploit this vulnerability to inject malicious scripts into the target applications to access any cookies or sensitive information retained by the browser and used with that application. Affected products and versions include: ADM 4.0.6.REG2, 4.1.0 and below as well as ADM 4.2.1.RGE2 and below, LooksGood 2.0.0.R129 and below and SoundsGood 2.3.0.r1027 and below. | https://www.asustor.com/security/security_advisory_detail?id=22 | 2023-05-04T03:31:16.029Z | 2023-05-17T06:33:37.536Z | 2023-05-18T01:34:00.464Z | {'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'} |
CVE-2023-2620 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.1 prior to 15.11.10, all versions from 16.0 prior to 16.0.6, all versions from 16.1 prior to 16.1.1. A maintainer could modify a webhook URL to leak masked webhook secrets by manipulating other masked portions. This addresses an incomplete fix for CVE-2023-0838. | https://gitlab.com/gitlab-org/gitlab/-/issues/410433 | 2023-05-10T05:22:00.071Z | 2023-07-13T02:11:05.008Z | 2023-07-13T02:11:05.008Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.1, 16.0, 16.1'} |
CVE-2023-2270 | The Netskope client service running with NT\SYSTEM privileges accepts network connections from localhost to start various services and execute commands. The connection handling function of Netskope client before R100 in this service utilized a relative path to download and unzip configuration files on the machine. This relative path provided a way for local users to write arbitrary files at a location which is accessible to only higher privileged users. This can be exploited by local users to execute code with NT\SYSTEM privileges on the end machine.
| https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2023-001 | 2023-04-25T05:16:46.270Z | 2023-06-15T04:29:55.133Z | 2023-06-15T04:30:03.092Z | {'Vendor': 'Netskope', 'Product': 'Netskope Client', 'Versions': '100;0'} |
CVE-2023-2765 | A vulnerability has been found in Weaver OA up to 9.5 and classified as problematic. This vulnerability affects unknown code of the file /E-mobile/App/System/File/downfile.php. The manipulation of the argument url leads to absolute path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-229270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229270 | 2023-05-17T16:05:00.734Z | 2023-05-17T16:31:03.333Z | 2023-10-23T06:27:02.236Z | {'Vendor': 'Weaver', 'Product': 'OA', 'Versions': '9.0, 9.1, 9.2, 9.3, 9.4, 9.5'} |
CVE-2023-2335 |
Plaintext Password in Registry
vulnerability in 42gears surelock windows surelockwinsetupv2.40.0.Exe on Windows (Registery modules) allows Retrieve
Admin user credentials
This issue affects surelock windows: from 2.3.12 through 2.40.0.
| https://www.42gears.com/security-and-compliance/ | 2023-04-27T09:46:47.715Z | 2023-04-27T17:55:49.876Z | 2023-04-27T17:57:35.096Z | {'Vendor': '42gears', 'Product': 'surelock windows', 'Versions': '2.3.12'} |
CVE-2023-2909 | EZ Sync service fails to adequately handle user input, allowing an attacker to navigate beyond the intended directory structure and delete files. Affected products and versions include: ADM 4.0.6.REG2, 4.1.0 and below as well as ADM 4.2.1.RGE2 and below. | https://www.asustor.com/security/security_advisory_detail?id=25 | 2023-05-26T09:43:49.971Z | 2023-05-31T09:26:31.581Z | 2023-06-07T08:08:19.073Z | {'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'} |
CVE-2023-2266 | An Improper neutralization of input during web page generation in the Schweitzer Engineering Laboratories SEL-411L could allow an attacker to generate cross-site scripting based attacks against an authorized and authenticated user.
See product Instruction Manual Appendix A dated 20230830 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:21:09.897Z | 2023-11-30T16:57:34.955Z | 2023-11-30T16:58:00.174Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'} |
CVE-2023-2636 | The AN_GradeBook WordPress plugin through 5.0.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber | https://wpscan.com/vulnerability/6a3bfd88-1251-4d40-b26f-62950a3ce0b5 | 2023-05-10T19:26:22.578Z | 2023-07-17T13:29:51.763Z | 2023-07-17T13:29:51.763Z | {'Vendor': 'Unknown', 'Product': 'AN_GradeBook', 'Versions': '0'} |
CVE-2023-2323 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/41edf190-f6bf-4a29-a237-7ff1b2d048d3 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2773 | A vulnerability has been found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file view_admin.php. The manipulation of the argument adminid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229279. | https://vuldb.com/?id.229279 | 2023-05-17T16:58:15.854Z | 2023-05-17T19:00:05.244Z | 2023-10-23T06:35:34.531Z | {'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'} |
CVE-2023-2289 | The wordpress vertical image slider plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘search_term’ parameter in versions up to, and including, 1.2.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c9983364-9b52-4acc-91d4-b352c6d24d52?source=cve | 2023-04-25T19:35:37.833Z | 2023-06-09T05:33:33.580Z | 2023-06-09T05:33:33.580Z | {'Vendor': 'nik00726', 'Product': 'wordpress vertical image slider plugin', 'Versions': '*'} |
CVE-2023-2118 | Insufficient access control in support ticket feature in Devolutions Server 2023.1.5.0 and below allows an authenticated attacker to send support tickets and download diagnostic files via specific endpoints. | https://devolutions.net/security/advisories/DEVO-2023-0010 | 2023-04-17T12:42:59.155Z | 2023-04-21T21:52:14.163Z | 2023-06-12T19:48:35.982Z | {'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'} |
CVE-2023-2548 | The RegistrationMagic plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 5.2.0.5. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers, with administrator-level permissions and above, to change user passwords and potentially take over super-administrator accounts in multisite setup. | https://www.wordfence.com/threat-intel/vulnerabilities/id/bfbc406b-49af-419e-adeb-0510794b7e3f?source=cve | 2023-05-05T17:13:12.767Z | 2023-05-16T08:40:01.773Z | 2023-05-16T08:40:01.773Z | {'Vendor': 'metagauss', 'Product': 'RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login', 'Versions': '*'} |
CVE-2023-2661 | A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228803. | https://vuldb.com/?id.228803 | 2023-05-11T13:01:43.979Z | 2023-05-11T15:00:06.182Z | 2023-10-23T05:56:29.883Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
CVE-2023-2231 | A vulnerability, which was classified as critical, was found in MAXTECH MAX-G866ac 0.4.1_TBRO_20160314. This affects an unknown part of the component Remote Management. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227001 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227001 | 2023-04-21T14:16:04.937Z | 2023-04-21T14:31:03.678Z | 2023-10-22T14:55:00.480Z | {'Vendor': 'MAXTECH', 'Product': 'MAX-G866ac', 'Versions': '0.4.1_TBRO_20160314'} |
CVE-2023-2724 | Type confusion in V8 in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html | 2023-05-15T21:16:58.324Z | 2023-05-16T18:45:34.232Z | 2023-05-16T18:45:34.232Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'} |
CVE-2023-2374 | A vulnerability has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument ecn-down leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227650 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227650 | 2023-04-28T11:29:52.832Z | 2023-04-28T14:31:04.038Z | 2023-10-22T18:31:51.401Z | {'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'} |
CVE-2023-2860 | An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel. | https://access.redhat.com/security/cve/CVE-2023-2860 | 2023-05-24T07:11:24.194Z | 2023-07-24T15:19:18.473Z | 2024-01-23T03:20:36.395Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.0-rc5'} |
CVE-2023-2163 | Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafe
code paths being incorrectly marked as safe, resulting in arbitrary read/write in
kernel memory, lateral privilege escalation, and container escape.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed | 2023-04-18T18:22:35.441Z | 2023-09-20T05:02:38.155Z | 2023-09-20T05:02:38.155Z | {'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '-, -'} |
CVE-2023-2499 | The RegistrationMagic plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.2.1.0. This is due to insufficient verification on the user being supplied during a Google social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. | https://www.wordfence.com/threat-intel/vulnerabilities/id/87ec5542-b6e7-4b18-a3ec-c258e749d32e?source=cve | 2023-05-03T14:48:17.108Z | 2023-05-16T08:40:01.163Z | 2023-05-16T08:40:01.163Z | {'Vendor': 'metagauss', 'Product': 'RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login', 'Versions': '*'} |
CVE-2023-2533 | A Cross-Site Request Forgery (CSRF) vulnerability has been identified in
PaperCut NG/MF, which, under specific conditions, could potentially enable
an attacker to alter security settings or execute arbitrary code. This could
be exploited if the target is an admin with a current login session. Exploiting
this would typically involve the possibility of deceiving an admin into clicking
a specially crafted malicious link, potentially leading to unauthorized changes.
| https://fluidattacks.com/advisories/arcangel/ | 2023-05-05T03:13:21.706Z | 2023-06-20T14:45:14.102Z | 2023-07-06T05:19:14.394Z | {'Vendor': 'PaperCut', 'Product': 'PaperCut NG/MF', 'Versions': '22.0.10, 21.2.12, 20.1.8'} |
CVE-2023-2026 | The Image Protector WordPress plugin through 1.1 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/2b59f640-5568-42bb-87b7-36eb448db5be | 2023-04-13T15:49:26.919Z | 2023-07-10T12:40:26.105Z | 2023-07-10T13:05:43.819Z | {'Vendor': 'Unknown', 'Product': 'Image Protector', 'Versions': '0'} |
CVE-2023-2476 | A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument 系统工具/公告管理 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868. | https://vuldb.com/?id.227868 | 2023-05-02T12:01:35.109Z | 2023-05-02T13:31:03.477Z | 2023-10-23T05:17:27.842Z | {'Vendor': 'Dromara', 'Product': 'J2eeFAST', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6'} |
CVE-2023-2925 | A vulnerability, which was classified as problematic, was found in Webkul krayin crm 1.2.4. This affects an unknown part of the file /admin/contacts/organizations/edit/2 of the component Edit Person Page. The manipulation of the argument Organization leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230079. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230079 | 2023-05-27T07:17:47.638Z | 2023-05-27T08:31:02.986Z | 2023-10-23T07:14:36.008Z | {'Vendor': 'Webkul', 'Product': 'krayin crm', 'Versions': '1.2.4'} |
CVE-2023-2564 | OS Command Injection in GitHub repository sbs20/scanservjs prior to v2.27.0.
| https://huntr.dev/bounties/d13113ad-a107-416b-acc1-01e4c16ec461 | 2023-05-07T00:00:00 | 2023-05-07T00:00:00 | 2023-10-10T07:18:26.553Z | {'Vendor': 'sbs20', 'Product': 'sbs20/scanservjs', 'Versions': 'unspecified'} |
CVE-2023-2134 | Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html | 2023-04-17T22:27:00.236Z | 2023-04-19T03:40:26.081Z | 2023-04-19T03:40:26.081Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'} |
CVE-2023-2837 | Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17 | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-2972 | Prototype Pollution in GitHub repository antfu/utils prior to 0.7.3. | https://huntr.dev/bounties/009f1cd9-401c-49a7-bd08-be35cff6faef | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'antfu', 'Product': 'antfu/utils', 'Versions': 'unspecified'} |
CVE-2023-2421 | A vulnerability classified as problematic has been found in Control iD RHiD 23.3.19.0. Affected is an unknown function of the file /v2/#/add/department. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-227718 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227718 | 2023-04-28T17:03:55.990Z | 2023-04-29T01:31:04.560Z | 2023-10-23T05:08:54.882Z | {'Vendor': 'Control iD', 'Product': 'RHiD', 'Versions': '23.3.19.0'} |
CVE-2023-2071 |
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets. The device has the functionality, through a CIP class, to execute exported functions from libraries. There is a routine that restricts it to execute specific functions from two dynamic link library files. By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140724 | 2023-04-14T18:04:01.758Z | 2023-09-12T13:12:42.386Z | 2023-09-12T13:12:42.386Z | {'Vendor': 'Rockwell Automation', 'Product': 'Fa', 'Versions': '<=13.0'} |
CVE-2023-2358 |
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.5.0.0 and 9.3.0.4, including 8.3.x.x, saves passwords of the Hadoop Copy Files step in plaintext.
| https://support.pentaho.com/hc/en-us/articles/19668208622221 | 2023-04-27T19:02:38.693Z | 2023-09-26T21:34:06.878Z | 2023-09-26T21:34:06.878Z | {'Vendor': 'Hitachi Vantara', 'Product': 'Pentaho Business Analytics Server', 'Versions': '1.0, 9.5.0.0'} |
CVE-2023-2708 | The Video Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘search_term’ parameter in versions up to, and including, 1.0.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/8cfbad9f-61ba-4216-9078-c1e7e809899a?source=cve | 2023-05-15T12:39:48.962Z | 2023-05-16T02:04:27.089Z | 2023-05-16T02:04:27.089Z | {'Vendor': 'nik00726', 'Product': 'Video Gallery', 'Versions': '*'} |
CVE-2023-2122 | The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitise and escape the iowd_tabs_active parameter before rendering it in the plugin admin panel, leading to a reflected Cross-Site Scripting vulnerability, allowing an attacker to trick a logged in admin to execute arbitrary javascript by clicking a link. | https://wpscan.com/vulnerability/936fd93a-428d-4744-a4fc-c8da78dcbe78 | 2023-04-17T15:15:20.988Z | 2023-08-16T11:03:20.332Z | 2023-08-16T11:03:20.332Z | {'Vendor': 'Unknown', 'Product': 'Image Optimizer by 10web', 'Versions': '0'} |
CVE-2023-2572 | The Survey Maker WordPress plugin before 3.4.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/2f7fe6e6-c3d0-4e27-8222-572d7a420153 | 2023-05-08T10:35:11.367Z | 2023-06-05T13:38:59.749Z | 2023-06-05T13:38:59.749Z | {'Vendor': 'Unknown', 'Product': 'Survey Maker', 'Versions': '0'} |
CVE-2023-2088 | A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality. | https://security.openstack.org/ossa/OSSA-2023-003.html | 2023-04-14T00:00:00 | 2023-05-12T00:00:00 | 2023-07-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'OpenStack', 'Versions': 'unknown'} |
CVE-2023-2067 | The Announcement & Notification Banner – Bulletin plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce validation on the 'bulletinwp_update_bulletin_status', 'bulletinwp_update_bulletin', 'bulletinwp_update_settings', 'bulletinwp_update_status', 'bulletinwp_export_bulletins', and 'bulletinwp_import_bulletins' functions in versions up to, and including, 3.7.0. This makes it possible for unauthenticated attackers to modify the plugin's settings, modify bulletins, create new bulletins, and more, via a forged request granted they can trick a site's user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b808450f-0ebf-4c49-a9e3-f1c1f2b1f632?source=cve | 2023-04-14T13:39:20.309Z | 2023-06-09T05:33:30.276Z | 2023-06-09T05:33:30.276Z | {'Vendor': 'mikewire_rocksolid', 'Product': 'Announcement & Notification Banner – Bulletin', 'Versions': '*'} |
CVE-2023-2437 | The UserPro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.1.1. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. An attacker can leverage CVE-2023-2448 and CVE-2023-2446 to get the user's email address to successfully exploit this vulnerability. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b3cf9f38-c20e-40dc-a7a1-65b0c6ba7925?source=cve | 2023-05-01T09:41:14.173Z | 2023-11-22T15:33:33.084Z | 2023-11-22T15:33:33.084Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2964 | The Simple Iframe WordPress plugin before 1.2.0 does not properly validate one of its WordPress block attribute's content, which may allow users whose role is at least that of a contributor to conduct Stored Cross-Site Scripting attacks. | https://wpscan.com/vulnerability/97aac334-5323-41bb-90f0-d180bcc9162f | 2023-05-29T18:00:39.299Z | 2023-07-10T12:40:29.302Z | 2023-07-10T13:05:44.376Z | {'Vendor': 'Unknown', 'Product': 'Simple Iframe', 'Versions': '0'} |
CVE-2023-2876 | Sensitive Cookie Without 'HttpOnly' Flag vulnerability in ABB REX640 PCL1 (firmware modules), ABB REX640 PCL2 (Firmware modules), ABB REX640 PCL3 (firmware modules) allows Cross-Site Scripting (XSS).This issue affects REX640 PCL1: from 1.0;0 before 1.0.8; REX640 PCL2: from 1.0;0 before 1.1.4; REX640 PCL3: from 1.0;0 before 1.2.1.
| https://search.abb.com/library/Download.aspx?DocumentID=2NGA001423&LanguageCode=en&DocumentPartId=&Action=Launch | 2023-05-24T17:41:29.260Z | 2023-06-13T03:52:12.002Z | 2023-06-13T03:52:12.002Z | {'Vendor': 'ABB', 'Product': 'REX640 PCL1', 'Versions': '1.0;0'} |
CVE-2023-2899 | The Google Map Shortcode WordPress plugin through 3.1.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/92dcbeb3-17db-4d10-8ae7-c99acdb48c78 | 2023-05-25T19:53:03.218Z | 2023-06-19T10:52:45.489Z | 2023-06-19T10:52:45.489Z | {'Vendor': 'Unknown', 'Product': 'Google Map Shortcode', 'Versions': '0'} |
CVE-2023-2933 | Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:14.252Z | 2023-05-30T21:31:39.451Z | 2023-05-30T21:31:39.451Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2460 | Insufficient validation of untrusted input in Extensions in Google Chrome prior to 113.0.5672.63 allowed an attacker who convinced a user to install a malicious extension to bypass file access checks via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html | 2023-05-01T23:09:49.405Z | 2023-05-02T23:47:57.740Z | 2023-05-02T23:47:57.740Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'} |
CVE-2023-2030 | An issue has been discovered in GitLab CE/EE affecting all versions from 12.2 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which an attacker could potentially modify the metadata of signed commits. | https://gitlab.com/gitlab-org/gitlab/-/issues/407252 | 2023-04-13T18:20:57.328Z | 2024-01-12T13:57:06.694Z | 2024-01-12T13:57:06.694Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.2, 16.6, 16.7'} |
CVE-2023-2319 | It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2. | https://bugzilla.redhat.com/show_bug.cgi?id=2190092 | 2023-04-27T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'pcs', 'Versions': 'Affects pcs v0.11.4-6.el9, Fixed in pcs v0.11.4-7.el9_2'} |
CVE-2023-2749 | Download Center fails to properly validate the file path submitted by a user, An attacker can exploit this vulnerability to gain unauthorized access to sensitive files or directories without appropriate permission restrictions. Download Center on ADM 4.0 and above will be affected. Affected products and versions include: Download Center 1.1.5.r1280 and below. | https://www.asustor.com/security/security_advisory_detail?id=24 | 2023-05-17T05:56:36.390Z | 2023-05-31T08:36:37.182Z | 2023-05-31T08:36:37.182Z | {'Vendor': 'ASUSTOR', 'Product': 'Download Center', 'Versions': '1.1.5'} |
CVE-2023-2381 | A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=bandwidth_profile.htm of the component Web Management Interface. The manipulation of the argument BandWidthProfile.ProfileName leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227659. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227659 | 2023-04-28T11:48:13.707Z | 2023-04-28T17:00:05.464Z | 2023-10-22T18:40:23.570Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2694 | A vulnerability was found in SourceCodester Online Exam System 1.0. It has been classified as critical. This affects an unknown part of the file /dosen/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228975. | https://vuldb.com/?id.228975 | 2023-05-14T07:52:33.707Z | 2023-05-14T10:00:04.635Z | 2023-10-23T06:16:02.927Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2047 | A vulnerability was found in Campcodes Advanced Online Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument voter leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225932. | https://vuldb.com/?id.225932 | 2023-04-14T07:41:42.016Z | 2023-04-14T10:31:03.924Z | 2023-10-22T09:52:33.067Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2417 | A vulnerability was found in ks-soft Advanced Host Monitor up to 12.56 and classified as problematic. Affected by this issue is some unknown functionality of the file C:\Program Files (x86)\HostMonitor\RMA-Win\rma_active.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. Upgrading to version 12.60 is able to address this issue. It is recommended to upgrade the affected component. VDB-227714 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227714 | 2023-04-28T16:48:47.231Z | 2023-04-29T00:31:03.814Z | 2023-10-22T19:08:26.626Z | {'Vendor': 'ks-soft', 'Product': 'Advanced Host Monitor', 'Versions': '12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, 12.10, 12.11, 12.12, 12.13, 12.14, 12.15, 12.16, 12.17, 12.18, 12.19, 12.20, 12.21, 12.22, 12.23, 12.24, 12.25, 12.26, 12.27, 12.28, 12.29, 12.30, 12.31, 12.32, 12.33, 12.34, 12.35, 12.36, 12.37, 12.38, 12.39, 12.40, 12.41, 12.42, 12.43, 12.44, 12.45, 12.46, 12.47, 12.48, 12.49, 12.50, 12.51, 12.52, 12.53, 12.54, 12.55, 12.56'} |
CVE-2023-2944 | Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/0d67dcb1-acc0-4d5d-bb69-a09d1bc9fa1d | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2801 | Grafana is an open-source platform for monitoring and observability.
Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.
The only feature that uses mixed queries at the moment is public dashboards, but it's also possible to cause this by calling the query API directly.
This might enable malicious users to crash Grafana instances through that endpoint.
Users may upgrade to version 9.4.12 and 9.5.3 to receive a fix.
| https://grafana.com/security/security-advisories/cve-2023-2801/ | 2023-05-18T16:22:13.573Z | 2023-06-06T18:03:32.459Z | 2023-06-06T18:03:32.459Z | {'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '9.4.0, 9.5.0'} |
CVE-2023-2102 | Cross-site Scripting (XSS) - Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0. | https://huntr.dev/bounties/dd7c04a7-a984-4387-9ac4-24596e7ece44 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | {'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'} |
CVE-2023-2552 | Cross-Site Request Forgery (CSRF) in GitHub repository unilogies/bumsys prior to 2.1.1. | https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'} |
CVE-2023-2786 | Mattermost fails to properly check the permissions when executing commands allowing a member with no permissions to post a message in a channel to actually post it by executing channel commands.
| https://mattermost.com/security-updates | 2023-05-18T10:49:51.062Z | 2023-06-16T08:43:49.826Z | 2023-06-16T08:43:49.826Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10, 7.8.5, 7.9.4, 7.10.1'} |
CVE-2023-2339 | Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/bb1537a5-fe7b-4c77-a582-10a82435fbc2 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2769 | A vulnerability classified as critical has been found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229275. | https://vuldb.com/?id.229275 | 2023-05-17T16:42:31.248Z | 2023-05-17T17:31:03.343Z | 2023-10-23T06:30:41.847Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-2293 | A vulnerability was found in SourceCodester Purchase Order Management System 1.0. It has been classified as problematic. This affects an unknown part of the file classes/Master.php?f=save_item. The manipulation of the argument description with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227463. | https://vuldb.com/?id.227463 | 2023-04-25T20:49:31.057Z | 2023-04-25T21:00:04.871Z | 2023-10-22T16:00:09.154Z | {'Vendor': 'SourceCodester', 'Product': 'Purchase Order Management System', 'Versions': '1.0'} |
CVE-2023-2913 |
An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140160 | 2023-05-26T13:21:35.457Z | 2023-07-18T19:52:45.214Z | 2023-07-18T19:55:22.920Z | {'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ThinServer', 'Versions': '13.0.0 - 13.0.2, 13.1.0'} |
CVE-2023-2440 | The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.1. This is due to missing nonce validation in the 'admin_page', 'userpro_verify_user' and 'verifyUnverifyAllUsers' functions. This makes it possible for unauthenticated attackers to modify the role of verified users to elevate verified user privileges to that of any user such as 'administrator' via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/73600498-f55c-4b8e-a625-4f292e58e0ee?source=cve | 2023-05-01T09:54:33.228Z | 2023-11-22T15:33:27.961Z | 2023-11-22T15:33:27.961Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2010 | The Forminator WordPress plugin before 1.24.1 does not use an atomic operation to check whether a user has already voted, and then update that information. This leads to a Race Condition that may allow a single user to vote multiple times on a poll. | https://wpscan.com/vulnerability/d0da4c0d-622f-4310-a867-6bfdb474073a | 2023-04-12T16:22:26.910Z | 2023-07-04T07:23:26.428Z | 2023-07-05T10:47:52.992Z | {'Vendor': 'Unknown', 'Product': 'Forminator', 'Versions': '0'} |
CVE-2023-2505 |
The affected products have a CSRF vulnerability that could allow an attacker to execute code and upload malicious files.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11 | 2023-05-03T15:24:23.176Z | 2023-05-22T21:01:56.372Z | 2023-05-22T21:05:35.109Z | {'Vendor': 'BirdDog', 'Product': 'STUDIO R3', 'Versions': '3.6.4'} |
Subsets and Splits