CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3764 | The WooCommerce PDF Invoice Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.90. This is due to missing or incorrect nonce validation on the Save function. This makes it possible for unauthenticated attackers to make changes to invoices via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ebf2e701-9f9b-4a78-a61a-0cf90cdd9755?source=cve | 2023-07-18T20:10:53.389Z | 2023-08-31T05:33:14.499Z | 2023-08-31T05:33:14.499Z | {'Vendor': 'edgarrojas', 'Product': 'WooCommerce PDF Invoice Builder, Create invoices, packing slips and more', 'Versions': '*'} |
CVE-2023-3271 |
Improper Access Control in the SICK ICR890-4 could allow an unauthenticated remote attacker to gather information about the system and download data via the REST API by accessing
unauthenticated endpoints.
| https://sick.com/psirt | 2023-06-15T11:32:31.460Z | 2023-07-10T09:26:21.041Z | 2023-07-10T09:32:48.098Z | {'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'} |
CVE-2023-3621 | A vulnerability was found in IBOS OA 4.5.5. It has been classified as critical. Affected is the function createDeleteCommand of the file ?r=article/default/delete of the component Delete Packet. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233574 | 2023-07-11T14:59:28.753Z | 2023-07-11T16:00:04.367Z | 2023-10-23T14:56:38.686Z | {'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'} |
CVE-2023-3508 | The WooCommerce Pre-Orders WordPress plugin before 2.0.3 has a flawed CSRF check when processing its tab actions, which could allow attackers to make logged in admins email pre-orders customer, change the released date, mark all pre-orders of a specific product as complete or cancel via CSRF attacks | https://wpscan.com/vulnerability/064c7acb-db57-4537-8a6d-32f7ea31c738 | 2023-07-04T18:11:44.617Z | 2023-07-31T09:37:37.921Z | 2023-07-31T09:37:37.921Z | {'Vendor': 'Unknown', 'Product': 'WooCommerce Pre-Orders', 'Versions': '0'} |
CVE-2023-3158 | The Mail Control plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 0.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/77537eb8-1c84-4702-aba1-727b0de1c3e1?source=cve | 2023-06-08T00:54:34.360Z | 2023-07-12T04:38:46.096Z | 2023-07-12T04:38:46.096Z | {'Vendor': 'rahalaboulfeth', 'Product': 'Mail Control – Email Customizer, SMTP Deliverability, logging, open and click Tracking', 'Versions': '*'} |
CVE-2023-3590 | Mattermost fails to delete card attachments in Boards, allowing an attacker to access deleted attachments.
| https://mattermost.com/security-updates | 2023-07-10T15:01:13.653Z | 2023-07-17T15:28:50.860Z | 2023-07-17T15:28:50.860Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 7.10.3'} |
CVE-2023-3969 | A vulnerability, which was classified as problematic, has been found in GZ Scripts Availability Booking Calendar PHP 1.0. Affected by this issue is some unknown functionality of the file index.php of the component HTTP POST Request Handler. The manipulation of the argument promo_code leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235568. | https://vuldb.com/?id.235568 | 2023-07-27T06:56:05.640Z | 2023-07-27T11:31:03.531Z | 2023-10-24T07:50:29.972Z | {'Vendor': 'GZ Scripts', 'Product': 'Availability Booking Calendar PHP', 'Versions': '1.0'} |
CVE-2023-3986 | A vulnerability was found in SourceCodester Simple Online Mens Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/?page=user/list. The manipulation of the argument First Name/Last Name/Username leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235607. | https://vuldb.com/?id.235607 | 2023-07-27T19:48:02.787Z | 2023-07-28T05:00:05.605Z | 2023-10-24T07:55:22.744Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Online Mens Salon Management System', 'Versions': '1.0'} |
CVE-2023-3085 | A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The patch is named 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663. | https://vuldb.com/?id.230663 | 2023-06-03T10:00:14.019Z | 2023-06-03T10:31:02.697Z | 2023-10-23T07:54:51.637Z | {'Vendor': 'X-WRT', 'Product': 'luci', 'Versions': '22.10_b202303061504'} |
CVE-2023-3656 | cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by an unauthenticated remote code execution vulnerability. This vulnerability can be triggered by an HTTP endpoint exposed to the network. | https://www.cashit.at/ | 2023-07-13T07:01:30.677Z | 2023-10-03T07:39:53.661Z | 2023-11-02T09:03:48.291Z | {'Vendor': 'PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH', 'Product': 'cashIT! - serving solutions.', 'Versions': '0'} |
CVE-2023-3206 | A vulnerability classified as problematic was found in Chengdu VEC40G 3.0. Affected by this vulnerability is an unknown functionality of the file /send_order.cgi?parameter=restart. The manipulation of the argument restart with the input reboot leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.231229 | 2023-06-12T14:28:40.642Z | 2023-06-12T15:00:05.574Z | 2023-10-23T13:06:21.530Z | {'Vendor': 'Chengdu', 'Product': 'VEC40G', 'Versions': '3.0'} |
CVE-2023-3713 | The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'profile_magic_check_smtp_connection' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation. | https://www.wordfence.com/threat-intel/vulnerabilities/id/473ba791-af99-4aae-99cb-ccf220e443e7?source=cve | 2023-07-17T14:17:49.052Z | 2023-07-18T02:39:25.094Z | 2023-07-18T02:39:25.094Z | {'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'} |
CVE-2023-3343 | The User Registration plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.0.1 via deserialization of untrusted input from the 'profile-pic-url' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3590277a-3319-4707-b728-d75ea59e8ad9?source=cve | 2023-06-20T17:22:00.922Z | 2023-07-13T02:04:14.751Z | 2023-07-13T02:04:14.751Z | {'Vendor': 'wpeverest', 'Product': 'User Registration – Custom Registration Form, Login Form And User Profile For WordPress', 'Versions': '*'} |
CVE-2023-3894 | Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
| https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50083 | 2023-07-24T21:18:16.456Z | 2023-08-08T16:59:58.129Z | 2023-08-08T16:59:58.129Z | {'Vendor': 'FasterXML', 'Product': ' jackson-dataformats-text', 'Versions': '0'} |
CVE-2023-3197 | The MStore API plugin for WordPress is vulnerable to Unauthenticated Blind SQL Injection via the 'id' parameter in versions up to, and including, 4.0.1 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/30aab1af-a78f-4bac-b3c5-30ea854ccef7?source=cve | 2023-06-12T13:45:47.111Z | 2023-06-24T02:00:18.262Z | 2023-06-24T02:00:18.262Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-3528 | A vulnerability was found in ThinuTech ThinuCMS 1.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /category.php. The manipulation of the argument cat_id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-233252. | https://vuldb.com/?id.233252 | 2023-07-06T17:32:37.809Z | 2023-07-06T18:00:03.991Z | 2023-10-23T14:07:22.844Z | {'Vendor': 'ThinuTech', 'Product': 'ThinuCMS', 'Versions': '1.5'} |
CVE-2023-3178 | The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability delete arbitrary logs via a CSRF attack. | https://wpscan.com/vulnerability/5341cb5d-d204-49e1-b013-f8959461995f/ | 2023-06-09T08:24:52.036Z | 2024-01-16T15:55:29.719Z | 2024-01-16T15:55:29.719Z | {'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '2.5.0'} |
CVE-2023-3482 | When Firefox is configured to block storage of all cookies, it was still possible to store data in localstorage by using an iframe with a source of 'about:blank'. This could have led to malicious websites storing tracking data without permission. This vulnerability affects Firefox < 115. | https://bugzilla.mozilla.org/show_bug.cgi?id=1839464 | 2023-06-30T13:54:30.810Z | 2023-07-05T09:01:13.962Z | 2023-07-05T09:01:13.962Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-3251 |
A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.
| https://www.tenable.com/security/tns-2023-29 | 2023-06-14T19:51:19.650Z | 2023-08-29T18:38:11.935Z | 2023-08-29T18:38:11.935Z | {'Vendor': 'Tenable', 'Product': 'Nessus', 'Versions': '0'} |
CVE-2023-3601 | The Simple Author Box WordPress plugin before 2.52 does not verify a user ID before outputting information about that user, leading to arbitrary user information disclosure to users with a role as low as Contributor. | https://wpscan.com/vulnerability/c0cc513e-c306-4920-9afb-e33d95a7292f | 2023-07-10T17:43:18.843Z | 2023-08-14T19:10:21.138Z | 2024-01-16T15:54:01.512Z | {'Vendor': 'Unknown', 'Product': 'Simple Author Box', 'Versions': '0'} |
CVE-2023-3314 |
A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.
| https://kcm.trellix.com/corporate/index?page=content&id=SB10403 | 2023-06-19T08:42:45.707Z | 2023-07-03T08:02:29.010Z | 2023-07-03T08:02:29.010Z | {'Vendor': 'Trellix', 'Product': 'Enterprise Security Manager', 'Versions': '11.6.3'} |
CVE-2023-3744 | Server-Side Request Forgery vulnerability in SLims version 9.6.0. This vulnerability could allow an authenticated attacker to send requests to internal services or upload the contents of relevant files via the "scrape_image.php" file in the imageURL parameter. | https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-slims | 2023-07-18T07:17:40.669Z | 2023-10-02T13:50:31.607Z | 2023-10-02T13:50:31.607Z | {'Vendor': 'SLiMS', 'Product': 'SLiMS', 'Versions': '9.6.0'} |
CVE-2023-3181 | The C:\Program Files (x86)\Splashtop\Splashtop Software Updater\uninst.exe process creates a folder at C:\Windows\Temp~nsu.tmp and copies itself to it as Au_.exe. The C:\Windows\Temp~nsu.tmp\Au_.exe file is automatically launched as SYSTEM when the system reboots or when a standard user runs an MSI repair using Splashtop Streamer’s Windows Installer. Since the C:\Windows\Temp~nsu.tmp folder inherits permissions from C:\Windows\Temp and Au_.exe is susceptible to DLL hijacking, standard users can write a malicious DLL to it and elevate their privileges. | https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0015.md | 2023-06-09T09:44:05.431Z | 2024-01-25T15:22:47.828Z | 2024-01-25T15:22:47.828Z | {'Vendor': 'Splashtop', 'Product': 'Splashtop Software Updater', 'Versions': '0'} |
CVE-2023-3882 | A vulnerability, which was classified as critical, has been found in Campcodes Beauty Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit-accepted-appointment.php. The manipulation of the argument contactno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235244. | https://vuldb.com/?id.235244 | 2023-07-24T16:50:33.881Z | 2023-07-25T05:00:04.917Z | 2023-10-24T07:10:55.963Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3494 | The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process.
| https://security.FreeBSD.org/advisories/FreeBSD-SA-23:07.bhyve.asc | 2023-06-30T22:57:48.603Z | 2023-08-01T22:13:21.634Z | 2023-08-01T22:34:32.578Z | {'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 13.1-RELEASE'} |
CVE-2023-3617 | A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been classified as critical. This affects an unknown part of the file admin_class.php of the component Login Page. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233565 was assigned to this vulnerability. | https://vuldb.com/?id.233565 | 2023-07-11T14:31:57.025Z | 2023-07-11T15:00:03.716Z | 2023-10-23T14:54:12.314Z | {'Vendor': 'SourceCodester', 'Product': 'Best POS Management System', 'Versions': '1.0'} |
CVE-2023-3247 | In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce.
| https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw | 2023-06-14T16:24:08.631Z | 2023-07-22T04:17:09.896Z | 2023-07-22T04:17:09.896Z | {'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.*, 8.1.*, 8.2.*'} |
CVE-2023-3752 | A vulnerability was found in Creativeitem Academy LMS 5.15. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /home/courses. The manipulation of the argument sort_by leads to cross site scripting. The attack may be launched remotely. VDB-234422 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234422 | 2023-07-18T16:25:59.245Z | 2023-07-19T01:31:03.400Z | 2023-10-23T15:35:41.493Z | {'Vendor': 'Creativeitem', 'Product': 'Academy LMS', 'Versions': '5.15'} |
CVE-2023-3302 | Improper Neutralization of Formula Elements in a CSV File in GitHub repository admidio/admidio prior to 4.2.9. | https://huntr.dev/bounties/5e18619f-8379-464a-aad2-65883bb4e81a | 2023-06-18T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'} |
CVE-2023-3586 | Mattermost fails to disable public Boards after the "Enable Publicly-Shared Boards" configuration option is disabled, resulting in previously-shared public Boards to remain accessible.
| https://mattermost.com/security-updates | 2023-07-10T13:57:18.062Z | 2023-07-17T15:25:30.532Z | 2023-07-17T15:25:30.532Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3'} |
CVE-2023-3569 | In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service. | https://cert.vde.com/en/advisories/VDE-2023-017 | 2023-07-10T07:42:55.485Z | 2023-08-08T06:56:40.395Z | 2023-08-08T06:56:40.395Z | {'Vendor': 'PHOENIX CONTACT', 'Product': 'CLOUD CLIENT 1101T-TX/TX', 'Versions': '0'} |
CVE-2023-3093 | The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6ec3a-c5fd-4f63-a9a0-2c9ddfb96e2e?source=cve | 2023-06-04T03:17:14.839Z | 2023-07-12T04:38:45.199Z | 2023-07-12T04:38:45.199Z | {'Vendor': 'yaycommerce', 'Product': 'YaySMTP – Simple WP SMTP Mail', 'Versions': '2.4.5'} |
CVE-2023-3139 | The Protect WP Admin WordPress plugin before 4.0 discloses the URL of the admin panel via a redirection of a crafted URL, bypassing the protection offered. | https://wpscan.com/vulnerability/f8a29aee-19cd-4e62-b829-afc9107f69bd | 2023-06-07T08:34:01.627Z | 2023-07-04T07:23:27.209Z | 2023-07-24T08:19:04.342Z | {'Vendor': 'Unknown', 'Product': 'Protect WP Admin', 'Versions': '0'} |
CVE-2023-3990 | A vulnerability classified as problematic has been found in Mingsoft MCMS up to 5.3.1. This affects an unknown part of the file search.do of the component HTTP POST Request Handler. The manipulation of the argument style leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-235611. | https://vuldb.com/?id.235611 | 2023-07-27T20:15:13.939Z | 2023-07-28T07:00:05.551Z | 2023-10-24T08:00:15.831Z | {'Vendor': 'Mingsoft', 'Product': 'MCMS', 'Versions': '5.3.0, 5.3.1'} |
CVE-2023-3210 | An issue has been discovered in GitLab affecting all versions starting from 15.11 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. An authenticated user could trigger a denial of service when importing or cloning malicious content. | https://gitlab.com/gitlab-org/gitlab/-/issues/415074 | 2023-06-12T15:15:26.086Z | 2023-09-01T10:31:06.983Z | 2023-09-01T10:31:06.983Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.11, 16.2, 16.3'} |
CVE-2023-3640 | A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system. | https://access.redhat.com/security/cve/CVE-2023-3640 | 2023-07-12T15:37:45.552Z | 2023-07-24T15:19:29.983Z | 2024-01-23T01:03:43.473Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-3355 | A NULL pointer dereference flaw was found in the Linux kernel's drivers/gpu/drm/msm/msm_gem_submit.c code in the submit_lookup_cmds function, which fails because it lacks a check of the return value of kmalloc(). This issue allows a local user to crash the system. | https://access.redhat.com/security/cve/CVE-2023-3355 | 2023-06-21T00:00:00 | 2023-06-28T00:00:00 | 2024-01-23T02:35:02.994Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.1-rc8'} |
CVE-2023-3705 | The vulnerability exists in CP-Plus NVR due to an improper input handling at the web-based management interface of the affected product. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.
Successful exploitation of this vulnerability could allow the remote attacker to obtain sensitive information on the targeted device.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0239 | 2023-07-17T10:01:52.049Z | 2023-08-24T07:03:12.395Z | 2023-08-24T07:03:12.395Z | {'Vendor': 'Aditya Infotech Limited ', 'Product': 'CP-VNR-3104, CP-VNR-3108, CP-VNR-3208', 'Versions': '0'} |
CVE-2023-3512 | Relative path traversal vulnerability in Setelsa Security's ConacWin CB, in its 3.8.2.2 version and earlier, the exploitation of which could allow an attacker to perform an arbitrary download of files from the system via the "Download file" parameter. | https://https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin | 2023-07-05T07:49:47.301Z | 2023-10-04T10:53:36.243Z | 2023-10-04T10:53:36.243Z | {'Vendor': 'Setelsa Security', 'Product': 'ConacWin CB', 'Versions': '0'} |
CVE-2023-3142 | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 2.0. | https://huntr.dev/bounties/d00686b0-f89a-4e14-98d7-b8dd3f92a6e5 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-3841 | A vulnerability has been found in NxFilter 4.3.2.5 and classified as problematic. This vulnerability affects unknown code of the file user.jsp. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The identifier of this vulnerability is VDB-235192. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235192 | 2023-07-22T06:23:16.239Z | 2023-07-23T03:00:04.713Z | 2023-10-24T06:31:53.112Z | {'Vendor': 'n/a', 'Product': 'NxFilter', 'Versions': '4.3.2.5'} |
CVE-2023-3904 | An issue has been discovered in GitLab EE affecting all versions starting before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible to overflow the time spent on an issue that altered the details shown in the issue boards. | https://gitlab.com/gitlab-org/gitlab/-/issues/418226 | 2023-07-25T10:30:28.338Z | 2023-12-15T16:03:15.329Z | 2023-12-15T16:03:15.329Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.5, 16.6'} |
CVE-2023-3457 | A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232674 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.232674 | 2023-06-29T12:55:15.889Z | 2023-06-29T13:31:03.915Z | 2023-10-23T13:49:04.011Z | {'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'} |
CVE-2023-3007 | A vulnerability was found in ningzichun Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file resetPassword.php of the component Password Reset Handler. The manipulation of the argument sid leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230354 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230354 | 2023-05-31T11:01:45.300Z | 2023-05-31T11:31:03.046Z | 2023-10-23T07:34:07.302Z | {'Vendor': 'ningzichun', 'Product': 'Student Management System', 'Versions': '1.0'} |
CVE-2023-3791 | A vulnerability was found in IBOS OA 4.5.5 and classified as critical. Affected by this issue is the function actionExport of the file ?r=contact/default/export of the component Personal Office Address Book. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-235058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235058 | 2023-07-20T07:36:08.588Z | 2023-07-20T18:00:05.088Z | 2023-10-23T17:48:36.476Z | {'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'} |
CVE-2023-3115 | An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories. | https://gitlab.com/gitlab-org/gitlab/-/issues/414367 | 2023-06-06T03:19:59.543Z | 2023-09-29T06:02:51.300Z | 2023-09-29T06:02:51.300Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.11, 16.3, 16.4'} |
CVE-2023-3545 | Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in Chamilo LMS <= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of `.htaccess` file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as CVE-2023-3533, to achieve remote code execution. | https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-125-2023-07-13-Critical-impact-Moderate-risk-Htaccess-File-Upload-Security-Bypass-on-Windows-CVE-2023-3545 | 2023-07-07T13:10:48.745Z | 2023-11-28T07:07:27.183Z | 2023-11-28T07:07:27.183Z | {'Vendor': 'Chamilo', 'Product': 'Chamilo', 'Versions': '0'} |
CVE-2023-3050 | Reliance on Cookies without Validation and Integrity Checking in a Security Decision vulnerability in TMT Lockcell allows Privilege Abuse, Authentication Bypass.This issue affects Lockcell: before 15.
| https://www.usom.gov.tr/bildirim/tr-23-0345 | 2023-06-02T10:07:23.702Z | 2023-06-13T11:50:27.709Z | 2023-06-19T12:26:17.304Z | {'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'} |
CVE-2023-3953 |
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory
Buffer vulnerability exists that could cause memory corruption when an authenticated user
opens a tampered log file from GP-Pro EX. | https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-220-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-220-01.pdf | 2023-07-26T08:14:55.340Z | 2023-08-09T14:02:44.472Z | 2023-08-09T14:02:44.472Z | {'Vendor': 'Schneider Electric', 'Product': 'GP-Pro EX WinGP for iPC', 'Versions': 'v4.09.450 and prior'} |
CVE-2023-3729 | Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html | 2023-07-18T00:34:20.140Z | 2023-08-01T22:39:16.947Z | 2023-08-04T19:09:51.822Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.131'} |
CVE-2023-3379 | Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges. | https://cert.vde.com/en/advisories/VDE-2023-015/ | 2023-06-23T09:01:09.552Z | 2023-11-20T07:23:41.887Z | 2023-11-20T07:23:41.887Z | {'Vendor': 'WAGO', 'Product': 'Compact Controller 100 (751-9301)', 'Versions': '0'} |
CVE-2023-3683 | A vulnerability has been found in LivelyWorks Articart 2.0.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /items/search. The manipulation of the argument search_term leads to cross site scripting. The attack can be launched remotely. The identifier VDB-234229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234229 | 2023-07-15T16:13:43.471Z | 2023-07-16T08:00:05.329Z | 2023-10-23T15:19:49.670Z | {'Vendor': 'LivelyWorks', 'Product': 'Articart', 'Versions': '2.0.1'} |
CVE-2023-3396 | A vulnerability was found in Campcodes Retro Cellphone Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232351. | https://vuldb.com/?id.232351 | 2023-06-25T18:05:42.705Z | 2023-06-25T18:31:03.220Z | 2023-10-23T13:45:24.253Z | {'Vendor': 'Campcodes', 'Product': 'Retro Cellphone Online Store', 'Versions': '1.0'} |
CVE-2023-3553 | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository nilsteampassnet/teampass prior to 3.0.10. | https://huntr.dev/bounties/857f002a-2794-4807-aa5d-2f340de01870 | 2023-07-08T08:33:31.066Z | 2023-07-08T08:33:44.816Z | 2023-07-08T08:33:44.816Z | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3103 | Authentication bypass vulnerability, the exploitation of which could allow a local attacker to perform a Man-in-the-Middle (MITM) attack on the robot's camera video stream. In addition, if a MITM attack is carried out, it is possible to consume the robot's resources, which could lead to a denial-of-service (DOS) condition. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-unitree-robotics-a1 | 2023-06-05T12:33:13.726Z | 2023-11-22T11:51:48.573Z | 2023-11-22T11:51:48.573Z | {'Vendor': 'Unitree Robotics', 'Product': 'A1', 'Versions': '1.16'} |
CVE-2023-3800 | A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235068. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235068 | 2023-07-20T08:17:02.789Z | 2023-07-20T23:00:04.741Z | 2023-10-23T18:44:37.531Z | {'Vendor': 'n/a', 'Product': 'EasyAdmin8', 'Versions': '2.0.2.2'} |
CVE-2023-3945 | A vulnerability was found in phpscriptpoint Lawyer 1.6. It has been classified as problematic. This affects an unknown part of the file search.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235401 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235401 | 2023-07-25T14:51:26.149Z | 2023-07-25T21:31:03.569Z | 2023-10-24T07:49:16.710Z | {'Vendor': 'phpscriptpoint', 'Product': 'Lawyer', 'Versions': '1.6'} |
CVE-2023-3046 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Scienta allows SQL Injection.This issue affects Scienta: before 20230630.1953.
| https://www.usom.gov.tr/bildirim/tr-23-0418 | 2023-06-02T10:04:52.504Z | 2023-07-25T05:46:30.462Z | 2023-07-25T05:46:30.462Z | {'Vendor': 'Biltay Technology', 'Product': 'Scienta', 'Versions': '0'} |
CVE-2023-3695 | A vulnerability classified as critical has been found in Campcodes Beauty Salon Management System 1.0. Affected is an unknown function of the file add-product.php. The manipulation of the argument category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234252. | https://vuldb.com/?id.234252 | 2023-07-16T18:23:58.975Z | 2023-07-17T00:31:03.813Z | 2023-10-23T15:33:15.107Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3380 | A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.232236 | 2023-06-23T09:14:21.253Z | 2023-06-23T09:31:03.911Z | 2023-10-23T13:39:18.352Z | {'Vendor': 'Wavlink', 'Product': 'WN579X3', 'Versions': '20230615'} |
CVE-2023-3857 | A vulnerability, which was classified as problematic, was found in phpscriptpoint Ecommerce 1.15. This affects an unknown part of the file /product.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235209 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235209 | 2023-07-23T13:05:11.032Z | 2023-07-24T01:00:04.841Z | 2023-10-24T06:50:11.508Z | {'Vendor': 'phpscriptpoint', 'Product': 'Ecommerce', 'Versions': '1.15'} |
CVE-2023-3154 | The WordPress Gallery Plugin WordPress plugin before 3.39 is vulnerable to PHAR Deserialization due to a lack of input parameter validation in the `gallery_edit` function, allowing an attacker to access arbitrary resources on the server. | https://wpscan.com/vulnerability/ed099489-1db4-4b42-9f72-77de39c9e01e | 2023-06-07T19:35:28.475Z | 2023-10-16T19:39:06.028Z | 2023-10-16T19:39:06.028Z | {'Vendor': 'Unknown', 'Product': 'WordPress Gallery Plugin', 'Versions': '0'} |
CVE-2023-3504 | A vulnerability was found in SmartWeb Infotech Job Board 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /settings/account of the component My Profile Page. The manipulation of the argument filename leads to unrestricted upload. The attack may be launched remotely. The identifier of this vulnerability is VDB-232952. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.232952 | 2023-07-04T13:33:02.761Z | 2023-07-04T15:00:04.402Z | 2023-10-23T14:03:43.394Z | {'Vendor': 'SmartWeb Infotech', 'Product': 'Job Board', 'Versions': '1.0'} |
CVE-2023-3011 | The ARMember plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.5. This is due to missing or incorrect nonce validation on the arm_check_user_cap function. This makes it possible for unauthenticated attackers to perform multiple unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/42f5f29b-2d83-4b15-82aa-0598f8a2317b?source=cve | 2023-05-31T12:30:06.769Z | 2023-07-12T04:38:44.334Z | 2023-07-12T04:38:44.334Z | {'Vendor': 'reputeinfosystems', 'Product': 'ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup', 'Versions': '*'} |
CVE-2023-3768 | Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services. | https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products | 2023-07-19T11:41:48.222Z | 2023-10-02T10:55:39.288Z | 2023-10-23T10:14:24.319Z | {'Vendor': 'Ingeteam', 'Product': 'INGEPAC DA3451', 'Versions': '0.29.2.42'} |
CVE-2023-3292 | The grid-kit-premium WordPress plugin before 2.2.0 does not escape some parameters as well as generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/d993c385-c3ad-49a6-b079-3a1b090864c8 | 2023-06-16T08:26:07.461Z | 2023-07-31T09:37:35.639Z | 2023-07-31T09:37:35.639Z | {'Vendor': 'Unknown', 'Product': 'grid-kit-premium', 'Versions': '0'} |
CVE-2023-3338 | A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system. | https://access.redhat.com/security/cve/CVE-2023-3338 | 2023-06-20T00:00:00 | 2023-06-30T00:00:00 | 2024-01-23T02:34:01.241Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.5-rc1'} |
CVE-2023-3787 | A vulnerability classified as problematic was found in Codecanyon Tiva Events Calender 1.4. This vulnerability affects unknown code. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235054 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235054 | 2023-07-20T07:13:45.841Z | 2023-07-20T14:52:18.673Z | 2023-10-23T17:43:43.803Z | {'Vendor': 'Codecanyon', 'Product': 'Tiva Events Calender', 'Versions': '1.4'} |
CVE-2023-3769 | Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services. | https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products | 2023-07-19T11:41:49.204Z | 2023-10-02T13:01:03.985Z | 2023-10-23T10:15:07.508Z | {'Vendor': 'Ingeteam', 'Product': 'INGEPAC FC5066', 'Versions': '9.0.22.6+6.1.1.22+5.3.1.1'} |
CVE-2023-3293 | Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm-core prior to 8.3.0. | https://huntr.dev/bounties/22cb0ee3-e5da-40e0-9d2c-ace9b759f171 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm-core', 'Versions': 'unspecified'} |
CVE-2023-3339 | A vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file exam-delete.php. The manipulation of the argument test_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232015. | https://vuldb.com/?id.232015 | 2023-06-20T15:07:54.477Z | 2023-06-21T06:31:03.287Z | 2023-10-23T13:36:51.974Z | {'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'} |
CVE-2023-3786 | A vulnerability classified as problematic has been found in Aures Komet up to 20230509. This affects an unknown part of the component Kiosk Mode. The manipulation leads to improper access controls. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier VDB-235053 was assigned to this vulnerability. | https://vuldb.com/?id.235053 | 2023-07-20T07:11:44.889Z | 2023-07-20T13:00:05.904Z | 2023-10-23T17:42:30.628Z | {'Vendor': 'Aures', 'Product': 'Komet', 'Versions': '20230509'} |
CVE-2023-3856 | A vulnerability, which was classified as problematic, has been found in phpscriptpoint Ecommerce 1.15. Affected by this issue is some unknown functionality of the file /blog-single.php. The manipulation of the argument slug leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235208. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235208 | 2023-07-23T13:05:08.640Z | 2023-07-24T00:31:03.825Z | 2023-10-24T06:48:58.250Z | {'Vendor': 'phpscriptpoint', 'Product': 'Ecommerce', 'Versions': '1.15'} |
CVE-2023-3155 | The WordPress Gallery Plugin WordPress plugin before 3.39 is vulnerable to Arbitrary File Read and Delete due to a lack of input parameter validation in the `gallery_edit` function, allowing an attacker to access arbitrary resources on the server. | https://wpscan.com/vulnerability/5c8473f4-4b52-430b-9140-b81b0a0901da | 2023-06-07T19:42:51.033Z | 2023-10-16T19:39:07.736Z | 2023-10-16T19:39:07.736Z | {'Vendor': 'Unknown', 'Product': 'WordPress Gallery Plugin', 'Versions': '0'} |
CVE-2023-3505 | A vulnerability was found in Onest CRM 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/project/update/2 of the component Project List Handler. The manipulation of the argument name with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-232953 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.232953 | 2023-07-04T13:48:11.686Z | 2023-07-04T15:31:03.633Z | 2023-10-23T14:04:56.526Z | {'Vendor': 'Onest', 'Product': 'CRM', 'Versions': '1.0'} |
CVE-2023-3010 | Grafana is an open-source platform for monitoring and observability.
The WorldMap panel plugin, versions before 1.0.4 contains a DOM XSS vulnerability.
| https://grafana.com/security/security-advisories/cve-2023-3010/ | 2023-05-31T11:52:43.685Z | 2023-10-25T08:09:48.174Z | 2023-10-25T08:09:48.174Z | {'Vendor': 'Grafana', 'Product': 'worldmap-panel', 'Versions': '0.3.30'} |
CVE-2023-3440 | Incorrect Default Permissions vulnerability in Hitachi JP1/Performance Management on Windows allows File Manipulation.This issue affects JP1/Performance Management - Manager: from 09-00 before 12-50-07; JP1/Performance Management - Base: from 09-00 through 10-50-*; JP1/Performance Management - Agent Option for Application Server: from 11-00 before 11-50-16; JP1/Performance Management - Agent Option for Enterprise Applications: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for HiRDB: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for IBM Lotus Domino: from 10-00 before 11-50-16; JP1/Performance Management - Agent Option for Microsoft(R) Exchange Server: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for Microsoft(R) Internet Information Server: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for Microsoft(R) SQL Server: from 09-00 before 12-50-07; JP1/Performance Management - Agent Option for Oracle: from 09-00 before 12-10-08; JP1/Performance Management - Agent Option for Platform: from 09-00 before 12-50-07; JP1/Performance Management - Agent Option for Service Response: from 09-00 before 11-50-16; JP1/Performance Management - Agent Option for Transaction System: from 11-00 before 12-00-14; JP1/Performance Management - Remote Monitor for Microsoft(R) SQL Server: from 09-00 before 12-50-07; JP1/Performance Management - Remote Monitor for Oracle: from 09-00 before 12-10-08; JP1/Performance Management - Remote Monitor for Platform: from 09-00 before 12-10-08; JP1/Performance Management - Remote Monitor for Virtual Machine: from 10-00 before 12-50-07; JP1/Performance Management - Agent Option for Domino: from 09-00 through 09-00-*; JP1/Performance Management - Agent Option for IBM WebSphere Application Server: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for IBM WebSphere MQ: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for JP1/AJS3: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for OpenTP1: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for Oracle WebLogic Server: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for uCosminexus Application Server: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for Virtual Machine: from 09-00 through 09-01-*.
| https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-145/index.html | 2023-06-28T09:03:01.678Z | 2023-10-03T01:05:42.803Z | 2023-10-03T01:05:42.803Z | {'Vendor': 'Hitachi', 'Product': 'JP1/Performance Management - Manager', 'Versions': '09-00, 11-50, 12-00, 12-10, 12-50'} |
CVE-2023-3694 | A vulnerability, which was classified as critical, has been found in SourceCodester House Rental and Property Listing 1.0. This issue affects some unknown processing of the file index.php. The manipulation of the argument keywords/location leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-234245 was assigned to this vulnerability. | https://vuldb.com/?id.234245 | 2023-07-16T14:29:20.687Z | 2023-07-16T23:31:03.759Z | 2023-10-23T15:32:01.955Z | {'Vendor': 'SourceCodester', 'Product': 'House Rental and Property Listing', 'Versions': '1.0'} |
CVE-2023-3381 | A vulnerability classified as problematic was found in SourceCodester Online School Fees System 1.0. Affected by this vulnerability is an unknown functionality of the file /paysystem/datatable.php of the component GET Parameter Handler. The manipulation of the argument doj leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-232237 was assigned to this vulnerability. | https://vuldb.com/?id.232237 | 2023-06-23T09:16:35.276Z | 2023-06-23T09:31:04.940Z | 2023-10-23T13:40:31.524Z | {'Vendor': 'SourceCodester', 'Product': 'Online School Fees System', 'Versions': '1.0'} |
CVE-2023-3552 | Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.10. | https://huntr.dev/bounties/aeb2f43f-0602-4ac6-9685-273e87ff4ded | 2023-07-08T08:18:52.463Z | 2023-07-08T08:19:04.324Z | 2023-07-08T08:19:04.324Z | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3102 | A sensitive information leak issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows access to titles of private issue and MR. | https://gitlab.com/gitlab-org/gitlab/-/issues/414269 | 2023-06-05T12:22:41.456Z | 2023-07-21T15:30:47.974Z | 2023-07-21T15:30:47.974Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.1'} |
CVE-2023-3801 | A vulnerability was found in IBOS OA 4.5.5. It has been declared as critical. Affected by this vulnerability is the function actionEdit of the file ?r=officialdoc/officialdoc/edit of the component Mobile Notification Handler. The manipulation leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-235069 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235069 | 2023-07-20T08:20:59.920Z | 2023-07-20T23:31:03.186Z | 2023-10-23T18:45:50.703Z | {'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'} |
CVE-2023-3944 | A vulnerability was found in phpscriptpoint Lawyer 1.6 and classified as problematic. Affected by this issue is some unknown functionality of the file page.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235400. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235400 | 2023-07-25T14:51:23.264Z | 2023-07-25T19:31:03.830Z | 2023-10-24T07:48:03.547Z | {'Vendor': 'phpscriptpoint', 'Product': 'Lawyer', 'Versions': '1.6'} |
CVE-2023-3417 | Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird < 115.0.1 and Thunderbird < 102.13.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1835582 | 2023-06-26T17:25:53.967Z | 2023-07-24T10:09:37.591Z | 2023-07-28T13:12:34.115Z | {'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'} |
CVE-2023-3047 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TMT Lockcell allows SQL Injection.This issue affects Lockcell: before 15.
| https://www.usom.gov.tr/bildirim/tr-23-0345 | 2023-06-02T10:07:20.204Z | 2023-06-13T11:41:05.006Z | 2023-06-19T12:23:04.527Z | {'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'} |
CVE-2023-3728 | Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:19.948Z | 2023-08-01T22:39:16.671Z | 2023-08-01T22:39:16.671Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3378 | null | null | 2023-06-23T09:01:08.423Z | null | 2023-09-15T05:25:46.808Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3682 | A vulnerability, which was classified as critical, was found in Nesote Inout Blockchain EasyPayments 1.0. Affected is an unknown function of the file /index.php/payment/getcoinaddress of the component POST Parameter Handler. The manipulation of the argument coinid leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234228. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234228 | 2023-07-15T16:10:30.703Z | 2023-07-15T16:31:03.234Z | 2023-10-23T15:18:36.525Z | {'Vendor': 'Nesote', 'Product': 'Inout Blockchain EasyPayments', 'Versions': '1.0'} |
CVE-2023-3397 | A race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information. | https://access.redhat.com/security/cve/CVE-2023-3397 | 2023-06-25T19:23:19.126Z | 2023-11-01T19:05:39.080Z | 2024-01-23T00:52:18.794Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-3817 | Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.
An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the "-check" option.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue. | https://www.openssl.org/news/secadv/20230731.txt | 2023-07-21T08:47:25.638Z | 2023-07-31T15:34:13.627Z | 2023-07-31T15:34:13.627Z | {'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0, 1.1.1, 1.0.2'} |
CVE-2023-3114 | Terraform Enterprise since v202207-1 did not properly implement authorization rules for agent pools, allowing the workspace to be targeted by unauthorized agents. This authorization flaw could potentially allow a workspace to access resources from a separate, higher-privileged workspace in the same organization that targeted an agent pool. This vulnerability, CVE-2023-3114, is fixed in Terraform Enterprise v202306-1. | https://discuss.hashicorp.com/t/hcsec-2023-18-terraform-enterprise-agent-pool-controls-allowed-unauthorized-workspaces-to-target-an-agent-pool/55329 | 2023-06-06T00:43:14.939Z | 2023-06-22T21:59:46.778Z | 2023-06-22T21:59:46.778Z | {'Vendor': 'HashiCorp', 'Product': 'Terraform Enterprise', 'Versions': 'v202207-1'} |
CVE-2023-3544 | A vulnerability was found in GZ Scripts Time Slot Booking Calendar PHP 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-233296. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233296 | 2023-07-07T12:15:10.964Z | 2023-07-07T17:00:04.738Z | 2023-10-23T14:22:02.419Z | {'Vendor': 'GZ Scripts', 'Product': 'Time Slot Booking Calendar PHP', 'Versions': '1.8'} |
CVE-2023-3051 | The Page Builder by AZEXO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'azh_post' shortcode in versions up to, and including, 1.27.133 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/24486605-9324-4f19-9ca3-340d006432db?source=cve | 2023-06-02T11:18:26.272Z | 2023-06-02T23:37:55.112Z | 2023-06-02T23:37:55.112Z | {'Vendor': 'azexo', 'Product': 'Page Builder with Image Map by AZEXO', 'Versions': '*'} |
CVE-2023-3401 | An issue has been discovered in GitLab affecting all versions before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code. | https://gitlab.com/gitlab-org/gitlab/-/issues/416252 | 2023-06-26T10:17:32.851Z | 2023-08-02T08:30:48.302Z | 2023-08-02T08:30:48.302Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.1.0, 16.2.0'} |
CVE-2023-3790 | A vulnerability has been found in Boom CMS 8.0.7 and classified as problematic. Affected by this vulnerability is the function add of the component assets-manager. The manipulation of the argument title/description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235057 was assigned to this vulnerability. | https://vuldb.com/?id.235057 | 2023-07-20T07:20:47.244Z | 2023-07-20T16:31:03.961Z | 2023-10-23T17:47:23.323Z | {'Vendor': 'Boom', 'Product': 'CMS', 'Versions': '8.0.7'} |
CVE-2023-3513 | Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization. | https://starlabs.sg/advisories/23/23-3513/ | 2023-07-05T08:39:02.308Z | 2023-07-14T04:49:59.445Z | 2023-07-14T04:49:59.445Z | {'Vendor': 'Razer', 'Product': 'Razer Central', 'Versions': '0'} |
CVE-2023-3143 | A vulnerability classified as problematic has been found in SourceCodester Online Discussion Forum Site 1.0. Affected is an unknown function of the file admin\posts\manage_post.php. The manipulation of the argument content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231012. | https://vuldb.com/?id.231012 | 2023-06-07T13:55:36.847Z | 2023-06-07T14:31:02.866Z | 2023-10-23T12:44:22.598Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3840 | A vulnerability, which was classified as problematic, was found in NxFilter 4.3.2.5. This affects an unknown part of the file /report,daily.jsp?stime=2023%2F07%2F12&timeOption=yesterday&. The manipulation of the argument user leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-235191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235191 | 2023-07-22T06:23:10.427Z | 2023-07-23T02:31:03.547Z | 2023-10-24T06:30:39.953Z | {'Vendor': 'n/a', 'Product': 'NxFilter', 'Versions': '4.3.2.5'} |
CVE-2023-3456 | Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/7/ | 2023-06-29T11:13:39.706Z | 2023-07-06T12:34:21.446Z | 2023-07-06T12:34:21.446Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 3.1.0, 2.1.0, 2.0.0, 2.0.1'} |
CVE-2023-3006 | A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible. | https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel 6.1-rc1'} |
Subsets and Splits