CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3764
The WooCommerce PDF Invoice Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.90. This is due to missing or incorrect nonce validation on the Save function. This makes it possible for unauthenticated attackers to make changes to invoices via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ebf2e701-9f9b-4a78-a61a-0cf90cdd9755?source=cve
2023-07-18T20:10:53.389Z
2023-08-31T05:33:14.499Z
2023-08-31T05:33:14.499Z
{'Vendor': 'edgarrojas', 'Product': 'WooCommerce PDF Invoice Builder, Create invoices, packing slips and more', 'Versions': '*'}
CVE-2023-3271
Improper Access Control in the SICK ICR890-4 could allow an unauthenticated remote attacker to gather information about the system and download data via the REST API by accessing unauthenticated endpoints.
https://sick.com/psirt
2023-06-15T11:32:31.460Z
2023-07-10T09:26:21.041Z
2023-07-10T09:32:48.098Z
{'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'}
CVE-2023-3621
A vulnerability was found in IBOS OA 4.5.5. It has been classified as critical. Affected is the function createDeleteCommand of the file ?r=article/default/delete of the component Delete Packet. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-233574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233574
2023-07-11T14:59:28.753Z
2023-07-11T16:00:04.367Z
2023-10-23T14:56:38.686Z
{'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'}
CVE-2023-3508
The WooCommerce Pre-Orders WordPress plugin before 2.0.3 has a flawed CSRF check when processing its tab actions, which could allow attackers to make logged in admins email pre-orders customer, change the released date, mark all pre-orders of a specific product as complete or cancel via CSRF attacks
https://wpscan.com/vulnerability/064c7acb-db57-4537-8a6d-32f7ea31c738
2023-07-04T18:11:44.617Z
2023-07-31T09:37:37.921Z
2023-07-31T09:37:37.921Z
{'Vendor': 'Unknown', 'Product': 'WooCommerce Pre-Orders', 'Versions': '0'}
CVE-2023-3158
The Mail Control plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 0.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/77537eb8-1c84-4702-aba1-727b0de1c3e1?source=cve
2023-06-08T00:54:34.360Z
2023-07-12T04:38:46.096Z
2023-07-12T04:38:46.096Z
{'Vendor': 'rahalaboulfeth', 'Product': 'Mail Control – Email Customizer, SMTP Deliverability, logging, open and click Tracking', 'Versions': '*'}
CVE-2023-3590
Mattermost fails to delete card attachments in Boards, allowing an attacker to access deleted attachments.
https://mattermost.com/security-updates
2023-07-10T15:01:13.653Z
2023-07-17T15:28:50.860Z
2023-07-17T15:28:50.860Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 7.10.3'}
CVE-2023-3969
A vulnerability, which was classified as problematic, has been found in GZ Scripts Availability Booking Calendar PHP 1.0. Affected by this issue is some unknown functionality of the file index.php of the component HTTP POST Request Handler. The manipulation of the argument promo_code leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235568.
https://vuldb.com/?id.235568
2023-07-27T06:56:05.640Z
2023-07-27T11:31:03.531Z
2023-10-24T07:50:29.972Z
{'Vendor': 'GZ Scripts', 'Product': 'Availability Booking Calendar PHP', 'Versions': '1.0'}
CVE-2023-3986
A vulnerability was found in SourceCodester Simple Online Mens Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/?page=user/list. The manipulation of the argument First Name/Last Name/Username leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235607.
https://vuldb.com/?id.235607
2023-07-27T19:48:02.787Z
2023-07-28T05:00:05.605Z
2023-10-24T07:55:22.744Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Online Mens Salon Management System', 'Versions': '1.0'}
CVE-2023-3085
A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The patch is named 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663.
https://vuldb.com/?id.230663
2023-06-03T10:00:14.019Z
2023-06-03T10:31:02.697Z
2023-10-23T07:54:51.637Z
{'Vendor': 'X-WRT', 'Product': 'luci', 'Versions': '22.10_b202303061504'}
CVE-2023-3656
cashIT! - serving solutions. Devices from "PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH" to 03.A06rks 2023.02.37 are affected by an unauthenticated remote code execution vulnerability. This vulnerability can be triggered by an HTTP endpoint exposed to the network.
https://www.cashit.at/
2023-07-13T07:01:30.677Z
2023-10-03T07:39:53.661Z
2023-11-02T09:03:48.291Z
{'Vendor': 'PoS/ Dienstleistung, Entwicklung & Vertrieb GmbH', 'Product': 'cashIT! - serving solutions.', 'Versions': '0'}
CVE-2023-3206
A vulnerability classified as problematic was found in Chengdu VEC40G 3.0. Affected by this vulnerability is an unknown functionality of the file /send_order.cgi?parameter=restart. The manipulation of the argument restart with the input reboot leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.231229
2023-06-12T14:28:40.642Z
2023-06-12T15:00:05.574Z
2023-10-23T13:06:21.530Z
{'Vendor': 'Chengdu', 'Product': 'VEC40G', 'Versions': '3.0'}
CVE-2023-3713
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'profile_magic_check_smtp_connection' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation.
https://www.wordfence.com/threat-intel/vulnerabilities/id/473ba791-af99-4aae-99cb-ccf220e443e7?source=cve
2023-07-17T14:17:49.052Z
2023-07-18T02:39:25.094Z
2023-07-18T02:39:25.094Z
{'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'}
CVE-2023-3343
The User Registration plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.0.1 via deserialization of untrusted input from the 'profile-pic-url' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3590277a-3319-4707-b728-d75ea59e8ad9?source=cve
2023-06-20T17:22:00.922Z
2023-07-13T02:04:14.751Z
2023-07-13T02:04:14.751Z
{'Vendor': 'wpeverest', 'Product': 'User Registration – Custom Registration Form, Login Form And User Profile For WordPress', 'Versions': '*'}
CVE-2023-3894
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50083
2023-07-24T21:18:16.456Z
2023-08-08T16:59:58.129Z
2023-08-08T16:59:58.129Z
{'Vendor': 'FasterXML', 'Product': ' jackson-dataformats-text', 'Versions': '0'}
CVE-2023-3197
The MStore API plugin for WordPress is vulnerable to Unauthenticated Blind SQL Injection via the 'id' parameter in versions up to, and including, 4.0.1 due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/30aab1af-a78f-4bac-b3c5-30ea854ccef7?source=cve
2023-06-12T13:45:47.111Z
2023-06-24T02:00:18.262Z
2023-06-24T02:00:18.262Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-3528
A vulnerability was found in ThinuTech ThinuCMS 1.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /category.php. The manipulation of the argument cat_id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-233252.
https://vuldb.com/?id.233252
2023-07-06T17:32:37.809Z
2023-07-06T18:00:03.991Z
2023-10-23T14:07:22.844Z
{'Vendor': 'ThinuTech', 'Product': 'ThinuCMS', 'Versions': '1.5'}
CVE-2023-3178
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability delete arbitrary logs via a CSRF attack.
https://wpscan.com/vulnerability/5341cb5d-d204-49e1-b013-f8959461995f/
2023-06-09T08:24:52.036Z
2024-01-16T15:55:29.719Z
2024-01-16T15:55:29.719Z
{'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '2.5.0'}
CVE-2023-3482
When Firefox is configured to block storage of all cookies, it was still possible to store data in localstorage by using an iframe with a source of 'about:blank'. This could have led to malicious websites storing tracking data without permission. This vulnerability affects Firefox < 115.
https://bugzilla.mozilla.org/show_bug.cgi?id=1839464
2023-06-30T13:54:30.810Z
2023-07-05T09:01:13.962Z
2023-07-05T09:01:13.962Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-3251
A pass-back vulnerability exists where an authenticated, remote attacker with administrator privileges could uncover stored SMTP credentials within the Nessus application.This issue affects Nessus: before 10.6.0.
https://www.tenable.com/security/tns-2023-29
2023-06-14T19:51:19.650Z
2023-08-29T18:38:11.935Z
2023-08-29T18:38:11.935Z
{'Vendor': 'Tenable', 'Product': 'Nessus', 'Versions': '0'}
CVE-2023-3601
The Simple Author Box WordPress plugin before 2.52 does not verify a user ID before outputting information about that user, leading to arbitrary user information disclosure to users with a role as low as Contributor.
https://wpscan.com/vulnerability/c0cc513e-c306-4920-9afb-e33d95a7292f
2023-07-10T17:43:18.843Z
2023-08-14T19:10:21.138Z
2024-01-16T15:54:01.512Z
{'Vendor': 'Unknown', 'Product': 'Simple Author Box', 'Versions': '0'}
CVE-2023-3314
A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.
https://kcm.trellix.com/corporate/index?page=content&id=SB10403
2023-06-19T08:42:45.707Z
2023-07-03T08:02:29.010Z
2023-07-03T08:02:29.010Z
{'Vendor': 'Trellix', 'Product': 'Enterprise Security Manager', 'Versions': '11.6.3'}
CVE-2023-3744
Server-Side Request Forgery vulnerability in SLims version 9.6.0. This vulnerability could allow an authenticated attacker to send requests to internal services or upload the contents of relevant files via the "scrape_image.php" file in the imageURL parameter.
https://www.incibe.es/en/incibe-cert/notices/aviso/server-side-request-forgery-slims
2023-07-18T07:17:40.669Z
2023-10-02T13:50:31.607Z
2023-10-02T13:50:31.607Z
{'Vendor': 'SLiMS', 'Product': 'SLiMS', 'Versions': '9.6.0'}
CVE-2023-3181
The C:\Program Files (x86)\Splashtop\Splashtop Software Updater\uninst.exe process creates a folder at C:\Windows\Temp~nsu.tmp and copies itself to it as Au_.exe. The C:\Windows\Temp~nsu.tmp\Au_.exe file is automatically launched as SYSTEM when the system reboots or when a standard user runs an MSI repair using Splashtop Streamer’s Windows Installer. Since the C:\Windows\Temp~nsu.tmp folder inherits permissions from C:\Windows\Temp and Au_.exe is susceptible to DLL hijacking, standard users can write a malicious DLL to it and elevate their privileges.
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0015.md
2023-06-09T09:44:05.431Z
2024-01-25T15:22:47.828Z
2024-01-25T15:22:47.828Z
{'Vendor': 'Splashtop', 'Product': 'Splashtop Software Updater', 'Versions': '0'}
CVE-2023-3882
A vulnerability, which was classified as critical, has been found in Campcodes Beauty Salon Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/edit-accepted-appointment.php. The manipulation of the argument contactno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235244.
https://vuldb.com/?id.235244
2023-07-24T16:50:33.881Z
2023-07-25T05:00:04.917Z
2023-10-24T07:10:55.963Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3494
The fwctl driver implements a state machine which is executed when a bhyve guest accesses certain x86 I/O ports. The interface lets the guest copy a string into a buffer resident in the bhyve process' memory. A bug in the state machine implementation can result in a buffer overflowing when copying this string. Malicious, privileged software running in a guest VM can exploit the buffer overflow to achieve code execution on the host in the bhyve userspace process, which typically runs as root, mitigated by the capabilities assigned through the Capsicum sandbox available to the bhyve process.
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:07.bhyve.asc
2023-06-30T22:57:48.603Z
2023-08-01T22:13:21.634Z
2023-08-01T22:34:32.578Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 13.1-RELEASE'}
CVE-2023-3617
A vulnerability was found in SourceCodester Best POS Management System 1.0. It has been classified as critical. This affects an unknown part of the file admin_class.php of the component Login Page. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233565 was assigned to this vulnerability.
https://vuldb.com/?id.233565
2023-07-11T14:31:57.025Z
2023-07-11T15:00:03.716Z
2023-10-23T14:54:12.314Z
{'Vendor': 'SourceCodester', 'Product': 'Best POS Management System', 'Versions': '1.0'}
CVE-2023-3247
In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce. 
https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw
2023-06-14T16:24:08.631Z
2023-07-22T04:17:09.896Z
2023-07-22T04:17:09.896Z
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.*, 8.1.*, 8.2.*'}
CVE-2023-3752
A vulnerability was found in Creativeitem Academy LMS 5.15. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /home/courses. The manipulation of the argument sort_by leads to cross site scripting. The attack may be launched remotely. VDB-234422 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234422
2023-07-18T16:25:59.245Z
2023-07-19T01:31:03.400Z
2023-10-23T15:35:41.493Z
{'Vendor': 'Creativeitem', 'Product': 'Academy LMS', 'Versions': '5.15'}
CVE-2023-3302
Improper Neutralization of Formula Elements in a CSV File in GitHub repository admidio/admidio prior to 4.2.9.
https://huntr.dev/bounties/5e18619f-8379-464a-aad2-65883bb4e81a
2023-06-18T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'}
CVE-2023-3586
Mattermost fails to disable public Boards after the "Enable Publicly-Shared Boards" configuration option is disabled, resulting in previously-shared public Boards to remain accessible.
https://mattermost.com/security-updates
2023-07-10T13:57:18.062Z
2023-07-17T15:25:30.532Z
2023-07-17T15:25:30.532Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3'}
CVE-2023-3569
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.
https://cert.vde.com/en/advisories/VDE-2023-017
2023-07-10T07:42:55.485Z
2023-08-08T06:56:40.395Z
2023-08-08T06:56:40.395Z
{'Vendor': 'PHOENIX CONTACT', 'Product': 'CLOUD CLIENT 1101T-TX/TX', 'Versions': '0'}
CVE-2023-3093
The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/68e6ec3a-c5fd-4f63-a9a0-2c9ddfb96e2e?source=cve
2023-06-04T03:17:14.839Z
2023-07-12T04:38:45.199Z
2023-07-12T04:38:45.199Z
{'Vendor': 'yaycommerce', 'Product': 'YaySMTP – Simple WP SMTP Mail', 'Versions': '2.4.5'}
CVE-2023-3139
The Protect WP Admin WordPress plugin before 4.0 discloses the URL of the admin panel via a redirection of a crafted URL, bypassing the protection offered.
https://wpscan.com/vulnerability/f8a29aee-19cd-4e62-b829-afc9107f69bd
2023-06-07T08:34:01.627Z
2023-07-04T07:23:27.209Z
2023-07-24T08:19:04.342Z
{'Vendor': 'Unknown', 'Product': 'Protect WP Admin', 'Versions': '0'}
CVE-2023-3990
A vulnerability classified as problematic has been found in Mingsoft MCMS up to 5.3.1. This affects an unknown part of the file search.do of the component HTTP POST Request Handler. The manipulation of the argument style leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-235611.
https://vuldb.com/?id.235611
2023-07-27T20:15:13.939Z
2023-07-28T07:00:05.551Z
2023-10-24T08:00:15.831Z
{'Vendor': 'Mingsoft', 'Product': 'MCMS', 'Versions': '5.3.0, 5.3.1'}
CVE-2023-3210
An issue has been discovered in GitLab affecting all versions starting from 15.11 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. An authenticated user could trigger a denial of service when importing or cloning malicious content.
https://gitlab.com/gitlab-org/gitlab/-/issues/415074
2023-06-12T15:15:26.086Z
2023-09-01T10:31:06.983Z
2023-09-01T10:31:06.983Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.11, 16.2, 16.3'}
CVE-2023-3640
A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.
https://access.redhat.com/security/cve/CVE-2023-3640
2023-07-12T15:37:45.552Z
2023-07-24T15:19:29.983Z
2024-01-23T01:03:43.473Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-3355
A NULL pointer dereference flaw was found in the Linux kernel's drivers/gpu/drm/msm/msm_gem_submit.c code in the submit_lookup_cmds function, which fails because it lacks a check of the return value of kmalloc(). This issue allows a local user to crash the system.
https://access.redhat.com/security/cve/CVE-2023-3355
2023-06-21T00:00:00
2023-06-28T00:00:00
2024-01-23T02:35:02.994Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.1-rc8'}
CVE-2023-3705
The vulnerability exists in CP-Plus NVR due to an improper input handling at the web-based management interface of the affected product. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to obtain sensitive information on the targeted device.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0239
2023-07-17T10:01:52.049Z
2023-08-24T07:03:12.395Z
2023-08-24T07:03:12.395Z
{'Vendor': 'Aditya Infotech Limited ', 'Product': 'CP-VNR-3104, CP-VNR-3108, CP-VNR-3208', 'Versions': '0'}
CVE-2023-3512
Relative path traversal vulnerability in Setelsa Security's ConacWin CB, in its 3.8.2.2 version and earlier, the exploitation of which could allow an attacker to perform an arbitrary download of files from the system via the "Download file" parameter.
https://https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-setelsa-security-conacwin
2023-07-05T07:49:47.301Z
2023-10-04T10:53:36.243Z
2023-10-04T10:53:36.243Z
{'Vendor': 'Setelsa Security', 'Product': 'ConacWin CB', 'Versions': '0'}
CVE-2023-3142
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 2.0.
https://huntr.dev/bounties/d00686b0-f89a-4e14-98d7-b8dd3f92a6e5
2023-06-07T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-3841
A vulnerability has been found in NxFilter 4.3.2.5 and classified as problematic. This vulnerability affects unknown code of the file user.jsp. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The identifier of this vulnerability is VDB-235192. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235192
2023-07-22T06:23:16.239Z
2023-07-23T03:00:04.713Z
2023-10-24T06:31:53.112Z
{'Vendor': 'n/a', 'Product': 'NxFilter', 'Versions': '4.3.2.5'}
CVE-2023-3904
An issue has been discovered in GitLab EE affecting all versions starting before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible to overflow the time spent on an issue that altered the details shown in the issue boards.
https://gitlab.com/gitlab-org/gitlab/-/issues/418226
2023-07-25T10:30:28.338Z
2023-12-15T16:03:15.329Z
2023-12-15T16:03:15.329Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.5, 16.6'}
CVE-2023-3457
A vulnerability was found in SourceCodester Shopping Website 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-232674 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.232674
2023-06-29T12:55:15.889Z
2023-06-29T13:31:03.915Z
2023-10-23T13:49:04.011Z
{'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'}
CVE-2023-3007
A vulnerability was found in ningzichun Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file resetPassword.php of the component Password Reset Handler. The manipulation of the argument sid leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230354 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230354
2023-05-31T11:01:45.300Z
2023-05-31T11:31:03.046Z
2023-10-23T07:34:07.302Z
{'Vendor': 'ningzichun', 'Product': 'Student Management System', 'Versions': '1.0'}
CVE-2023-3791
A vulnerability was found in IBOS OA 4.5.5 and classified as critical. Affected by this issue is the function actionExport of the file ?r=contact/default/export of the component Personal Office Address Book. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-235058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235058
2023-07-20T07:36:08.588Z
2023-07-20T18:00:05.088Z
2023-10-23T17:48:36.476Z
{'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'}
CVE-2023-3115
An issue has been discovered in GitLab EE affecting all versions affecting all versions from 11.11 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Single Sign On restrictions were not correctly enforced for indirect project members accessing public members-only project repositories.
https://gitlab.com/gitlab-org/gitlab/-/issues/414367
2023-06-06T03:19:59.543Z
2023-09-29T06:02:51.300Z
2023-09-29T06:02:51.300Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.11, 16.3, 16.4'}
CVE-2023-3545
Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in Chamilo LMS <= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of `.htaccess` file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as CVE-2023-3533, to achieve remote code execution.
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-125-2023-07-13-Critical-impact-Moderate-risk-Htaccess-File-Upload-Security-Bypass-on-Windows-CVE-2023-3545
2023-07-07T13:10:48.745Z
2023-11-28T07:07:27.183Z
2023-11-28T07:07:27.183Z
{'Vendor': 'Chamilo', 'Product': 'Chamilo', 'Versions': '0'}
CVE-2023-3050
Reliance on Cookies without Validation and Integrity Checking in a Security Decision vulnerability in TMT Lockcell allows Privilege Abuse, Authentication Bypass.This issue affects Lockcell: before 15.
https://www.usom.gov.tr/bildirim/tr-23-0345
2023-06-02T10:07:23.702Z
2023-06-13T11:50:27.709Z
2023-06-19T12:26:17.304Z
{'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'}
CVE-2023-3953
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause memory corruption when an authenticated user opens a tampered log file from GP-Pro EX.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-220-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-220-01.pdf
2023-07-26T08:14:55.340Z
2023-08-09T14:02:44.472Z
2023-08-09T14:02:44.472Z
{'Vendor': 'Schneider Electric', 'Product': 'GP-Pro EX WinGP for iPC', 'Versions': 'v4.09.450 and prior'}
CVE-2023-3729
Use after free in Splitscreen in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via crafted UI interactions. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html
2023-07-18T00:34:20.140Z
2023-08-01T22:39:16.947Z
2023-08-04T19:09:51.822Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.131'}
CVE-2023-3379
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
https://cert.vde.com/en/advisories/VDE-2023-015/
2023-06-23T09:01:09.552Z
2023-11-20T07:23:41.887Z
2023-11-20T07:23:41.887Z
{'Vendor': 'WAGO', 'Product': 'Compact Controller 100 (751-9301)', 'Versions': '0'}
CVE-2023-3683
A vulnerability has been found in LivelyWorks Articart 2.0.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /items/search. The manipulation of the argument search_term leads to cross site scripting. The attack can be launched remotely. The identifier VDB-234229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234229
2023-07-15T16:13:43.471Z
2023-07-16T08:00:05.329Z
2023-10-23T15:19:49.670Z
{'Vendor': 'LivelyWorks', 'Product': 'Articart', 'Versions': '2.0.1'}
CVE-2023-3396
A vulnerability was found in Campcodes Retro Cellphone Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232351.
https://vuldb.com/?id.232351
2023-06-25T18:05:42.705Z
2023-06-25T18:31:03.220Z
2023-10-23T13:45:24.253Z
{'Vendor': 'Campcodes', 'Product': 'Retro Cellphone Online Store', 'Versions': '1.0'}
CVE-2023-3553
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
https://huntr.dev/bounties/857f002a-2794-4807-aa5d-2f340de01870
2023-07-08T08:33:31.066Z
2023-07-08T08:33:44.816Z
2023-07-08T08:33:44.816Z
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3103
Authentication bypass vulnerability, the exploitation of which could allow a local attacker to perform a Man-in-the-Middle (MITM) attack on the robot's camera video stream. In addition, if a MITM attack is carried out, it is possible to consume the robot's resources, which could lead to a denial-of-service (DOS) condition.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-unitree-robotics-a1
2023-06-05T12:33:13.726Z
2023-11-22T11:51:48.573Z
2023-11-22T11:51:48.573Z
{'Vendor': 'Unitree Robotics', 'Product': 'A1', 'Versions': '1.16'}
CVE-2023-3800
A vulnerability was found in EasyAdmin8 2.0.2.2. It has been classified as problematic. Affected is an unknown function of the file /admin/index/index.html#/admin/mall.goods/index.html of the component File Upload Module. The manipulation leads to unrestricted upload. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235068. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235068
2023-07-20T08:17:02.789Z
2023-07-20T23:00:04.741Z
2023-10-23T18:44:37.531Z
{'Vendor': 'n/a', 'Product': 'EasyAdmin8', 'Versions': '2.0.2.2'}
CVE-2023-3945
A vulnerability was found in phpscriptpoint Lawyer 1.6. It has been classified as problematic. This affects an unknown part of the file search.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235401 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235401
2023-07-25T14:51:26.149Z
2023-07-25T21:31:03.569Z
2023-10-24T07:49:16.710Z
{'Vendor': 'phpscriptpoint', 'Product': 'Lawyer', 'Versions': '1.6'}
CVE-2023-3046
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Scienta allows SQL Injection.This issue affects Scienta: before 20230630.1953.
https://www.usom.gov.tr/bildirim/tr-23-0418
2023-06-02T10:04:52.504Z
2023-07-25T05:46:30.462Z
2023-07-25T05:46:30.462Z
{'Vendor': 'Biltay Technology', 'Product': 'Scienta', 'Versions': '0'}
CVE-2023-3695
A vulnerability classified as critical has been found in Campcodes Beauty Salon Management System 1.0. Affected is an unknown function of the file add-product.php. The manipulation of the argument category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-234252.
https://vuldb.com/?id.234252
2023-07-16T18:23:58.975Z
2023-07-17T00:31:03.813Z
2023-10-23T15:33:15.107Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3380
A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.232236
2023-06-23T09:14:21.253Z
2023-06-23T09:31:03.911Z
2023-10-23T13:39:18.352Z
{'Vendor': 'Wavlink', 'Product': 'WN579X3', 'Versions': '20230615'}
CVE-2023-3857
A vulnerability, which was classified as problematic, was found in phpscriptpoint Ecommerce 1.15. This affects an unknown part of the file /product.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235209 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235209
2023-07-23T13:05:11.032Z
2023-07-24T01:00:04.841Z
2023-10-24T06:50:11.508Z
{'Vendor': 'phpscriptpoint', 'Product': 'Ecommerce', 'Versions': '1.15'}
CVE-2023-3154
The WordPress Gallery Plugin WordPress plugin before 3.39 is vulnerable to PHAR Deserialization due to a lack of input parameter validation in the `gallery_edit` function, allowing an attacker to access arbitrary resources on the server.
https://wpscan.com/vulnerability/ed099489-1db4-4b42-9f72-77de39c9e01e
2023-06-07T19:35:28.475Z
2023-10-16T19:39:06.028Z
2023-10-16T19:39:06.028Z
{'Vendor': 'Unknown', 'Product': 'WordPress Gallery Plugin', 'Versions': '0'}
CVE-2023-3504
A vulnerability was found in SmartWeb Infotech Job Board 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /settings/account of the component My Profile Page. The manipulation of the argument filename leads to unrestricted upload. The attack may be launched remotely. The identifier of this vulnerability is VDB-232952. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.232952
2023-07-04T13:33:02.761Z
2023-07-04T15:00:04.402Z
2023-10-23T14:03:43.394Z
{'Vendor': 'SmartWeb Infotech', 'Product': 'Job Board', 'Versions': '1.0'}
CVE-2023-3011
The ARMember plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.5. This is due to missing or incorrect nonce validation on the arm_check_user_cap function. This makes it possible for unauthenticated attackers to perform multiple unauthorized actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/42f5f29b-2d83-4b15-82aa-0598f8a2317b?source=cve
2023-05-31T12:30:06.769Z
2023-07-12T04:38:44.334Z
2023-07-12T04:38:44.334Z
{'Vendor': 'reputeinfosystems', 'Product': 'ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup', 'Versions': '*'}
CVE-2023-3768
Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products
2023-07-19T11:41:48.222Z
2023-10-02T10:55:39.288Z
2023-10-23T10:14:24.319Z
{'Vendor': 'Ingeteam', 'Product': 'INGEPAC DA3451', 'Versions': '0.29.2.42'}
CVE-2023-3292
The grid-kit-premium WordPress plugin before 2.2.0 does not escape some parameters as well as generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/d993c385-c3ad-49a6-b079-3a1b090864c8
2023-06-16T08:26:07.461Z
2023-07-31T09:37:35.639Z
2023-07-31T09:37:35.639Z
{'Vendor': 'Unknown', 'Product': 'grid-kit-premium', 'Versions': '0'}
CVE-2023-3338
A null pointer dereference flaw was found in the Linux kernel's DECnet networking protocol. This issue could allow a remote user to crash the system.
https://access.redhat.com/security/cve/CVE-2023-3338
2023-06-20T00:00:00
2023-06-30T00:00:00
2024-01-23T02:34:01.241Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.5-rc1'}
CVE-2023-3787
A vulnerability classified as problematic was found in Codecanyon Tiva Events Calender 1.4. This vulnerability affects unknown code. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235054 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235054
2023-07-20T07:13:45.841Z
2023-07-20T14:52:18.673Z
2023-10-23T17:43:43.803Z
{'Vendor': 'Codecanyon', 'Product': 'Tiva Events Calender', 'Versions': '1.4'}
CVE-2023-3769
Incorrect data input validation vulnerability, which could allow an attacker with access to the network to implement fuzzing techniques that would allow him to gain knowledge about specially crafted packets that would create a DoS condition through the MMS protocol when initiating communication, achieving a complete system reboot of the device and its services.
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products
2023-07-19T11:41:49.204Z
2023-10-02T13:01:03.985Z
2023-10-23T10:15:07.508Z
{'Vendor': 'Ingeteam', 'Product': 'INGEPAC FC5066', 'Versions': '9.0.22.6+6.1.1.22+5.3.1.1'}
CVE-2023-3293
Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm-core prior to 8.3.0.
https://huntr.dev/bounties/22cb0ee3-e5da-40e0-9d2c-ace9b759f171
2023-06-16T00:00:00
2023-06-16T00:00:00
2023-06-16T00:00:00
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm-core', 'Versions': 'unspecified'}
CVE-2023-3339
A vulnerability has been found in code-projects Agro-School Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file exam-delete.php. The manipulation of the argument test_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232015.
https://vuldb.com/?id.232015
2023-06-20T15:07:54.477Z
2023-06-21T06:31:03.287Z
2023-10-23T13:36:51.974Z
{'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'}
CVE-2023-3786
A vulnerability classified as problematic has been found in Aures Komet up to 20230509. This affects an unknown part of the component Kiosk Mode. The manipulation leads to improper access controls. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The identifier VDB-235053 was assigned to this vulnerability.
https://vuldb.com/?id.235053
2023-07-20T07:11:44.889Z
2023-07-20T13:00:05.904Z
2023-10-23T17:42:30.628Z
{'Vendor': 'Aures', 'Product': 'Komet', 'Versions': '20230509'}
CVE-2023-3856
A vulnerability, which was classified as problematic, has been found in phpscriptpoint Ecommerce 1.15. Affected by this issue is some unknown functionality of the file /blog-single.php. The manipulation of the argument slug leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235208. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235208
2023-07-23T13:05:08.640Z
2023-07-24T00:31:03.825Z
2023-10-24T06:48:58.250Z
{'Vendor': 'phpscriptpoint', 'Product': 'Ecommerce', 'Versions': '1.15'}
CVE-2023-3155
The WordPress Gallery Plugin WordPress plugin before 3.39 is vulnerable to Arbitrary File Read and Delete due to a lack of input parameter validation in the `gallery_edit` function, allowing an attacker to access arbitrary resources on the server.
https://wpscan.com/vulnerability/5c8473f4-4b52-430b-9140-b81b0a0901da
2023-06-07T19:42:51.033Z
2023-10-16T19:39:07.736Z
2023-10-16T19:39:07.736Z
{'Vendor': 'Unknown', 'Product': 'WordPress Gallery Plugin', 'Versions': '0'}
CVE-2023-3505
A vulnerability was found in Onest CRM 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/project/update/2 of the component Project List Handler. The manipulation of the argument name with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-232953 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.232953
2023-07-04T13:48:11.686Z
2023-07-04T15:31:03.633Z
2023-10-23T14:04:56.526Z
{'Vendor': 'Onest', 'Product': 'CRM', 'Versions': '1.0'}
CVE-2023-3010
Grafana is an open-source platform for monitoring and observability. The WorldMap panel plugin, versions before 1.0.4 contains a DOM XSS vulnerability.
https://grafana.com/security/security-advisories/cve-2023-3010/
2023-05-31T11:52:43.685Z
2023-10-25T08:09:48.174Z
2023-10-25T08:09:48.174Z
{'Vendor': 'Grafana', 'Product': 'worldmap-panel', 'Versions': '0.3.30'}
CVE-2023-3440
Incorrect Default Permissions vulnerability in Hitachi JP1/Performance Management on Windows allows File Manipulation.This issue affects JP1/Performance Management - Manager: from 09-00 before 12-50-07; JP1/Performance Management - Base: from 09-00 through 10-50-*; JP1/Performance Management - Agent Option for Application Server: from 11-00 before 11-50-16; JP1/Performance Management - Agent Option for Enterprise Applications: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for HiRDB: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for IBM Lotus Domino: from 10-00 before 11-50-16; JP1/Performance Management - Agent Option for Microsoft(R) Exchange Server: from 09-00 before  12-00-14; JP1/Performance Management - Agent Option for Microsoft(R) Internet Information Server: from 09-00 before 12-00-14; JP1/Performance Management - Agent Option for Microsoft(R) SQL Server: from 09-00 before 12-50-07; JP1/Performance Management - Agent Option for Oracle: from 09-00 before  12-10-08; JP1/Performance Management - Agent Option for Platform: from 09-00 before 12-50-07; JP1/Performance Management - Agent Option for Service Response: from 09-00 before 11-50-16; JP1/Performance Management - Agent Option for Transaction System: from 11-00 before 12-00-14; JP1/Performance Management - Remote Monitor for Microsoft(R) SQL Server: from 09-00 before 12-50-07; JP1/Performance Management - Remote Monitor for Oracle: from 09-00 before 12-10-08; JP1/Performance Management - Remote Monitor for Platform: from 09-00 before 12-10-08; JP1/Performance Management - Remote Monitor for Virtual Machine: from 10-00 before 12-50-07; JP1/Performance Management - Agent Option for Domino: from 09-00 through 09-00-*; JP1/Performance Management - Agent Option for IBM WebSphere Application Server: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for IBM WebSphere MQ: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for JP1/AJS3: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for OpenTP1: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for Oracle WebLogic Server: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for uCosminexus Application Server: from 09-00 through 10-00-*; JP1/Performance Management - Agent Option for Virtual Machine: from 09-00 through 09-01-*.
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-145/index.html
2023-06-28T09:03:01.678Z
2023-10-03T01:05:42.803Z
2023-10-03T01:05:42.803Z
{'Vendor': 'Hitachi', 'Product': 'JP1/Performance Management - Manager', 'Versions': '09-00, 11-50, 12-00, 12-10, 12-50'}
CVE-2023-3694
A vulnerability, which was classified as critical, has been found in SourceCodester House Rental and Property Listing 1.0. This issue affects some unknown processing of the file index.php. The manipulation of the argument keywords/location leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-234245 was assigned to this vulnerability.
https://vuldb.com/?id.234245
2023-07-16T14:29:20.687Z
2023-07-16T23:31:03.759Z
2023-10-23T15:32:01.955Z
{'Vendor': 'SourceCodester', 'Product': 'House Rental and Property Listing', 'Versions': '1.0'}
CVE-2023-3381
A vulnerability classified as problematic was found in SourceCodester Online School Fees System 1.0. Affected by this vulnerability is an unknown functionality of the file /paysystem/datatable.php of the component GET Parameter Handler. The manipulation of the argument doj leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-232237 was assigned to this vulnerability.
https://vuldb.com/?id.232237
2023-06-23T09:16:35.276Z
2023-06-23T09:31:04.940Z
2023-10-23T13:40:31.524Z
{'Vendor': 'SourceCodester', 'Product': 'Online School Fees System', 'Versions': '1.0'}
CVE-2023-3552
Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
https://huntr.dev/bounties/aeb2f43f-0602-4ac6-9685-273e87ff4ded
2023-07-08T08:18:52.463Z
2023-07-08T08:19:04.324Z
2023-07-08T08:19:04.324Z
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3102
A sensitive information leak issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows access to titles of private issue and MR.
https://gitlab.com/gitlab-org/gitlab/-/issues/414269
2023-06-05T12:22:41.456Z
2023-07-21T15:30:47.974Z
2023-07-21T15:30:47.974Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.1'}
CVE-2023-3801
A vulnerability was found in IBOS OA 4.5.5. It has been declared as critical. Affected by this vulnerability is the function actionEdit of the file ?r=officialdoc/officialdoc/edit of the component Mobile Notification Handler. The manipulation leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-235069 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235069
2023-07-20T08:20:59.920Z
2023-07-20T23:31:03.186Z
2023-10-23T18:45:50.703Z
{'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'}
CVE-2023-3944
A vulnerability was found in phpscriptpoint Lawyer 1.6 and classified as problematic. Affected by this issue is some unknown functionality of the file page.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235400. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235400
2023-07-25T14:51:23.264Z
2023-07-25T19:31:03.830Z
2023-10-24T07:48:03.547Z
{'Vendor': 'phpscriptpoint', 'Product': 'Lawyer', 'Versions': '1.6'}
CVE-2023-3417
Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird < 115.0.1 and Thunderbird < 102.13.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1835582
2023-06-26T17:25:53.967Z
2023-07-24T10:09:37.591Z
2023-07-28T13:12:34.115Z
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
CVE-2023-3047
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TMT Lockcell allows SQL Injection.This issue affects Lockcell: before 15.
https://www.usom.gov.tr/bildirim/tr-23-0345
2023-06-02T10:07:20.204Z
2023-06-13T11:41:05.006Z
2023-06-19T12:23:04.527Z
{'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'}
CVE-2023-3728
Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:19.948Z
2023-08-01T22:39:16.671Z
2023-08-01T22:39:16.671Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3378
null
null
2023-06-23T09:01:08.423Z
null
2023-09-15T05:25:46.808Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3682
A vulnerability, which was classified as critical, was found in Nesote Inout Blockchain EasyPayments 1.0. Affected is an unknown function of the file /index.php/payment/getcoinaddress of the component POST Parameter Handler. The manipulation of the argument coinid leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234228. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234228
2023-07-15T16:10:30.703Z
2023-07-15T16:31:03.234Z
2023-10-23T15:18:36.525Z
{'Vendor': 'Nesote', 'Product': 'Inout Blockchain EasyPayments', 'Versions': '1.0'}
CVE-2023-3397
A race condition occurred between the functions lmLogClose and txEnd in JFS, in the Linux Kernel, executed in different threads. This flaw allows a local attacker with normal user privileges to crash the system or leak internal kernel information.
https://access.redhat.com/security/cve/CVE-2023-3397
2023-06-25T19:23:19.126Z
2023-11-01T19:05:39.080Z
2024-01-23T00:52:18.794Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-3817
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
https://www.openssl.org/news/secadv/20230731.txt
2023-07-21T08:47:25.638Z
2023-07-31T15:34:13.627Z
2023-07-31T15:34:13.627Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0, 1.1.1, 1.0.2'}
CVE-2023-3114
Terraform Enterprise since v202207-1 did not properly implement authorization rules for agent pools, allowing the workspace to be targeted by unauthorized agents. This authorization flaw could potentially allow a workspace to access resources from a separate, higher-privileged workspace in the same organization that targeted an agent pool. This vulnerability, CVE-2023-3114, is fixed in Terraform Enterprise v202306-1.
https://discuss.hashicorp.com/t/hcsec-2023-18-terraform-enterprise-agent-pool-controls-allowed-unauthorized-workspaces-to-target-an-agent-pool/55329
2023-06-06T00:43:14.939Z
2023-06-22T21:59:46.778Z
2023-06-22T21:59:46.778Z
{'Vendor': 'HashiCorp', 'Product': 'Terraform Enterprise', 'Versions': 'v202207-1'}
CVE-2023-3544
A vulnerability was found in GZ Scripts Time Slot Booking Calendar PHP 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-233296. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233296
2023-07-07T12:15:10.964Z
2023-07-07T17:00:04.738Z
2023-10-23T14:22:02.419Z
{'Vendor': 'GZ Scripts', 'Product': 'Time Slot Booking Calendar PHP', 'Versions': '1.8'}
CVE-2023-3051
The Page Builder by AZEXO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'azh_post' shortcode in versions up to, and including, 1.27.133 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/24486605-9324-4f19-9ca3-340d006432db?source=cve
2023-06-02T11:18:26.272Z
2023-06-02T23:37:55.112Z
2023-06-02T23:37:55.112Z
{'Vendor': 'azexo', 'Product': 'Page Builder with Image Map by AZEXO', 'Versions': '*'}
CVE-2023-3401
An issue has been discovered in GitLab affecting all versions before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. The main branch of a repository with a specially designed name allows an attacker to create repositories with malicious code.
https://gitlab.com/gitlab-org/gitlab/-/issues/416252
2023-06-26T10:17:32.851Z
2023-08-02T08:30:48.302Z
2023-08-02T08:30:48.302Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.1.0, 16.2.0'}
CVE-2023-3790
A vulnerability has been found in Boom CMS 8.0.7 and classified as problematic. Affected by this vulnerability is the function add of the component assets-manager. The manipulation of the argument title/description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235057 was assigned to this vulnerability.
https://vuldb.com/?id.235057
2023-07-20T07:20:47.244Z
2023-07-20T16:31:03.961Z
2023-10-23T17:47:23.323Z
{'Vendor': 'Boom', 'Product': 'CMS', 'Versions': '8.0.7'}
CVE-2023-3513
Improper Privilege Control in RazerCentralSerivce Named Pipe in Razer RazerCentral <=7.11.0.558 on Windows allows a malicious actor with local access to gain SYSTEM privilege via communicating with the named pipe as a low-privilege user and triggering an insecure .NET deserialization.
https://starlabs.sg/advisories/23/23-3513/
2023-07-05T08:39:02.308Z
2023-07-14T04:49:59.445Z
2023-07-14T04:49:59.445Z
{'Vendor': 'Razer', 'Product': 'Razer Central', 'Versions': '0'}
CVE-2023-3143
A vulnerability classified as problematic has been found in SourceCodester Online Discussion Forum Site 1.0. Affected is an unknown function of the file admin\posts\manage_post.php. The manipulation of the argument content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231012.
https://vuldb.com/?id.231012
2023-06-07T13:55:36.847Z
2023-06-07T14:31:02.866Z
2023-10-23T12:44:22.598Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3840
A vulnerability, which was classified as problematic, was found in NxFilter 4.3.2.5. This affects an unknown part of the file /report,daily.jsp?stime=2023%2F07%2F12&timeOption=yesterday&. The manipulation of the argument user leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-235191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235191
2023-07-22T06:23:10.427Z
2023-07-23T02:31:03.547Z
2023-10-24T06:30:39.953Z
{'Vendor': 'n/a', 'Product': 'NxFilter', 'Versions': '4.3.2.5'}
CVE-2023-3456
Vulnerability of kernel raw address leakage in the hang detector module. Successful exploitation of this vulnerability may affect service confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/7/
2023-06-29T11:13:39.706Z
2023-07-06T12:34:21.446Z
2023-07-06T12:34:21.446Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 3.1.0, 2.1.0, 2.0.0, 2.0.1'}
CVE-2023-3006
A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.
https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel 6.1-rc1'}