CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3211 | The WordPress Database Administrator WordPress plugin through 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection. | https://wpscan.com/vulnerability/873824f0-e8b1-45bd-8579-bc3c649a54e5/ | 2023-06-12T16:39:15.527Z | 2024-01-16T15:54:01.909Z | 2024-01-16T15:54:01.909Z | {'Vendor': 'Unknown', 'Product': 'WordPress Database Administrator', 'Versions': '0'} |
CVE-2023-3641 | A vulnerability has been found in khodakhah NodCMS 3.4.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /en/blog-comment-4 of the component POST Request Handler. The manipulation of the argument comment_name/comment_content leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233887. | https://vuldb.com/?id.233887 | 2023-07-12T16:09:21.070Z | 2023-07-12T16:31:03.571Z | 2023-10-23T15:02:44.696Z | {'Vendor': 'khodakhah', 'Product': 'NodCMS', 'Versions': '3.4.1'} |
CVE-2023-3354 | A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service. | https://access.redhat.com/security/cve/CVE-2023-3354 | 2023-06-21T12:33:29.897Z | 2023-07-11T16:16:56.294Z | 2023-07-11T16:16:56.294Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''} |
CVE-2023-3704 | The vulnerability exists in CP-Plus DVR due to an improper input validation within the web-based management interface of the affected products. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device.
Successful exploitation of this vulnerability could allow the remote attacker to change system time of the targeted device.
| https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0240 | 2023-07-17T09:58:21.102Z | 2023-08-24T06:42:48.928Z | 2023-08-24T06:42:48.928Z | {'Vendor': 'Aditya Infotech Limited ', 'Product': 'CP-UVR-1601E1-HC, CP-UVR-1601E2-H, CP-UVR-1601E1-H, CP-UVR-0801F1-HC, CP-UVR-0801K1-H, CP-UVR-0801K1B-H, CP-UVR-0808K1-H, CP-UVR-0401L1-4KH, CP-UVR-0401L1B-4KH', 'Versions': '0'} |
CVE-2023-3587 | Mattermost fails to properly show information in the UI, allowing a system admin to modify a board state allowing any user with a valid sharing link to join the board with editor access, without the UI showing the updated permissions.
| https://mattermost.com/security-updates | 2023-07-10T14:01:18.080Z | 2023-07-17T15:26:51.996Z | 2023-07-17T15:26:51.996Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3 '} |
CVE-2023-3568 | Open Redirect in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
| https://huntr.dev/bounties/e8d530db-a6a7-4f79-a95d-b77654cc04f8 | 2023-07-10T07:28:33.708Z | 2023-07-10T07:28:46.277Z | 2023-08-02T08:54:29.003Z | {'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'} |
CVE-2023-3092 | The SMTP Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.2.16 due to insufficient input sanitization and output escaping when the 'Save Data SendMail' feature is enabled. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/8ae734d1-0cd4-4ff5-8448-828b0fb64f70?source=cve | 2023-06-04T03:01:26.441Z | 2023-07-12T04:38:47.062Z | 2023-07-12T04:38:47.062Z | {'Vendor': 'photoboxone', 'Product': 'SMTP Mail', 'Versions': '*'} |
CVE-2023-3138 | A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption. | https://access.redhat.com/security/cve/CVE-2023-3138 | 2023-06-07T00:00:00 | 2023-06-28T00:00:00 | 2023-12-08T19:06:17.298140 | {'Vendor': 'n/a', 'Product': 'libX11', 'Versions': 'libX11 1.8.6'} |
CVE-2023-3991 | An OS command injection vulnerability exists in the httpd iperfrun.cgi functionality of FreshTomato 2023.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability. | https://govtech-csg.github.io/security-advisories/2023/10/16/CVE-2023-3991.html | 2023-07-28T03:32:37.859Z | 2023-10-16T09:07:46.666Z | 2023-10-16T09:14:32.286Z | {'Vendor': 'FreshTomato', 'Product': 'FreshTomato', 'Versions': '2023.3'} |
CVE-2023-3616 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mava Software Hotel Management System allows SQL Injection.This issue affects Hotel Management System: before 2.0.
| https://www.usom.gov.tr/bildirim/tr-23-0493 | 2023-07-11T14:12:21.527Z | 2023-09-05T17:59:11.573Z | 2023-09-05T17:59:11.573Z | {'Vendor': 'Mava Software', 'Product': 'Hotel Management System', 'Versions': '0'} |
CVE-2023-3246 | An issue has been discovered in GitLab EE/CE affecting all versions starting before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1 which allows an attackers to block Sidekiq job processor. | https://gitlab.com/gitlab-org/gitlab/-/issues/415371 | 2023-06-14T16:14:43.775Z | 2023-11-06T12:01:43.918Z | 2023-11-06T12:01:43.918Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.3, 16.4.0, 16.5.0'} |
CVE-2023-3753 | A vulnerability classified as problematic has been found in Creativeitem Mastery LMS 1.2. This affects an unknown part of the file /browse. The manipulation of the argument search/featured/recommended/skill leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234423 | 2023-07-18T16:27:55.298Z | 2023-07-19T02:00:06.762Z | 2023-10-23T15:36:54.821Z | {'Vendor': 'Creativeitem', 'Product': 'Mastery LMS', 'Versions': '1.2'} |
CVE-2023-3303 | Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9. | https://huntr.dev/bounties/65d260cc-55a9-4e71-888d-cb2f66c071af | 2023-06-18T00:00:00 | 2023-06-23T00:00:00 | 2023-06-23T00:00:00 | {'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'} |
CVE-2023-3180 | A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ. | https://access.redhat.com/security/cve/CVE-2023-3180 | 2023-06-09T08:30:43.335Z | 2023-08-03T14:31:36.083Z | 2024-01-23T02:29:25.701Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''} |
CVE-2023-3883 | A vulnerability, which was classified as problematic, was found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/add-category.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235245 was assigned to this vulnerability. | https://vuldb.com/?id.235245 | 2023-07-24T16:51:36.543Z | 2023-07-25T05:31:03.535Z | 2023-10-24T07:12:09.120Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3495 | ** UNSUPPORTED WHEN ASSIGNED ** Out-of-bounds Write vulnerability in Hitachi EH-VIEW (KeypadDesigner) allows local attackers to potentially execute arbitray code on affected EH-VIEW installations. User interaction is required to exploit the vulnerabilities in that the user must open a malicious file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
| https://www.hitachi.com/hirt/hitachi-sec/2023/002.html | 2023-07-03T00:25:04.134Z | 2023-08-23T01:32:12.229Z | 2023-08-23T01:32:12.229Z | {'Vendor': 'Hitachi', 'Product': 'EH-VIEW', 'Versions': '0'} |
CVE-2023-3600 | During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2, Firefox ESR < 115.0.2, and Thunderbird < 115.0.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1839703 | 2023-07-10T17:22:55.377Z | 2023-07-12T13:45:04.298Z | 2023-07-24T10:09:18.289Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-3315 | Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and earlier allow attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932 | 2023-06-19T09:49:32.025Z | 2023-06-19T20:10:21.312Z | 2023-10-24T12:50:32.952Z | {'Vendor': 'Jenkins Project', 'Product': 'Jenkins Team Concert Plugin', 'Versions': '0'} |
CVE-2023-3745 | A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service. | https://access.redhat.com/security/cve/CVE-2023-3745 | 2023-07-18T08:04:50.631Z | 2023-07-24T15:19:23.319Z | 2023-07-24T15:19:23.319Z | {'Vendor': 'n/a', 'Product': 'ImageMagick6', 'Versions': '6.9.11-0'} |
CVE-2023-3196 | This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis | 2023-06-12T11:42:38.992Z | 2023-10-03T15:20:05.609Z | 2023-10-03T15:23:23.105Z | {'Vendor': 'Capensis', 'Product': 'Canopsis', 'Versions': '23.04-alpha3'} |
CVE-2023-3529 | A vulnerability classified as problematic has been found in Rotem Dynamics Rotem CRM up to 20230729. This affects an unknown part of the file /LandingPages/api/otp/send?id=[ID][ampersand]method=sms of the component OTP URI Interface. The manipulation leads to information exposure through discrepancy. It is possible to initiate the attack remotely. The identifier VDB-233253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233253 | 2023-07-06T17:34:18.716Z | 2023-07-06T18:31:03.754Z | 2023-10-23T14:08:36.015Z | {'Vendor': 'Rotem Dynamics', 'Product': 'Rotem CRM', 'Versions': '20230729'} |
CVE-2023-3179 | The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account). | https://wpscan.com/vulnerability/542caa40-b199-4397-90bb-4fdb693ebb24 | 2023-06-09T08:24:57.044Z | 2023-07-17T13:29:54.425Z | 2023-07-17T13:29:54.425Z | {'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '2.5.0'} |
CVE-2023-3657 | A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. This issue affects some unknown processing of the file Master.php?f=save_book of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-234011. | https://vuldb.com/?id.234011 | 2023-07-13T09:48:25.898Z | 2023-07-13T10:00:05.373Z | 2023-10-23T15:07:37.592Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-3712 | Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Privilege Escalation.This issue affects PM43 versions prior to P10.19.050004.
Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).
| https://www.honeywell.com/us/en/product-security | 2023-07-17T13:59:27.158Z | 2023-09-12T19:59:00.396Z | 2023-09-12T19:59:00.396Z | {'Vendor': 'Honeywell', 'Product': 'PM23/43', 'Versions': '0'} |
CVE-2023-3342 | The User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to a hardcoded encryption key and missing file type validation on the 'ur_upload_profile_pic' function in versions up to, and including, 3.0.2. This makes it possible for authenticated attackers with subscriber-level capabilities or above to upload arbitrary files on the affected site's server which may make remote code execution possible. This was partially patched in version 3.0.2 and fully patched in version 3.0.2.1. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a979e885-f7dd-4616-a881-64f3d97c309d?source=cve | 2023-06-20T17:21:43.299Z | 2023-07-13T02:04:15.320Z | 2023-07-13T02:04:15.320Z | {'Vendor': 'wpeverest', 'Product': 'User Registration – Custom Registration Form, Login Form And User Profile For WordPress', 'Versions': '*'} |
CVE-2023-3591 | Mattermost fails to invalidate previously generated password reset tokens when a new reset token was created.
| https://mattermost.com/security-updates | 2023-07-10T15:08:38.159Z | 2023-07-17T15:30:05.295Z | 2023-07-17T15:30:05.295Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3 '} |
CVE-2023-3987 | A vulnerability was found in SourceCodester Simple Online Mens Salon Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=user/manage_user&id=3. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235608. | https://vuldb.com/?id.235608 | 2023-07-27T19:49:00.414Z | 2023-07-28T05:31:03.454Z | 2023-10-24T07:56:36.057Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Online Mens Salon Management System', 'Versions': '1.0'} |
CVE-2023-3084 | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a | 2023-06-03T00:00:00 | 2023-06-03T00:00:00 | 2023-06-03T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3159 | A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails. | https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff | 2023-06-08T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to Kernel 5.18-rc6'} |
CVE-2023-3335 | Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator on Linux allows local users to gain sensive information.This issue affects Hitachi Ops Center Administrator: before 10.9.3-00.
| https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-140/index.html | 2023-06-20T07:02:24.702Z | 2023-10-03T01:02:47.466Z | 2023-10-03T01:02:47.466Z | {'Vendor': 'Hitachi', 'Product': 'Hitachi Ops Center Administrator', 'Versions': '0'} |
CVE-2023-3765 | Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | https://huntr.dev/bounties/4be5fd63-8a0a-490d-9ee1-f33dc768ed76 | 2023-07-19T00:53:20.894Z | 2023-07-19T00:53:33.969Z | 2023-07-19T00:53:33.969Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-3270 | Exposure of Sensitive Information to an Unauthorized Actor in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the system. | https://sick.com/psirt | 2023-06-15T11:32:12.485Z | 2023-07-10T09:18:28.375Z | 2023-07-10T09:32:21.556Z | {'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'} |
CVE-2023-3620 | Cross-site Scripting (XSS) - Stored in GitHub repository amauric/tarteaucitron.js prior to v1.13.1. | https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9 | 2023-07-11T14:55:31.595Z | 2023-07-11T14:55:43.561Z | 2023-07-11T14:55:43.561Z | {'Vendor': 'amauric', 'Product': 'amauric/tarteaucitron.js', 'Versions': 'unspecified'} |
CVE-2023-3732 | Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:20.532Z | 2023-08-01T22:39:17.419Z | 2023-08-01T22:39:17.419Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3362 | An information disclosure issue in GitLab CE/EE affecting all versions from 16.0 prior to 16.0.6, and version 16.1.0 allows unauthenticated actors to access the import error information if a project was imported from GitHub. | https://gitlab.com/gitlab-org/gitlab/-/issues/415131 | 2023-06-22T01:14:35.086Z | 2023-07-13T02:08:46.856Z | 2023-07-13T02:08:46.856Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.1'} |
CVE-2023-3698 | Printer service fails to adequately handle user input, allowing an remote unauthorized users to navigate beyond the intended directory structure and delete files. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
| https://www.asustor.com/security/security_advisory_detail?id=28 | 2023-07-17T06:12:27.375Z | 2023-08-17T09:34:53.301Z | 2023-08-17T09:34:53.301Z | {'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'} |
CVE-2023-3677 | The WooCommerce PDF Invoice Builder plugin for WordPress is vulnerable to SQL Injection via the pageId parameter in versions up to, and including, 1.2.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for subscribers or higher to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4336d597-7e87-46eb-8abd-9fafd6cd25d9?source=cve | 2023-07-14T20:13:24.052Z | 2023-08-31T05:33:06.690Z | 2023-08-31T05:33:06.690Z | {'Vendor': 'edgarrojas', 'Product': 'WooCommerce PDF Invoice Builder, Create invoices, packing slips and more', 'Versions': '*'} |
CVE-2023-3227 | Insufficient Granularity of Access Control in GitHub repository fossbilling/fossbilling prior to 0.5.0. | https://huntr.dev/bounties/97ecf4b8-7eeb-4e39-917c-2660262ff9ba | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3548 | An unauthorized user could gain account access to IQ Wifi 6 versions prior to 2.0.2 by conducting a brute force authentication attack.
| https://www.johnsoncontrols.com/cyber-solutions/security-advisories | 2023-07-07T19:02:52.585Z | 2023-07-25T13:01:04.564Z | 2023-07-25T13:01:04.564Z | {'Vendor': 'Johnson Controls', 'Product': 'IQ Wifi 6', 'Versions': '0'} |
CVE-2023-3118 | The Export All URLs WordPress plugin before 4.6 does not sanitise and escape a parameter before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/8a9efc8d-561a-42c6-8e61-ae5c3be581ea | 2023-06-06T08:53:57.091Z | 2023-07-10T12:40:46.857Z | 2023-07-10T13:05:47.247Z | {'Vendor': 'Unknown', 'Product': 'Export All URLs', 'Versions': '0'} |
CVE-2023-3374 | Incomplete List of Disallowed Inputs vulnerability in Unisign Bookreen allows Privilege Escalation.This issue affects Bookreen: before 3.0.0.
| https://www.usom.gov.tr/bildirim/tr-23-0489 | 2023-06-23T06:27:05.715Z | 2023-09-05T16:29:04.728Z | 2023-09-06T07:15:56.842Z | {'Vendor': 'Unisign', 'Product': 'Bookreen', 'Versions': '0'} |
CVE-2023-3724 | If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. wolfSSL recommends that TLS 1.3 client side users update the version of wolfSSL used.
| https://github.com/wolfSSL/wolfssl/pull/6412 | 2023-07-17T21:06:23.613Z | 2023-07-17T21:13:10.623Z | 2023-07-17T21:13:10.623Z | {'Vendor': 'wolfSSL', 'Product': 'wolfSSL', 'Versions': '3.14.0'} |
CVE-2023-3231 | A vulnerability has been found in UJCMS up to 6.0.2 and classified as problematic. This vulnerability affects unknown code of the component ZIP Package Handler. The manipulation of the argument dir leads to information disclosure. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-231502 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.231502 | 2023-06-14T05:15:10.460Z | 2023-06-14T05:31:04.404Z | 2023-10-23T13:08:47.967Z | {'Vendor': 'n/a', 'Product': 'UJCMS', 'Versions': '6.0.0, 6.0.1, 6.0.2'} |
CVE-2023-3661 | A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. This affects an unknown part of the file /classes/Master.php?f=save_inquiry. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234015. | https://vuldb.com/?id.234015 | 2023-07-13T09:54:16.640Z | 2023-07-13T12:00:04.697Z | 2023-10-23T15:12:30.421Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-3909 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.3 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A Regular Expression Denial of Service was possible by adding a large string in timeout input in gitlab-ci.yml file. | https://gitlab.com/gitlab-org/gitlab/-/issues/418763 | 2023-07-25T10:30:28.870Z | 2023-11-06T12:08:45.129Z | 2023-11-06T12:08:45.129Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.3, 16.4, 16.5'} |
CVE-2023-3773 | A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace. | https://access.redhat.com/errata/RHSA-2023:6583 | 2023-07-19T13:55:13.694Z | 2023-07-25T15:47:40.391Z | 2024-01-23T01:06:33.894Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-3323 |
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
| https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 | 2023-06-19T15:47:21.374Z | 2023-07-24T17:17:09.348Z | 2023-07-24T17:17:09.348Z | {'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build '} |
CVE-2023-3636 | The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the 'save_users_map_name' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'usernames' parameter. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6a5e4708-db3e-483c-852f-1a487825cf92?source=cve | 2023-07-12T12:54:44.498Z | 2023-08-31T05:33:09.460Z | 2023-08-31T05:33:09.460Z | {'Vendor': 'wedevs', 'Product': 'WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts', 'Versions': '*'} |
CVE-2023-3266 | A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:36.714Z | 2023-08-14T04:09:45.187Z | 2023-08-14T04:09:45.187Z | {'Vendor': 'CyberPower', 'Product': 'PowerPanel Enterprise', 'Versions': 'v2.6.0'} |
CVE-2023-3071 | Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8. | https://huntr.dev/bounties/3e8d5166-9bc6-46e7-94a8-cad52434a39e | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'} |
CVE-2023-3421 | Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html | 2023-06-26T18:54:52.366Z | 2023-06-26T20:40:12.035Z | 2023-06-26T20:40:12.035Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.198'} |
CVE-2023-3972 | A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide). | https://access.redhat.com/errata/RHSA-2023:6264 | 2023-07-27T12:10:37.684Z | 2023-11-01T15:54:52.093Z | 2024-01-23T00:49:23.089Z | {'Vendor': 'n/a', 'Product': 'insights-client', 'Versions': '3.2.2'} |
CVE-2023-3837 | A vulnerability classified as problematic has been found in DedeBIZ 6.2.10. Affected is an unknown function of the file /admin/sys_sql_query.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235188. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235188 | 2023-07-22T06:08:35.641Z | 2023-07-22T20:31:03.587Z | 2023-10-24T06:27:00.374Z | {'Vendor': 'n/a', 'Product': 'DedeBIZ', 'Versions': '6.2.10'} |
CVE-2023-3134 | The Forminator WordPress plugin before 1.24.4 does not properly escape values that are being reflected inside form fields that use pre-populated query parameters, which could lead to reflected XSS attacks. | https://wpscan.com/vulnerability/6d50d3cc-7563-42c4-977b-f834fee711da | 2023-06-06T21:02:25.697Z | 2023-07-31T09:37:34.911Z | 2023-10-11T08:42:32.652Z | {'Vendor': 'Unknown', 'Product': 'Forminator', 'Versions': '0'} |
CVE-2023-3564 | A vulnerability was found in GZ Scripts GZ Multi Hotel Booking System 1.8. It has been classified as problematic. Affected is an unknown function of the file /index.php. The manipulation of the argument adults/children/cal_id leads to cross site scripting. It is possible to launch the attack remotely. VDB-233358 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.233358 | 2023-07-08T13:24:13.656Z | 2023-07-08T17:00:03.885Z | 2023-10-23T14:43:13.490Z | {'Vendor': 'GZ Scripts', 'Product': 'GZ Multi Hotel Booking System', 'Versions': '1.8'} |
CVE-2023-3708 | Several themes for WordPress by DeoThemes are vulnerable to Reflected Cross-Site Scripting via breadcrumbs in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=cve | 2023-07-17T12:50:14.331Z | 2023-07-18T02:01:06.298Z | 2023-07-18T02:01:06.298Z | {'Vendor': 'deothemes', 'Product': 'Everse', 'Versions': '*'} |
CVE-2023-3358 | A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8 | 2023-06-21T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'kernel 6.1-rc8'} |
CVE-2023-3476 | A vulnerability was found in SimplePHPscripts GuestBook Script 2.2. It has been classified as problematic. This affects an unknown part of the file preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-232755. | https://vuldb.com/?id.232755 | 2023-06-30T06:33:11.138Z | 2023-06-30T07:00:06.339Z | 2023-10-23T13:57:36.242Z | {'Vendor': 'SimplePHPscripts', 'Product': 'GuestBook Script', 'Versions': '2.2'} |
CVE-2023-3026 | Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 21.2.8. | https://huntr.dev/bounties/9bbcc127-1e69-4c88-b318-d2afef48eff0 | 2023-06-01T00:00:00 | 2023-06-01T00:00:00 | 2023-06-01T00:00:00 | {'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'} |
CVE-2023-3533 | Path traversal in file upload functionality in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via arbitrary file write. | https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-124-2023-07-13-Critical-impact-High-risk-Unauthenticated-Arbitrary-File-Write-RCE-CVE-2023-3533 | 2023-07-07T07:41:09.938Z | 2023-11-28T07:06:43.738Z | 2023-11-28T07:06:43.738Z | {'Vendor': 'Chamilo', 'Product': 'Chamilo', 'Versions': '0'} |
CVE-2023-3163 | A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.231090 | 2023-06-08T12:54:06.689Z | 2023-06-08T13:31:02.992Z | 2023-10-23T12:56:34.849Z | {'Vendor': 'y_project', 'Product': 'RuoYi', 'Versions': '4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 4.7.7'} |
CVE-2023-3499 | The Photo Gallery, Images, Slider in Rbs Image Gallery WordPress plugin before 3.2.16 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/ea29413b-494e-410e-ae42-42f96284899c | 2023-07-03T20:44:41.304Z | 2023-09-04T11:27:01.030Z | 2023-09-04T23:14:26.061Z | {'Vendor': 'Unknown', 'Product': 'Photo Gallery, Images, Slider in Rbs Image Gallery', 'Versions': '0'} |
CVE-2023-3860 | A vulnerability was found in phpscriptpoint Insurance 1.2. It has been classified as problematic. Affected is an unknown function of the file /page.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-235212. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235212 | 2023-07-23T13:16:13.613Z | 2023-07-24T02:31:03.193Z | 2023-10-24T06:53:50.959Z | {'Vendor': 'phpscriptpoint', 'Product': 'Insurance', 'Versions': '1.2'} |
CVE-2023-3460 | The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild. | https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7 | 2023-06-29T13:45:40.301Z | 2023-07-04T07:23:28.852Z | 2023-07-04T07:23:28.852Z | {'Vendor': 'Unknown', 'Product': 'Ultimate Member', 'Versions': '0'} |
CVE-2023-3933 | The Your Journey theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c738e051-ad1c-4115-94d3-127dd5dff935?source=cve | 2023-07-25T11:21:39.504Z | 2023-10-20T15:06:22.941Z | 2023-10-20T15:06:22.941Z | {'Vendor': 'wiloke', 'Product': 'Your Journey', 'Versions': '*'} |
CVE-2023-3899 | A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root. | https://access.redhat.com/errata/RHSA-2023:4701 | 2023-07-25T10:15:36.274Z | 2023-08-23T10:49:11.684Z | 2024-01-23T01:14:10.383Z | {'Vendor': 'n/a', 'Product': 'subscription-manager', 'Versions': '1.29.37, 1.28.39'} |
CVE-2023-3876 | A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-235238 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235238 | 2023-07-24T16:44:41.822Z | 2023-07-25T02:00:05.168Z | 2023-10-24T07:03:36.659Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3175 | The AI ChatBot WordPress plugin before 4.6.1 does not adequately escape some settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | https://wpscan.com/vulnerability/7643980b-eaa2-45d1-bd9d-9afae0943f43 | 2023-06-09T01:33:14.465Z | 2023-07-10T12:40:53.443Z | 2023-07-10T13:05:48.368Z | {'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'} |
CVE-2023-3525 | The Getnet Argentina para Woocommerce plugin for WordPress is vulnerable to authorization bypass due to missing validation on the 'webhook' function in versions up to, and including, 0.0.4. This makes it possible for unauthenticated attackers to set their payment status to 'APPROVED' without payment. | https://www.wordfence.com/threat-intel/vulnerabilities/id/245e9117-ca63-458e-a094-60a759f5ec19?source=cve | 2023-07-06T13:31:01.859Z | 2023-07-12T04:38:43.519Z | 2023-07-12T04:38:43.519Z | {'Vendor': 'wanderlustcodes', 'Product': 'Getnet Argentina para Woocommerce', 'Versions': '0.0.1'} |
CVE-2023-3749 | A local user could edit the VideoEdge configuration file and interfere with VideoEdge operation. | https://www.johnsoncontrols.com/cyber-solutions/security-advisories | 2023-07-18T14:49:50.889Z | 2023-08-03T19:40:05.497Z | 2023-08-03T19:40:05.497Z | {'Vendor': 'Sensormatic Electronics, a subsidiary of Johnson Controls, Inc.', 'Product': 'VideoEdge', 'Versions': '0'} |
CVE-2023-3319 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iDisplay PlatPlay DS allows Stored XSS.This issue affects PlatPlay DS: before 3.14.
| https://www.usom.gov.tr/bildirim/tr-23-0402 | 2023-06-19T13:49:40.496Z | 2023-07-13T07:52:43.858Z | 2023-07-26T09:08:03.902Z | {'Vendor': 'iDisplay', 'Product': 'PlatPlay DS', 'Versions': '0'} |
CVE-2023-3964 | An issue has been discovered in GitLab affecting all versions starting from 13.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for users to access composer packages on public projects that have package registry disabled in the project settings. | https://gitlab.com/gitlab-org/gitlab/-/issues/419857 | 2023-07-26T22:30:27.029Z | 2023-12-01T07:02:18.158Z | 2023-12-01T07:02:18.158Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.2, 16.5, 16.6'} |
CVE-2023-3067 | Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium prior to 0.59.4. | https://huntr.dev/bounties/4772ceb7-1594-414d-9b20-5b82029da7b6 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'zadam', 'Product': 'zadam/trilium', 'Versions': 'unspecified'} |
CVE-2023-3572 | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device. | https://cert.vde.com/en/advisories/VDE-2023-018/ | 2023-07-10T07:53:13.476Z | 2023-08-08T06:52:29.820Z | 2023-09-08T08:12:15.705Z | {'Vendor': 'PHOENIX CONTACT', 'Product': 'WP 6070-WVPS', 'Versions': '0'} |
CVE-2023-3088 | The WP Mail Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/86ee1acb-6f0c-40e6-80a0-fc93b61c1602?source=cve | 2023-06-03T17:07:08.612Z | 2023-07-12T04:38:46.572Z | 2023-07-12T04:38:46.572Z | {'Vendor': 'anandau14', 'Product': 'WP Mail Log', 'Versions': '*'} |
CVE-2023-3122 | The GD Mail Queue plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 3.9.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0b668f45-c7fb-481b-bc8e-115e5b7248c9?source=cve | 2023-06-06T12:19:30.196Z | 2023-07-12T04:38:42.099Z | 2023-07-12T04:38:42.099Z | {'Vendor': 'gdragon', 'Product': 'GD Mail Queue', 'Versions': '*'} |
CVE-2023-3821 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.6.4. | https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa | 2023-07-21T14:50:26.881Z | 2023-07-21T14:50:39.925Z | 2023-07-21T14:50:39.925Z | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-3859 | A vulnerability was found in phpscriptpoint Car Listing 1.6 and classified as critical. This issue affects some unknown processing of the file /search.php of the component GET Parameter Handler. The manipulation of the argument brand_id/model_id/car_condition/car_category_id/body_type_id/fuel_type_id/transmission_type_id/year/mileage_start/mileage_end/country/state/city leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235211. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235211 | 2023-07-23T13:13:39.924Z | 2023-07-24T02:00:04.712Z | 2023-10-24T06:52:37.806Z | {'Vendor': 'phpscriptpoint', 'Product': 'Car Listing', 'Versions': '1.6'} |
CVE-2023-3273 |
Improper Access Control in the SICK ICR890-4 could allow an unauthenticated remote attacker to affect the availability of the device by changing settings of the device such as the IP
address based on missing access control.
| https://sick.com/psirt | 2023-06-15T11:32:34.499Z | 2023-07-10T09:31:17.829Z | 2023-07-10T09:39:09.749Z | {'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'} |
CVE-2023-3789 | A vulnerability, which was classified as problematic, was found in PaulPrinting CMS 2018. Affected is an unknown function of the file /account/delivery of the component Search. The manipulation of the argument s leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235056. | https://vuldb.com/?id.235056 | 2023-07-20T07:17:43.349Z | 2023-07-20T16:00:05.408Z | 2023-10-23T17:46:10.136Z | {'Vendor': 'PaulPrinting', 'Product': 'CMS', 'Versions': '2018'} |
CVE-2023-3623 | A vulnerability was found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230704. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Duty/AjaxHandle/UploadHandler.ashx of the component Duty Module. The manipulation of the argument Filedata leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233576. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233576 | 2023-07-11T15:20:02.537Z | 2023-07-11T16:31:03.123Z | 2023-10-23T14:57:51.846Z | {'Vendor': 'Suncreate', 'Product': 'Mountain Flood Disaster Prevention Monitoring and Early Warning System', 'Versions': '20230704'} |
CVE-2023-3336 | TN-5900 Series version 3.3 and prior versions is vulnearble to user enumeration vulnerability. The vulnerability may allow a remote attacker to determine whether a user is valid during password recovery through the web login page and enable a brute force attack with valid users.
| https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230401-tn-5900-series-user-enumeration-vulnerability | 2023-06-20T08:08:16.510Z | 2023-07-05T09:11:54.255Z | 2023-08-08T03:48:54.395Z | {'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'} |
CVE-2023-3766 | A vulnerability was discovered in the odoh-rs rust crate that stems from faulty logic during the parsing of encrypted queries. This issue specifically occurs when processing encrypted query data received from remote clients and enables an attacker with knowledge of this vulnerability to craft and send specially designed encrypted queries to targeted ODOH servers running with odoh-rs. Upon successful exploitation, the server will crash abruptly, disrupting its normal operation and rendering the service temporarily unavailable.
| https://github.com/cloudflare/odoh-rs/security/advisories/GHSA-gpcv-p28p-fv2p | 2023-07-19T09:00:02.933Z | 2023-08-03T13:49:46.751Z | 2023-08-03T13:49:46.751Z | {'Vendor': 'Cloudflare', 'Product': 'odoh-rs', 'Versions': '0'} |
CVE-2023-3048 | Authorization Bypass Through User-Controlled Key vulnerability in TMT Lockcell allows Authentication Abuse, Authentication Bypass.This issue affects Lockcell: before 15.
| https://www.usom.gov.tr/bildirim/tr-23-0345 | 2023-06-02T10:07:21.562Z | 2023-06-13T11:44:32.696Z | 2023-07-26T09:07:29.413Z | {'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'} |
CVE-2023-3418 | The Querlo Chatbot WordPress plugin through 1.2.4 does not escape or sanitize chat messages, leading to a stored Cross-Site Scripting vulnerability. | https://wpscan.com/vulnerability/407edb21-8fcb-484a-babb-fce96a6aede7 | 2023-06-26T18:02:00.370Z | 2023-07-17T13:29:55.323Z | 2023-07-17T13:29:55.323Z | {'Vendor': 'Unknown', 'Product': 'Querlo Chatbot', 'Versions': '0'} |
CVE-2023-3674 | A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted. | https://access.redhat.com/security/cve/CVE-2023-3674 | 2023-07-14T12:39:01.155Z | 2023-07-19T18:25:28.581Z | 2024-01-23T01:04:15.630Z | {'Vendor': 'n/a', 'Product': 'keylime', 'Versions': '7.2.5, 7.3.0'} |
CVE-2023-3224 | Code Injection in GitHub repository nuxt/nuxt prior to 3.5.3. | https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'nuxt', 'Product': 'nuxt/nuxt', 'Versions': 'unspecified'} |
CVE-2023-3731 | Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html | 2023-07-18T00:34:20.338Z | 2023-08-01T22:39:17.259Z | 2023-08-04T19:10:34.051Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.131'} |
CVE-2023-3361 | A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret. | https://access.redhat.com/security/cve/CVE-2023-3361 | 2023-06-22T00:15:11.082Z | 2023-10-04T11:34:57.746Z | 2023-10-04T11:34:57.746Z | {'Vendor': 'n/a', 'Product': 'odh-dashboard', 'Versions': '1.28.1'} |
CVE-2023-3232 | A vulnerability was found in Zhong Bang CRMEB up to 4.6.0 and classified as critical. This issue affects some unknown processing of the file /api/wechat/app_auth of the component Image Upload. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231503. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.231503 | 2023-06-14T05:30:55.768Z | 2023-06-14T06:00:04.383Z | 2023-10-23T13:10:01.148Z | {'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6'} |
CVE-2023-3662 | In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows for execution of binaries from the current working directory in the users context . | https://cert.vde.com/en/advisories/VDE-2023-021/ | 2023-07-13T12:54:10.262Z | 2023-08-03T10:55:43.844Z | 2023-08-03T10:55:43.844Z | {'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.5.17.0'} |
CVE-2023-3398 | Denial of Service in GitHub repository jgraph/drawio prior to 18.1.3. | https://huntr.dev/bounties/aa087215-80e1-433d-b870-650705630e69 | 2023-06-26T10:04:56.783Z | 2023-06-26T10:05:09.278Z | 2023-06-26T10:05:09.278Z | {'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'} |
CVE-2023-3377 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veribilim Software Computer Veribase allows SQL Injection.This issue affects Veribase: through 20231123.
NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
| https://https://www.usom.gov.tr/bildirim/tr-23-0655 | 2023-06-23T07:58:39.597Z | 2023-11-23T08:30:25.283Z | 2023-11-23T08:30:25.283Z | {'Vendor': 'Veribilim Software Computer', 'Product': 'Veribase', 'Versions': '0'} |
CVE-2023-3727 | Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:19.742Z | 2023-08-01T22:39:16.484Z | 2023-08-01T22:39:16.484Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3009 | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3459 | The Export and Import Users and Customers plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'hf_update_customer' function called via an AJAX action in versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with shop manager-level permissions to change user passwords and potentially take over administrator accounts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/47337214-9cc3-4b12-bb71-9acbab3649b7?source=cve | 2023-06-29T13:33:02.598Z | 2023-07-18T02:39:24.563Z | 2023-07-18T02:39:24.563Z | {'Vendor': 'webtoffee', 'Product': 'Export and Import Users and Customers', 'Versions': '*'} |
CVE-2023-3635 | GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.
| https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195/ | 2023-07-12T12:46:57.470Z | 2023-07-12T18:34:31.609Z | 2023-10-03T21:09:06.443Z | {'Vendor': '', 'Product': '', 'Versions': '0.5.0, 1.0.0, 2.0.0, 3.0.0'} |
CVE-2023-3265 | An authentication bypass exists on CyberPower PowerPanel Enterprise by failing to sanitize meta-characters from the username, allowing an attacker to login into the application with the default user "cyberpower" by appending a non-printable character.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator with hardcoded default credentials. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:34.078Z | 2023-08-14T04:08:06.402Z | 2023-08-14T04:08:06.402Z | {'Vendor': 'CyberPower', 'Product': 'PowerPanel Enterprise', 'Versions': 'v2.6.0'} |
CVE-2023-3770 |
Incorrect validation vulnerability of the data entered, allowing an attacker with access to the network on which the affected device is located to use the discovery port protocol (1925/UDP) to obtain device-specific information without the need for authentication.
| https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products | 2023-07-19T11:41:50.175Z | 2023-10-02T13:11:05.513Z | 2023-10-23T10:15:55.286Z | {'Vendor': 'Ingeteam', 'Product': 'INGEPAC DA3451', 'Versions': '0.29.2.42'} |
CVE-2023-3320 | The WP Sticky Social plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing nonce validation in the ~/admin/views/admin.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a272e12b-97a2-421a-a703-3acce2ed8313?source=cve | 2023-06-19T14:32:52.667Z | 2023-06-20T02:52:14.413Z | 2023-06-20T02:52:14.413Z | {'Vendor': 'musilda', 'Product': 'WP Sticky Social', 'Versions': '1.0.1'} |
Subsets and Splits