CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3211
The WordPress Database Administrator WordPress plugin through 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
https://wpscan.com/vulnerability/873824f0-e8b1-45bd-8579-bc3c649a54e5/
2023-06-12T16:39:15.527Z
2024-01-16T15:54:01.909Z
2024-01-16T15:54:01.909Z
{'Vendor': 'Unknown', 'Product': 'WordPress Database Administrator', 'Versions': '0'}
CVE-2023-3641
A vulnerability has been found in khodakhah NodCMS 3.4.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /en/blog-comment-4 of the component POST Request Handler. The manipulation of the argument comment_name/comment_content leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233887.
https://vuldb.com/?id.233887
2023-07-12T16:09:21.070Z
2023-07-12T16:31:03.571Z
2023-10-23T15:02:44.696Z
{'Vendor': 'khodakhah', 'Product': 'NodCMS', 'Versions': '3.4.1'}
CVE-2023-3354
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
https://access.redhat.com/security/cve/CVE-2023-3354
2023-06-21T12:33:29.897Z
2023-07-11T16:16:56.294Z
2023-07-11T16:16:56.294Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-3704
The vulnerability exists in CP-Plus DVR due to an improper input validation within the web-based management interface of the affected products. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable device. Successful exploitation of this vulnerability could allow the remote attacker to change system time of the targeted device.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0240
2023-07-17T09:58:21.102Z
2023-08-24T06:42:48.928Z
2023-08-24T06:42:48.928Z
{'Vendor': 'Aditya Infotech Limited ', 'Product': 'CP-UVR-1601E1-HC, CP-UVR-1601E2-H, CP-UVR-1601E1-H, CP-UVR-0801F1-HC, CP-UVR-0801K1-H, CP-UVR-0801K1B-H, CP-UVR-0808K1-H, CP-UVR-0401L1-4KH, CP-UVR-0401L1B-4KH', 'Versions': '0'}
CVE-2023-3587
Mattermost fails to properly show information in the UI, allowing a system admin to modify a board state allowing any user with a valid sharing link to join the board with editor access, without the UI showing the updated permissions.
https://mattermost.com/security-updates
2023-07-10T14:01:18.080Z
2023-07-17T15:26:51.996Z
2023-07-17T15:26:51.996Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3 '}
CVE-2023-3568
Open Redirect in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
https://huntr.dev/bounties/e8d530db-a6a7-4f79-a95d-b77654cc04f8
2023-07-10T07:28:33.708Z
2023-07-10T07:28:46.277Z
2023-08-02T08:54:29.003Z
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
CVE-2023-3092
The SMTP Mail plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.2.16 due to insufficient input sanitization and output escaping when the 'Save Data SendMail' feature is enabled. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8ae734d1-0cd4-4ff5-8448-828b0fb64f70?source=cve
2023-06-04T03:01:26.441Z
2023-07-12T04:38:47.062Z
2023-07-12T04:38:47.062Z
{'Vendor': 'photoboxone', 'Product': 'SMTP Mail', 'Versions': '*'}
CVE-2023-3138
A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.
https://access.redhat.com/security/cve/CVE-2023-3138
2023-06-07T00:00:00
2023-06-28T00:00:00
2023-12-08T19:06:17.298140
{'Vendor': 'n/a', 'Product': 'libX11', 'Versions': 'libX11 1.8.6'}
CVE-2023-3991
An OS command injection vulnerability exists in the httpd iperfrun.cgi functionality of FreshTomato 2023.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.
https://govtech-csg.github.io/security-advisories/2023/10/16/CVE-2023-3991.html
2023-07-28T03:32:37.859Z
2023-10-16T09:07:46.666Z
2023-10-16T09:14:32.286Z
{'Vendor': 'FreshTomato', 'Product': 'FreshTomato', 'Versions': '2023.3'}
CVE-2023-3616
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mava Software Hotel Management System allows SQL Injection.This issue affects Hotel Management System: before 2.0.
https://www.usom.gov.tr/bildirim/tr-23-0493
2023-07-11T14:12:21.527Z
2023-09-05T17:59:11.573Z
2023-09-05T17:59:11.573Z
{'Vendor': 'Mava Software', 'Product': 'Hotel Management System', 'Versions': '0'}
CVE-2023-3246
An issue has been discovered in GitLab EE/CE affecting all versions starting before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1 which allows an attackers to block Sidekiq job processor.
https://gitlab.com/gitlab-org/gitlab/-/issues/415371
2023-06-14T16:14:43.775Z
2023-11-06T12:01:43.918Z
2023-11-06T12:01:43.918Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.3, 16.4.0, 16.5.0'}
CVE-2023-3753
A vulnerability classified as problematic has been found in Creativeitem Mastery LMS 1.2. This affects an unknown part of the file /browse. The manipulation of the argument search/featured/recommended/skill leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234423
2023-07-18T16:27:55.298Z
2023-07-19T02:00:06.762Z
2023-10-23T15:36:54.821Z
{'Vendor': 'Creativeitem', 'Product': 'Mastery LMS', 'Versions': '1.2'}
CVE-2023-3303
Improper Access Control in GitHub repository admidio/admidio prior to 4.2.9.
https://huntr.dev/bounties/65d260cc-55a9-4e71-888d-cb2f66c071af
2023-06-18T00:00:00
2023-06-23T00:00:00
2023-06-23T00:00:00
{'Vendor': 'admidio', 'Product': 'admidio/admidio', 'Versions': 'unspecified'}
CVE-2023-3180
A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.
https://access.redhat.com/security/cve/CVE-2023-3180
2023-06-09T08:30:43.335Z
2023-08-03T14:31:36.083Z
2024-01-23T02:29:25.701Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-3883
A vulnerability, which was classified as problematic, was found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/add-category.php. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235245 was assigned to this vulnerability.
https://vuldb.com/?id.235245
2023-07-24T16:51:36.543Z
2023-07-25T05:31:03.535Z
2023-10-24T07:12:09.120Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3495
** UNSUPPORTED WHEN ASSIGNED ** Out-of-bounds Write vulnerability in Hitachi EH-VIEW (KeypadDesigner) allows local attackers to potentially execute arbitray code on affected EH-VIEW installations. User interaction is required to exploit the vulnerabilities in that the user must open a malicious file. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://www.hitachi.com/hirt/hitachi-sec/2023/002.html
2023-07-03T00:25:04.134Z
2023-08-23T01:32:12.229Z
2023-08-23T01:32:12.229Z
{'Vendor': 'Hitachi', 'Product': 'EH-VIEW', 'Versions': '0'}
CVE-2023-3600
During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2, Firefox ESR < 115.0.2, and Thunderbird < 115.0.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1839703
2023-07-10T17:22:55.377Z
2023-07-12T13:45:04.298Z
2023-07-24T10:09:18.289Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-3315
Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and earlier allow attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932
2023-06-19T09:49:32.025Z
2023-06-19T20:10:21.312Z
2023-10-24T12:50:32.952Z
{'Vendor': 'Jenkins Project', 'Product': 'Jenkins Team Concert Plugin', 'Versions': '0'}
CVE-2023-3745
A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.
https://access.redhat.com/security/cve/CVE-2023-3745
2023-07-18T08:04:50.631Z
2023-07-24T15:19:23.319Z
2023-07-24T15:19:23.319Z
{'Vendor': 'n/a', 'Product': 'ImageMagick6', 'Versions': '6.9.11-0'}
CVE-2023-3196
This vulnerability could allow an attacker to store a malicious JavaScript payload in the login footer and login page description parameters within the administration panel.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-canopsis-capensis
2023-06-12T11:42:38.992Z
2023-10-03T15:20:05.609Z
2023-10-03T15:23:23.105Z
{'Vendor': 'Capensis', 'Product': 'Canopsis', 'Versions': '23.04-alpha3'}
CVE-2023-3529
A vulnerability classified as problematic has been found in Rotem Dynamics Rotem CRM up to 20230729. This affects an unknown part of the file /LandingPages/api/otp/send?id=[ID][ampersand]method=sms of the component OTP URI Interface. The manipulation leads to information exposure through discrepancy. It is possible to initiate the attack remotely. The identifier VDB-233253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233253
2023-07-06T17:34:18.716Z
2023-07-06T18:31:03.754Z
2023-10-23T14:08:36.015Z
{'Vendor': 'Rotem Dynamics', 'Product': 'Rotem CRM', 'Versions': '20230729'}
CVE-2023-3179
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account).
https://wpscan.com/vulnerability/542caa40-b199-4397-90bb-4fdb693ebb24
2023-06-09T08:24:57.044Z
2023-07-17T13:29:54.425Z
2023-07-17T13:29:54.425Z
{'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '2.5.0'}
CVE-2023-3657
A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. This issue affects some unknown processing of the file Master.php?f=save_book of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-234011.
https://vuldb.com/?id.234011
2023-07-13T09:48:25.898Z
2023-07-13T10:00:05.373Z
2023-10-23T15:07:37.592Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-3712
Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Privilege Escalation.This issue affects PM43 versions prior to P10.19.050004.  Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).
https://www.honeywell.com/us/en/product-security
2023-07-17T13:59:27.158Z
2023-09-12T19:59:00.396Z
2023-09-12T19:59:00.396Z
{'Vendor': 'Honeywell', 'Product': 'PM23/43', 'Versions': '0'}
CVE-2023-3342
The User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to a hardcoded encryption key and missing file type validation on the 'ur_upload_profile_pic' function in versions up to, and including, 3.0.2. This makes it possible for authenticated attackers with subscriber-level capabilities or above to upload arbitrary files on the affected site's server which may make remote code execution possible. This was partially patched in version 3.0.2 and fully patched in version 3.0.2.1.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a979e885-f7dd-4616-a881-64f3d97c309d?source=cve
2023-06-20T17:21:43.299Z
2023-07-13T02:04:15.320Z
2023-07-13T02:04:15.320Z
{'Vendor': 'wpeverest', 'Product': 'User Registration – Custom Registration Form, Login Form And User Profile For WordPress', 'Versions': '*'}
CVE-2023-3591
Mattermost fails to invalidate previously generated password reset tokens when a new reset token was created.
https://mattermost.com/security-updates
2023-07-10T15:08:38.159Z
2023-07-17T15:30:05.295Z
2023-07-17T15:30:05.295Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3 '}
CVE-2023-3987
A vulnerability was found in SourceCodester Simple Online Mens Salon Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=user/manage_user&id=3. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235608.
https://vuldb.com/?id.235608
2023-07-27T19:49:00.414Z
2023-07-28T05:31:03.454Z
2023-10-24T07:56:36.057Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Online Mens Salon Management System', 'Versions': '1.0'}
CVE-2023-3084
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a
2023-06-03T00:00:00
2023-06-03T00:00:00
2023-06-03T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3159
A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.
https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff
2023-06-08T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to Kernel 5.18-rc6'}
CVE-2023-3335
Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Administrator on Linux allows local users  to gain sensive information.This issue affects Hitachi Ops Center Administrator: before 10.9.3-00.
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-140/index.html
2023-06-20T07:02:24.702Z
2023-10-03T01:02:47.466Z
2023-10-03T01:02:47.466Z
{'Vendor': 'Hitachi', 'Product': 'Hitachi Ops Center Administrator', 'Versions': '0'}
CVE-2023-3765
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.
https://huntr.dev/bounties/4be5fd63-8a0a-490d-9ee1-f33dc768ed76
2023-07-19T00:53:20.894Z
2023-07-19T00:53:33.969Z
2023-07-19T00:53:33.969Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-3270
Exposure of Sensitive Information to an Unauthorized Actor in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the system.
https://sick.com/psirt
2023-06-15T11:32:12.485Z
2023-07-10T09:18:28.375Z
2023-07-10T09:32:21.556Z
{'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'}
CVE-2023-3620
Cross-site Scripting (XSS) - Stored in GitHub repository amauric/tarteaucitron.js prior to v1.13.1.
https://huntr.dev/bounties/a0fd0671-f051-4d41-8928-9b19819084c9
2023-07-11T14:55:31.595Z
2023-07-11T14:55:43.561Z
2023-07-11T14:55:43.561Z
{'Vendor': 'amauric', 'Product': 'amauric/tarteaucitron.js', 'Versions': 'unspecified'}
CVE-2023-3732
Out of bounds memory access in Mojo in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:20.532Z
2023-08-01T22:39:17.419Z
2023-08-01T22:39:17.419Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3362
An information disclosure issue in GitLab CE/EE affecting all versions from 16.0 prior to 16.0.6, and version 16.1.0 allows unauthenticated actors to access the import error information if a project was imported from GitHub.
https://gitlab.com/gitlab-org/gitlab/-/issues/415131
2023-06-22T01:14:35.086Z
2023-07-13T02:08:46.856Z
2023-07-13T02:08:46.856Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.1'}
CVE-2023-3698
Printer service fails to adequately handle user input, allowing an remote unauthorized users to navigate beyond the intended directory structure and delete files. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
https://www.asustor.com/security/security_advisory_detail?id=28
2023-07-17T06:12:27.375Z
2023-08-17T09:34:53.301Z
2023-08-17T09:34:53.301Z
{'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'}
CVE-2023-3677
The WooCommerce PDF Invoice Builder plugin for WordPress is vulnerable to SQL Injection via the pageId parameter in versions up to, and including, 1.2.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for subscribers or higher to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4336d597-7e87-46eb-8abd-9fafd6cd25d9?source=cve
2023-07-14T20:13:24.052Z
2023-08-31T05:33:06.690Z
2023-08-31T05:33:06.690Z
{'Vendor': 'edgarrojas', 'Product': 'WooCommerce PDF Invoice Builder, Create invoices, packing slips and more', 'Versions': '*'}
CVE-2023-3227
Insufficient Granularity of Access Control in GitHub repository fossbilling/fossbilling prior to 0.5.0.
https://huntr.dev/bounties/97ecf4b8-7eeb-4e39-917c-2660262ff9ba
2023-06-14T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3548
An unauthorized user could gain account access to IQ Wifi 6 versions prior to 2.0.2 by conducting a brute force authentication attack.
https://www.johnsoncontrols.com/cyber-solutions/security-advisories
2023-07-07T19:02:52.585Z
2023-07-25T13:01:04.564Z
2023-07-25T13:01:04.564Z
{'Vendor': 'Johnson Controls', 'Product': 'IQ Wifi 6', 'Versions': '0'}
CVE-2023-3118
The Export All URLs WordPress plugin before 4.6 does not sanitise and escape a parameter before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/8a9efc8d-561a-42c6-8e61-ae5c3be581ea
2023-06-06T08:53:57.091Z
2023-07-10T12:40:46.857Z
2023-07-10T13:05:47.247Z
{'Vendor': 'Unknown', 'Product': 'Export All URLs', 'Versions': '0'}
CVE-2023-3374
Incomplete List of Disallowed Inputs vulnerability in Unisign Bookreen allows Privilege Escalation.This issue affects Bookreen: before 3.0.0.
https://www.usom.gov.tr/bildirim/tr-23-0489
2023-06-23T06:27:05.715Z
2023-09-05T16:29:04.728Z
2023-09-06T07:15:56.842Z
{'Vendor': 'Unisign', 'Product': 'Bookreen', 'Versions': '0'}
CVE-2023-3724
If a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. wolfSSL recommends that TLS 1.3 client side users update the version of wolfSSL used. 
https://github.com/wolfSSL/wolfssl/pull/6412
2023-07-17T21:06:23.613Z
2023-07-17T21:13:10.623Z
2023-07-17T21:13:10.623Z
{'Vendor': 'wolfSSL', 'Product': 'wolfSSL', 'Versions': '3.14.0'}
CVE-2023-3231
A vulnerability has been found in UJCMS up to 6.0.2 and classified as problematic. This vulnerability affects unknown code of the component ZIP Package Handler. The manipulation of the argument dir leads to information disclosure. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-231502 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.231502
2023-06-14T05:15:10.460Z
2023-06-14T05:31:04.404Z
2023-10-23T13:08:47.967Z
{'Vendor': 'n/a', 'Product': 'UJCMS', 'Versions': '6.0.0, 6.0.1, 6.0.2'}
CVE-2023-3661
A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. This affects an unknown part of the file /classes/Master.php?f=save_inquiry. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234015.
https://vuldb.com/?id.234015
2023-07-13T09:54:16.640Z
2023-07-13T12:00:04.697Z
2023-10-23T15:12:30.421Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-3909
An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.3 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A Regular Expression Denial of Service was possible by adding a large string in timeout input in gitlab-ci.yml file.
https://gitlab.com/gitlab-org/gitlab/-/issues/418763
2023-07-25T10:30:28.870Z
2023-11-06T12:08:45.129Z
2023-11-06T12:08:45.129Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.3, 16.4, 16.5'}
CVE-2023-3773
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.
https://access.redhat.com/errata/RHSA-2023:6583
2023-07-19T13:55:13.694Z
2023-07-25T15:47:40.391Z
2024-01-23T01:06:33.894Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-3323
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590
2023-06-19T15:47:21.374Z
2023-07-24T17:17:09.348Z
2023-07-24T17:17:09.348Z
{'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build '}
CVE-2023-3636
The WP Project Manager plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.6.4 due to insufficient restriction on the 'save_users_map_name' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'usernames' parameter.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6a5e4708-db3e-483c-852f-1a487825cf92?source=cve
2023-07-12T12:54:44.498Z
2023-08-31T05:33:09.460Z
2023-08-31T05:33:09.460Z
{'Vendor': 'wedevs', 'Product': 'WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts', 'Versions': '*'}
CVE-2023-3266
A non-feature complete authentication mechanism exists in the production application allowing an attacker to bypass all authentication checks if LDAP authentication is selected.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator by selecting LDAP authentication from a hidden HTML combo box. Successful exploitation of this vulnerability also requires the attacker to know at least one username on the device, but any password will authenticate successfully.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:36.714Z
2023-08-14T04:09:45.187Z
2023-08-14T04:09:45.187Z
{'Vendor': 'CyberPower', 'Product': 'PowerPanel Enterprise', 'Versions': 'v2.6.0'}
CVE-2023-3071
Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8.
https://huntr.dev/bounties/3e8d5166-9bc6-46e7-94a8-cad52434a39e
2023-06-02T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'}
CVE-2023-3421
Use after free in Media in Google Chrome prior to 114.0.5735.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
2023-06-26T18:54:52.366Z
2023-06-26T20:40:12.035Z
2023-06-26T20:40:12.035Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.198'}
CVE-2023-3972
A vulnerability was found in insights-client. This security issue occurs because of insecure file operations or unsafe handling of temporary files and directories that lead to local privilege escalation. Before the insights-client has been registered on the system by root, an unprivileged local user or attacker could create the /var/tmp/insights-client directory (owning the directory with read, write, and execute permissions) on the system. After the insights-client is registered by root, an attacker could then control the directory content that insights are using by putting malicious scripts into it and executing arbitrary code as root (trivially bypassing SELinux protections because insights processes are allowed to disable SELinux system-wide).
https://access.redhat.com/errata/RHSA-2023:6264
2023-07-27T12:10:37.684Z
2023-11-01T15:54:52.093Z
2024-01-23T00:49:23.089Z
{'Vendor': 'n/a', 'Product': 'insights-client', 'Versions': '3.2.2'}
CVE-2023-3837
A vulnerability classified as problematic has been found in DedeBIZ 6.2.10. Affected is an unknown function of the file /admin/sys_sql_query.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235188. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235188
2023-07-22T06:08:35.641Z
2023-07-22T20:31:03.587Z
2023-10-24T06:27:00.374Z
{'Vendor': 'n/a', 'Product': 'DedeBIZ', 'Versions': '6.2.10'}
CVE-2023-3134
The Forminator WordPress plugin before 1.24.4 does not properly escape values that are being reflected inside form fields that use pre-populated query parameters, which could lead to reflected XSS attacks.
https://wpscan.com/vulnerability/6d50d3cc-7563-42c4-977b-f834fee711da
2023-06-06T21:02:25.697Z
2023-07-31T09:37:34.911Z
2023-10-11T08:42:32.652Z
{'Vendor': 'Unknown', 'Product': 'Forminator', 'Versions': '0'}
CVE-2023-3564
A vulnerability was found in GZ Scripts GZ Multi Hotel Booking System 1.8. It has been classified as problematic. Affected is an unknown function of the file /index.php. The manipulation of the argument adults/children/cal_id leads to cross site scripting. It is possible to launch the attack remotely. VDB-233358 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.233358
2023-07-08T13:24:13.656Z
2023-07-08T17:00:03.885Z
2023-10-23T14:43:13.490Z
{'Vendor': 'GZ Scripts', 'Product': 'GZ Multi Hotel Booking System', 'Versions': '1.8'}
CVE-2023-3708
Several themes for WordPress by DeoThemes are vulnerable to Reflected Cross-Site Scripting via breadcrumbs in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1b8b0f14-f31a-45cd-bb98-0b717059aa80?source=cve
2023-07-17T12:50:14.331Z
2023-07-18T02:01:06.298Z
2023-07-18T02:01:06.298Z
{'Vendor': 'deothemes', 'Product': 'Everse', 'Versions': '*'}
CVE-2023-3358
A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8
2023-06-21T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'kernel 6.1-rc8'}
CVE-2023-3476
A vulnerability was found in SimplePHPscripts GuestBook Script 2.2. It has been classified as problematic. This affects an unknown part of the file preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-232755.
https://vuldb.com/?id.232755
2023-06-30T06:33:11.138Z
2023-06-30T07:00:06.339Z
2023-10-23T13:57:36.242Z
{'Vendor': 'SimplePHPscripts', 'Product': 'GuestBook Script', 'Versions': '2.2'}
CVE-2023-3026
Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 21.2.8.
https://huntr.dev/bounties/9bbcc127-1e69-4c88-b318-d2afef48eff0
2023-06-01T00:00:00
2023-06-01T00:00:00
2023-06-01T00:00:00
{'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'}
CVE-2023-3533
Path traversal in file upload functionality in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via arbitrary file write.
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-124-2023-07-13-Critical-impact-High-risk-Unauthenticated-Arbitrary-File-Write-RCE-CVE-2023-3533
2023-07-07T07:41:09.938Z
2023-11-28T07:06:43.738Z
2023-11-28T07:06:43.738Z
{'Vendor': 'Chamilo', 'Product': 'Chamilo', 'Versions': '0'}
CVE-2023-3163
A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.231090
2023-06-08T12:54:06.689Z
2023-06-08T13:31:02.992Z
2023-10-23T12:56:34.849Z
{'Vendor': 'y_project', 'Product': 'RuoYi', 'Versions': '4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 4.7.7'}
CVE-2023-3499
The Photo Gallery, Images, Slider in Rbs Image Gallery WordPress plugin before 3.2.16 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/ea29413b-494e-410e-ae42-42f96284899c
2023-07-03T20:44:41.304Z
2023-09-04T11:27:01.030Z
2023-09-04T23:14:26.061Z
{'Vendor': 'Unknown', 'Product': 'Photo Gallery, Images, Slider in Rbs Image Gallery', 'Versions': '0'}
CVE-2023-3860
A vulnerability was found in phpscriptpoint Insurance 1.2. It has been classified as problematic. Affected is an unknown function of the file /page.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-235212. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235212
2023-07-23T13:16:13.613Z
2023-07-24T02:31:03.193Z
2023-10-24T06:53:50.959Z
{'Vendor': 'phpscriptpoint', 'Product': 'Insurance', 'Versions': '1.2'}
CVE-2023-3460
The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
https://wpscan.com/vulnerability/694235c7-4469-4ffd-a722-9225b19e98d7
2023-06-29T13:45:40.301Z
2023-07-04T07:23:28.852Z
2023-07-04T07:23:28.852Z
{'Vendor': 'Unknown', 'Product': 'Ultimate Member', 'Versions': '0'}
CVE-2023-3933
The Your Journey theme for WordPress is vulnerable to Reflected Cross-Site Scripting via prototype pollution in versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c738e051-ad1c-4115-94d3-127dd5dff935?source=cve
2023-07-25T11:21:39.504Z
2023-10-20T15:06:22.941Z
2023-10-20T15:06:22.941Z
{'Vendor': 'wiloke', 'Product': 'Your Journey', 'Versions': '*'}
CVE-2023-3899
A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.
https://access.redhat.com/errata/RHSA-2023:4701
2023-07-25T10:15:36.274Z
2023-08-23T10:49:11.684Z
2024-01-23T01:14:10.383Z
{'Vendor': 'n/a', 'Product': 'subscription-manager', 'Versions': '1.29.37, 1.28.39'}
CVE-2023-3876
A vulnerability was found in Campcodes Beauty Salon Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-235238 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235238
2023-07-24T16:44:41.822Z
2023-07-25T02:00:05.168Z
2023-10-24T07:03:36.659Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3175
The AI ChatBot WordPress plugin before 4.6.1 does not adequately escape some settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
https://wpscan.com/vulnerability/7643980b-eaa2-45d1-bd9d-9afae0943f43
2023-06-09T01:33:14.465Z
2023-07-10T12:40:53.443Z
2023-07-10T13:05:48.368Z
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
CVE-2023-3525
The Getnet Argentina para Woocommerce plugin for WordPress is vulnerable to authorization bypass due to missing validation on the 'webhook' function in versions up to, and including, 0.0.4. This makes it possible for unauthenticated attackers to set their payment status to 'APPROVED' without payment.
https://www.wordfence.com/threat-intel/vulnerabilities/id/245e9117-ca63-458e-a094-60a759f5ec19?source=cve
2023-07-06T13:31:01.859Z
2023-07-12T04:38:43.519Z
2023-07-12T04:38:43.519Z
{'Vendor': 'wanderlustcodes', 'Product': 'Getnet Argentina para Woocommerce', 'Versions': '0.0.1'}
CVE-2023-3749
A local user could edit the VideoEdge configuration file and interfere with VideoEdge operation.
https://www.johnsoncontrols.com/cyber-solutions/security-advisories
2023-07-18T14:49:50.889Z
2023-08-03T19:40:05.497Z
2023-08-03T19:40:05.497Z
{'Vendor': 'Sensormatic Electronics, a subsidiary of Johnson Controls, Inc.', 'Product': 'VideoEdge', 'Versions': '0'}
CVE-2023-3319
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in iDisplay PlatPlay DS allows Stored XSS.This issue affects PlatPlay DS: before 3.14.
https://www.usom.gov.tr/bildirim/tr-23-0402
2023-06-19T13:49:40.496Z
2023-07-13T07:52:43.858Z
2023-07-26T09:08:03.902Z
{'Vendor': 'iDisplay', 'Product': 'PlatPlay DS', 'Versions': '0'}
CVE-2023-3964
An issue has been discovered in GitLab affecting all versions starting from 13.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for users to access composer packages on public projects that have package registry disabled in the project settings.
https://gitlab.com/gitlab-org/gitlab/-/issues/419857
2023-07-26T22:30:27.029Z
2023-12-01T07:02:18.158Z
2023-12-01T07:02:18.158Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.2, 16.5, 16.6'}
CVE-2023-3067
Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium prior to 0.59.4.
https://huntr.dev/bounties/4772ceb7-1594-414d-9b20-5b82029da7b6
2023-06-02T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'zadam', 'Product': 'zadam/trilium', 'Versions': 'unspecified'}
CVE-2023-3572
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device.
https://cert.vde.com/en/advisories/VDE-2023-018/
2023-07-10T07:53:13.476Z
2023-08-08T06:52:29.820Z
2023-09-08T08:12:15.705Z
{'Vendor': 'PHOENIX CONTACT', 'Product': 'WP 6070-WVPS', 'Versions': '0'}
CVE-2023-3088
The WP Mail Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/86ee1acb-6f0c-40e6-80a0-fc93b61c1602?source=cve
2023-06-03T17:07:08.612Z
2023-07-12T04:38:46.572Z
2023-07-12T04:38:46.572Z
{'Vendor': 'anandau14', 'Product': 'WP Mail Log', 'Versions': '*'}
CVE-2023-3122
The GD Mail Queue plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 3.9.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0b668f45-c7fb-481b-bc8e-115e5b7248c9?source=cve
2023-06-06T12:19:30.196Z
2023-07-12T04:38:42.099Z
2023-07-12T04:38:42.099Z
{'Vendor': 'gdragon', 'Product': 'GD Mail Queue', 'Versions': '*'}
CVE-2023-3821
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.6.4.
https://huntr.dev/bounties/599ba4f6-c900-4161-9127-f1e6a6e29aaa
2023-07-21T14:50:26.881Z
2023-07-21T14:50:39.925Z
2023-07-21T14:50:39.925Z
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-3859
A vulnerability was found in phpscriptpoint Car Listing 1.6 and classified as critical. This issue affects some unknown processing of the file /search.php of the component GET Parameter Handler. The manipulation of the argument brand_id/model_id/car_condition/car_category_id/body_type_id/fuel_type_id/transmission_type_id/year/mileage_start/mileage_end/country/state/city leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235211. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235211
2023-07-23T13:13:39.924Z
2023-07-24T02:00:04.712Z
2023-10-24T06:52:37.806Z
{'Vendor': 'phpscriptpoint', 'Product': 'Car Listing', 'Versions': '1.6'}
CVE-2023-3273
Improper Access Control in the SICK ICR890-4 could allow an unauthenticated remote attacker to affect the availability of the device by changing settings of the device such as the IP address based on missing access control.
https://sick.com/psirt
2023-06-15T11:32:34.499Z
2023-07-10T09:31:17.829Z
2023-07-10T09:39:09.749Z
{'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'}
CVE-2023-3789
A vulnerability, which was classified as problematic, was found in PaulPrinting CMS 2018. Affected is an unknown function of the file /account/delivery of the component Search. The manipulation of the argument s leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235056.
https://vuldb.com/?id.235056
2023-07-20T07:17:43.349Z
2023-07-20T16:00:05.408Z
2023-10-23T17:46:10.136Z
{'Vendor': 'PaulPrinting', 'Product': 'CMS', 'Versions': '2018'}
CVE-2023-3623
A vulnerability was found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230704. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Duty/AjaxHandle/UploadHandler.ashx of the component Duty Module. The manipulation of the argument Filedata leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233576. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233576
2023-07-11T15:20:02.537Z
2023-07-11T16:31:03.123Z
2023-10-23T14:57:51.846Z
{'Vendor': 'Suncreate', 'Product': 'Mountain Flood Disaster Prevention Monitoring and Early Warning System', 'Versions': '20230704'}
CVE-2023-3336
TN-5900 Series version 3.3 and prior versions is vulnearble to user enumeration vulnerability. The vulnerability may allow a remote attacker to determine whether a user is valid during password recovery through the web login page and enable a brute force attack with valid users.
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230401-tn-5900-series-user-enumeration-vulnerability
2023-06-20T08:08:16.510Z
2023-07-05T09:11:54.255Z
2023-08-08T03:48:54.395Z
{'Vendor': 'Moxa', 'Product': 'TN-5900 Series', 'Versions': '1.0'}
CVE-2023-3766
A vulnerability was discovered in the odoh-rs rust crate that stems from faulty logic during the parsing of encrypted queries. This issue specifically occurs when processing encrypted query data received from remote clients and enables an attacker with knowledge of this vulnerability to craft and send specially designed encrypted queries to targeted ODOH servers running with odoh-rs. Upon successful exploitation, the server will crash abruptly, disrupting its normal operation and rendering the service temporarily unavailable.
https://github.com/cloudflare/odoh-rs/security/advisories/GHSA-gpcv-p28p-fv2p
2023-07-19T09:00:02.933Z
2023-08-03T13:49:46.751Z
2023-08-03T13:49:46.751Z
{'Vendor': 'Cloudflare', 'Product': 'odoh-rs', 'Versions': '0'}
CVE-2023-3048
Authorization Bypass Through User-Controlled Key vulnerability in TMT Lockcell allows Authentication Abuse, Authentication Bypass.This issue affects Lockcell: before 15.
https://www.usom.gov.tr/bildirim/tr-23-0345
2023-06-02T10:07:21.562Z
2023-06-13T11:44:32.696Z
2023-07-26T09:07:29.413Z
{'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'}
CVE-2023-3418
The Querlo Chatbot WordPress plugin through 1.2.4 does not escape or sanitize chat messages, leading to a stored Cross-Site Scripting vulnerability.
https://wpscan.com/vulnerability/407edb21-8fcb-484a-babb-fce96a6aede7
2023-06-26T18:02:00.370Z
2023-07-17T13:29:55.323Z
2023-07-17T13:29:55.323Z
{'Vendor': 'Unknown', 'Product': 'Querlo Chatbot', 'Versions': '0'}
CVE-2023-3674
A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.
https://access.redhat.com/security/cve/CVE-2023-3674
2023-07-14T12:39:01.155Z
2023-07-19T18:25:28.581Z
2024-01-23T01:04:15.630Z
{'Vendor': 'n/a', 'Product': 'keylime', 'Versions': '7.2.5, 7.3.0'}
CVE-2023-3224
Code Injection in GitHub repository nuxt/nuxt prior to 3.5.3.
https://huntr.dev/bounties/1eb74fd8-0258-4c1f-a904-83b52e373a87
2023-06-13T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'nuxt', 'Product': 'nuxt/nuxt', 'Versions': 'unspecified'}
CVE-2023-3731
Use after free in Diagnostics in Google Chrome on ChromeOS prior to 115.0.5790.131 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html
2023-07-18T00:34:20.338Z
2023-08-01T22:39:17.259Z
2023-08-04T19:10:34.051Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.131'}
CVE-2023-3361
A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.
https://access.redhat.com/security/cve/CVE-2023-3361
2023-06-22T00:15:11.082Z
2023-10-04T11:34:57.746Z
2023-10-04T11:34:57.746Z
{'Vendor': 'n/a', 'Product': 'odh-dashboard', 'Versions': '1.28.1'}
CVE-2023-3232
A vulnerability was found in Zhong Bang CRMEB up to 4.6.0 and classified as critical. This issue affects some unknown processing of the file /api/wechat/app_auth of the component Image Upload. The manipulation leads to deserialization. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231503. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.231503
2023-06-14T05:30:55.768Z
2023-06-14T06:00:04.383Z
2023-10-23T13:10:01.148Z
{'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6'}
CVE-2023-3662
In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows for execution of binaries from the current working directory in the users context .
https://cert.vde.com/en/advisories/VDE-2023-021/
2023-07-13T12:54:10.262Z
2023-08-03T10:55:43.844Z
2023-08-03T10:55:43.844Z
{'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.5.17.0'}
CVE-2023-3398
Denial of Service in GitHub repository jgraph/drawio prior to 18.1.3.
https://huntr.dev/bounties/aa087215-80e1-433d-b870-650705630e69
2023-06-26T10:04:56.783Z
2023-06-26T10:05:09.278Z
2023-06-26T10:05:09.278Z
{'Vendor': 'jgraph', 'Product': 'jgraph/drawio', 'Versions': 'unspecified'}
CVE-2023-3377
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veribilim Software Computer Veribase allows SQL Injection.This issue affects Veribase: through 20231123.  NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://https://www.usom.gov.tr/bildirim/tr-23-0655
2023-06-23T07:58:39.597Z
2023-11-23T08:30:25.283Z
2023-11-23T08:30:25.283Z
{'Vendor': 'Veribilim Software Computer', 'Product': 'Veribase', 'Versions': '0'}
CVE-2023-3727
Use after free in WebRTC in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:19.742Z
2023-08-01T22:39:16.484Z
2023-08-01T22:39:16.484Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3009
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3459
The Export and Import Users and Customers plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'hf_update_customer' function called via an AJAX action in versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with shop manager-level permissions to change user passwords and potentially take over administrator accounts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/47337214-9cc3-4b12-bb71-9acbab3649b7?source=cve
2023-06-29T13:33:02.598Z
2023-07-18T02:39:24.563Z
2023-07-18T02:39:24.563Z
{'Vendor': 'webtoffee', 'Product': 'Export and Import Users and Customers', 'Versions': '*'}
CVE-2023-3635
GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This may lead to denial of service of the Okio client when handling a crafted GZIP archive, by using the GzipSource class.
https://research.jfrog.com/vulnerabilities/okio-gzip-source-unhandled-exception-dos-xray-523195/
2023-07-12T12:46:57.470Z
2023-07-12T18:34:31.609Z
2023-10-03T21:09:06.443Z
{'Vendor': '', 'Product': '', 'Versions': '0.5.0, 1.0.0, 2.0.0, 3.0.0'}
CVE-2023-3265
An authentication bypass exists on CyberPower PowerPanel Enterprise by failing to sanitize meta-characters from the username, allowing an attacker to login into the application with the default user "cyberpower" by appending a non-printable character.An unauthenticated attacker can leverage this vulnerability to log in to the CypberPower PowerPanel Enterprise as an administrator with hardcoded default credentials.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:34.078Z
2023-08-14T04:08:06.402Z
2023-08-14T04:08:06.402Z
{'Vendor': 'CyberPower', 'Product': 'PowerPanel Enterprise', 'Versions': 'v2.6.0'}
CVE-2023-3770
 Incorrect validation vulnerability of the data entered, allowing an attacker with access to the network on which the affected device is located to use the discovery port protocol (1925/UDP) to obtain device-specific information without the need for authentication.
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-ingeteam-products
2023-07-19T11:41:50.175Z
2023-10-02T13:11:05.513Z
2023-10-23T10:15:55.286Z
{'Vendor': 'Ingeteam', 'Product': 'INGEPAC DA3451', 'Versions': '0.29.2.42'}
CVE-2023-3320
The WP Sticky Social plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing nonce validation in the ~/admin/views/admin.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a272e12b-97a2-421a-a703-3acce2ed8313?source=cve
2023-06-19T14:32:52.667Z
2023-06-20T02:52:14.413Z
2023-06-20T02:52:14.413Z
{'Vendor': 'musilda', 'Product': 'WP Sticky Social', 'Versions': '1.0.1'}