CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3747 | Zero Trust Administrators have the ability to disallow end users from disabling WARP on their devices. Override codes can also be created by the Administrators to allow a device to temporarily be disconnected from WARP, however, due to lack of server side validation, an attacker with local access to the device, could extend the maximum allowed disconnected time of WARP client granted by an override code by changing the date & time on the local device where WARP is running.
| https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone | 2023-07-18T08:43:28.555Z | 2023-09-07T12:11:01.435Z | 2023-09-07T12:11:01.435Z | {'Vendor': 'Cloudflare', 'Product': 'WARP Client', 'Versions': '0'} |
CVE-2023-3252 |
An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges could alter logging variables to overwrite arbitrary files on the remote host with log data, which could lead to a denial of service condition.
| https://www.tenable.com/security/tns-2023-29 | 2023-06-14T20:01:52.895Z | 2023-08-29T18:55:09.869Z | 2023-08-29T18:55:09.869Z | {'Vendor': ' Tenable', 'Product': 'Nessus', 'Versions': '0'} |
CVE-2023-3497 | Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html | 2023-07-03T13:26:37.767Z | 2023-07-03T16:54:10.292Z | 2023-07-29T00:14:14.612Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-3881 | A vulnerability classified as critical was found in Campcodes Beauty Salon Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php. The manipulation of the argument contactno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235243. | https://vuldb.com/?id.235243 | 2023-07-24T16:49:31.006Z | 2023-07-25T04:31:04.023Z | 2023-10-24T07:09:42.765Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3028 | Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too.
Multiple vulnerabilities were identified:
- The MQTT backend does not require authentication, allowing unauthorized connections from an attacker.
- The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend.
- The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle's location.
- The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend.
The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.
| https://asrg.io/security-advisories/cve-2023-3028/ | 2023-06-01T05:09:18.844Z | 2023-06-01T05:34:48.206Z | 2023-09-28T05:47:34.600Z | {'Vendor': 'Hangzhou Hopechart IoT Technology Co., Ltd.', 'Product': 'HQT401', 'Versions': '201808021036'} |
CVE-2023-3478 | A vulnerability classified as critical was found in IBOS OA 4.5.5. Affected by this vulnerability is the function actionEdit of the file ?r=dashboard/roleadmin/edit&op=member of the component Add User Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232759. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.232759 | 2023-06-30T08:17:16.713Z | 2023-06-30T12:00:03.793Z | 2023-10-23T14:00:03.869Z | {'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'} |
CVE-2023-3182 | The Membership WordPress plugin before 3.2.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/655a68ee-9447-41ca-899e-986a419fb7ed | 2023-06-09T12:33:47.210Z | 2023-07-17T13:29:56.981Z | 2023-07-17T13:29:56.981Z | {'Vendor': 'Unknown', 'Product': 'Membership Plugin', 'Versions': '0'} |
CVE-2023-3751 | A vulnerability was found in Super Store Finder 3.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php of the component POST Parameter Handler. The manipulation of the argument products leads to sql injection. The attack can be launched remotely. The identifier VDB-234421 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234421 | 2023-07-18T16:23:26.320Z | 2023-07-19T00:00:04.459Z | 2023-10-23T15:34:28.307Z | {'Vendor': 'n/a', 'Product': 'Super Store Finder', 'Versions': '3.6'} |
CVE-2023-3301 | A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service. | https://access.redhat.com/security/cve/CVE-2023-3301 | 2023-06-17T16:48:21.977Z | 2023-09-13T16:09:36.861Z | 2023-09-13T16:09:36.861Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': '8.1.0-rc0'} |
CVE-2023-3614 | Mattermost fails to properly validate a gif image file, allowing an attacker to consume a significant amount of server resources, making the server unresponsive for an extended period of time by linking to specially crafted image file.
| https://mattermost.com/security-updates | 2023-07-11T09:04:11.707Z | 2023-07-17T15:32:16.646Z | 2023-07-17T15:32:16.646Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3'} |
CVE-2023-3244 | The Comments Like Dislike plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the restore_settings function called via an AJAX action in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to reset the plugin's settings. NOTE: After attempting to contact the developer with no response, and reporting this to the WordPress plugin's team 30 days ago we are disclosing this issue as it still is not updated. | https://www.wordfence.com/threat-intel/vulnerabilities/id/66019297-a8a8-4bbc-99db-4b47066f3e50?source=cve | 2023-06-14T14:35:53.135Z | 2023-08-17T06:43:42.770Z | 2023-08-17T06:43:42.770Z | {'Vendor': 'happy-coders', 'Product': 'Comments Like Dislike', 'Versions': '*'} |
CVE-2023-3993 | An issue has been discovered in GitLab EE affecting all versions starting from 14.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Access tokens may have been logged when a query was made to a specific endpoint. | https://gitlab.com/gitlab-org/gitlab/-/issues/409570 | 2023-07-28T09:01:21.622Z | 2023-08-02T00:07:00.242Z | 2023-08-02T00:07:00.242Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '14.3, 16.1, 16.2'} |
CVE-2023-3839 | A vulnerability, which was classified as problematic, has been found in DedeBIZ 6.2.10. Affected by this issue is some unknown functionality of the file /admin/sys_sql_query.php. The manipulation of the argument sqlquery leads to sql injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-235190 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235190 | 2023-07-22T06:13:24.881Z | 2023-07-23T02:00:03.953Z | 2023-10-24T06:29:26.732Z | {'Vendor': 'n/a', 'Product': 'DedeBIZ', 'Versions': '6.2.10'} |
CVE-2023-3090 | A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.
The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.
We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e | 2023-06-03T22:31:04.130Z | 2023-06-28T19:06:41.221Z | 2023-06-28T19:16:26.617Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '3.19'} |
CVE-2023-3585 | Mattermost Boards fail to properly validate a board link, allowing an attacker to crash a channel by posting a specially crafted boards link.
| https://mattermost.com/security-updates | 2023-07-10T13:44:28.891Z | 2023-07-17T15:24:20.975Z | 2023-07-17T15:24:20.975Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3'} |
CVE-2023-3356 | The Subscribers Text Counter WordPress plugin before 1.7.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, which also lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping | https://wpscan.com/vulnerability/93faad5b-e1e8-4e49-b19e-b91343d68b51 | 2023-06-21T17:41:40.393Z | 2023-08-30T14:21:59.863Z | 2023-08-30T14:21:59.863Z | {'Vendor': 'Unknown', 'Product': 'Subscribers Text Counter', 'Versions': '0'} |
CVE-2023-3706 | The ActivityPub WordPress plugin before 1.0.0 does not ensure that post titles to be displayed are public and belong to the plugin, allowing any authenticated user, such as subscriber to retrieve the title of arbitrary post (such as draft and private) via an IDOR vector | https://wpscan.com/vulnerability/daa4d93a-f8b1-4809-a18e-8ab63a05de5a | 2023-07-17T11:43:58.316Z | 2023-10-16T19:39:15.786Z | 2023-10-16T19:39:15.786Z | {'Vendor': 'Unknown', 'Product': 'ActivityPub', 'Versions': '0'} |
CVE-2023-3213 | The WP Mail SMTP Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the is_print_page function in versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to disclose potentially sensitive email information. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a813251b-a4c1-4b23-ad03-dcc1f4f19eb9?source=cve | 2023-06-12T21:06:40.747Z | 2023-10-04T01:52:39.357Z | 2023-10-04T01:52:39.357Z | {'Vendor': 'WPForms (Awesome Motive)', 'Product': 'WP Mail SMTP Pro', 'Versions': '*'} |
CVE-2023-3643 | A vulnerability was found in Boss Mini 1.4.0 Build 6221. It has been classified as critical. This affects an unknown part of the file boss/servlet/document. The manipulation of the argument path leads to file inclusion. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233889 was assigned to this vulnerability. | https://vuldb.com/?id.233889 | 2023-07-12T16:15:04.950Z | 2023-07-12T17:31:03.036Z | 2023-10-23T15:05:11.205Z | {'Vendor': 'n/a', 'Product': 'Boss Mini', 'Versions': '1.4.0 Build 6221'} |
CVE-2023-3004 | A vulnerability, which was classified as critical, has been found in SourceCodester Simple Chat System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=read_msg of the component POST Parameter Handler. The manipulation of the argument convo_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230348. | https://vuldb.com/?id.230348 | 2023-05-31T07:59:56.022Z | 2023-05-31T09:00:04.246Z | 2023-10-23T07:31:40.745Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Chat System', 'Versions': '1.0'} |
CVE-2023-3907 | A privilege escalation vulnerability in GitLab EE affecting all versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows a project Maintainer to use a Project Access Token to escalate their role to Owner | https://gitlab.com/gitlab-org/gitlab/-/issues/418878 | 2023-07-25T10:30:28.613Z | 2023-12-17T23:02:36.694Z | 2023-12-17T23:02:36.694Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.5, 16.6'} |
CVE-2023-3842 | A vulnerability was found in Pointware EasyInventory 1.0.12.0 and classified as critical. This issue affects some unknown processing of the file C:\Program Files (x86)\EasyInventory\Easy2W.exe. The manipulation leads to unquoted search path. Attacking locally is a requirement. The identifier VDB-235193 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235193 | 2023-07-22T06:25:21.377Z | 2023-07-23T03:31:03.619Z | 2023-10-24T06:33:06.372Z | {'Vendor': 'Pointware', 'Product': 'EasyInventory', 'Versions': '1.0.12.0'} |
CVE-2023-3511 | An issue has been discovered in GitLab EE affecting all versions starting from 8.17 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible for auditor users to fork and submit merge requests to private projects they're not a member of. | https://gitlab.com/gitlab-org/gitlab/-/issues/416961 | 2023-07-04T21:18:11.362Z | 2023-12-15T15:31:04.966Z | 2023-12-15T15:31:04.966Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '8.17, 16.5, 16.6'} |
CVE-2023-3141 | A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak. | https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/ | 2023-06-07T00:00:00 | 2023-06-09T00:00:00 | 2023-10-19T23:06:24.549591 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kenrel version prior to Kernel 6.4-rc1'} |
CVE-2023-3268 | An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information. | https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/ | 2023-06-15T00:00:00 | 2023-06-16T00:00:00 | 2023-10-19T23:07:17.871230 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to 6.4-rc1'} |
CVE-2023-3792 | A vulnerability was found in Beijing Netcon NS-ASG 6.3. It has been classified as problematic. This affects an unknown part of the file /admin/test_status.php. The manipulation leads to direct request. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235059 | 2023-07-20T07:45:36.548Z | 2023-07-20T19:00:04.971Z | 2023-10-23T17:49:49.610Z | {'Vendor': 'Beijing Netcon', 'Product': 'NS-ASG', 'Versions': '6.3'} |
CVE-2023-3638 | In GeoVision GV-ADR2701 cameras, an attacker could edit the login response to access the web application.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05 | 2023-07-12T13:56:15.455Z | 2023-07-19T14:22:13.198Z | 2023-07-19T14:22:13.198Z | {'Vendor': 'GeoVision ', 'Product': 'GV-ADR2701', 'Versions': '1.00_2017_12_15'} |
CVE-2023-3950 | An information disclosure issue in GitLab EE affecting all versions from 16.2 prior to 16.2.5, and 16.3 prior to 16.3.1 allowed other Group Owners to see the Public Key for a Google Cloud Logging audit event streaming destination, if configured. Owners can now only write the key, not read it. | https://gitlab.com/gitlab-org/gitlab/-/issues/419675 | 2023-07-25T17:30:22.877Z | 2023-09-01T10:30:46.990Z | 2023-09-01T10:30:46.990Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.3'} |
CVE-2023-3053 | The Page Builder by AZEXO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'azh_add_post' function in versions up to, and including, 1.27.133. This makes it possible for authenticated attackers to create a post with any post type and post status. | https://www.wordfence.com/threat-intel/vulnerabilities/id/dd56cb73-1c40-44b1-b713-c0291832d988?source=cve | 2023-06-02T11:20:06.600Z | 2023-06-02T23:37:56.460Z | 2023-06-02T23:37:56.460Z | {'Vendor': 'azexo', 'Product': 'Page Builder with Image Map by AZEXO', 'Versions': '*'} |
CVE-2023-3403 | The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pm_upload_csv' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to import new users and update existing users. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b335fc19-2998-4711-8813-6cb68d7447bd?source=cve | 2023-06-26T12:27:58.543Z | 2023-07-18T02:39:25.938Z | 2023-07-18T02:39:25.938Z | {'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'} |
CVE-2023-3116 | in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions. | https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md | 2023-06-06T06:29:14.227Z | 2023-11-20T11:44:26.409Z | 2023-11-20T11:44:26.409Z | {'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'} |
CVE-2023-3815 | A vulnerability, which was classified as problematic, has been found in y_project RuoYi up to 4.7.7. Affected by this issue is the function uploadFilesPath of the component File Upload. The manipulation of the argument originalFilenames leads to cross site scripting. The attack may be launched remotely. VDB-235118 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235118 | 2023-07-20T20:59:49.318Z | 2023-07-21T05:00:04.905Z | 2023-10-24T06:12:22.269Z | {'Vendor': 'y_project', 'Product': 'RuoYi', 'Versions': '4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 4.7.7'} |
CVE-2023-3395 |
All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03 | 2023-06-23T20:42:39.795Z | 2023-07-03T20:04:17.653Z | 2023-07-03T20:04:17.653Z | {'Vendor': 'Ovarro', 'Product': 'TBox MS-CPU32', 'Versions': '0'} |
CVE-2023-3680 | A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_item of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-234225 was assigned to this vulnerability. | https://vuldb.com/?id.234225 | 2023-07-15T07:34:40.440Z | 2023-07-15T09:00:05.039Z | 2023-10-23T15:16:10.176Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-3045 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tise Technology Parking Web Report allows SQL Injection.This issue affects Parking Web Report: before 2.1.
| https://www.usom.gov.tr/bildirim/tr-23-0387 | 2023-06-02T10:04:50.323Z | 2023-07-09T16:16:57.421Z | 2023-07-09T16:16:57.421Z | {'Vendor': 'Tise Technology', 'Product': 'Parking Web Report', 'Versions': '0'} |
CVE-2023-3946 |
A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 SP1 Update 1allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO.
| https://kcm.trellix.com/corporate/index?page=content&id=SB10402 | 2023-07-25T15:13:46.994Z | 2023-07-26T05:10:44.967Z | 2023-07-26T05:10:44.967Z | {'Vendor': 'Trellix', 'Product': 'Trellix EPO', 'Versions': ' '} |
CVE-2023-3803 | A vulnerability classified as problematic has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This affects an unknown part of the file /Service/ImageStationDataService.asmx of the component File Name Handler. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235071. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235071 | 2023-07-20T08:27:56.581Z | 2023-07-21T00:31:03.420Z | 2023-10-24T06:01:23.414Z | {'Vendor': 'Chengdu', 'Product': 'Flash Flood Disaster Monitoring and Warning System', 'Versions': '2.0'} |
CVE-2023-3550 | Mediawiki v1.40.0 does not validate namespaces used in XML files.
Therefore, if the instance administrator allows XML file uploads,
a remote attacker with a low-privileged user account can use this
exploit to become an administrator by sending a malicious link to
the instance administrator.
| https://fluidattacks.com/advisories/blondie/ | 2023-07-08T01:02:40.399Z | 2023-09-25T15:20:27.351Z | 2023-09-25T15:20:27.351Z | {'Vendor': 'MediaWiki', 'Product': 'MediaWiki', 'Versions': '1.40.0'} |
CVE-2023-3100 | A vulnerability, which was classified as critical, has been found in IBOS 4.5.5. Affected by this issue is the function actionDel of the file ?r=dashboard/approval/del. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-230690 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230690 | 2023-06-05T05:11:11.462Z | 2023-06-05T07:31:03.066Z | 2023-10-23T12:39:29.879Z | {'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'} |
CVE-2023-3229 | Business Logic Errors in GitHub repository fossbilling/fossbilling prior to 0.5.0. | https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | 2023-06-14T00:00:00 | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3679 | A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=save_inquiry of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234224. | https://vuldb.com/?id.234224 | 2023-07-15T07:32:46.367Z | 2023-07-15T08:31:03.079Z | 2023-10-23T15:14:56.890Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-3383 | A vulnerability, which was classified as critical, was found in SourceCodester Game Result Matrix System 1.0. This affects an unknown part of the file /dipam/athlete-profile.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232239. | https://vuldb.com/?id.232239 | 2023-06-23T09:19:02.572Z | 2023-06-23T10:00:05.798Z | 2023-10-23T13:42:57.863Z | {'Vendor': 'SourceCodester', 'Product': 'Game Result Matrix System', 'Versions': '1.0'} |
CVE-2023-3696 | Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.4. | https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467 | 2023-07-17T00:00:07.556Z | 2023-07-17T00:00:21.160Z | 2023-07-17T00:00:21.160Z | {'Vendor': 'automattic', 'Product': 'automattic/mongoose', 'Versions': 'unspecified'} |
CVE-2023-3012 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-07-15T00:00:00 | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-3442 | A missing authorization vulnerability exists in versions of the Jenkins Plug-in for ServiceNow DevOps prior to 1.38.1 that, if exploited successfully, could cause the unwanted exposure of sensitive information. To address this issue, apply the 1.38.1 version of the Jenkins plug-in for ServiceNow DevOps on your Jenkins server. No changes are required on your instances of the Now Platform.
| https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1434119 | 2023-06-28T13:13:25.323Z | 2023-07-26T18:32:19.787Z | 2023-07-26T18:32:19.787Z | {'Vendor': 'ServiceNow', 'Product': 'Jenkins plug-in for ServiceNow DevOps', 'Versions': '0'} |
CVE-2023-3507 | The WooCommerce Pre-Orders WordPress plugin before 2.0.3 has a flawed CSRF check when canceling pre-orders, which could allow attackers to make logged in admins cancel arbitrary pre-orders via a CSRF attack | https://wpscan.com/vulnerability/e72bbe9b-e51d-40ab-820d-404e0cb86ee6 | 2023-07-04T18:10:50.115Z | 2023-07-31T09:37:37.183Z | 2023-07-31T09:37:37.183Z | {'Vendor': 'Unknown', 'Product': 'WooCommerce Pre-Orders', 'Versions': '0'} |
CVE-2023-3854 | A vulnerability classified as critical has been found in phpscriptpoint BloodBank 1.1. Affected is an unknown function of the file /search of the component POST Parameter Handler. The manipulation of the argument country/city/blood_group_id leads to sql injection. It is possible to launch the attack remotely. VDB-235206 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235206 | 2023-07-23T13:00:56.987Z | 2023-07-23T23:00:04.608Z | 2023-10-24T06:46:31.320Z | {'Vendor': 'phpscriptpoint', 'Product': 'BloodBank', 'Versions': '1.1'} |
CVE-2023-3784 | A vulnerability was found in Dooblou WiFi File Explorer 1.13.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument search/order/download/mode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235051. | https://vuldb.com/?id.235051 | 2023-07-20T07:06:35.649Z | 2023-07-20T08:02:02.627Z | 2023-10-23T17:40:04.311Z | {'Vendor': 'Dooblou', 'Product': 'WiFi File Explorer', 'Versions': '1.13.3'} |
CVE-2023-3291 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5 | 2023-06-16T00:00:00 | 2023-06-16T00:00:00 | 2023-07-15T00:00:00 | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-3209 | The MStore API WordPress plugin before 3.9.7 does not secure most of its AJAX actions by implementing privilege checks, nonce checks, or a combination of both. | https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c | 2023-06-12T15:09:38.041Z | 2023-07-10T12:41:04.575Z | 2023-07-10T13:05:50.082Z | {'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'} |
CVE-2023-3659 | A vulnerability has been found in SourceCodester AC Repair and Services System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/?page=user/manage_user. The manipulation of the argument firstname/middlename leads to cross site scripting. The attack can be launched remotely. The identifier VDB-234013 was assigned to this vulnerability. | https://vuldb.com/?id.234013 | 2023-07-13T09:49:03.746Z | 2023-07-13T11:00:04.551Z | 2023-10-23T15:10:04.095Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-3989 | A vulnerability was found in SourceCodester Jewelry Store System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add_customer.php. The manipulation leads to cross site scripting. The attack may be launched remotely. VDB-235610 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235610 | 2023-07-27T20:01:07.190Z | 2023-07-28T06:31:03.857Z | 2023-10-24T07:59:02.598Z | {'Vendor': 'SourceCodester', 'Product': 'Jewelry Store System', 'Versions': '1.0'} |
CVE-2023-3823 | In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down.
| https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr | 2023-07-21T16:16:57.133Z | 2023-08-11T05:42:25.771Z | 2023-08-11T05:42:25.771Z | {'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.*, 8.1.*, 8.2.*'} |
CVE-2023-3570 | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP DELETE request to gain full access to the device. | https://cert.vde.com/en/advisories/VDE-2023-018/ | 2023-07-10T07:53:11.063Z | 2023-08-08T06:52:57.641Z | 2023-08-25T06:07:25.366Z | {'Vendor': 'PHOENIX CONTACT', 'Product': 'WP 6070-WVPS', 'Versions': '0'} |
CVE-2023-3120 | A vulnerability, which was classified as critical, was found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file view_service.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230799. | https://vuldb.com/?id.230799 | 2023-06-06T10:03:40.683Z | 2023-06-06T11:00:04.154Z | 2023-10-23T12:41:56.319Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-3435 | The User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks. | https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b | 2023-06-27T17:40:30.280Z | 2023-08-14T19:10:19.283Z | 2024-01-16T15:54:04.428Z | {'Vendor': 'Unknown', 'Product': 'User Activity Log', 'Versions': '0'} |
CVE-2023-3065 | Improper Authentication vulnerability in Mobatime mobile application AMXGT100 allows Authentication Bypass.This issue affects Mobatime mobile application AMXGT100 through 1.3.20.
| https://borelenzo.github.io/stuff/2023/06/02/cve-2023-3064_65_66.html | 2023-06-02T14:24:18.278Z | 2023-06-05T08:27:33.950Z | 2023-06-05T08:27:33.950Z | {'Vendor': 'Mobatime', 'Product': 'Mobatime mobile application AMXGT100', 'Versions': '0'} |
CVE-2023-3177 | A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin\inquiries\view_inquiry.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231151. | https://vuldb.com/?id.231151 | 2023-06-09T05:24:42.143Z | 2023-06-09T06:00:04.330Z | 2023-10-23T13:00:15.427Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-3527 | A CSV injection vulnerability was found in the Avaya Call Management System (CMS) Supervisor web application which allows a user with administrative privileges to input crafted data which, when exported to a CSV file, may attempt arbitrary command execution on the system used to open the file by a spreadsheet software
such as Microsoft Excel.
| https://download.avaya.com/css/public/documents/101086364 | 2023-07-06T16:01:05.440Z | 2023-07-18T21:10:36.841Z | 2023-07-18T21:10:36.841Z | {'Vendor': 'Avaya', 'Product': 'Avaya Call Management System', 'Versions': '19.x.x.x'} |
CVE-2023-3874 | A vulnerability, which was classified as critical, was found in Campcodes Beauty Salon Management System 1.0. Affected is an unknown function of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235236. | https://vuldb.com/?id.235236 | 2023-07-24T16:42:39.447Z | 2023-07-25T01:00:05.230Z | 2023-10-24T07:01:10.368Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3032 | Unrestricted Upload of File with Dangerous Type vulnerability in Mobatime web application (Documentary proof upload modules) allows a malicious user to Upload a Web Shell to a Web Server.This issue affects Mobatime web application: through 06.7.22.
| https://borelenzo.github.io/stuff/2023/06/01/cve-2023-3032.html | 2023-06-01T08:47:22.177Z | 2023-06-02T12:28:40.384Z | 2023-06-05T08:21:14.474Z | {'Vendor': 'Mobatime', 'Product': 'Mobatime web application', 'Versions': '0'} |
CVE-2023-3462 | HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5. | https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714 | 2023-06-29T19:00:52.239Z | 2023-07-31T22:40:23.432Z | 2023-07-31T22:40:23.432Z | {'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.14.0'} |
CVE-2023-3198 | The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_status_order_message function. This makes it possible for unauthenticated attackers to update status order message via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f30190-4576-4c2b-b069-72501538733b?source=cve | 2023-06-12T13:48:53.008Z | 2023-06-14T01:47:49.676Z | 2023-06-14T01:47:49.676Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-3248 | The All-in-one Floating Contact Form WordPress plugin before 2.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/90c7496b-552f-4566-b7ae-8c953c965352 | 2023-06-14T17:12:04.687Z | 2023-07-24T10:20:25.254Z | 2023-07-24T10:20:25.254Z | {'Vendor': 'Unknown', 'Product': 'All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs', 'Versions': '0'} |
CVE-2023-3618 | A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service. | https://access.redhat.com/security/cve/CVE-2023-3618 | 2023-07-11T14:46:05.545Z | 2023-07-12T14:06:04.572Z | 2023-08-08T16:50:48.957Z | {'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': ''} |
CVE-2023-3862 | A vulnerability was found in Travelmate Travelable Trek Management Solution 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Comment Box Handler. The manipulation of the argument comment leads to cross site scripting. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. VDB-235214 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235214 | 2023-07-23T13:21:05.671Z | 2023-07-24T03:31:03.806Z | 2023-10-24T06:56:17.665Z | {'Vendor': 'Travelmate', 'Product': 'Travelable Trek Management Solution', 'Versions': '1.0'} |
CVE-2023-3531 | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10. | https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414 | 2023-07-06T19:18:34.371Z | 2023-07-06T19:18:45.317Z | 2023-07-06T19:18:45.317Z | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-3161 | A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service. | https://bugzilla.redhat.com/show_bug.cgi?id=2213485 | 2023-06-08T00:00:00 | 2023-06-12T00:00:00 | 2023-06-12T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux Kernel (fbcon)', 'Versions': 'Fixed in kernel 6.2-rc7'} |
CVE-2023-3474 | A vulnerability has been found in SimplePHPscripts Simple Blog 3.2 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. It is recommended to upgrade the affected component. The identifier VDB-232753 was assigned to this vulnerability. | https://vuldb.com/?id.232753 | 2023-06-30T06:17:14.638Z | 2023-06-30T06:31:04.753Z | 2023-10-23T13:55:09.837Z | {'Vendor': 'SimplePHPscripts', 'Product': 'Simple Blog', 'Versions': '3.2'} |
CVE-2023-3024 | Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access. | https://github.com/SiliconLabs/gecko_sdk | 2023-05-31T19:31:15.221Z | 2023-09-29T16:32:30.503Z | 2023-09-29T16:32:30.503Z | {'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0.0'} |
CVE-2023-3136 | The MailArchiver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ce330cae-c2f8-42f3-822b-ca24bf46e433?source=cve | 2023-06-06T23:13:45.193Z | 2023-08-30T08:28:12.297Z | 2023-08-30T08:28:12.297Z | {'Vendor': 'pierrelannoy', 'Product': 'MailArchiver', 'Versions': '*'} |
CVE-2023-3566 | A vulnerability was found in wallabag 2.5.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /config of the component Profile Config. The manipulation of the argument Name leads to allocation of resources. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233359. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233359 | 2023-07-08T13:26:24.302Z | 2023-07-08T17:31:03.631Z | 2023-10-23T14:44:26.647Z | {'Vendor': 'n/a', 'Product': 'wallabag', 'Versions': '2.5.4'} |
CVE-2023-3835 | A vulnerability classified as problematic has been found in Bug Finder MineStack 1.0. This affects an unknown part of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235161 | 2023-07-21T20:46:08.178Z | 2023-07-22T17:31:04.303Z | 2023-10-24T06:24:34.047Z | {'Vendor': 'Bug Finder', 'Product': 'MineStack', 'Versions': '1.0'} |
CVE-2023-3970 | A vulnerability, which was classified as problematic, was found in GZ Scripts Availability Booking Calendar PHP 1.0. This affects an unknown part of the file /index.php?controller=GzUser&action=edit&id=1 of the component Image Handler. The manipulation of the argument img leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235569 was assigned to this vulnerability. | https://vuldb.com/?id.235569 | 2023-07-27T06:57:29.111Z | 2023-07-27T12:00:06.063Z | 2023-10-24T07:51:43.120Z | {'Vendor': 'GZ Scripts', 'Product': 'Availability Booking Calendar PHP', 'Versions': '1.0'} |
CVE-2023-3073 | Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8 via evvtgendoc. | https://github.com/tsolucio/corebos/commit/e87f77c64061b43186c80ad1b50d313c67d7f6cf | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | 2023-08-24T23:57:43.859354 | {'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'} |
CVE-2023-3589 | A Cross-Site Request Forgery (CSRF) vulnerability affecting Teamwork Cloud from No Magic Release 2021x through No Magic Release 2022x could allow with some very specific conditions an attacker to send a specifically crafted query to the server. | https://www.3ds.com/vulnerability/advisories | 2023-07-10T14:22:56.221Z | 2023-10-09T08:54:08.100Z | 2023-10-13T09:15:26.671Z | {'Vendor': 'Dassault Systèmes', 'Product': 'Teamwork Cloud - Business Edition', 'Versions': 'No Magic Release 2021x Golden, No Magic Release 2022x Golden'} |
CVE-2023-3423 | Weak Password Requirements in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v 1.2.0. | https://huntr.dev/bounties/dd19c7d0-70f1-4d86-a552-611dfa8e0139 | 2023-06-27T03:29:13.178Z | 2023-06-27T03:29:26.759Z | 2023-06-27T03:29:26.759Z | {'Vendor': 'cloudexplorer-dev', 'Product': 'cloudexplorer-dev/cloudexplorer-lite', 'Versions': 'unspecified'} |
CVE-2023-3264 | The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database. A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:29.804Z | 2023-08-14T04:05:58.124Z | 2023-08-25T05:03:24.641Z | {'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': 'v2.6.0'} |
CVE-2023-3771 | The T1 WordPress theme through 19.0 is vulnerable to unauthenticated open redirect with which any attacker and redirect users to arbitrary websites. | https://wpscan.com/vulnerability/7c6fc499-de09-4874-ab96-bdc24d550cfb/ | 2023-07-19T13:08:16.066Z | 2024-01-16T15:54:04.782Z | 2024-01-16T15:54:04.782Z | {'Vendor': 'Unknown', 'Product': 't1', 'Versions': '0'} |
CVE-2023-3321 |
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
| https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 | 2023-06-19T15:47:17.589Z | 2023-07-24T17:06:31.093Z | 2023-07-24T17:06:31.093Z | {'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build '} |
CVE-2023-3008 | A vulnerability classified as critical has been found in ningzichun Student Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument user/pass leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230355. | https://vuldb.com/?id.230355 | 2023-05-31T11:01:47.403Z | 2023-05-31T11:31:03.993Z | 2023-10-23T07:35:20.485Z | {'Vendor': 'ningzichun', 'Product': 'Student Management System', 'Versions': '1.0'} |
CVE-2023-3458 | A vulnerability was found in SourceCodester Shopping Website 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file forgot-password.php. The manipulation of the argument contact leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232675. | https://vuldb.com/?id.232675 | 2023-06-29T12:55:18.014Z | 2023-06-29T13:31:04.889Z | 2023-10-23T13:50:17.226Z | {'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'} |
CVE-2023-3233 | A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It has been classified as critical. Affected is the function get_image_base64 of the file api/controller/v1/PublicController.php. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231504. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.231504 | 2023-06-14T05:30:58.126Z | 2023-06-14T06:31:03.289Z | 2023-10-23T13:11:14.335Z | {'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6'} |
CVE-2023-3663 | In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server. | https://cert.vde.com/en/advisories/VDE-2023-022/ | 2023-07-13T13:04:46.976Z | 2023-08-03T10:55:08.945Z | 2023-08-03T10:55:08.945Z | {'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.5.11.20'} |
CVE-2023-3399 | An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates. | https://gitlab.com/gitlab-org/gitlab/-/issues/416244 | 2023-06-26T10:17:01.488Z | 2023-11-06T12:08:54.970Z | 2023-11-07T06:52:22.719Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.6, 16.4, 16.5'} |
CVE-2023-3376 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Digital Strategy Zekiweb allows SQL Injection.This issue affects Zekiweb: before 2.
| https://www.usom.gov.tr/bildirim/tr-23-0408 | 2023-06-23T07:58:38.492Z | 2023-07-17T13:11:40.174Z | 2023-07-17T13:11:40.174Z | {'Vendor': 'Digital Strategy', 'Product': 'Zekiweb', 'Versions': '0'} |
CVE-2023-3726 | OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting.
| https://fluidattacks.com/advisories/creed/ | 2023-07-17T22:17:31.210Z | 2024-01-04T14:39:43.942Z | 2024-01-04T14:39:43.942Z | {'Vendor': 'OCSInventory', 'Product': 'OCSInventory', 'Versions': '2.12.0'} |
CVE-2023-3819 | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pimcore/pimcore prior to 10.6.4. | https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c | 2023-07-21T14:37:44.153Z | 2023-07-21T14:37:57.468Z | 2023-07-21T14:37:57.468Z | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-3225 | The Float menu WordPress plugin before 5.0.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/3c76d0f4-2ea8-433d-afb2-e35e45630899 | 2023-06-13T17:12:34.788Z | 2023-07-10T12:41:13.941Z | 2023-07-10T13:05:51.766Z | {'Vendor': 'Unknown', 'Product': 'Float menu', 'Versions': '0'} |
CVE-2023-3730 | Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:20.239Z | 2023-08-01T22:39:17.106Z | 2023-08-01T22:39:17.106Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3049 | Unrestricted Upload of File with Dangerous Type vulnerability in TMT Lockcell allows Command Injection.This issue affects Lockcell: before 15.
| https://www.usom.gov.tr/bildirim/tr-23-0345 | 2023-06-02T10:07:22.606Z | 2023-06-13T11:47:56.294Z | 2023-07-26T09:07:46.933Z | {'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'} |
CVE-2023-3272 |
Cleartext Transmission of Sensitive Information in the SICK ICR890-4 could allow a
remote attacker to gather sensitive information by intercepting network traffic that is not encrypted.
| https://sick.com/psirt | 2023-06-15T11:32:32.808Z | 2023-07-10T09:27:46.002Z | 2023-07-10T09:27:46.002Z | {'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'} |
CVE-2023-3788 | A vulnerability, which was classified as problematic, has been found in ActiveITzone Active Super Shop CMS 2.5. This issue affects some unknown processing of the component Manage Details Page. The manipulation of the argument name/phone/address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235055. | https://vuldb.com/?id.235055 | 2023-07-20T07:16:57.873Z | 2023-07-20T15:31:03.892Z | 2023-10-23T17:44:56.964Z | {'Vendor': 'ActiveITzone', 'Product': 'Active Super Shop CMS', 'Versions': '2.5'} |
CVE-2023-3622 |
Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read arbitrary resource | https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-3_release_notes.htm | 2023-07-11T15:00:02.490Z | 2023-07-26T14:45:18.257Z | 2023-12-28T17:01:30.181Z | {'Vendor': 'SolarWinds ', 'Product': 'SolarWinds Platform ', 'Versions': '2023.2 and previous versions'} |
CVE-2023-3337 | A vulnerability was found in PuneethReddyHC Online Shopping System Advanced 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/reg.php of the component Admin Registration. The manipulation leads to improper authentication. The attack can be launched remotely. The identifier VDB-232009 was assigned to this vulnerability. | https://vuldb.com/?id.232009 | 2023-06-20T11:43:22.300Z | 2023-06-20T12:00:04.541Z | 2023-10-23T13:35:38.691Z | {'Vendor': 'PuneethReddyHC', 'Product': 'Online Shopping System Advanced', 'Versions': '1.0'} |
CVE-2023-3767 | An OS command injection vulnerability has been found on EasyPHP Webserver affecting version 14.1. This vulnerability could allow an attacker to get full access to the system by sending a specially crafted exploit to the /index.php?zone=settings parameter. | https://www.incibe.es/incibe-cert/alerta-temprana/avisos/inyeccion-de-comandos-os-en-easyphp-webserver | 2023-07-19T10:34:45.262Z | 2023-09-26T07:51:36.754Z | 2023-09-26T07:51:36.754Z | {'Vendor': 'EasyPHP', 'Product': 'Webserver', 'Versions': '14.1'} |
CVE-2023-3858 | A vulnerability has been found in phpscriptpoint Car Listing 1.6 and classified as problematic. This vulnerability affects unknown code of the file /search.php. The manipulation of the argument country/state/city leads to cross site scripting. The attack can be initiated remotely. VDB-235210 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235210 | 2023-07-23T13:11:06.413Z | 2023-07-24T01:31:03.712Z | 2023-10-24T06:51:24.655Z | {'Vendor': 'phpscriptpoint', 'Product': 'Car Listing', 'Versions': '1.6'} |
CVE-2023-3629 | A flaw was found in Infinispan's REST, Cache retrieval endpoints do not properly evaluate the necessary admin permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions. | https://access.redhat.com/errata/RHSA-2023:5396 | 2023-07-11T20:51:42.907Z | 2023-12-18T13:43:07.770Z | 2023-12-18T13:43:07.770Z | {'Vendor': 'n/a', 'Product': 'infinispan', 'Versions': ''} |
CVE-2023-3279 | The WordPress Gallery Plugin WordPress plugin before 3.39 does not validate some block attributes before using them to generate paths passed to include function/s, allowing Admin users to perform LFI attacks | https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635 | 2023-06-15T20:46:40.234Z | 2023-10-16T19:39:18.389Z | 2023-10-16T19:39:18.389Z | {'Vendor': 'Unknown', 'Product': 'WordPress Gallery Plugin', 'Versions': '0'} |
CVE-2023-3783 | A vulnerability was found in Webile 1.0.1. It has been classified as problematic. Affected is an unknown function of the component HTTP POST Request Handler. The manipulation of the argument new_file_name/c leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-235050 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235050 | 2023-07-20T07:03:29.690Z | 2023-07-20T07:22:18.602Z | 2023-10-23T17:38:50.878Z | {'Vendor': 'n/a', 'Product': 'Webile', 'Versions': '1.0.1'} |
Subsets and Splits