CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3747
Zero Trust Administrators have the ability to disallow end users from disabling WARP on their devices. Override codes can also be created by the Administrators to allow a device to temporarily be disconnected from WARP, however, due to lack of server side validation, an attacker with local access to the device, could extend the maximum allowed disconnected time of WARP client granted by an override code by changing the date & time on the local device where WARP is running.
https://play.google.com/store/apps/details?id=com.cloudflare.onedotonedotonedotone
2023-07-18T08:43:28.555Z
2023-09-07T12:11:01.435Z
2023-09-07T12:11:01.435Z
{'Vendor': 'Cloudflare', 'Product': 'WARP Client', 'Versions': '0'}
CVE-2023-3252
An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges could alter logging variables to overwrite arbitrary files on the remote host with log data, which could lead to a denial of service condition.
https://www.tenable.com/security/tns-2023-29
2023-06-14T20:01:52.895Z
2023-08-29T18:55:09.869Z
2023-08-29T18:55:09.869Z
{'Vendor': ' Tenable', 'Product': 'Nessus', 'Versions': '0'}
CVE-2023-3497
Out of bounds read in Google Security Processor firmware in Google Chrome on Chrome OS prior to 114.0.5735.90 allowed a local attacker to perform denial of service via physical access to the device. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html
2023-07-03T13:26:37.767Z
2023-07-03T16:54:10.292Z
2023-07-29T00:14:14.612Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-3881
A vulnerability classified as critical was found in Campcodes Beauty Salon Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php. The manipulation of the argument contactno leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235243.
https://vuldb.com/?id.235243
2023-07-24T16:49:31.006Z
2023-07-25T04:31:04.023Z
2023-10-24T07:09:42.765Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3028
Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too. Multiple vulnerabilities were identified: - The MQTT backend does not require authentication, allowing unauthorized connections from an attacker. - The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend. - The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle's location. - The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend. The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.
https://asrg.io/security-advisories/cve-2023-3028/
2023-06-01T05:09:18.844Z
2023-06-01T05:34:48.206Z
2023-09-28T05:47:34.600Z
{'Vendor': 'Hangzhou Hopechart IoT Technology Co., Ltd.', 'Product': 'HQT401', 'Versions': '201808021036'}
CVE-2023-3478
A vulnerability classified as critical was found in IBOS OA 4.5.5. Affected by this vulnerability is the function actionEdit of the file ?r=dashboard/roleadmin/edit&op=member of the component Add User Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232759. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.232759
2023-06-30T08:17:16.713Z
2023-06-30T12:00:03.793Z
2023-10-23T14:00:03.869Z
{'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'}
CVE-2023-3182
The Membership WordPress plugin before 3.2.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/655a68ee-9447-41ca-899e-986a419fb7ed
2023-06-09T12:33:47.210Z
2023-07-17T13:29:56.981Z
2023-07-17T13:29:56.981Z
{'Vendor': 'Unknown', 'Product': 'Membership Plugin', 'Versions': '0'}
CVE-2023-3751
A vulnerability was found in Super Store Finder 3.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php of the component POST Parameter Handler. The manipulation of the argument products leads to sql injection. The attack can be launched remotely. The identifier VDB-234421 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234421
2023-07-18T16:23:26.320Z
2023-07-19T00:00:04.459Z
2023-10-23T15:34:28.307Z
{'Vendor': 'n/a', 'Product': 'Super Store Finder', 'Versions': '3.6'}
CVE-2023-3301
A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.
https://access.redhat.com/security/cve/CVE-2023-3301
2023-06-17T16:48:21.977Z
2023-09-13T16:09:36.861Z
2023-09-13T16:09:36.861Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': '8.1.0-rc0'}
CVE-2023-3614
Mattermost fails to properly validate a gif image file, allowing an attacker to consume a significant amount of server resources, making the server unresponsive for an extended period of time by linking to specially crafted image file.
https://mattermost.com/security-updates
2023-07-11T09:04:11.707Z
2023-07-17T15:32:16.646Z
2023-07-17T15:32:16.646Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3'}
CVE-2023-3244
The Comments Like Dislike plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the restore_settings function called via an AJAX action in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to reset the plugin's settings. NOTE: After attempting to contact the developer with no response, and reporting this to the WordPress plugin's team 30 days ago we are disclosing this issue as it still is not updated.
https://www.wordfence.com/threat-intel/vulnerabilities/id/66019297-a8a8-4bbc-99db-4b47066f3e50?source=cve
2023-06-14T14:35:53.135Z
2023-08-17T06:43:42.770Z
2023-08-17T06:43:42.770Z
{'Vendor': 'happy-coders', 'Product': 'Comments Like Dislike', 'Versions': '*'}
CVE-2023-3993
An issue has been discovered in GitLab EE affecting all versions starting from 14.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. Access tokens may have been logged when a query was made to a specific endpoint.
https://gitlab.com/gitlab-org/gitlab/-/issues/409570
2023-07-28T09:01:21.622Z
2023-08-02T00:07:00.242Z
2023-08-02T00:07:00.242Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '14.3, 16.1, 16.2'}
CVE-2023-3839
A vulnerability, which was classified as problematic, has been found in DedeBIZ 6.2.10. Affected by this issue is some unknown functionality of the file /admin/sys_sql_query.php. The manipulation of the argument sqlquery leads to sql injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-235190 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235190
2023-07-22T06:13:24.881Z
2023-07-23T02:00:03.953Z
2023-10-24T06:29:26.732Z
{'Vendor': 'n/a', 'Product': 'DedeBIZ', 'Versions': '6.2.10'}
CVE-2023-3090
A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation. The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled. We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
2023-06-03T22:31:04.130Z
2023-06-28T19:06:41.221Z
2023-06-28T19:16:26.617Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '3.19'}
CVE-2023-3585
Mattermost Boards fail to properly validate a board link, allowing an attacker to crash a channel by posting a specially crafted boards link.
https://mattermost.com/security-updates
2023-07-10T13:44:28.891Z
2023-07-17T15:24:20.975Z
2023-07-17T15:24:20.975Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.9.5, 7.10.3'}
CVE-2023-3356
The Subscribers Text Counter WordPress plugin before 1.7.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack, which also lead to Stored Cross-Site Scripting due to the lack of sanitisation and escaping
https://wpscan.com/vulnerability/93faad5b-e1e8-4e49-b19e-b91343d68b51
2023-06-21T17:41:40.393Z
2023-08-30T14:21:59.863Z
2023-08-30T14:21:59.863Z
{'Vendor': 'Unknown', 'Product': 'Subscribers Text Counter', 'Versions': '0'}
CVE-2023-3706
The ActivityPub WordPress plugin before 1.0.0 does not ensure that post titles to be displayed are public and belong to the plugin, allowing any authenticated user, such as subscriber to retrieve the title of arbitrary post (such as draft and private) via an IDOR vector
https://wpscan.com/vulnerability/daa4d93a-f8b1-4809-a18e-8ab63a05de5a
2023-07-17T11:43:58.316Z
2023-10-16T19:39:15.786Z
2023-10-16T19:39:15.786Z
{'Vendor': 'Unknown', 'Product': 'ActivityPub', 'Versions': '0'}
CVE-2023-3213
The WP Mail SMTP Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the is_print_page function in versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to disclose potentially sensitive email information.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a813251b-a4c1-4b23-ad03-dcc1f4f19eb9?source=cve
2023-06-12T21:06:40.747Z
2023-10-04T01:52:39.357Z
2023-10-04T01:52:39.357Z
{'Vendor': 'WPForms (Awesome Motive)', 'Product': 'WP Mail SMTP Pro', 'Versions': '*'}
CVE-2023-3643
A vulnerability was found in Boss Mini 1.4.0 Build 6221. It has been classified as critical. This affects an unknown part of the file boss/servlet/document. The manipulation of the argument path leads to file inclusion. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233889 was assigned to this vulnerability.
https://vuldb.com/?id.233889
2023-07-12T16:15:04.950Z
2023-07-12T17:31:03.036Z
2023-10-23T15:05:11.205Z
{'Vendor': 'n/a', 'Product': 'Boss Mini', 'Versions': '1.4.0 Build 6221'}
CVE-2023-3004
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Chat System 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=read_msg of the component POST Parameter Handler. The manipulation of the argument convo_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230348.
https://vuldb.com/?id.230348
2023-05-31T07:59:56.022Z
2023-05-31T09:00:04.246Z
2023-10-23T07:31:40.745Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Chat System', 'Versions': '1.0'}
CVE-2023-3907
A privilege escalation vulnerability in GitLab EE affecting all versions from 16.0 prior to 16.4.4, 16.5 prior to 16.5.4, and 16.6 prior to 16.6.2 allows a project Maintainer to use a Project Access Token to escalate their role to Owner
https://gitlab.com/gitlab-org/gitlab/-/issues/418878
2023-07-25T10:30:28.613Z
2023-12-17T23:02:36.694Z
2023-12-17T23:02:36.694Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.5, 16.6'}
CVE-2023-3842
A vulnerability was found in Pointware EasyInventory 1.0.12.0 and classified as critical. This issue affects some unknown processing of the file C:\Program Files (x86)\EasyInventory\Easy2W.exe. The manipulation leads to unquoted search path. Attacking locally is a requirement. The identifier VDB-235193 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235193
2023-07-22T06:25:21.377Z
2023-07-23T03:31:03.619Z
2023-10-24T06:33:06.372Z
{'Vendor': 'Pointware', 'Product': 'EasyInventory', 'Versions': '1.0.12.0'}
CVE-2023-3511
An issue has been discovered in GitLab EE affecting all versions starting from 8.17 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. It was possible for auditor users to fork and submit merge requests to private projects they're not a member of.
https://gitlab.com/gitlab-org/gitlab/-/issues/416961
2023-07-04T21:18:11.362Z
2023-12-15T15:31:04.966Z
2023-12-15T15:31:04.966Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '8.17, 16.5, 16.6'}
CVE-2023-3141
A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.
https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/
2023-06-07T00:00:00
2023-06-09T00:00:00
2023-10-19T23:06:24.549591
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kenrel version prior to Kernel 6.4-rc1'}
CVE-2023-3268
An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/
2023-06-15T00:00:00
2023-06-16T00:00:00
2023-10-19T23:07:17.871230
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to 6.4-rc1'}
CVE-2023-3792
A vulnerability was found in Beijing Netcon NS-ASG 6.3. It has been classified as problematic. This affects an unknown part of the file /admin/test_status.php. The manipulation leads to direct request. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235059
2023-07-20T07:45:36.548Z
2023-07-20T19:00:04.971Z
2023-10-23T17:49:49.610Z
{'Vendor': 'Beijing Netcon', 'Product': 'NS-ASG', 'Versions': '6.3'}
CVE-2023-3638
In GeoVision GV-ADR2701 cameras, an attacker could edit the login response to access the web application.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-199-05
2023-07-12T13:56:15.455Z
2023-07-19T14:22:13.198Z
2023-07-19T14:22:13.198Z
{'Vendor': 'GeoVision ', 'Product': 'GV-ADR2701', 'Versions': '1.00_2017_12_15'}
CVE-2023-3950
An information disclosure issue in GitLab EE affecting all versions from 16.2 prior to 16.2.5, and 16.3 prior to 16.3.1 allowed other Group Owners to see the Public Key for a Google Cloud Logging audit event streaming destination, if configured. Owners can now only write the key, not read it.
https://gitlab.com/gitlab-org/gitlab/-/issues/419675
2023-07-25T17:30:22.877Z
2023-09-01T10:30:46.990Z
2023-09-01T10:30:46.990Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.3'}
CVE-2023-3053
The Page Builder by AZEXO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'azh_add_post' function in versions up to, and including, 1.27.133. This makes it possible for authenticated attackers to create a post with any post type and post status.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dd56cb73-1c40-44b1-b713-c0291832d988?source=cve
2023-06-02T11:20:06.600Z
2023-06-02T23:37:56.460Z
2023-06-02T23:37:56.460Z
{'Vendor': 'azexo', 'Product': 'Page Builder with Image Map by AZEXO', 'Versions': '*'}
CVE-2023-3403
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pm_upload_csv' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to import new users and update existing users.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b335fc19-2998-4711-8813-6cb68d7447bd?source=cve
2023-06-26T12:27:58.543Z
2023-07-18T02:39:25.938Z
2023-07-18T02:39:25.938Z
{'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'}
CVE-2023-3116
in OpenHarmony v3.2.2 and prior versions allow a local attacker get confidential information or rewrite sensitive file through incorrect default permissions.
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2023/2023-12.md
2023-06-06T06:29:14.227Z
2023-11-20T11:44:26.409Z
2023-11-20T11:44:26.409Z
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'}
CVE-2023-3815
A vulnerability, which was classified as problematic, has been found in y_project RuoYi up to 4.7.7. Affected by this issue is the function uploadFilesPath of the component File Upload. The manipulation of the argument originalFilenames leads to cross site scripting. The attack may be launched remotely. VDB-235118 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235118
2023-07-20T20:59:49.318Z
2023-07-21T05:00:04.905Z
2023-10-24T06:12:22.269Z
{'Vendor': 'y_project', 'Product': 'RuoYi', 'Versions': '4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6, 4.7.7'}
CVE-2023-3395
​All versions of the TWinSoft Configuration Tool store encrypted passwords as plaintext in memory. An attacker with access to system files could open a file to load the document into memory, including sensitive information associated with document, such as password. The attacker could then obtain the plaintext password by using a memory viewer.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-180-03
2023-06-23T20:42:39.795Z
2023-07-03T20:04:17.653Z
2023-07-03T20:04:17.653Z
{'Vendor': 'Ovarro', 'Product': 'TBox MS-CPU32', 'Versions': '0'}
CVE-2023-3680
A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_item of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-234225 was assigned to this vulnerability.
https://vuldb.com/?id.234225
2023-07-15T07:34:40.440Z
2023-07-15T09:00:05.039Z
2023-10-23T15:16:10.176Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-3045
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tise Technology Parking Web Report allows SQL Injection.This issue affects Parking Web Report: before 2.1.
https://www.usom.gov.tr/bildirim/tr-23-0387
2023-06-02T10:04:50.323Z
2023-07-09T16:16:57.421Z
2023-07-09T16:16:57.421Z
{'Vendor': 'Tise Technology', 'Product': 'Parking Web Report', 'Versions': '0'}
CVE-2023-3946
A reflected cross-site scripting (XSS) vulnerability in ePO prior to 5.10 SP1 Update 1allows a remote unauthenticated attacker to potentially obtain access to an ePO administrator's session by convincing the authenticated ePO administrator to click on a carefully crafted link. This would lead to limited access to sensitive information and limited ability to alter some information in ePO.
https://kcm.trellix.com/corporate/index?page=content&id=SB10402
2023-07-25T15:13:46.994Z
2023-07-26T05:10:44.967Z
2023-07-26T05:10:44.967Z
{'Vendor': 'Trellix', 'Product': 'Trellix EPO', 'Versions': ' '}
CVE-2023-3803
A vulnerability classified as problematic has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This affects an unknown part of the file /Service/ImageStationDataService.asmx of the component File Name Handler. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235071. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235071
2023-07-20T08:27:56.581Z
2023-07-21T00:31:03.420Z
2023-10-24T06:01:23.414Z
{'Vendor': 'Chengdu', 'Product': 'Flash Flood Disaster Monitoring and Warning System', 'Versions': '2.0'}
CVE-2023-3550
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
https://fluidattacks.com/advisories/blondie/
2023-07-08T01:02:40.399Z
2023-09-25T15:20:27.351Z
2023-09-25T15:20:27.351Z
{'Vendor': 'MediaWiki', 'Product': 'MediaWiki', 'Versions': '1.40.0'}
CVE-2023-3100
A vulnerability, which was classified as critical, has been found in IBOS 4.5.5. Affected by this issue is the function actionDel of the file ?r=dashboard/approval/del. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-230690 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230690
2023-06-05T05:11:11.462Z
2023-06-05T07:31:03.066Z
2023-10-23T12:39:29.879Z
{'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'}
CVE-2023-3229
Business Logic Errors in GitHub repository fossbilling/fossbilling prior to 0.5.0.
https://huntr.dev/bounties/31f48ca1-e5e8-436f-b779-cad597759170
2023-06-14T00:00:00
2023-06-14T00:00:00
2023-06-14T00:00:00
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3679
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=save_inquiry of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234224.
https://vuldb.com/?id.234224
2023-07-15T07:32:46.367Z
2023-07-15T08:31:03.079Z
2023-10-23T15:14:56.890Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-3383
A vulnerability, which was classified as critical, was found in SourceCodester Game Result Matrix System 1.0. This affects an unknown part of the file /dipam/athlete-profile.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232239.
https://vuldb.com/?id.232239
2023-06-23T09:19:02.572Z
2023-06-23T10:00:05.798Z
2023-10-23T13:42:57.863Z
{'Vendor': 'SourceCodester', 'Product': 'Game Result Matrix System', 'Versions': '1.0'}
CVE-2023-3696
Prototype Pollution in GitHub repository automattic/mongoose prior to 7.3.4.
https://huntr.dev/bounties/1eef5a72-f6ab-4f61-b31d-fc66f5b4b467
2023-07-17T00:00:07.556Z
2023-07-17T00:00:21.160Z
2023-07-17T00:00:21.160Z
{'Vendor': 'automattic', 'Product': 'automattic/mongoose', 'Versions': 'unspecified'}
CVE-2023-3012
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-07-15T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-3442
A missing authorization vulnerability exists in versions of the Jenkins Plug-in for ServiceNow DevOps prior to 1.38.1 that, if exploited successfully, could cause the unwanted exposure of sensitive information. To address this issue, apply the 1.38.1 version of the Jenkins plug-in for ServiceNow DevOps on your Jenkins server. No changes are required on your instances of the Now Platform.
https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1434119
2023-06-28T13:13:25.323Z
2023-07-26T18:32:19.787Z
2023-07-26T18:32:19.787Z
{'Vendor': 'ServiceNow', 'Product': 'Jenkins plug-in for ServiceNow DevOps', 'Versions': '0'}
CVE-2023-3507
The WooCommerce Pre-Orders WordPress plugin before 2.0.3 has a flawed CSRF check when canceling pre-orders, which could allow attackers to make logged in admins cancel arbitrary pre-orders via a CSRF attack
https://wpscan.com/vulnerability/e72bbe9b-e51d-40ab-820d-404e0cb86ee6
2023-07-04T18:10:50.115Z
2023-07-31T09:37:37.183Z
2023-07-31T09:37:37.183Z
{'Vendor': 'Unknown', 'Product': 'WooCommerce Pre-Orders', 'Versions': '0'}
CVE-2023-3854
A vulnerability classified as critical has been found in phpscriptpoint BloodBank 1.1. Affected is an unknown function of the file /search of the component POST Parameter Handler. The manipulation of the argument country/city/blood_group_id leads to sql injection. It is possible to launch the attack remotely. VDB-235206 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235206
2023-07-23T13:00:56.987Z
2023-07-23T23:00:04.608Z
2023-10-24T06:46:31.320Z
{'Vendor': 'phpscriptpoint', 'Product': 'BloodBank', 'Versions': '1.1'}
CVE-2023-3784
A vulnerability was found in Dooblou WiFi File Explorer 1.13.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument search/order/download/mode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235051.
https://vuldb.com/?id.235051
2023-07-20T07:06:35.649Z
2023-07-20T08:02:02.627Z
2023-10-23T17:40:04.311Z
{'Vendor': 'Dooblou', 'Product': 'WiFi File Explorer', 'Versions': '1.13.3'}
CVE-2023-3291
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5
2023-06-16T00:00:00
2023-06-16T00:00:00
2023-07-15T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-3209
The MStore API WordPress plugin before 3.9.7 does not secure most of its AJAX actions by implementing privilege checks, nonce checks, or a combination of both.
https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c
2023-06-12T15:09:38.041Z
2023-07-10T12:41:04.575Z
2023-07-10T13:05:50.082Z
{'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'}
CVE-2023-3659
A vulnerability has been found in SourceCodester AC Repair and Services System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/?page=user/manage_user. The manipulation of the argument firstname/middlename leads to cross site scripting. The attack can be launched remotely. The identifier VDB-234013 was assigned to this vulnerability.
https://vuldb.com/?id.234013
2023-07-13T09:49:03.746Z
2023-07-13T11:00:04.551Z
2023-10-23T15:10:04.095Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-3989
A vulnerability was found in SourceCodester Jewelry Store System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file add_customer.php. The manipulation leads to cross site scripting. The attack may be launched remotely. VDB-235610 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235610
2023-07-27T20:01:07.190Z
2023-07-28T06:31:03.857Z
2023-10-24T07:59:02.598Z
{'Vendor': 'SourceCodester', 'Product': 'Jewelry Store System', 'Versions': '1.0'}
CVE-2023-3823
In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down. 
https://github.com/php/php-src/security/advisories/GHSA-3qrf-m4j2-pcrr
2023-07-21T16:16:57.133Z
2023-08-11T05:42:25.771Z
2023-08-11T05:42:25.771Z
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.*, 8.1.*, 8.2.*'}
CVE-2023-3570
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP DELETE request to gain full access to the device.
https://cert.vde.com/en/advisories/VDE-2023-018/
2023-07-10T07:53:11.063Z
2023-08-08T06:52:57.641Z
2023-08-25T06:07:25.366Z
{'Vendor': 'PHOENIX CONTACT', 'Product': 'WP 6070-WVPS', 'Versions': '0'}
CVE-2023-3120
A vulnerability, which was classified as critical, was found in SourceCodester Service Provider Management System 1.0. This affects an unknown part of the file view_service.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230799.
https://vuldb.com/?id.230799
2023-06-06T10:03:40.683Z
2023-06-06T11:00:04.154Z
2023-10-23T12:41:56.319Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-3435
The User Activity Log WordPress plugin before 1.6.5 does not correctly sanitise and escape several parameters before using it in a SQL statement as part of its exportation feature, allowing unauthenticated attackers to conduct SQL injection attacks.
https://wpscan.com/vulnerability/30a37a61-0d16-46f7-b9d8-721d983afc6b
2023-06-27T17:40:30.280Z
2023-08-14T19:10:19.283Z
2024-01-16T15:54:04.428Z
{'Vendor': 'Unknown', 'Product': 'User Activity Log', 'Versions': '0'}
CVE-2023-3065
Improper Authentication vulnerability in Mobatime mobile application AMXGT100 allows Authentication Bypass.This issue affects Mobatime mobile application AMXGT100 through 1.3.20.
https://borelenzo.github.io/stuff/2023/06/02/cve-2023-3064_65_66.html
2023-06-02T14:24:18.278Z
2023-06-05T08:27:33.950Z
2023-06-05T08:27:33.950Z
{'Vendor': 'Mobatime', 'Product': 'Mobatime mobile application AMXGT100', 'Versions': '0'}
CVE-2023-3177
A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin\inquiries\view_inquiry.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231151.
https://vuldb.com/?id.231151
2023-06-09T05:24:42.143Z
2023-06-09T06:00:04.330Z
2023-10-23T13:00:15.427Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-3527
A CSV injection vulnerability was found in the Avaya Call Management System (CMS) Supervisor web application which allows a user with administrative privileges to input crafted data which, when exported to a CSV file, may attempt arbitrary command execution on the system used to open the file by a spreadsheet software such as Microsoft Excel.  
https://download.avaya.com/css/public/documents/101086364
2023-07-06T16:01:05.440Z
2023-07-18T21:10:36.841Z
2023-07-18T21:10:36.841Z
{'Vendor': 'Avaya', 'Product': 'Avaya Call Management System', 'Versions': '19.x.x.x'}
CVE-2023-3874
A vulnerability, which was classified as critical, was found in Campcodes Beauty Salon Management System 1.0. Affected is an unknown function of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235236.
https://vuldb.com/?id.235236
2023-07-24T16:42:39.447Z
2023-07-25T01:00:05.230Z
2023-10-24T07:01:10.368Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3032
Unrestricted Upload of File with Dangerous Type vulnerability in Mobatime web application (Documentary proof upload modules) allows a malicious user to Upload a Web Shell to a Web Server.This issue affects Mobatime web application: through 06.7.22.
https://borelenzo.github.io/stuff/2023/06/01/cve-2023-3032.html
2023-06-01T08:47:22.177Z
2023-06-02T12:28:40.384Z
2023-06-05T08:21:14.474Z
{'Vendor': 'Mobatime', 'Product': 'Mobatime web application', 'Versions': '0'}
CVE-2023-3462
HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.
https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714
2023-06-29T19:00:52.239Z
2023-07-31T22:40:23.432Z
2023-07-31T22:40:23.432Z
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.14.0'}
CVE-2023-3198
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_status_order_message function. This makes it possible for unauthenticated attackers to update status order message via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f30190-4576-4c2b-b069-72501538733b?source=cve
2023-06-12T13:48:53.008Z
2023-06-14T01:47:49.676Z
2023-06-14T01:47:49.676Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-3248
The All-in-one Floating Contact Form WordPress plugin before 2.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/90c7496b-552f-4566-b7ae-8c953c965352
2023-06-14T17:12:04.687Z
2023-07-24T10:20:25.254Z
2023-07-24T10:20:25.254Z
{'Vendor': 'Unknown', 'Product': 'All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs', 'Versions': '0'}
CVE-2023-3618
A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
https://access.redhat.com/security/cve/CVE-2023-3618
2023-07-11T14:46:05.545Z
2023-07-12T14:06:04.572Z
2023-08-08T16:50:48.957Z
{'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': ''}
CVE-2023-3862
A vulnerability was found in Travelmate Travelable Trek Management Solution 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Comment Box Handler. The manipulation of the argument comment leads to cross site scripting. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. VDB-235214 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235214
2023-07-23T13:21:05.671Z
2023-07-24T03:31:03.806Z
2023-10-24T06:56:17.665Z
{'Vendor': 'Travelmate', 'Product': 'Travelable Trek Management Solution', 'Versions': '1.0'}
CVE-2023-3531
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10.
https://huntr.dev/bounties/c9f0b3ff-bbc4-4ea1-a59e-8594b48bb414
2023-07-06T19:18:34.371Z
2023-07-06T19:18:45.317Z
2023-07-06T19:18:45.317Z
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-3161
A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font->width and font->height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=2213485
2023-06-08T00:00:00
2023-06-12T00:00:00
2023-06-12T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux Kernel (fbcon)', 'Versions': 'Fixed in kernel 6.2-rc7'}
CVE-2023-3474
A vulnerability has been found in SimplePHPscripts Simple Blog 3.2 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. It is recommended to upgrade the affected component. The identifier VDB-232753 was assigned to this vulnerability.
https://vuldb.com/?id.232753
2023-06-30T06:17:14.638Z
2023-06-30T06:31:04.753Z
2023-10-23T13:55:09.837Z
{'Vendor': 'SimplePHPscripts', 'Product': 'Simple Blog', 'Versions': '3.2'}
CVE-2023-3024
Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.
https://github.com/SiliconLabs/gecko_sdk
2023-05-31T19:31:15.221Z
2023-09-29T16:32:30.503Z
2023-09-29T16:32:30.503Z
{'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0.0'}
CVE-2023-3136
The MailArchiver plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ce330cae-c2f8-42f3-822b-ca24bf46e433?source=cve
2023-06-06T23:13:45.193Z
2023-08-30T08:28:12.297Z
2023-08-30T08:28:12.297Z
{'Vendor': 'pierrelannoy', 'Product': 'MailArchiver', 'Versions': '*'}
CVE-2023-3566
A vulnerability was found in wallabag 2.5.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /config of the component Profile Config. The manipulation of the argument Name leads to allocation of resources. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233359. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233359
2023-07-08T13:26:24.302Z
2023-07-08T17:31:03.631Z
2023-10-23T14:44:26.647Z
{'Vendor': 'n/a', 'Product': 'wallabag', 'Versions': '2.5.4'}
CVE-2023-3835
A vulnerability classified as problematic has been found in Bug Finder MineStack 1.0. This affects an unknown part of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235161 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235161
2023-07-21T20:46:08.178Z
2023-07-22T17:31:04.303Z
2023-10-24T06:24:34.047Z
{'Vendor': 'Bug Finder', 'Product': 'MineStack', 'Versions': '1.0'}
CVE-2023-3970
A vulnerability, which was classified as problematic, was found in GZ Scripts Availability Booking Calendar PHP 1.0. This affects an unknown part of the file /index.php?controller=GzUser&action=edit&id=1 of the component Image Handler. The manipulation of the argument img leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235569 was assigned to this vulnerability.
https://vuldb.com/?id.235569
2023-07-27T06:57:29.111Z
2023-07-27T12:00:06.063Z
2023-10-24T07:51:43.120Z
{'Vendor': 'GZ Scripts', 'Product': 'Availability Booking Calendar PHP', 'Versions': '1.0'}
CVE-2023-3073
Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8 via evvtgendoc.
https://github.com/tsolucio/corebos/commit/e87f77c64061b43186c80ad1b50d313c67d7f6cf
2023-06-02T00:00:00
2023-06-02T00:00:00
2023-08-24T23:57:43.859354
{'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'}
CVE-2023-3589
A Cross-Site Request Forgery (CSRF) vulnerability affecting Teamwork Cloud from No Magic Release 2021x through No Magic Release 2022x could allow with some very specific conditions an attacker to send a specifically crafted query to the server.
https://www.3ds.com/vulnerability/advisories
2023-07-10T14:22:56.221Z
2023-10-09T08:54:08.100Z
2023-10-13T09:15:26.671Z
{'Vendor': 'Dassault Systèmes', 'Product': 'Teamwork Cloud - Business Edition', 'Versions': 'No Magic Release 2021x Golden, No Magic Release 2022x Golden'}
CVE-2023-3423
Weak Password Requirements in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v 1.2.0.
https://huntr.dev/bounties/dd19c7d0-70f1-4d86-a552-611dfa8e0139
2023-06-27T03:29:13.178Z
2023-06-27T03:29:26.759Z
2023-06-27T03:29:26.759Z
{'Vendor': 'cloudexplorer-dev', 'Product': 'cloudexplorer-dev/cloudexplorer-lite', 'Versions': 'unspecified'}
CVE-2023-3264
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database. A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:29.804Z
2023-08-14T04:05:58.124Z
2023-08-25T05:03:24.641Z
{'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': 'v2.6.0'}
CVE-2023-3771
The T1 WordPress theme through 19.0 is vulnerable to unauthenticated open redirect with which any attacker and redirect users to arbitrary websites.
https://wpscan.com/vulnerability/7c6fc499-de09-4874-ab96-bdc24d550cfb/
2023-07-19T13:08:16.066Z
2024-01-16T15:54:04.782Z
2024-01-16T15:54:04.782Z
{'Vendor': 'Unknown', 'Product': 't1', 'Versions': '0'}
CVE-2023-3321
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590
2023-06-19T15:47:17.589Z
2023-07-24T17:06:31.093Z
2023-07-24T17:06:31.093Z
{'Vendor': 'ABB', 'Product': 'ABB Ability™ zenon', 'Versions': '11 build '}
CVE-2023-3008
A vulnerability classified as critical has been found in ningzichun Student Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument user/pass leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230355.
https://vuldb.com/?id.230355
2023-05-31T11:01:47.403Z
2023-05-31T11:31:03.993Z
2023-10-23T07:35:20.485Z
{'Vendor': 'ningzichun', 'Product': 'Student Management System', 'Versions': '1.0'}
CVE-2023-3458
A vulnerability was found in SourceCodester Shopping Website 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file forgot-password.php. The manipulation of the argument contact leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232675.
https://vuldb.com/?id.232675
2023-06-29T12:55:18.014Z
2023-06-29T13:31:04.889Z
2023-10-23T13:50:17.226Z
{'Vendor': 'SourceCodester', 'Product': 'Shopping Website', 'Versions': '1.0'}
CVE-2023-3233
A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It has been classified as critical. Affected is the function get_image_base64 of the file api/controller/v1/PublicController.php. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231504. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.231504
2023-06-14T05:30:58.126Z
2023-06-14T06:31:03.289Z
2023-10-23T13:11:14.335Z
{'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6'}
CVE-2023-3663
In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.
https://cert.vde.com/en/advisories/VDE-2023-022/
2023-07-13T13:04:46.976Z
2023-08-03T10:55:08.945Z
2023-08-03T10:55:08.945Z
{'Vendor': 'CODESYS', 'Product': 'CODESYS Development System', 'Versions': '3.5.11.20'}
CVE-2023-3399
An issue has been discovered in GitLab EE affecting all versions starting from 11.6 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. It was possible for an unauthorised project or group member to read the CI/CD variables using the custom project templates.
https://gitlab.com/gitlab-org/gitlab/-/issues/416244
2023-06-26T10:17:01.488Z
2023-11-06T12:08:54.970Z
2023-11-07T06:52:22.719Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.6, 16.4, 16.5'}
CVE-2023-3376
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Digital Strategy Zekiweb allows SQL Injection.This issue affects Zekiweb: before 2.
https://www.usom.gov.tr/bildirim/tr-23-0408
2023-06-23T07:58:38.492Z
2023-07-17T13:11:40.174Z
2023-07-17T13:11:40.174Z
{'Vendor': 'Digital Strategy', 'Product': 'Zekiweb', 'Versions': '0'}
CVE-2023-3726
OCSInventory allow stored email template with special characters that lead to a Stored cross-site Scripting.
https://fluidattacks.com/advisories/creed/
2023-07-17T22:17:31.210Z
2024-01-04T14:39:43.942Z
2024-01-04T14:39:43.942Z
{'Vendor': 'OCSInventory', 'Product': 'OCSInventory', 'Versions': '2.12.0'}
CVE-2023-3819
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pimcore/pimcore prior to 10.6.4.
https://huntr.dev/bounties/be5e4d4c-1b0b-4c01-a1fc-00533135817c
2023-07-21T14:37:44.153Z
2023-07-21T14:37:57.468Z
2023-07-21T14:37:57.468Z
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-3225
The Float menu WordPress plugin before 5.0.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/3c76d0f4-2ea8-433d-afb2-e35e45630899
2023-06-13T17:12:34.788Z
2023-07-10T12:41:13.941Z
2023-07-10T13:05:51.766Z
{'Vendor': 'Unknown', 'Product': 'Float menu', 'Versions': '0'}
CVE-2023-3730
Use after free in Tab Groups in Google Chrome prior to 115.0.5790.98 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:20.239Z
2023-08-01T22:39:17.106Z
2023-08-01T22:39:17.106Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3049
Unrestricted Upload of File with Dangerous Type vulnerability in TMT Lockcell allows Command Injection.This issue affects Lockcell: before 15.
https://www.usom.gov.tr/bildirim/tr-23-0345
2023-06-02T10:07:22.606Z
2023-06-13T11:47:56.294Z
2023-07-26T09:07:46.933Z
{'Vendor': 'TMT', 'Product': 'Lockcell', 'Versions': '0'}
CVE-2023-3272
Cleartext Transmission of Sensitive Information in the SICK ICR890-4 could allow a remote attacker to gather sensitive information by intercepting network traffic that is not encrypted.
https://sick.com/psirt
2023-06-15T11:32:32.808Z
2023-07-10T09:27:46.002Z
2023-07-10T09:27:46.002Z
{'Vendor': 'SICK AG', 'Product': 'ICR890-4', 'Versions': '0'}
CVE-2023-3788
A vulnerability, which was classified as problematic, has been found in ActiveITzone Active Super Shop CMS 2.5. This issue affects some unknown processing of the component Manage Details Page. The manipulation of the argument name/phone/address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235055.
https://vuldb.com/?id.235055
2023-07-20T07:16:57.873Z
2023-07-20T15:31:03.892Z
2023-10-23T17:44:56.964Z
{'Vendor': 'ActiveITzone', 'Product': 'Active Super Shop CMS', 'Versions': '2.5'}
CVE-2023-3622
Access Control Bypass Vulnerability in the SolarWinds Platform that allows an underprivileged user to read arbitrary resource
https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2023-3_release_notes.htm
2023-07-11T15:00:02.490Z
2023-07-26T14:45:18.257Z
2023-12-28T17:01:30.181Z
{'Vendor': 'SolarWinds ', 'Product': 'SolarWinds Platform ', 'Versions': '2023.2 and previous versions'}
CVE-2023-3337
A vulnerability was found in PuneethReddyHC Online Shopping System Advanced 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/reg.php of the component Admin Registration. The manipulation leads to improper authentication. The attack can be launched remotely. The identifier VDB-232009 was assigned to this vulnerability.
https://vuldb.com/?id.232009
2023-06-20T11:43:22.300Z
2023-06-20T12:00:04.541Z
2023-10-23T13:35:38.691Z
{'Vendor': 'PuneethReddyHC', 'Product': 'Online Shopping System Advanced', 'Versions': '1.0'}
CVE-2023-3767
An OS command injection vulnerability has been found on EasyPHP Webserver affecting version 14.1. This vulnerability could allow an attacker to get full access to the system by sending a specially crafted exploit to the /index.php?zone=settings parameter.
https://www.incibe.es/incibe-cert/alerta-temprana/avisos/inyeccion-de-comandos-os-en-easyphp-webserver
2023-07-19T10:34:45.262Z
2023-09-26T07:51:36.754Z
2023-09-26T07:51:36.754Z
{'Vendor': 'EasyPHP', 'Product': 'Webserver', 'Versions': '14.1'}
CVE-2023-3858
A vulnerability has been found in phpscriptpoint Car Listing 1.6 and classified as problematic. This vulnerability affects unknown code of the file /search.php. The manipulation of the argument country/state/city leads to cross site scripting. The attack can be initiated remotely. VDB-235210 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235210
2023-07-23T13:11:06.413Z
2023-07-24T01:31:03.712Z
2023-10-24T06:51:24.655Z
{'Vendor': 'phpscriptpoint', 'Product': 'Car Listing', 'Versions': '1.6'}
CVE-2023-3629
A flaw was found in Infinispan's REST, Cache retrieval endpoints do not properly evaluate the necessary admin permissions for the operation. This issue could allow an authenticated user to access information outside of their intended permissions.
https://access.redhat.com/errata/RHSA-2023:5396
2023-07-11T20:51:42.907Z
2023-12-18T13:43:07.770Z
2023-12-18T13:43:07.770Z
{'Vendor': 'n/a', 'Product': 'infinispan', 'Versions': ''}
CVE-2023-3279
The WordPress Gallery Plugin WordPress plugin before 3.39 does not validate some block attributes before using them to generate paths passed to include function/s, allowing Admin users to perform LFI attacks
https://wpscan.com/vulnerability/3b7a7070-8d61-4ff8-b003-b4ff06221635
2023-06-15T20:46:40.234Z
2023-10-16T19:39:18.389Z
2023-10-16T19:39:18.389Z
{'Vendor': 'Unknown', 'Product': 'WordPress Gallery Plugin', 'Versions': '0'}
CVE-2023-3783
A vulnerability was found in Webile 1.0.1. It has been classified as problematic. Affected is an unknown function of the component HTTP POST Request Handler. The manipulation of the argument new_file_name/c leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-235050 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235050
2023-07-20T07:03:29.690Z
2023-07-20T07:22:18.602Z
2023-10-23T17:38:50.878Z
{'Vendor': 'n/a', 'Product': 'Webile', 'Versions': '1.0.1'}