CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3015
A vulnerability has been found in yiwent Vip Video Analysis 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file data/title.php. The manipulation of the argument titurl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230359.
https://vuldb.com/?id.230359
2023-05-31T13:04:14.833Z
2023-05-31T14:00:04.846Z
2023-10-23T07:37:46.816Z
{'Vendor': 'yiwent', 'Product': 'Vip Video Analysis', 'Versions': '1.0'}
CVE-2023-3445
Cross-site Scripting (XSS) - Stored in GitHub repository spinacms/spina prior to 2.15.1.
https://huntr.dev/bounties/18a74a9d-4a2d-4bf8-ae62-56a909427070
2023-06-28T13:22:34.978Z
2023-06-28T13:22:48.106Z
2023-06-28T13:22:48.106Z
{'Vendor': 'spinacms', 'Product': 'spinacms/spina', 'Versions': 'unspecified'}
CVE-2023-3853
A vulnerability was found in phpscriptpoint BloodBank 1.1. It has been rated as problematic. This issue affects some unknown processing of the file page.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235205 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235205
2023-07-23T12:59:21.301Z
2023-07-23T22:31:04.001Z
2023-10-24T06:45:18.108Z
{'Vendor': 'phpscriptpoint', 'Product': 'BloodBank', 'Versions': '1.1'}
CVE-2023-3150
A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file posts\manage_post.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231019.
https://vuldb.com/?id.231019
2023-06-07T13:56:03.827Z
2023-06-07T17:31:03.214Z
2023-10-23T12:52:55.334Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3500
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A reflected XSS was possible when creating specific PlantUML diagrams that allowed the attacker to perform arbitrary actions on behalf of victims.
https://gitlab.com/gitlab-org/gitlab/-/issues/416902
2023-07-04T09:22:12.252Z
2023-08-02T00:07:15.239Z
2023-08-02T00:07:15.239Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.0, 16.1, 16.2'}
CVE-2023-3384
A flaw was found in the Quay registry. While the image labels created through Quay undergo validation both in the UI and backend by applying a regex (validation.py), the same validation is not performed when the label comes from an image. This flaw allows an attacker to publish a malicious image to a public registry containing a script that can be executed via Cross-site scripting (XSS).
https://access.redhat.com/security/cve/CVE-2023-3384
2023-06-23T09:29:36.852Z
2023-07-24T15:19:20.552Z
2024-01-23T00:49:33.121Z
{'Vendor': 'n/a', 'Product': 'quay-registry-container', 'Versions': ''}
CVE-2023-3691
A vulnerability, which was classified as problematic, was found in layui up to v2.8.0-rc.16. This affects an unknown part of the component HTML Attribute Handler. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.8.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-234237 was assigned to this vulnerability.
https://vuldb.com/?id.234237
2023-07-15T16:34:37.981Z
2023-07-16T16:31:02.909Z
2023-10-23T15:29:35.450Z
{'Vendor': 'n/a', 'Product': 'layui', 'Versions': 'v2.8.0-rc.0, v2.8.0-rc.1, v2.8.0-rc.2, v2.8.0-rc.3, v2.8.0-rc.4, v2.8.0-rc.5, v2.8.0-rc.6, v2.8.0-rc.7, v2.8.0-rc.8, v2.8.0-rc.9, v2.8.0-rc.10, v2.8.0-rc.11, v2.8.0-rc.12, v2.8.0-rc.13, v2.8.0-rc.14, v2.8.0-rc.15, v2.8.0-rc.16'}
CVE-2023-3412
The Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0.0. This is due to a missing capability check on the ajax_store_save() function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify plugin settings and inject malicious web scripts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b58403df-af09-4d74-88e6-140e3f2f291b?source=cve
2023-06-26T14:58:32.904Z
2023-06-27T03:28:27.818Z
2023-06-27T03:28:27.818Z
{'Vendor': 'webcraftplugins', 'Product': 'Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite', 'Versions': '*'}
CVE-2023-3042
In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn't. The oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 .  To mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables. Specifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings. Additionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs. Fix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+
https://www.dotcms.com/security/SI-68
2023-06-01T20:26:04.134Z
2023-10-17T22:52:05.453Z
2023-10-23T16:58:08.007Z
{'Vendor': 'dotCMS', 'Product': 'dotCMS core', 'Versions': '5.3.8, 21.06, 22.03, 23.01'}
CVE-2023-3557
A vulnerability was found in GZ Scripts Property Listing Script 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /preview.php. The manipulation of the argument page/layout/sort_by leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-233351. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233351
2023-07-08T11:51:56.251Z
2023-07-08T13:31:03.870Z
2023-10-23T14:26:55.191Z
{'Vendor': 'GZ Scripts', 'Product': 'Property Listing Script', 'Versions': '1.0'}
CVE-2023-3107
A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc
2023-06-05T14:10:11.626Z
2023-08-01T22:01:07.584Z
2023-08-01T22:01:07.584Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 13.1-RELEASE, 12.4-RELEASE'}
CVE-2023-3804
A vulnerability classified as problematic was found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This vulnerability affects unknown code of the file /Service/FileHandler.ashx. The manipulation of the argument userFile leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235072. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235072
2023-07-20T08:28:02.257Z
2023-07-21T01:00:04.439Z
2023-10-24T06:02:36.588Z
{'Vendor': 'Chengdu', 'Product': 'Flash Flood Disaster Monitoring and Warning System', 'Versions': '2.0'}
CVE-2023-3668
Improper Encoding or Escaping of Output in GitHub repository froxlor/froxlor prior to 2.0.21.
https://huntr.dev/bounties/df8cccf4-a340-440e-a7e0-1b42e757d66e
2023-07-14T00:00:06.988Z
2023-07-14T00:00:19.815Z
2023-07-14T00:00:19.815Z
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-3392
The Read More & Accordion WordPress plugin before 3.2.7 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
https://wpscan.com/vulnerability/1e733ccf-8026-4831-9863-e505c2aecba6
2023-06-23T16:49:48.588Z
2023-10-16T08:32:44.792Z
2023-10-16T08:32:44.792Z
{'Vendor': 'Unknown', 'Product': 'Read More & Accordion', 'Versions': '0'}
CVE-2023-3238
A vulnerability, which was classified as critical, has been found in OTCMS up to 6.62. This issue affects some unknown processing of the file /admin/read.php?mudi=getSignal. The manipulation of the argument signalUrl leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231509 was assigned to this vulnerability.
https://vuldb.com/?id.231509
2023-06-14T06:12:36.410Z
2023-06-14T08:00:04.536Z
2023-10-23T13:17:20.337Z
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'}
CVE-2023-3687
A vulnerability was found in Bylancer QuickVCard 2.1. It has been rated as critical. This issue affects some unknown processing of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be initiated remotely. The identifier VDB-234233 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234233
2023-07-15T16:22:01.984Z
2023-07-16T13:31:03.418Z
2023-10-23T15:24:42.614Z
{'Vendor': 'Bylancer', 'Product': 'QuickVCard', 'Versions': '2.1'}
CVE-2023-3404
The ProfileGrid plugin for WordPress is vulnerable to unauthorized decryption of private information in versions up to, and including, 5.5.0. This is due to the passphrase and iv being hardcoded in the 'pm_encrypt_decrypt_pass' function and used across all sites running the plugin. This makes it possible for authenticated attackers, with administrator-level permissions or above to decrypt and view users' passwords. If combined with another vulnerability, this can potentially grant lower-privileged users access to users' passwords.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6d490bfb-6560-428e-ad91-0f8d8bc9b1f2?source=cve
2023-06-26T12:32:34.057Z
2023-08-31T05:33:10.376Z
2023-08-31T05:33:10.376Z
{'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'}
CVE-2023-3957
The ACF Photo Gallery Field plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient restriction on the 'apg_profile_update' function in versions up to, and including, 1.9. This makes it possible for authenticated attackers, with subscriber-level permissions or above, to update the user metas arbitrarily. The meta value can only be a string.
https://www.wordfence.com/threat-intel/vulnerabilities/id/689511e0-1355-4fcb-8a72-d819abc8e9a3?source=cve
2023-07-26T17:43:11.122Z
2023-07-27T06:54:16.133Z
2023-07-27T06:54:16.133Z
{'Vendor': 'navzme', 'Product': 'ACF Photo Gallery Field', 'Versions': '*'}
CVE-2023-3812
An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.
https://access.redhat.com/errata/RHSA-2023:6799
2023-07-20T13:02:44.826Z
2023-07-24T15:19:21.817Z
2024-01-25T20:44:32.980Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.1-rc4'}
CVE-2023-3111
A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().
https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6%40gmail.com/
2023-06-05T00:00:00
2023-06-05T00:00:00
2023-10-19T23:07:21.269649
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to Kernel 6.0-rc2'}
CVE-2023-3541
A vulnerability has been found in ThinuTech ThinuCMS 1.5 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /author_posts.php. The manipulation of the argument author with the input g6g12<script>alert(1)</script>o8sdm leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233293 was assigned to this vulnerability.
https://vuldb.com/?id.233293
2023-07-07T12:06:49.767Z
2023-07-07T15:31:03.050Z
2023-10-23T14:18:22.365Z
{'Vendor': 'ThinuTech', 'Product': 'ThinuCMS', 'Versions': '1.5'}
CVE-2023-3795
A vulnerability classified as critical was found in Bug Finder ChainCity Real Estate Investment Platform 1.0. Affected by this vulnerability is an unknown functionality of the file /property of the component GET Parameter Handler. The manipulation of the argument name leads to sql injection. The associated identifier of this vulnerability is VDB-235063. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235063
2023-07-20T07:54:53.764Z
2023-07-20T20:31:04.016Z
2023-10-23T18:38:31.299Z
{'Vendor': 'Bug Finder', 'Product': 'ChainCity Real Estate Investment Platform', 'Versions': '1.0'}
CVE-2023-3280
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.
https://security.paloaltonetworks.com/CVE-2023-3280
2023-06-15T23:55:42.807Z
2023-09-13T16:13:29.266Z
2023-09-13T16:13:29.266Z
{'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XDR Agent', 'Versions': '5.0, 7.5-CE, 7.9, 7.9-CE, 8.0, 8.1'}
CVE-2023-3900
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. An invalid 'start_sha' value on merge requests page may lead to Denial of Service as Changes tab would not load.
https://gitlab.com/gitlab-org/gitlab/-/issues/418770
2023-07-25T10:30:28.129Z
2023-08-02T00:07:05.231Z
2023-08-02T00:07:05.231Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.1, 16.2'}
CVE-2023-3453
ETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-01
2023-06-28T20:05:19.353Z
2023-08-23T21:14:17.553Z
2023-08-23T21:14:17.553Z
{'Vendor': 'ETIC Telecom', 'Product': 'Remote Access Server (RAS)', 'Versions': '0'}
CVE-2023-3003
A vulnerability classified as critical was found in SourceCodester Train Station Ticketing System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_prices.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230347.
https://vuldb.com/?id.230347
2023-05-31T07:58:39.412Z
2023-05-31T08:31:03.102Z
2023-10-23T07:30:27.560Z
{'Vendor': 'SourceCodester', 'Product': 'Train Station Ticketing System', 'Versions': '1.0'}
CVE-2023-3146
A vulnerability, which was classified as critical, was found in SourceCodester Online Discussion Forum Site 1.0. This affects an unknown part of the file admin\categories\manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231015.
https://vuldb.com/?id.231015
2023-06-07T13:55:48.029Z
2023-06-07T15:31:03.632Z
2023-10-23T12:48:02.403Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3845
A vulnerability was found in mooSocial mooDating 1.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /friends/ajax_invite of the component URL Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235196. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
https://vuldb.com/?id.235196
2023-07-22T13:57:23.765Z
2023-07-23T06:00:04.120Z
2023-10-24T06:36:45.958Z
{'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'}
CVE-2023-3351
null
null
2023-06-21T11:28:09.158Z
null
2023-06-21T11:28:49.486Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3701
Aqua Drive, in its 2.4 version, is vulnerable to a relative path traversal vulnerability. By exploiting this vulnerability, an authenticated non privileged user could access/modify stored resources of other users. It could also be possible to access and modify the source and configuration files of the cloud disk platform, affecting the integrity and availability of the entire platform.
https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-aqua-esolutions
2023-07-17T07:36:44.415Z
2023-10-04T10:56:36.903Z
2023-10-04T10:56:36.903Z
{'Vendor': 'Aqua eSolutions', 'Product': 'Aqua Drive', 'Versions': ' 2.4'}
CVE-2023-3214
Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
2023-06-13T00:12:14.906Z
2023-06-13T17:51:08.391Z
2023-06-13T17:51:08.391Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'}
CVE-2023-3644
A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /classes/Master.php?f=save_inquiry. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. VDB-233890 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.233890
2023-07-12T16:27:32.629Z
2023-07-12T18:00:04.970Z
2023-10-23T15:06:24.431Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-3097
A vulnerability was found in KylinSoft kylin-software-properties on KylinOS. It has been rated as critical. This issue affects the function setMainSource. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.1-130 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230687. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230687
2023-06-05T05:07:49.785Z
2023-06-05T06:00:04.476Z
2023-10-23T12:35:50.371Z
{'Vendor': 'KylinSoft', 'Product': 'kylin-software-properties', 'Versions': 'n/a'}
CVE-2023-3994
An issue has been discovered in GitLab CE/EE affecting all versions starting from 9.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use ProjectReferenceFilter to the preview_markdown endpoint.
https://gitlab.com/gitlab-org/gitlab/-/issues/416225
2023-07-28T09:01:26.489Z
2023-08-02T00:06:50.342Z
2023-08-02T00:06:50.342Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '9.3, 16.1, 16.2'}
CVE-2023-3428
A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service.
https://access.redhat.com/security/cve/CVE-2023-3428
2023-06-27T12:45:42.917Z
2023-10-04T18:02:23.724Z
2023-10-04T18:02:23.724Z
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': '7.1.1-19'}
CVE-2023-3078
An uncontrolled search path vulnerability was reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.
https://support.lenovo.com/us/en/product_security/LEN-121183
2023-06-02T20:44:58.642Z
2023-08-17T16:47:36.274Z
2024-01-03T21:10:30.242Z
{'Vendor': 'Lenovo', 'Product': 'Universal Device Client (UDC)', 'Versions': '0'}
CVE-2023-3582
Mattermost fails to verify channel membership when linking a board to a channel allowing a low-privileged authenticated user to link a Board to a private channel they don't have access to, 
https://mattermost.com/security-updates
2023-07-10T12:41:59.203Z
2023-07-17T15:21:35.038Z
2023-07-17T15:21:35.038Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.3, 7.9.5, 7.8.7'}
CVE-2023-3756
A vulnerability was found in Creativeitem Atlas Business Directory Listing 2.13 and classified as problematic. Affected by this issue is some unknown functionality of the file /home/search. The manipulation of the argument search_string leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-234428. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234428
2023-07-18T16:36:35.775Z
2023-07-19T04:00:04.066Z
2023-10-23T17:30:18.624Z
{'Vendor': 'Creativeitem', 'Product': 'Atlas Business Directory Listing', 'Versions': '2.13'}
CVE-2023-3306
A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.231802
2023-06-18T07:00:10.368Z
2023-06-18T08:00:04.675Z
2023-10-23T13:27:06.123Z
{'Vendor': 'Ruijie', 'Product': 'RG-EW1200G', 'Versions': 'EW_3.0(1)B11P204'}
CVE-2023-3613
Mattermost WelcomeBot plugin fails to to validate the membership status when inviting or adding users to channels allowing guest accounts to be added or invited to channels by default.
https://mattermost.com/security-updates
2023-07-11T08:28:36.132Z
2023-07-17T15:31:23.674Z
2023-07-17T15:31:23.674Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost Plugins', 'Versions': '0, 0, 7.8.6, 7.10.3'}
CVE-2023-3243
** UNSUPPORTED WHEN ASSIGNED ** [An attacker can capture an authenticating hash and utilize it to create new sessions. The hash is also a poorly salted MD5 hash, which could result in a successful brute force password attack. Impacted product is BCM-WEB version 3.3.X. Recommended fix: Upgrade to a supported product such as Alerton ACM.] Out of an abundance of caution, this CVE ID is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. 
https://www.honeywell.com/us/en/product-security
2023-06-14T13:51:12.389Z
2023-06-28T20:23:21.810Z
2023-07-07T13:08:54.149Z
{'Vendor': 'Alerton', 'Product': 'BCM-WEB', 'Versions': '3.3.X'}
CVE-2023-3869
The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a comment.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b30ac1b0-eae2-4194-bf8e-ae73b4236965?source=cve
2023-07-24T16:02:28.151Z
2023-10-20T07:29:28.812Z
2023-10-20T07:29:28.812Z
{'Vendor': 'advancedcoding', 'Product': 'Comments – wpDiscuz', 'Versions': '*'}
CVE-2023-3490
SQL Injection in GitHub repository fossbilling/fossbilling prior to 0.5.3.
https://huntr.dev/bounties/4e60ebc1-e00f-48cb-b011-3cefce688ecd
2023-06-30T21:09:17.662Z
2023-06-30T21:09:30.821Z
2023-06-30T21:09:30.821Z
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3886
A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/invoice.php. The manipulation of the argument inv_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235248.
https://vuldb.com/?id.235248
2023-07-24T16:54:21.343Z
2023-07-25T07:00:14.897Z
2023-10-24T07:15:48.818Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3310
A vulnerability, which was classified as critical, has been found in code-projects Agro-School Management System 1.0. Affected by this issue is some unknown functionality of the file loaddata.php. The manipulation of the argument subject/course leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231806 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.231806
2023-06-18T11:35:41.600Z
2023-06-18T12:00:04.928Z
2023-10-23T13:31:59.026Z
{'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'}
CVE-2023-3740
Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:21.898Z
2023-08-01T22:39:18.788Z
2023-08-01T22:39:18.788Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3255
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
https://access.redhat.com/security/cve/CVE-2023-3255
2023-06-14T21:08:31.376Z
2023-09-13T16:12:52.294Z
2024-01-23T02:31:20.287Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': '8.1.0-rc0'}
CVE-2023-3605
A vulnerability was found in PHPGurukul Online Shopping Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Registration Page. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233467.
https://vuldb.com/?id.233467
2023-07-10T19:20:05.031Z
2023-07-10T20:00:04.915Z
2023-10-23T14:49:19.445Z
{'Vendor': 'PHPGurukul', 'Product': 'Online Shopping Portal', 'Versions': '1.0'}
CVE-2023-3486
An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host’s file storage. This could exhaust system resources and prevent the service from operating as expected.
https://www.tenable.com/security/research/tra-2023-23
2023-06-30T18:26:50.920Z
2023-07-25T12:50:42.477Z
2023-07-26T13:35:28.378Z
{'Vendor': 'PaperCut', 'Product': 'PaperCut NG', 'Versions': '0'}
CVE-2023-3890
A vulnerability classified as problematic has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit-accepted-appointment.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235251.
https://vuldb.com/?id.235251
2023-07-24T16:57:58.449Z
2023-07-25T08:31:03.628Z
2023-10-24T07:46:49.913Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3469
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.2.
https://huntr.dev/bounties/3565cfc9-82c4-4db8-9b8f-494dd81b56ca
2023-06-30T00:00:06.251Z
2023-06-30T00:00:19.692Z
2023-06-30T00:00:19.692Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-3193
Cross-site scripting (XSS) vulnerability in the Layout module's SEO configuration in Liferay Portal 7.4.3.70 through 7.4.3.73, and Liferay DXP 7.4 update 70 through 73 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_layout_admin_web_portlet_GroupPagesPortlet_backURL` parameter.
https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3193
2023-06-12T01:31:14.692Z
2023-06-15T03:47:57.663Z
2023-06-15T03:47:57.663Z
{'Vendor': 'Liferay', 'Product': 'Portal', 'Versions': '7.4.3.70'}
CVE-2023-3039
SD ROM Utility, versions prior to 1.0.2.0 contain an Improper Access Control vulnerability. A low-privileged malicious user may potentially exploit this vulnerability to perform arbitrary code execution with limited access.
https://www.dell.com/support/kbdoc/en-us/000216282/dsa-2023-274
2023-06-01T15:08:24.833Z
2023-09-12T06:06:06.635Z
2023-09-12T06:06:06.635Z
{'Vendor': 'Dell', 'Product': 'SD ROM Utility', 'Versions': 'Versions prior to 1.0.2.0'}
CVE-2023-3717
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Farmakom Remote Administration Console allows SQL Injection.This issue affects Remote Administration Console: before 1.02.
https://www.usom.gov.tr/bildirim/tr-23-0441
2023-07-17T14:57:59.624Z
2023-08-08T10:46:36.651Z
2023-08-08T10:46:36.651Z
{'Vendor': 'Farmakom', 'Product': 'Remote Administration Console', 'Versions': '0'}
CVE-2023-3347
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
https://access.redhat.com/errata/RHSA-2023:4325
2023-06-21T04:43:49.434Z
2023-07-20T14:54:05.525Z
2024-01-23T02:34:25.111Z
{'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.17.10, 4.18.5'}
CVE-2023-3652
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digital Ant E-Commerce Software allows Reflected XSS.This issue affects E-Commerce Software: before 11.
https://https://www.usom.gov.tr/bildirim/tr-23-0443
2023-07-13T06:19:04.835Z
2023-08-08T14:40:50.144Z
2023-08-08T14:40:50.144Z
{'Vendor': 'Digital Ant', 'Product': 'E-Commerce Software', 'Versions': '0'}
CVE-2023-3202
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_firebase_server_key function. This makes it possible for unauthenticated attackers to update the firebase server key to push notification when order status changed via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b3612e-3c91-469b-98ef-fdb03b0ee9d9?source=cve
2023-06-12T14:02:21.408Z
2023-07-12T04:38:50.393Z
2023-07-12T04:38:50.393Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-3828
A vulnerability was found in Bug Finder Listplace Directory Listing Platform 3.0. It has been classified as problematic. This affects an unknown part of the file /listplace/user/coverPhotoUpdate of the component Photo Handler. The manipulation of the argument user_cover_photo leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235149 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235149
2023-07-21T20:27:43.691Z
2023-07-22T10:31:03.335Z
2023-10-24T06:16:01.797Z
{'Vendor': 'Bug Finder', 'Product': 'Listplace Directory Listing Platform', 'Versions': '3.0'}
CVE-2023-3982
Cross-site Scripting (XSS) - Stored in GitHub repository omeka/omeka-s prior to 4.0.2.
https://huntr.dev/bounties/e5e889ee-5947-4c2a-a72e-9c90e2e2a845
2023-07-27T18:32:40.591Z
2023-07-27T18:32:45.355Z
2023-07-27T18:32:45.355Z
{'Vendor': 'omeka', 'Product': 'omeka/omeka-s', 'Versions': 'unspecified'}
CVE-2023-3081
The WP Mail Logging plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: An incomplete fix was released in 1.11.1.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ef20b3e6-d8f4-458e-b604-b46ef16e229e?source=cve
2023-06-03T02:30:15.225Z
2023-07-12T04:38:51.671Z
2023-07-12T04:38:51.671Z
{'Vendor': 'smub', 'Product': 'WP Mail Logging', 'Versions': '*'}
CVE-2023-3449
A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This vulnerability affects the function actionExport of the file ?r=recruit/interview/export&interviews=x of the component Interview Management Export. The manipulation of the argument interviews leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-232546 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.232546
2023-06-28T17:16:00.316Z
2023-06-28T17:31:02.974Z
2023-10-23T13:46:37.455Z
{'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'}
CVE-2023-3019
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
https://access.redhat.com/errata/RHSA-2024:0135
2023-05-31T14:08:11.910Z
2023-07-24T15:19:19.804Z
2024-01-25T20:51:24.791Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-3275
A vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view-pass-detail.php of the component POST Request Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The identifier VDB-231625 was assigned to this vulnerability.
https://vuldb.com/?id.231625
2023-06-15T12:12:06.654Z
2023-06-15T12:31:03.861Z
2023-10-23T13:23:26.433Z
{'Vendor': 'PHPGurukul', 'Product': 'Rail Pass Management System', 'Versions': '1.0'}
CVE-2023-3625
A vulnerability classified as critical was found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230706. This vulnerability affects unknown code of the file /Duty/AjaxHandle/Write/UploadFile.ashx of the component Duty Write-UploadFile. The manipulation of the argument Filedata leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-233578 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233578
2023-07-11T15:33:12.499Z
2023-07-11T17:31:03.567Z
2023-10-23T15:00:18.267Z
{'Vendor': 'Suncreate', 'Product': 'Mountain Flood Disaster Prevention Monitoring and Early Warning System', 'Versions': '20230706'}
CVE-2023-3330
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to obtain specific files in the product.
https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
2023-06-20T01:14:05.654Z
2023-06-28T01:13:03.181Z
2023-08-28T00:56:00.401Z
{'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'}
CVE-2023-3760
A vulnerability has been found in Intergard SGS 8.7.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Change Password Handler. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-234445 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234445
2023-07-18T19:28:30.503Z
2023-07-19T05:31:03.867Z
2023-10-23T17:33:58.191Z
{'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'}
CVE-2023-3808
A vulnerability was found in Hospital Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file patientforgotpassword.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235076.
https://vuldb.com/?id.235076
2023-07-20T08:44:08.069Z
2023-07-21T03:00:05.799Z
2023-10-24T06:07:29.501Z
{'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'}
CVE-2023-3672
Cross-site Scripting (XSS) - DOM in GitHub repository plaidweb/webmention.js prior to 0.5.5.
https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa
2023-07-14T09:27:20.240Z
2023-07-14T09:27:32.135Z
2023-07-14T09:27:32.135Z
{'Vendor': 'plaidweb', 'Product': 'plaidweb/webmention.js', 'Versions': 'unspecified'}
CVE-2023-3388
The Beautiful Cookie Consent Banner for WordPress is vulnerable to Stored Cross-Site Scripting via the 'nsc_bar_content_href' parameter in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. A partial patch was made available in 2.10.1 and the issue was fully patched in 2.10.2.
https://www.wordfence.com/threat-intel/vulnerabilities/id/542a4079-b1a2-49bc-9ddd-ba7978c9992e?source=cve
2023-06-23T13:10:57.580Z
2023-06-24T02:00:18.847Z
2023-06-24T02:00:18.847Z
{'Vendor': 'nikelschubert', 'Product': 'Beautiful Cookie Consent Banner', 'Versions': '*'}
CVE-2023-3222
Vulnerability in the password recovery mechanism of Password Recovery plugin for Roundcube, in its 1.2 version, which could allow a remote attacker to change an existing user´s password by adding a 6-digit numeric token. An attacker could create an automatic script to test all possible values because the platform has no limit on the number of requests.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-roundcube-password-recovery-plugin
2023-06-13T15:40:03.340Z
2023-09-04T12:49:47.169Z
2023-09-04T12:49:47.169Z
{'Vendor': 'AlfnRU', 'Product': 'Password Recovery Plugin', 'Versions': '1.2'}
CVE-2023-3737
Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:21.152Z
2023-08-01T22:39:18.253Z
2023-08-01T22:39:18.253Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3058
A vulnerability was found in 07FLY CRM up to 1.2.0. It has been declared as problematic. This vulnerability affects unknown code of the component User Profile Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230560.
https://vuldb.com/?id.230560
2023-06-02T12:00:39.280Z
2023-06-02T13:00:04.613Z
2023-10-23T07:47:32.539Z
{'Vendor': '07FLY', 'Product': 'CRM', 'Versions': '1.0, 1.1, 1.2'}
CVE-2023-3234
A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It has been declared as problematic. Affected by this vulnerability is the function put_image of the file api/controller/v1/PublicController.php. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231505 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.231505
2023-06-14T05:31:01.735Z
2023-06-14T06:31:04.253Z
2023-10-23T13:12:27.482Z
{'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6'}
CVE-2023-3664
The FileOrganizer WordPress plugin through 1.0.2 does not restrict functionality on multisite instances, allowing site admins to gain full control over the server.
https://wpscan.com/vulnerability/d59e6eac-3ebf-40e0-800c-8cbef345423f
2023-07-13T14:13:14.346Z
2023-09-25T15:56:55.853Z
2023-09-25T15:56:55.853Z
{'Vendor': 'Unknown', 'Product': 'FileOrganizer', 'Versions': '0'}
CVE-2023-3371
The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1033b4d-82a0-4484-aebf-f35d6a2a9a13?source=cve
2023-06-22T16:50:17.015Z
2023-06-27T01:55:28.259Z
2023-06-27T01:55:28.259Z
{'Vendor': 'wpdevteam', 'Product': 'EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor', 'Versions': '*'}
CVE-2023-3721
The WP-EMail WordPress plugin before 2.69.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/3f90347a-6586-4648-9f2c-d4f321bf801a
2023-07-17T18:29:16.548Z
2023-08-14T19:10:15.596Z
2024-01-16T15:54:05.380Z
{'Vendor': 'Unknown', 'Product': 'WP-EMail', 'Versions': '0'}
CVE-2023-3849
A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-235200. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
https://vuldb.com/?id.235200
2023-07-22T13:57:43.636Z
2023-07-23T09:00:03.826Z
2023-10-24T06:41:38.534Z
{'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'}
CVE-2023-3633
An out-of-bounds write vulnerability in Bitdefender Engines on Windows causes the engine to crash. This issue affects Bitdefender Engines version 7.94791 and lower.
https://www.bitdefender.com/support/security-advisories/out-of-bounds-memory-corruption-issue-in-ceva-engine-va-11010
2023-07-12T08:30:01.704Z
2023-07-14T19:29:34.392Z
2023-07-14T19:29:34.392Z
{'Vendor': 'Bitdefender', 'Product': 'Engines', 'Versions': '7.94791'}
CVE-2023-3263
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:27.340Z
2023-08-14T04:02:55.740Z
2023-08-14T04:02:55.740Z
{'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'}
CVE-2023-3799
A vulnerability was found in IBOS OA 4.5.5 and classified as critical. This issue affects some unknown processing of the file ?r=article/category/del of the component Delete Category Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235067. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235067
2023-07-20T08:13:00.456Z
2023-07-20T22:31:03.897Z
2023-10-23T18:43:24.375Z
{'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'}
CVE-2023-3776
A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f
2023-07-19T15:50:20.757Z
2023-07-21T20:49:53.667Z
2023-07-22T09:43:27.743Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '2.6'}
CVE-2023-3326
pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:04.pam_krb5.asc
2023-06-19T16:14:36.133Z
2023-06-22T16:37:51.360Z
2023-08-01T22:40:58.267Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 13.1-RELEASE, 12.4-RELEASE'}
CVE-2023-3832
A vulnerability was found in Bug Finder Wedding Wonders 1.0. It has been classified as problematic. Affected is an unknown function of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. It is possible to launch the attack remotely. VDB-235158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235158
2023-07-21T20:41:39.362Z
2023-07-22T15:31:03.384Z
2023-10-24T06:20:54.475Z
{'Vendor': 'Bug Finder', 'Product': 'Wedding Wonders', 'Versions': '1.0'}
CVE-2023-3998
The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the userRate function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a post.
https://www.wordfence.com/threat-intel/vulnerabilities/id/9d09bdab-ffab-44cc-bba2-821b21a8e343?source=cve
2023-07-28T18:03:01.833Z
2023-10-20T07:29:24.732Z
2023-10-20T07:29:24.732Z
{'Vendor': 'advancedcoding', 'Product': 'Comments – wpDiscuz', 'Versions': '*'}
CVE-2023-3131
The MStore API WordPress plugin before 3.9.7 does not secure most of its AJAX actions by implementing privilege checks, nonce checks, or a combination of both.
https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c
2023-06-06T19:39:10.707Z
2023-07-10T12:41:17.016Z
2023-07-10T13:05:52.286Z
{'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'}
CVE-2023-3561
A vulnerability, which was classified as problematic, was found in GZ Scripts PHP GZ Hotel Booking Script 1.8. This affects an unknown part of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233355. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233355
2023-07-08T13:20:32.517Z
2023-07-08T15:31:03.360Z
2023-10-23T14:31:47.885Z
{'Vendor': 'GZ Scripts', 'Product': 'PHP GZ Hotel Booking Script', 'Versions': '1.8'}
CVE-2023-3074
Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8.
https://huntr.dev/bounties/6132f557-3f0f-465d-990f-4329313349a4
2023-06-02T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'}
CVE-2023-3424
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint.
https://gitlab.com/gitlab-org/gitlab/-/issues/409802
2023-06-27T05:16:56.910Z
2023-07-13T02:08:07.284Z
2023-07-13T02:08:07.284Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.3, 16.0, 16.1'}
CVE-2023-3977
Several plugins for WordPress by Inisev are vulnerable to Cross-Site Request Forgery to unauthorized installation of plugins due to a missing nonce check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for unauthenticated attackers to install plugins from the limited list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=cve
2023-07-27T16:08:30.895Z
2023-07-28T04:37:03.018Z
2023-07-28T04:37:03.018Z
{'Vendor': 'steve85b', 'Product': 'SSL Mixed Content Fix', 'Versions': '*'}
CVE-2023-3648
Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-21.html
2023-07-13T02:20:56.371Z
2023-07-14T06:16:33.827Z
2023-07-14T06:16:33.827Z
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0, 3.6.0'}
CVE-2023-3218
Race Condition within a Thread in GitHub repository it-novum/openitcockpit prior to 4.6.5.
https://huntr.dev/bounties/94d50b11-20ca-46e3-9086-dd6836421675
2023-06-13T00:00:00
2023-06-13T00:00:00
2023-06-13T00:00:00
{'Vendor': 'it-novum', 'Product': 'it-novum/openitcockpit', 'Versions': 'unspecified'}
CVE-2023-3536
A vulnerability was found in SimplePHPscripts Funeral Script PHP 3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-233288.
https://vuldb.com/?id.233288
2023-07-07T11:57:26.126Z
2023-07-07T13:00:03.923Z
2023-10-23T14:12:16.006Z
{'Vendor': 'SimplePHPscripts', 'Product': 'Funeral Script PHP', 'Versions': '3.1'}
CVE-2023-3166
The Lana Email Logger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, Lana Email Logger due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d5f372bf-6b13-4ba7-8b8b-9d3b500e4420?source=cve
2023-06-08T17:22:06.108Z
2023-07-12T04:38:51.244Z
2023-07-12T04:38:51.244Z
{'Vendor': 'lanacodes', 'Product': 'Lana Email Logger', 'Versions': '*'}
CVE-2023-3920
An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation.
https://gitlab.com/gitlab-org/gitlab/-/issues/417481
2023-07-25T10:30:33.135Z
2023-09-29T06:02:31.303Z
2023-09-29T06:02:31.303Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.2, 16.3, 16.4'}
CVE-2023-3473
A vulnerability, which was classified as critical, was found in Campcodes Retro Cellphone Online Store 1.0. Affected is an unknown function of the file /admin/edit_product.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232752.
https://vuldb.com/?id.232752
2023-06-30T06:10:29.524Z
2023-06-30T06:31:03.791Z
2023-10-23T13:53:56.683Z
{'Vendor': 'Campcodes', 'Product': 'Retro Cellphone Online Store', 'Versions': '1.0'}
CVE-2023-3189
A vulnerability, which was classified as problematic, was found in SourceCodester Online School Fees System 1.0. This affects an unknown part of the file /paysystem/branch.php of the component POST Parameter Handler. The manipulation of the argument branch leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231501 was assigned to this vulnerability.
https://vuldb.com/?id.231501
2023-06-10T04:06:17.792Z
2023-06-14T05:31:03.452Z
2023-10-23T13:05:08.382Z
{'Vendor': 'SourceCodester', 'Product': 'Online School Fees System', 'Versions': '1.0'}
CVE-2023-3023
The WP EasyCart plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in versions up to, and including, 5.4.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level or above permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c1ddaf-4bf2-4937-b7bf-a09162db043e?source=cve
2023-05-31T19:10:12.395Z
2023-07-12T04:38:49.121Z
2023-07-12T04:38:49.121Z
{'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'}
CVE-2023-3873
A vulnerability, which was classified as critical, has been found in Campcodes Beauty Salon Management System 1.0. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235235.
https://vuldb.com/?id.235235
2023-07-24T16:41:32.368Z
2023-07-25T00:00:05.904Z
2023-10-24T06:59:57.182Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3170
The tagDiv Composer WordPress plugin before 4.2, used as a companion by the Newspaper and Newsmag themes from tagDiv, does not validate and escape some settings, which could allow users with Admin privileges to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/e95ff3c6-283b-4e5e-bea0-1f1375da08da
2023-06-08T18:55:16.306Z
2023-09-11T19:46:09.078Z
2023-09-11T19:46:09.078Z
{'Vendor': 'Unknown', 'Product': 'tagDiv Composer', 'Versions': '0'}
CVE-2023-3520
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository it-novum/openitcockpit prior to 4.6.6.
https://huntr.dev/bounties/f3b277bb-91db-419e-bcc4-fe0b055d2551
2023-07-06T00:00:07.172Z
2023-07-06T00:00:20.096Z
2023-07-06T00:00:20.096Z
{'Vendor': 'it-novum', 'Product': 'it-novum/openitcockpit', 'Versions': 'unspecified'}