CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3015 | A vulnerability has been found in yiwent Vip Video Analysis 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file data/title.php. The manipulation of the argument titurl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230359. | https://vuldb.com/?id.230359 | 2023-05-31T13:04:14.833Z | 2023-05-31T14:00:04.846Z | 2023-10-23T07:37:46.816Z | {'Vendor': 'yiwent', 'Product': 'Vip Video Analysis', 'Versions': '1.0'} |
CVE-2023-3445 | Cross-site Scripting (XSS) - Stored in GitHub repository spinacms/spina prior to 2.15.1. | https://huntr.dev/bounties/18a74a9d-4a2d-4bf8-ae62-56a909427070 | 2023-06-28T13:22:34.978Z | 2023-06-28T13:22:48.106Z | 2023-06-28T13:22:48.106Z | {'Vendor': 'spinacms', 'Product': 'spinacms/spina', 'Versions': 'unspecified'} |
CVE-2023-3853 | A vulnerability was found in phpscriptpoint BloodBank 1.1. It has been rated as problematic. This issue affects some unknown processing of the file page.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-235205 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235205 | 2023-07-23T12:59:21.301Z | 2023-07-23T22:31:04.001Z | 2023-10-24T06:45:18.108Z | {'Vendor': 'phpscriptpoint', 'Product': 'BloodBank', 'Versions': '1.1'} |
CVE-2023-3150 | A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file posts\manage_post.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231019. | https://vuldb.com/?id.231019 | 2023-06-07T13:56:03.827Z | 2023-06-07T17:31:03.214Z | 2023-10-23T12:52:55.334Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3500 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.0 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A reflected XSS was possible when creating specific PlantUML diagrams that allowed the attacker to perform arbitrary actions on behalf of victims. | https://gitlab.com/gitlab-org/gitlab/-/issues/416902 | 2023-07-04T09:22:12.252Z | 2023-08-02T00:07:15.239Z | 2023-08-02T00:07:15.239Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.0, 16.1, 16.2'} |
CVE-2023-3384 | A flaw was found in the Quay registry. While the image labels created through Quay undergo validation both in the UI and backend by applying a regex (validation.py), the same validation is
not performed when the label comes from an image. This flaw allows an attacker to publish a malicious image to a public registry containing a script that can be executed via Cross-site scripting (XSS). | https://access.redhat.com/security/cve/CVE-2023-3384 | 2023-06-23T09:29:36.852Z | 2023-07-24T15:19:20.552Z | 2024-01-23T00:49:33.121Z | {'Vendor': 'n/a', 'Product': 'quay-registry-container', 'Versions': ''} |
CVE-2023-3691 | A vulnerability, which was classified as problematic, was found in layui up to v2.8.0-rc.16. This affects an unknown part of the component HTML Attribute Handler. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.8.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-234237 was assigned to this vulnerability. | https://vuldb.com/?id.234237 | 2023-07-15T16:34:37.981Z | 2023-07-16T16:31:02.909Z | 2023-10-23T15:29:35.450Z | {'Vendor': 'n/a', 'Product': 'layui', 'Versions': 'v2.8.0-rc.0, v2.8.0-rc.1, v2.8.0-rc.2, v2.8.0-rc.3, v2.8.0-rc.4, v2.8.0-rc.5, v2.8.0-rc.6, v2.8.0-rc.7, v2.8.0-rc.8, v2.8.0-rc.9, v2.8.0-rc.10, v2.8.0-rc.11, v2.8.0-rc.12, v2.8.0-rc.13, v2.8.0-rc.14, v2.8.0-rc.15, v2.8.0-rc.16'} |
CVE-2023-3412 | The Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0.0. This is due to a missing capability check on the ajax_store_save() function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify plugin settings and inject malicious web scripts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b58403df-af09-4d74-88e6-140e3f2f291b?source=cve | 2023-06-26T14:58:32.904Z | 2023-06-27T03:28:27.818Z | 2023-06-27T03:28:27.818Z | {'Vendor': 'webcraftplugins', 'Product': 'Image Map Pro – Drag-and-drop Builder for Interactive Images – Lite', 'Versions': '*'} |
CVE-2023-3042 | In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn't.
The oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 .
To mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables.
Specifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings.
Additionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs.
Fix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+
| https://www.dotcms.com/security/SI-68 | 2023-06-01T20:26:04.134Z | 2023-10-17T22:52:05.453Z | 2023-10-23T16:58:08.007Z | {'Vendor': 'dotCMS', 'Product': 'dotCMS core', 'Versions': '5.3.8, 21.06, 22.03, 23.01'} |
CVE-2023-3557 | A vulnerability was found in GZ Scripts Property Listing Script 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /preview.php. The manipulation of the argument page/layout/sort_by leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-233351. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233351 | 2023-07-08T11:51:56.251Z | 2023-07-08T13:31:03.870Z | 2023-10-23T14:26:55.191Z | {'Vendor': 'GZ Scripts', 'Product': 'Property Listing Script', 'Versions': '1.0'} |
CVE-2023-3107 | A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
| https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc | 2023-06-05T14:10:11.626Z | 2023-08-01T22:01:07.584Z | 2023-08-01T22:01:07.584Z | {'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 13.1-RELEASE, 12.4-RELEASE'} |
CVE-2023-3804 | A vulnerability classified as problematic was found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This vulnerability affects unknown code of the file /Service/FileHandler.ashx. The manipulation of the argument userFile leads to unrestricted upload. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235072. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235072 | 2023-07-20T08:28:02.257Z | 2023-07-21T01:00:04.439Z | 2023-10-24T06:02:36.588Z | {'Vendor': 'Chengdu', 'Product': 'Flash Flood Disaster Monitoring and Warning System', 'Versions': '2.0'} |
CVE-2023-3668 | Improper Encoding or Escaping of Output in GitHub repository froxlor/froxlor prior to 2.0.21. | https://huntr.dev/bounties/df8cccf4-a340-440e-a7e0-1b42e757d66e | 2023-07-14T00:00:06.988Z | 2023-07-14T00:00:19.815Z | 2023-07-14T00:00:19.815Z | {'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'} |
CVE-2023-3392 | The Read More & Accordion WordPress plugin before 3.2.7 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present. | https://wpscan.com/vulnerability/1e733ccf-8026-4831-9863-e505c2aecba6 | 2023-06-23T16:49:48.588Z | 2023-10-16T08:32:44.792Z | 2023-10-16T08:32:44.792Z | {'Vendor': 'Unknown', 'Product': 'Read More & Accordion', 'Versions': '0'} |
CVE-2023-3238 | A vulnerability, which was classified as critical, has been found in OTCMS up to 6.62. This issue affects some unknown processing of the file /admin/read.php?mudi=getSignal. The manipulation of the argument signalUrl leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231509 was assigned to this vulnerability. | https://vuldb.com/?id.231509 | 2023-06-14T06:12:36.410Z | 2023-06-14T08:00:04.536Z | 2023-10-23T13:17:20.337Z | {'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 6.10, 6.11, 6.12, 6.13, 6.14, 6.15, 6.16, 6.17, 6.18, 6.19, 6.20, 6.21, 6.22, 6.23, 6.24, 6.25, 6.26, 6.27, 6.28, 6.29, 6.30, 6.31, 6.32, 6.33, 6.34, 6.35, 6.36, 6.37, 6.38, 6.39, 6.40, 6.41, 6.42, 6.43, 6.44, 6.45, 6.46, 6.47, 6.48, 6.49, 6.50, 6.51, 6.52, 6.53, 6.54, 6.55, 6.56, 6.57, 6.58, 6.59, 6.60, 6.61, 6.62'} |
CVE-2023-3687 | A vulnerability was found in Bylancer QuickVCard 2.1. It has been rated as critical. This issue affects some unknown processing of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be initiated remotely. The identifier VDB-234233 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234233 | 2023-07-15T16:22:01.984Z | 2023-07-16T13:31:03.418Z | 2023-10-23T15:24:42.614Z | {'Vendor': 'Bylancer', 'Product': 'QuickVCard', 'Versions': '2.1'} |
CVE-2023-3404 | The ProfileGrid plugin for WordPress is vulnerable to unauthorized decryption of private information in versions up to, and including, 5.5.0. This is due to the passphrase and iv being hardcoded in the 'pm_encrypt_decrypt_pass' function and used across all sites running the plugin. This makes it possible for authenticated attackers, with administrator-level permissions or above to decrypt and view users' passwords. If combined with another vulnerability, this can potentially grant lower-privileged users access to users' passwords. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6d490bfb-6560-428e-ad91-0f8d8bc9b1f2?source=cve | 2023-06-26T12:32:34.057Z | 2023-08-31T05:33:10.376Z | 2023-08-31T05:33:10.376Z | {'Vendor': 'metagauss', 'Product': 'ProfileGrid – User Profiles, Memberships, Groups and Communities', 'Versions': '*'} |
CVE-2023-3957 | The ACF Photo Gallery Field plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient restriction on the 'apg_profile_update' function in versions up to, and including, 1.9. This makes it possible for authenticated attackers, with subscriber-level permissions or above, to update the user metas arbitrarily. The meta value can only be a string. | https://www.wordfence.com/threat-intel/vulnerabilities/id/689511e0-1355-4fcb-8a72-d819abc8e9a3?source=cve | 2023-07-26T17:43:11.122Z | 2023-07-27T06:54:16.133Z | 2023-07-27T06:54:16.133Z | {'Vendor': 'navzme', 'Product': 'ACF Photo Gallery Field', 'Versions': '*'} |
CVE-2023-3812 | An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system. | https://access.redhat.com/errata/RHSA-2023:6799 | 2023-07-20T13:02:44.826Z | 2023-07-24T15:19:21.817Z | 2024-01-25T20:44:32.980Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.1-rc4'} |
CVE-2023-3111 | A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag(). | https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6%40gmail.com/ | 2023-06-05T00:00:00 | 2023-06-05T00:00:00 | 2023-10-19T23:07:21.269649 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to Kernel 6.0-rc2'} |
CVE-2023-3541 | A vulnerability has been found in ThinuTech ThinuCMS 1.5 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /author_posts.php. The manipulation of the argument author with the input g6g12<script>alert(1)</script>o8sdm leads to cross site scripting. The attack can be launched remotely. The identifier VDB-233293 was assigned to this vulnerability. | https://vuldb.com/?id.233293 | 2023-07-07T12:06:49.767Z | 2023-07-07T15:31:03.050Z | 2023-10-23T14:18:22.365Z | {'Vendor': 'ThinuTech', 'Product': 'ThinuCMS', 'Versions': '1.5'} |
CVE-2023-3795 | A vulnerability classified as critical was found in Bug Finder ChainCity Real Estate Investment Platform 1.0. Affected by this vulnerability is an unknown functionality of the file /property of the component GET Parameter Handler. The manipulation of the argument name leads to sql injection. The associated identifier of this vulnerability is VDB-235063. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235063 | 2023-07-20T07:54:53.764Z | 2023-07-20T20:31:04.016Z | 2023-10-23T18:38:31.299Z | {'Vendor': 'Bug Finder', 'Product': 'ChainCity Real Estate Investment Platform', 'Versions': '1.0'} |
CVE-2023-3280 | A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.
| https://security.paloaltonetworks.com/CVE-2023-3280 | 2023-06-15T23:55:42.807Z | 2023-09-13T16:13:29.266Z | 2023-09-13T16:13:29.266Z | {'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XDR Agent', 'Versions': '5.0, 7.5-CE, 7.9, 7.9-CE, 8.0, 8.1'} |
CVE-2023-3900 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. An invalid 'start_sha' value on merge requests page may lead to Denial of Service as Changes tab would not load. | https://gitlab.com/gitlab-org/gitlab/-/issues/418770 | 2023-07-25T10:30:28.129Z | 2023-08-02T00:07:05.231Z | 2023-08-02T00:07:05.231Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.1, 16.2'} |
CVE-2023-3453 |
ETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-01 | 2023-06-28T20:05:19.353Z | 2023-08-23T21:14:17.553Z | 2023-08-23T21:14:17.553Z | {'Vendor': 'ETIC Telecom', 'Product': 'Remote Access Server (RAS)', 'Versions': '0'} |
CVE-2023-3003 | A vulnerability classified as critical was found in SourceCodester Train Station Ticketing System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_prices.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230347. | https://vuldb.com/?id.230347 | 2023-05-31T07:58:39.412Z | 2023-05-31T08:31:03.102Z | 2023-10-23T07:30:27.560Z | {'Vendor': 'SourceCodester', 'Product': 'Train Station Ticketing System', 'Versions': '1.0'} |
CVE-2023-3146 | A vulnerability, which was classified as critical, was found in SourceCodester Online Discussion Forum Site 1.0. This affects an unknown part of the file admin\categories\manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231015. | https://vuldb.com/?id.231015 | 2023-06-07T13:55:48.029Z | 2023-06-07T15:31:03.632Z | 2023-10-23T12:48:02.403Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3845 | A vulnerability was found in mooSocial mooDating 1.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /friends/ajax_invite of the component URL Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235196. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | https://vuldb.com/?id.235196 | 2023-07-22T13:57:23.765Z | 2023-07-23T06:00:04.120Z | 2023-10-24T06:36:45.958Z | {'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'} |
CVE-2023-3351 | null | null | 2023-06-21T11:28:09.158Z | null | 2023-06-21T11:28:49.486Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3701 | Aqua Drive, in its 2.4 version, is vulnerable to a relative path traversal vulnerability. By exploiting this vulnerability, an authenticated non privileged user could access/modify stored resources of other users. It could also be possible to access and modify the source and configuration files of the cloud disk platform, affecting the integrity and availability of the entire platform. | https://www.incibe.es/en/incibe-cert/notices/aviso/relative-path-traversal-aqua-esolutions | 2023-07-17T07:36:44.415Z | 2023-10-04T10:56:36.903Z | 2023-10-04T10:56:36.903Z | {'Vendor': 'Aqua eSolutions', 'Product': 'Aqua Drive', 'Versions': ' 2.4'} |
CVE-2023-3214 | Use after free in Autofill payments in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html | 2023-06-13T00:12:14.906Z | 2023-06-13T17:51:08.391Z | 2023-06-13T17:51:08.391Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'} |
CVE-2023-3644 | A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /classes/Master.php?f=save_inquiry. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. VDB-233890 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.233890 | 2023-07-12T16:27:32.629Z | 2023-07-12T18:00:04.970Z | 2023-10-23T15:06:24.431Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-3097 | A vulnerability was found in KylinSoft kylin-software-properties on KylinOS. It has been rated as critical. This issue affects the function setMainSource. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.1-130 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230687. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230687 | 2023-06-05T05:07:49.785Z | 2023-06-05T06:00:04.476Z | 2023-10-23T12:35:50.371Z | {'Vendor': 'KylinSoft', 'Product': 'kylin-software-properties', 'Versions': 'n/a'} |
CVE-2023-3994 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 9.3 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible via sending crafted payloads which use ProjectReferenceFilter to the preview_markdown endpoint. | https://gitlab.com/gitlab-org/gitlab/-/issues/416225 | 2023-07-28T09:01:26.489Z | 2023-08-02T00:06:50.342Z | 2023-08-02T00:06:50.342Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '9.3, 16.1, 16.2'} |
CVE-2023-3428 | A heap-based buffer overflow vulnerability was found in coders/tiff.c in ImageMagick. This issue may allow a local attacker to trick the user into opening a specially crafted file, resulting in an application crash and denial of service. | https://access.redhat.com/security/cve/CVE-2023-3428 | 2023-06-27T12:45:42.917Z | 2023-10-04T18:02:23.724Z | 2023-10-04T18:02:23.724Z | {'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': '7.1.1-19'} |
CVE-2023-3078 | An uncontrolled search path vulnerability was reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges. | https://support.lenovo.com/us/en/product_security/LEN-121183 | 2023-06-02T20:44:58.642Z | 2023-08-17T16:47:36.274Z | 2024-01-03T21:10:30.242Z | {'Vendor': 'Lenovo', 'Product': 'Universal Device Client (UDC)', 'Versions': '0'} |
CVE-2023-3582 | Mattermost fails to verify channel membership when linking a board to a channel allowing a low-privileged authenticated user to link a Board to a private channel they don't have access to,
| https://mattermost.com/security-updates | 2023-07-10T12:41:59.203Z | 2023-07-17T15:21:35.038Z | 2023-07-17T15:21:35.038Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.3, 7.9.5, 7.8.7'} |
CVE-2023-3756 | A vulnerability was found in Creativeitem Atlas Business Directory Listing 2.13 and classified as problematic. Affected by this issue is some unknown functionality of the file /home/search. The manipulation of the argument search_string leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-234428. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234428 | 2023-07-18T16:36:35.775Z | 2023-07-19T04:00:04.066Z | 2023-10-23T17:30:18.624Z | {'Vendor': 'Creativeitem', 'Product': 'Atlas Business Directory Listing', 'Versions': '2.13'} |
CVE-2023-3306 | A vulnerability was found in Ruijie RG-EW1200G EW_3.0(1)B11P204. It has been declared as critical. This vulnerability affects unknown code of the file app.09df2a9e44ab48766f5f.js of the component Admin Password Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-231802 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.231802 | 2023-06-18T07:00:10.368Z | 2023-06-18T08:00:04.675Z | 2023-10-23T13:27:06.123Z | {'Vendor': 'Ruijie', 'Product': 'RG-EW1200G', 'Versions': 'EW_3.0(1)B11P204'} |
CVE-2023-3613 | Mattermost WelcomeBot plugin fails to to validate the membership status when inviting or adding users to channels allowing guest accounts to be added or invited to channels by default.
| https://mattermost.com/security-updates | 2023-07-11T08:28:36.132Z | 2023-07-17T15:31:23.674Z | 2023-07-17T15:31:23.674Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost Plugins', 'Versions': '0, 0, 7.8.6, 7.10.3'} |
CVE-2023-3243 |
** UNSUPPORTED WHEN ASSIGNED ** [An attacker can capture an authenticating hash
and utilize it to create new sessions. The hash is also a poorly salted MD5
hash, which could result in a successful brute force password attack. Impacted product is BCM-WEB version 3.3.X. Recommended fix: Upgrade to a supported product such
as Alerton
ACM.] Out of an abundance of caution, this CVE ID is being assigned to
better serve our customers and ensure all who are still running this product understand
that the product is end of life and should be removed or upgraded.
| https://www.honeywell.com/us/en/product-security | 2023-06-14T13:51:12.389Z | 2023-06-28T20:23:21.810Z | 2023-07-07T13:08:54.149Z | {'Vendor': 'Alerton', 'Product': 'BCM-WEB', 'Versions': '3.3.X'} |
CVE-2023-3869 | The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the voteOnComment function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a comment. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b30ac1b0-eae2-4194-bf8e-ae73b4236965?source=cve | 2023-07-24T16:02:28.151Z | 2023-10-20T07:29:28.812Z | 2023-10-20T07:29:28.812Z | {'Vendor': 'advancedcoding', 'Product': 'Comments – wpDiscuz', 'Versions': '*'} |
CVE-2023-3490 | SQL Injection in GitHub repository fossbilling/fossbilling prior to 0.5.3. | https://huntr.dev/bounties/4e60ebc1-e00f-48cb-b011-3cefce688ecd | 2023-06-30T21:09:17.662Z | 2023-06-30T21:09:30.821Z | 2023-06-30T21:09:30.821Z | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3886 | A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/invoice.php. The manipulation of the argument inv_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235248. | https://vuldb.com/?id.235248 | 2023-07-24T16:54:21.343Z | 2023-07-25T07:00:14.897Z | 2023-10-24T07:15:48.818Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3310 | A vulnerability, which was classified as critical, has been found in code-projects Agro-School Management System 1.0. Affected by this issue is some unknown functionality of the file loaddata.php. The manipulation of the argument subject/course leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231806 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.231806 | 2023-06-18T11:35:41.600Z | 2023-06-18T12:00:04.928Z | 2023-10-23T13:31:59.026Z | {'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'} |
CVE-2023-3740 | Insufficient validation of untrusted input in Themes in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially serve malicious content to a user via a crafted background URL. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:21.898Z | 2023-08-01T22:39:18.788Z | 2023-08-01T22:39:18.788Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3255 | A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service. | https://access.redhat.com/security/cve/CVE-2023-3255 | 2023-06-14T21:08:31.376Z | 2023-09-13T16:12:52.294Z | 2024-01-23T02:31:20.287Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': '8.1.0-rc0'} |
CVE-2023-3605 | A vulnerability was found in PHPGurukul Online Shopping Portal 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Registration Page. The manipulation leads to improper restriction of excessive authentication attempts. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-233467. | https://vuldb.com/?id.233467 | 2023-07-10T19:20:05.031Z | 2023-07-10T20:00:04.915Z | 2023-10-23T14:49:19.445Z | {'Vendor': 'PHPGurukul', 'Product': 'Online Shopping Portal', 'Versions': '1.0'} |
CVE-2023-3486 | An authentication bypass exists in PaperCut NG versions 22.0.12 and prior that could allow a remote, unauthenticated attacker to upload arbitrary files to the PaperCut NG host’s file storage. This could exhaust system resources and prevent the service from operating as expected.
| https://www.tenable.com/security/research/tra-2023-23 | 2023-06-30T18:26:50.920Z | 2023-07-25T12:50:42.477Z | 2023-07-26T13:35:28.378Z | {'Vendor': 'PaperCut', 'Product': 'PaperCut NG', 'Versions': '0'} |
CVE-2023-3890 | A vulnerability classified as problematic has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit-accepted-appointment.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235251. | https://vuldb.com/?id.235251 | 2023-07-24T16:57:58.449Z | 2023-07-25T08:31:03.628Z | 2023-10-24T07:46:49.913Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3469 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.2. | https://huntr.dev/bounties/3565cfc9-82c4-4db8-9b8f-494dd81b56ca | 2023-06-30T00:00:06.251Z | 2023-06-30T00:00:19.692Z | 2023-06-30T00:00:19.692Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-3193 | Cross-site scripting (XSS) vulnerability in the Layout module's SEO configuration in Liferay Portal 7.4.3.70 through 7.4.3.73, and Liferay DXP 7.4 update 70 through 73 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_layout_admin_web_portlet_GroupPagesPortlet_backURL` parameter. | https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3193 | 2023-06-12T01:31:14.692Z | 2023-06-15T03:47:57.663Z | 2023-06-15T03:47:57.663Z | {'Vendor': 'Liferay', 'Product': 'Portal', 'Versions': '7.4.3.70'} |
CVE-2023-3039 |
SD ROM Utility, versions prior to 1.0.2.0 contain an Improper Access Control vulnerability. A low-privileged malicious user may potentially exploit this vulnerability to perform arbitrary code execution with limited access.
| https://www.dell.com/support/kbdoc/en-us/000216282/dsa-2023-274 | 2023-06-01T15:08:24.833Z | 2023-09-12T06:06:06.635Z | 2023-09-12T06:06:06.635Z | {'Vendor': 'Dell', 'Product': 'SD ROM Utility', 'Versions': 'Versions prior to 1.0.2.0'} |
CVE-2023-3717 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Farmakom Remote Administration Console allows SQL Injection.This issue affects Remote Administration Console: before 1.02.
| https://www.usom.gov.tr/bildirim/tr-23-0441 | 2023-07-17T14:57:59.624Z | 2023-08-08T10:46:36.651Z | 2023-08-08T10:46:36.651Z | {'Vendor': 'Farmakom', 'Product': 'Remote Administration Console', 'Versions': '0'} |
CVE-2023-3347 | A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data. | https://access.redhat.com/errata/RHSA-2023:4325 | 2023-06-21T04:43:49.434Z | 2023-07-20T14:54:05.525Z | 2024-01-23T02:34:25.111Z | {'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.17.10, 4.18.5'} |
CVE-2023-3652 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digital Ant E-Commerce Software allows Reflected XSS.This issue affects E-Commerce Software: before 11.
| https://https://www.usom.gov.tr/bildirim/tr-23-0443 | 2023-07-13T06:19:04.835Z | 2023-08-08T14:40:50.144Z | 2023-08-08T14:40:50.144Z | {'Vendor': 'Digital Ant', 'Product': 'E-Commerce Software', 'Versions': '0'} |
CVE-2023-3202 | The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_firebase_server_key function. This makes it possible for unauthenticated attackers to update the firebase server key to push notification when order status changed via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d2b3612e-3c91-469b-98ef-fdb03b0ee9d9?source=cve | 2023-06-12T14:02:21.408Z | 2023-07-12T04:38:50.393Z | 2023-07-12T04:38:50.393Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-3828 | A vulnerability was found in Bug Finder Listplace Directory Listing Platform 3.0. It has been classified as problematic. This affects an unknown part of the file /listplace/user/coverPhotoUpdate of the component Photo Handler. The manipulation of the argument user_cover_photo leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235149 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235149 | 2023-07-21T20:27:43.691Z | 2023-07-22T10:31:03.335Z | 2023-10-24T06:16:01.797Z | {'Vendor': 'Bug Finder', 'Product': 'Listplace Directory Listing Platform', 'Versions': '3.0'} |
CVE-2023-3982 | Cross-site Scripting (XSS) - Stored in GitHub repository omeka/omeka-s prior to 4.0.2. | https://huntr.dev/bounties/e5e889ee-5947-4c2a-a72e-9c90e2e2a845 | 2023-07-27T18:32:40.591Z | 2023-07-27T18:32:45.355Z | 2023-07-27T18:32:45.355Z | {'Vendor': 'omeka', 'Product': 'omeka/omeka-s', 'Versions': 'unspecified'} |
CVE-2023-3081 | The WP Mail Logging plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 1.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: An incomplete fix was released in 1.11.1. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ef20b3e6-d8f4-458e-b604-b46ef16e229e?source=cve | 2023-06-03T02:30:15.225Z | 2023-07-12T04:38:51.671Z | 2023-07-12T04:38:51.671Z | {'Vendor': 'smub', 'Product': 'WP Mail Logging', 'Versions': '*'} |
CVE-2023-3449 | A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This vulnerability affects the function actionExport of the file ?r=recruit/interview/export&interviews=x of the component Interview Management Export. The manipulation of the argument interviews leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-232546 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.232546 | 2023-06-28T17:16:00.316Z | 2023-06-28T17:31:02.974Z | 2023-10-23T13:46:37.455Z | {'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'} |
CVE-2023-3019 | A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. | https://access.redhat.com/errata/RHSA-2024:0135 | 2023-05-31T14:08:11.910Z | 2023-07-24T15:19:19.804Z | 2024-01-25T20:51:24.791Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''} |
CVE-2023-3275 | A vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view-pass-detail.php of the component POST Request Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The identifier VDB-231625 was assigned to this vulnerability. | https://vuldb.com/?id.231625 | 2023-06-15T12:12:06.654Z | 2023-06-15T12:31:03.861Z | 2023-10-23T13:23:26.433Z | {'Vendor': 'PHPGurukul', 'Product': 'Rail Pass Management System', 'Versions': '1.0'} |
CVE-2023-3625 | A vulnerability classified as critical was found in Suncreate Mountain Flood Disaster Prevention Monitoring and Early Warning System up to 20230706. This vulnerability affects unknown code of the file /Duty/AjaxHandle/Write/UploadFile.ashx of the component Duty Write-UploadFile. The manipulation of the argument Filedata leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-233578 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233578 | 2023-07-11T15:33:12.499Z | 2023-07-11T17:31:03.567Z | 2023-10-23T15:00:18.267Z | {'Vendor': 'Suncreate', 'Product': 'Mountain Flood Disaster Prevention Monitoring and Early Warning System', 'Versions': '20230706'} |
CVE-2023-3330 | Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to obtain specific files in the product. | https://jpn.nec.com/security-info/secinfo/nv23-007_en.html | 2023-06-20T01:14:05.654Z | 2023-06-28T01:13:03.181Z | 2023-08-28T00:56:00.401Z | {'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'} |
CVE-2023-3760 | A vulnerability has been found in Intergard SGS 8.7.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Change Password Handler. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-234445 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234445 | 2023-07-18T19:28:30.503Z | 2023-07-19T05:31:03.867Z | 2023-10-23T17:33:58.191Z | {'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'} |
CVE-2023-3808 | A vulnerability was found in Hospital Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file patientforgotpassword.php. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-235076. | https://vuldb.com/?id.235076 | 2023-07-20T08:44:08.069Z | 2023-07-21T03:00:05.799Z | 2023-10-24T06:07:29.501Z | {'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'} |
CVE-2023-3672 | Cross-site Scripting (XSS) - DOM in GitHub repository plaidweb/webmention.js prior to 0.5.5. | https://huntr.dev/bounties/75cfb7ad-a75f-45ff-8688-32a9c55179aa | 2023-07-14T09:27:20.240Z | 2023-07-14T09:27:32.135Z | 2023-07-14T09:27:32.135Z | {'Vendor': 'plaidweb', 'Product': 'plaidweb/webmention.js', 'Versions': 'unspecified'} |
CVE-2023-3388 | The Beautiful Cookie Consent Banner for WordPress is vulnerable to Stored Cross-Site Scripting via the 'nsc_bar_content_href' parameter in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. A partial patch was made available in 2.10.1 and the issue was fully patched in 2.10.2. | https://www.wordfence.com/threat-intel/vulnerabilities/id/542a4079-b1a2-49bc-9ddd-ba7978c9992e?source=cve | 2023-06-23T13:10:57.580Z | 2023-06-24T02:00:18.847Z | 2023-06-24T02:00:18.847Z | {'Vendor': 'nikelschubert', 'Product': 'Beautiful Cookie Consent Banner', 'Versions': '*'} |
CVE-2023-3222 | Vulnerability in the password recovery mechanism of Password Recovery plugin for Roundcube, in its 1.2 version, which could allow a remote attacker to change an existing user´s password by adding a 6-digit numeric token. An attacker could create an automatic script to test all possible values because the platform has no limit on the number of requests. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-roundcube-password-recovery-plugin | 2023-06-13T15:40:03.340Z | 2023-09-04T12:49:47.169Z | 2023-09-04T12:49:47.169Z | {'Vendor': 'AlfnRU', 'Product': 'Password Recovery Plugin', 'Versions': '1.2'} |
CVE-2023-3737 | Inappropriate implementation in Notifications in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to spoof the contents of media notifications via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:21.152Z | 2023-08-01T22:39:18.253Z | 2023-08-01T22:39:18.253Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3058 | A vulnerability was found in 07FLY CRM up to 1.2.0. It has been declared as problematic. This vulnerability affects unknown code of the component User Profile Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230560. | https://vuldb.com/?id.230560 | 2023-06-02T12:00:39.280Z | 2023-06-02T13:00:04.613Z | 2023-10-23T07:47:32.539Z | {'Vendor': '07FLY', 'Product': 'CRM', 'Versions': '1.0, 1.1, 1.2'} |
CVE-2023-3234 | A vulnerability was found in Zhong Bang CRMEB up to 4.6.0. It has been declared as problematic. Affected by this vulnerability is the function put_image of the file api/controller/v1/PublicController.php. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231505 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.231505 | 2023-06-14T05:31:01.735Z | 2023-06-14T06:31:04.253Z | 2023-10-23T13:12:27.482Z | {'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6'} |
CVE-2023-3664 | The FileOrganizer WordPress plugin through 1.0.2 does not restrict functionality on multisite instances, allowing site admins to gain full control over the server. | https://wpscan.com/vulnerability/d59e6eac-3ebf-40e0-800c-8cbef345423f | 2023-07-13T14:13:14.346Z | 2023-09-25T15:56:55.853Z | 2023-09-25T15:56:55.853Z | {'Vendor': 'Unknown', 'Product': 'FileOrganizer', 'Versions': '0'} |
CVE-2023-3371 | The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c1033b4d-82a0-4484-aebf-f35d6a2a9a13?source=cve | 2023-06-22T16:50:17.015Z | 2023-06-27T01:55:28.259Z | 2023-06-27T01:55:28.259Z | {'Vendor': 'wpdevteam', 'Product': 'EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor', 'Versions': '*'} |
CVE-2023-3721 | The WP-EMail WordPress plugin before 2.69.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/3f90347a-6586-4648-9f2c-d4f321bf801a | 2023-07-17T18:29:16.548Z | 2023-08-14T19:10:15.596Z | 2024-01-16T15:54:05.380Z | {'Vendor': 'Unknown', 'Product': 'WP-EMail', 'Versions': '0'} |
CVE-2023-3849 | A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-235200. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | https://vuldb.com/?id.235200 | 2023-07-22T13:57:43.636Z | 2023-07-23T09:00:03.826Z | 2023-10-24T06:41:38.534Z | {'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'} |
CVE-2023-3633 | An out-of-bounds write vulnerability in Bitdefender Engines on Windows causes the engine to crash. This issue affects Bitdefender Engines version 7.94791 and lower. | https://www.bitdefender.com/support/security-advisories/out-of-bounds-memory-corruption-issue-in-ceva-engine-va-11010 | 2023-07-12T08:30:01.704Z | 2023-07-14T19:29:34.392Z | 2023-07-14T19:29:34.392Z | {'Vendor': 'Bitdefender', 'Product': 'Engines', 'Versions': '7.94791'} |
CVE-2023-3263 | The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:27.340Z | 2023-08-14T04:02:55.740Z | 2023-08-14T04:02:55.740Z | {'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'} |
CVE-2023-3799 | A vulnerability was found in IBOS OA 4.5.5 and classified as critical. This issue affects some unknown processing of the file ?r=article/category/del of the component Delete Category Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235067. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235067 | 2023-07-20T08:13:00.456Z | 2023-07-20T22:31:03.897Z | 2023-10-23T18:43:24.375Z | {'Vendor': 'IBOS', 'Product': 'OA', 'Versions': '4.5.5'} |
CVE-2023-3776 | A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.
If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.
We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f | 2023-07-19T15:50:20.757Z | 2023-07-21T20:49:53.667Z | 2023-07-22T09:43:27.743Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '2.6'} |
CVE-2023-3326 | pam_krb5 authenticates a user by essentially running kinit with the password, getting a ticket-granting ticket (tgt) from the Kerberos KDC (Key Distribution Center) over the network, as a way to verify the password. However, if a keytab is not provisioned on the system, pam_krb5 has no way to validate the response from the KDC, and essentially trusts the tgt provided over the network as being valid. In a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned, an attacker that is able to control both the password and the KDC responses can return a valid tgt, allowing authentication to occur for any user on the system.
| https://security.FreeBSD.org/advisories/FreeBSD-SA-23:04.pam_krb5.asc | 2023-06-19T16:14:36.133Z | 2023-06-22T16:37:51.360Z | 2023-08-01T22:40:58.267Z | {'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 13.1-RELEASE, 12.4-RELEASE'} |
CVE-2023-3832 | A vulnerability was found in Bug Finder Wedding Wonders 1.0. It has been classified as problematic. Affected is an unknown function of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. It is possible to launch the attack remotely. VDB-235158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235158 | 2023-07-21T20:41:39.362Z | 2023-07-22T15:31:03.384Z | 2023-10-24T06:20:54.475Z | {'Vendor': 'Bug Finder', 'Product': 'Wedding Wonders', 'Versions': '1.0'} |
CVE-2023-3998 | The wpDiscuz plugin for WordPress is vulnerable to unauthorized modification of data due to a missing authorization check on the userRate function in versions up to, and including, 7.6.3. This makes it possible for unauthenticated attackers to increase or decrease the rating of a post. | https://www.wordfence.com/threat-intel/vulnerabilities/id/9d09bdab-ffab-44cc-bba2-821b21a8e343?source=cve | 2023-07-28T18:03:01.833Z | 2023-10-20T07:29:24.732Z | 2023-10-20T07:29:24.732Z | {'Vendor': 'advancedcoding', 'Product': 'Comments – wpDiscuz', 'Versions': '*'} |
CVE-2023-3131 | The MStore API WordPress plugin before 3.9.7 does not secure most of its AJAX actions by implementing privilege checks, nonce checks, or a combination of both. | https://wpscan.com/vulnerability/970735f1-24bb-441c-89b6-5a0959246d6c | 2023-06-06T19:39:10.707Z | 2023-07-10T12:41:17.016Z | 2023-07-10T13:05:52.286Z | {'Vendor': 'Unknown', 'Product': 'MStore API', 'Versions': '0'} |
CVE-2023-3561 | A vulnerability, which was classified as problematic, was found in GZ Scripts PHP GZ Hotel Booking Script 1.8. This affects an unknown part of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-233355. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233355 | 2023-07-08T13:20:32.517Z | 2023-07-08T15:31:03.360Z | 2023-10-23T14:31:47.885Z | {'Vendor': 'GZ Scripts', 'Product': 'PHP GZ Hotel Booking Script', 'Versions': '1.8'} |
CVE-2023-3074 | Cross-site Scripting (XSS) - Stored in GitHub repository tsolucio/corebos prior to 8. | https://huntr.dev/bounties/6132f557-3f0f-465d-990f-4329313349a4 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'} |
CVE-2023-3424 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.3 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. | https://gitlab.com/gitlab-org/gitlab/-/issues/409802 | 2023-06-27T05:16:56.910Z | 2023-07-13T02:08:07.284Z | 2023-07-13T02:08:07.284Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '10.3, 16.0, 16.1'} |
CVE-2023-3977 | Several plugins for WordPress by Inisev are vulnerable to Cross-Site Request Forgery to unauthorized installation of plugins due to a missing nonce check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for unauthenticated attackers to install plugins from the limited list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=cve | 2023-07-27T16:08:30.895Z | 2023-07-28T04:37:03.018Z | 2023-07-28T04:37:03.018Z | {'Vendor': 'steve85b', 'Product': 'SSL Mixed Content Fix', 'Versions': '*'} |
CVE-2023-3648 | Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-21.html | 2023-07-13T02:20:56.371Z | 2023-07-14T06:16:33.827Z | 2023-07-14T06:16:33.827Z | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0, 3.6.0'} |
CVE-2023-3218 | Race Condition within a Thread in GitHub repository it-novum/openitcockpit prior to 4.6.5. | https://huntr.dev/bounties/94d50b11-20ca-46e3-9086-dd6836421675 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | 2023-06-13T00:00:00 | {'Vendor': 'it-novum', 'Product': 'it-novum/openitcockpit', 'Versions': 'unspecified'} |
CVE-2023-3536 | A vulnerability was found in SimplePHPscripts Funeral Script PHP 3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-233288. | https://vuldb.com/?id.233288 | 2023-07-07T11:57:26.126Z | 2023-07-07T13:00:03.923Z | 2023-10-23T14:12:16.006Z | {'Vendor': 'SimplePHPscripts', 'Product': 'Funeral Script PHP', 'Versions': '3.1'} |
CVE-2023-3166 | The Lana Email Logger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, Lana Email Logger due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d5f372bf-6b13-4ba7-8b8b-9d3b500e4420?source=cve | 2023-06-08T17:22:06.108Z | 2023-07-12T04:38:51.244Z | 2023-07-12T04:38:51.244Z | {'Vendor': 'lanacodes', 'Product': 'Lana Email Logger', 'Versions': '*'} |
CVE-2023-3920 | An issue has been discovered in GitLab affecting all versions starting from 11.2 before 16.2.8, all versions starting from 16.3 before 16.3.5, all versions starting from 16.4 before 16.4.1. It was possible that a maintainer to create a fork relationship between existing projects contrary to the documentation. | https://gitlab.com/gitlab-org/gitlab/-/issues/417481 | 2023-07-25T10:30:33.135Z | 2023-09-29T06:02:31.303Z | 2023-09-29T06:02:31.303Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.2, 16.3, 16.4'} |
CVE-2023-3473 | A vulnerability, which was classified as critical, was found in Campcodes Retro Cellphone Online Store 1.0. Affected is an unknown function of the file /admin/edit_product.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232752. | https://vuldb.com/?id.232752 | 2023-06-30T06:10:29.524Z | 2023-06-30T06:31:03.791Z | 2023-10-23T13:53:56.683Z | {'Vendor': 'Campcodes', 'Product': 'Retro Cellphone Online Store', 'Versions': '1.0'} |
CVE-2023-3189 | A vulnerability, which was classified as problematic, was found in SourceCodester Online School Fees System 1.0. This affects an unknown part of the file /paysystem/branch.php of the component POST Parameter Handler. The manipulation of the argument branch leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231501 was assigned to this vulnerability. | https://vuldb.com/?id.231501 | 2023-06-10T04:06:17.792Z | 2023-06-14T05:31:03.452Z | 2023-10-23T13:05:08.382Z | {'Vendor': 'SourceCodester', 'Product': 'Online School Fees System', 'Versions': '1.0'} |
CVE-2023-3023 | The WP EasyCart plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in versions up to, and including, 5.4.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level or above permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c1ddaf-4bf2-4937-b7bf-a09162db043e?source=cve | 2023-05-31T19:10:12.395Z | 2023-07-12T04:38:49.121Z | 2023-07-12T04:38:49.121Z | {'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'} |
CVE-2023-3873 | A vulnerability, which was classified as critical, has been found in Campcodes Beauty Salon Management System 1.0. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235235. | https://vuldb.com/?id.235235 | 2023-07-24T16:41:32.368Z | 2023-07-25T00:00:05.904Z | 2023-10-24T06:59:57.182Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3170 | The tagDiv Composer WordPress plugin before 4.2, used as a companion by the Newspaper and Newsmag themes from tagDiv, does not validate and escape some settings, which could allow users with Admin privileges to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/e95ff3c6-283b-4e5e-bea0-1f1375da08da | 2023-06-08T18:55:16.306Z | 2023-09-11T19:46:09.078Z | 2023-09-11T19:46:09.078Z | {'Vendor': 'Unknown', 'Product': 'tagDiv Composer', 'Versions': '0'} |
CVE-2023-3520 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository it-novum/openitcockpit prior to 4.6.6. | https://huntr.dev/bounties/f3b277bb-91db-419e-bcc4-fe0b055d2551 | 2023-07-06T00:00:07.172Z | 2023-07-06T00:00:20.096Z | 2023-07-06T00:00:20.096Z | {'Vendor': 'it-novum', 'Product': 'it-novum/openitcockpit', 'Versions': 'unspecified'} |
Subsets and Splits