CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-3035
A vulnerability has been found in Guangdong Pythagorean OA Office System up to 4.50.31 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Schedule Handler. The manipulation of the argument description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230467.
https://vuldb.com/?id.230467
2023-06-01T13:17:55.863Z
2023-06-01T13:31:03.225Z
2023-10-23T07:43:52.843Z
{'Vendor': 'Guangdong', 'Product': 'Pythagorean OA Office System', 'Versions': '4.50.0, 4.50.1, 4.50.2, 4.50.3, 4.50.4, 4.50.5, 4.50.6, 4.50.7, 4.50.8, 4.50.9, 4.50.10, 4.50.11, 4.50.12, 4.50.13, 4.50.14, 4.50.15, 4.50.16, 4.50.17, 4.50.18, 4.50.19, 4.50.20, 4.50.21, 4.50.22, 4.50.23, 4.50.24, 4.50.25, 4.50.26, 4.50.27, 4.50.28, 4.50.29, 4.50.30, 4.50.31'}
CVE-2023-3465
A vulnerability was found in SimplePHPscripts Classified Ads Script 1.8. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file user.php of the component HTTP POST Request Handler. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-232711.
https://vuldb.com/?id.232711
2023-06-29T20:15:53.005Z
2023-06-29T21:00:04.953Z
2023-10-23T13:52:43.508Z
{'Vendor': 'SimplePHPscripts', 'Product': 'Classified Ads Script', 'Versions': '1.8'}
CVE-2023-3936
The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/6d09a5d3-046d-47ef-86b4-c024ea09dc0f
2023-07-25T13:13:43.226Z
2023-08-21T12:29:49.665Z
2023-08-21T12:29:49.665Z
{'Vendor': 'Unknown', 'Product': 'Blog2Social: Social Media Auto Post & Scheduler', 'Versions': '7.1.0'}
CVE-2023-3609
A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation. If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability. We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
2023-07-10T20:52:53.660Z
2023-07-21T20:47:12.172Z
2023-07-21T20:47:12.172Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '4.14'}
CVE-2023-3259
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:48:44.547Z
2023-08-14T03:49:59.889Z
2023-08-14T03:49:59.889Z
{'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'}
CVE-2023-3577
Mattermost fails to properly restrict requests to localhost/intranet during the interactive dialog, which could allow an attacker to perform a limited blind SSRF.
https://mattermost.com/security-updates
2023-07-10T09:47:27.158Z
2023-07-17T15:18:07.871Z
2023-07-17T15:18:07.871Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.10.3'}
CVE-2023-3127
An unauthenticated user could log into iSTAR Ultra, iSTAR Ultra LT, iSTAR Ultra G2, and iSTAR Edge G2 with administrator rights.
https://www.johnsoncontrols.com/cyber-solutions/security-advisories
2023-06-06T14:51:53.713Z
2023-07-11T21:06:29.003Z
2023-07-11T21:06:29.003Z
{'Vendor': 'Sensormatic Electronics, a subsidiary of Johnson Controls, Inc.', 'Product': 'iSTAR Ultra', 'Versions': '>6.8.6'}
CVE-2023-3824
In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. 
https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv
2023-07-21T16:57:23.334Z
2023-08-11T05:48:34.082Z
2023-08-11T05:48:34.082Z
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.*, 8.1.*, 8.2.*'}
CVE-2023-3961
A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.
https://access.redhat.com/errata/RHSA-2023:6209
2023-07-26T21:21:23.933Z
2023-11-03T12:32:29.558Z
2024-01-23T01:16:55.377Z
{'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.19.1, 4.18.8, 4.17.12'}
CVE-2023-3432
Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plantuml prior to 1.2023.9.
https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51
2023-06-27T14:30:17.372Z
2023-06-27T14:30:23.442Z
2023-06-27T14:30:23.442Z
{'Vendor': 'plantuml', 'Product': 'plantuml/plantuml', 'Versions': 'unspecified'}
CVE-2023-3062
A vulnerability was found in code-projects Agro-School Management System 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-230568.
https://vuldb.com/?id.230568
2023-06-02T12:46:21.536Z
2023-06-02T14:00:05.404Z
2023-10-23T07:52:25.191Z
{'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'}
CVE-2023-3598
Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-07-10T17:04:59.077Z
2023-07-28T20:06:31.600Z
2023-07-28T20:06:31.600Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-3576
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
https://access.redhat.com/errata/RHSA-2023:6575
2023-07-10T09:16:33.670Z
2023-10-04T18:02:23.926Z
2024-01-23T00:56:24.964Z
{'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': '4.5.1'}
CVE-2023-3126
The B2BKing plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'b2bkingdownloadpricelist' function in versions up to, and including, 4.6.00. This makes it possible for Authenticated attackers with subscriber or customer-level permissions to retrieve the full pricing list of all products on the site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e3ac14-1421-49f0-9c60-7f7d5c9d7654?source=cve
2023-06-06T13:19:00.656Z
2023-06-07T01:51:44.695Z
2023-06-07T01:51:44.695Z
{'Vendor': 'webwizardsdev', 'Product': 'B2BKing — Ultimate WooCommerce Wholesale and B2B Solution', 'Versions': '*'}
CVE-2023-3825
PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02
2023-07-21T20:08:42.706Z
2023-07-31T22:53:56.568Z
2023-07-31T22:53:56.568Z
{'Vendor': 'PTC', 'Product': 'KEPServerEX', 'Versions': '6.0'}
CVE-2023-3433
The "nickname" field within Savoir-faire Linux's Jami application is susceptible to a failed state when a user inserts special characters into the field. When present, these special characters, make it so the application cannot create the signature for the user and results in a local denial of service to the application. 
https://review.jami.net/c/jami-daemon/+/23575
2023-06-27T15:27:47.858Z
2023-07-14T12:28:53.363Z
2023-07-14T12:28:53.363Z
{'Vendor': 'Savoir-faire Linux', 'Product': 'Jami', 'Versions': '20222284'}
CVE-2023-3063
The SP Project & Document Manager plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.67. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with subscriber privileges or above, to change user passwords and potentially take over administrator accounts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6dc2e720-85d9-42d9-94ef-eb172425993d?source=cve
2023-06-02T13:00:09.740Z
2023-06-30T01:56:17.054Z
2023-06-30T01:56:17.054Z
{'Vendor': 'smartypants', 'Product': 'SP Project & Document Manager', 'Versions': '*'}
CVE-2023-3599
A vulnerability was found in SourceCodester Best Fee Management System 1.0. It has been rated as critical. Affected by this issue is the function save_user of the file admin_class.php of the component Add User Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-233450 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.233450
2023-07-10T17:15:12.108Z
2023-07-10T17:31:03.077Z
2023-10-23T14:48:06.291Z
{'Vendor': 'SourceCodester', 'Product': 'Best Fee Management System', 'Versions': '1.0'}
CVE-2023-3608
A vulnerability was found in Ruijie BCR810W 2.5.10. It has been rated as critical. This issue affects some unknown processing of the component Tracert Page. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233477 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233477
2023-07-10T19:51:32.093Z
2023-07-10T21:31:03.835Z
2023-10-23T14:52:59.102Z
{'Vendor': 'Ruijie', 'Product': 'BCR810W', 'Versions': '2.5.10'}
CVE-2023-3872
A vulnerability classified as critical was found in Campcodes Beauty Salon Management System 1.0. This vulnerability affects unknown code of the file /admin/edit-services.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235234 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.235234
2023-07-24T16:40:18.281Z
2023-07-24T22:00:03.976Z
2023-10-24T06:58:44.008Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3171
A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.
https://access.redhat.com/errata/RHSA-2023:5484
2023-06-08T19:52:58.072Z
2023-12-27T15:45:33.293Z
2023-12-27T15:45:33.293Z
{'Vendor': 'n/a', 'Product': 'eap', 'Versions': ''}
CVE-2023-3521
Cross-site Scripting (XSS) - Reflected in GitHub repository fossbilling/fossbilling prior to 0.5.4.
https://huntr.dev/bounties/76a3441d-7f75-4a8d-a7a0-95a7f5456eb0
2023-07-06T01:45:26.009Z
2023-07-06T01:45:39.229Z
2023-07-06T01:45:39.229Z
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3034
Reflected XSS affects the ‘mode’ parameter in the /admin functionality of the web application in versions <=2.0.44
https://igs.bkg.bund.de/ntrip/bkgcaster
2023-06-01T08:53:55.239Z
2023-06-28T08:09:04.348Z
2023-06-28T08:09:04.348Z
{'Vendor': 'BKG', 'Product': 'NTRIP Professional Caster', 'Versions': '<=2.0.44'}
CVE-2023-3464
A vulnerability was found in SimplePHPscripts Classified Ads Script 1.8. It has been classified as problematic. Affected is an unknown function of the file /preview.php of the component URL Parameter Handler. The manipulation of the argument p leads to cross site scripting. It is possible to launch the attack remotely. It is recommended to upgrade the affected component. VDB-232710 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.232710
2023-06-29T20:15:50.727Z
2023-06-29T20:31:03.852Z
2023-10-23T13:51:30.373Z
{'Vendor': 'SimplePHPscripts', 'Product': 'Classified Ads Script', 'Versions': '1.8'}
CVE-2023-3937
Cross site scripting vulnerability in web portal in Snow Software License Manager from version 9.0.0 up to and including 9.30.1 on Windows allows an authenticated user with high privileges to trigger cross site scripting attack via the web browser
https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC
2023-07-25T13:29:16.203Z
2023-08-11T11:28:30.185Z
2023-08-11T13:53:50.811Z
{'Vendor': 'Snow Software', 'Product': 'Snow License Manager', 'Versions': '9.0.0'}
CVE-2023-3537
A vulnerability classified as problematic has been found in SimplePHPscripts News Script PHP Pro 2.4. This affects an unknown part of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-233289 was assigned to this vulnerability.
https://vuldb.com/?id.233289
2023-07-07T11:58:22.407Z
2023-07-07T13:31:03.298Z
2023-10-23T14:13:29.121Z
{'Vendor': 'SimplePHPscripts', 'Product': 'News Script PHP Pro', 'Versions': '2.4'}
CVE-2023-3167
The Mail Queue plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4aaca22-76b9-42ec-a960-65d44d696324?source=cve
2023-06-08T18:16:09.799Z
2023-07-12T04:38:50.820Z
2023-07-12T04:38:50.820Z
{'Vendor': 'wdm-team', 'Product': 'Mail Queue', 'Versions': '*'}
CVE-2023-3864
Blind SQL injection in a service running in Snow Software license manager from version 8.0.0 up to and including 9.30.1 on Windows allows a logged in user with high privileges to inject SQL commands via the web portal.
https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC
2023-07-24T13:51:33.771Z
2023-08-11T11:24:05.823Z
2023-08-11T11:24:05.823Z
{'Vendor': 'Snow Software', 'Product': 'SLM', 'Versions': '8.0.0'}
CVE-2023-3472
Use after free vulnerability in Panasonic KW Watcher versions 1.00 through 2.82 may allow attackers to execute arbitrary code.
https://www3.panasonic.biz/ac/e/fasys/software_info/eco/kwwatcher_versioninfo.jsp
2023-06-30T05:37:48.608Z
2023-09-06T04:05:43.051Z
2023-09-06T04:05:43.051Z
{'Vendor': 'Panasonic', 'Product': 'KW Watcher on Windows', 'Versions': '1.00'}
CVE-2023-3188
Server-Side Request Forgery (SSRF) in GitHub repository owncast/owncast prior to 0.1.0.
https://huntr.dev/bounties/0d0d526a-1c39-4e6a-b081-d3914468e495
2023-06-10T00:00:00
2023-06-10T00:00:00
2023-06-10T00:00:00
{'Vendor': 'owncast', 'Product': 'owncast/owncast', 'Versions': 'unspecified'}
CVE-2023-3022
A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
https://bugzilla.redhat.com/show_bug.cgi?id=2211440
2023-05-31T00:00:00
2023-06-19T00:00:00
2023-06-19T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux Kernel (IPv6)', 'Versions': 'Fixed in kernel 5.2-rc1'}
CVE-2023-3649
iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-22.html
2023-07-13T02:21:11.517Z
2023-07-14T06:16:45.767Z
2023-07-14T06:16:45.767Z
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0'}
CVE-2023-3219
The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.
https://wpscan.com/vulnerability/72d80887-0270-4987-9739-95b1a178c1fd
2023-06-13T14:48:58.415Z
2023-07-10T12:41:20.078Z
2023-07-10T12:41:20.078Z
{'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'}
CVE-2023-3833
A vulnerability was found in Bug Finder Montage 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235159
2023-07-21T20:43:05.854Z
2023-07-22T16:00:05.360Z
2023-10-24T06:22:07.733Z
{'Vendor': 'Bug Finder', 'Product': 'Montage', 'Versions': '1.0'}
CVE-2023-3999
The Waiting: One-click countdowns plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on its AJAX calls in versions up to, and including, 0.6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to create and delete countdowns as well as manipulate other plugin settings.
https://www.wordfence.com/threat-intel/vulnerabilities/id/293070c8-783f-404d-9250-392713703ce4?source=cve
2023-07-28T20:13:32.968Z
2023-08-31T05:33:04.838Z
2023-08-31T05:33:04.838Z
{'Vendor': 'pluginbuilders', 'Product': 'Waiting: One-click countdowns', 'Versions': '*'}
CVE-2023-3130
The Short URL WordPress plugin before 1.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/6e167864-c304-402e-8b2d-d47b5a3767d1
2023-06-06T18:27:07.424Z
2023-07-31T09:37:34.152Z
2023-07-31T09:37:34.152Z
{'Vendor': 'Unknown', 'Product': 'Short URL', 'Versions': '0'}
CVE-2023-3560
A vulnerability, which was classified as problematic, has been found in GZ Scripts Ticket Booking Script 1.8. Affected by this issue is some unknown functionality of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack may be launched remotely. VDB-233354 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233354
2023-07-08T11:56:12.862Z
2023-07-08T15:00:04.138Z
2023-10-23T14:30:34.692Z
{'Vendor': 'GZ Scripts', 'Product': 'Ticket Booking Script', 'Versions': '1.8'}
CVE-2023-3075
Cross-Site Request Forgery (CSRF) in GitHub repository tsolucio/corebos prior to 8.
https://huntr.dev/bounties/0f5448a6-d551-424f-887d-80f9bcfaa6e4
2023-06-02T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'}
CVE-2023-3425
Out-of-bounds read issue in M-Files Server versions below 23.8.12892.6 and LTS Service Release Versions before 23.2 LTS SR3 allows unauthenticated user to read restricted amount of bytes from memory.
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-3425
2023-06-27T05:38:34.710Z
2023-08-25T08:08:05.954Z
2023-08-25T08:08:05.954Z
{'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0, 23.2.12340.14'}
CVE-2023-3632
Use of Hard-coded Cryptographic Key vulnerability in Sifir Bes Education and Informatics Kunduz - Homework Helper App allows Authentication Abuse, Authentication Bypass.This issue affects Kunduz - Homework Helper App: before 6.2.3.
https://www.usom.gov.tr/bildirim/tr-23-0446
2023-07-12T07:54:24.491Z
2023-08-09T08:05:57.144Z
2023-08-16T07:26:12.454Z
{'Vendor': 'Sifir Bes Education and Informatics', 'Product': 'Kunduz - Homework Helper App', 'Versions': '0'}
CVE-2023-3262
The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database.A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records.
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
2023-06-15T06:50:25.309Z
2023-08-14T03:59:51.212Z
2023-08-25T05:09:31.582Z
{'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'}
CVE-2023-3798
A vulnerability has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0 and classified as critical. This vulnerability affects unknown code of the file /App_Resource/UEditor/server/upload.aspx. The manipulation of the argument file leads to unrestricted upload. The exploit has been disclosed to the public and may be used. VDB-235066 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235066
2023-07-20T08:10:57.282Z
2023-07-20T22:00:05.350Z
2023-10-23T18:42:11.212Z
{'Vendor': 'Chengdu', 'Product': 'Flash Flood Disaster Monitoring and Warning System', 'Versions': '2.0'}
CVE-2023-3777
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances. We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8
2023-07-19T16:02:06.626Z
2023-09-06T13:50:26.344Z
2023-09-06T13:50:26.344Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.9'}
CVE-2023-3327
null
null
2023-06-19T00:00:00
null
2023-06-27T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3848
A vulnerability, which was classified as problematic, has been found in mooSocial mooDating 1.2. This issue affects some unknown processing of the file /users/view of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235199. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
https://vuldb.com/?id.235199
2023-07-22T13:57:39.186Z
2023-07-23T08:00:04.071Z
2023-10-24T06:40:25.354Z
{'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'}
CVE-2023-3235
A vulnerability was found in mccms up to 2.6.5. It has been rated as critical. Affected by this issue is the function pic_api of the file sys/apps/controllers/admin/Comic.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231506 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.231506
2023-06-14T05:48:15.111Z
2023-06-14T07:00:04.704Z
2023-10-23T13:13:40.688Z
{'Vendor': 'n/a', 'Product': 'mccms', 'Versions': '2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5'}
CVE-2023-3665
A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code.
https://kcm.trellix.com/corporate/index?page=content&id=SB10405
2023-07-13T14:30:54.711Z
2023-10-04T14:32:52.925Z
2023-10-04T14:32:52.925Z
{'Vendor': 'Trellix ', 'Product': 'Trellix Endpoint Security', 'Versions': '10.7.0'}
CVE-2023-3370
null
null
2023-06-22T14:14:22.948Z
null
2023-07-02T21:50:51.619260Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3720
The Upload Media By URL WordPress plugin before 1.0.8 does not have CSRF check when uploading files, which could allow attackers to make logged in admins upload files (including HTML containing JS code for users with the unfiltered_html capability) on their behalf.
https://wpscan.com/vulnerability/16375a7f-0a9f-4961-8510-d047ffbf3954
2023-07-17T17:38:35.876Z
2023-08-30T14:22:00.303Z
2023-08-30T14:22:00.303Z
{'Vendor': 'Unknown', 'Product': 'Upload Media By URL', 'Versions': '0'}
CVE-2023-3059
A vulnerability, which was classified as critical, was found in SourceCodester Online Exam Form Submission 1.0. This affects an unknown part of the file /admin/update_s6.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230565 was assigned to this vulnerability.
https://vuldb.com/?id.230565
2023-06-02T12:39:12.199Z
2023-06-02T13:00:05.607Z
2023-10-23T07:48:45.701Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam Form Submission', 'Versions': '1.0'}
CVE-2023-3673
SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.24.
https://huntr.dev/bounties/46ca0934-5260-477b-9e86-7b16bb18d0a9
2023-07-14T12:18:52.623Z
2023-07-14T12:19:04.063Z
2023-07-14T12:19:04.063Z
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-3389
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer. We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663
2023-06-23T13:43:00.034Z
2023-06-28T19:33:55.097Z
2023-07-10T16:48:01.844Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.13, 5.10.162'}
CVE-2023-3223
A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.
https://access.redhat.com/errata/RHSA-2023:4505
2023-06-13T15:50:40.922Z
2023-09-27T13:54:44.682Z
2023-09-27T13:54:44.682Z
{'Vendor': 'n/a', 'Product': 'undertow', 'Versions': '2.2.24'}
CVE-2023-3736
Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
2023-07-18T00:34:21.033Z
2023-08-01T22:39:18.093Z
2023-08-01T22:39:18.093Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'}
CVE-2023-3366
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.2 does not have CRSF check when deleting a shipment, allowing attackers to make any logged in user, delete arbitrary shipment via a CSRF attack
https://wpscan.com/vulnerability/b2f06223-9352-4227-ae94-32061e2c5611
2023-06-22T08:52:30.487Z
2023-08-21T12:29:50.443Z
2023-08-21T12:29:50.443Z
{'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'}
CVE-2023-3809
A vulnerability was found in Hospital Management System 1.0. It has been classified as critical. This affects an unknown part of the file patient.php. The manipulation of the argument address leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235077 was assigned to this vulnerability.
https://vuldb.com/?id.235077
2023-07-20T08:44:11.176Z
2023-07-21T03:31:03.395Z
2023-10-24T06:08:42.670Z
{'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'}
CVE-2023-3274
A vulnerability classified as critical has been found in code-projects Supplier Management System 1.0. Affected is an unknown function of the file btn_functions.php of the component Picture Handler. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231624.
https://vuldb.com/?id.231624
2023-06-15T12:08:29.479Z
2023-06-15T12:31:02.902Z
2023-10-23T13:22:13.279Z
{'Vendor': 'code-projects', 'Product': 'Supplier Management System', 'Versions': '1.0'}
CVE-2023-3624
A vulnerability classified as critical has been found in Nesote Inout Blockchain FiatExchanger 3.0. This affects an unknown part of the file /index.php/coins/update_marketboxslider of the component POST Parameter Handler. The manipulation of the argument marketcurrency leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-233577 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.233577
2023-07-11T15:26:11.791Z
2023-07-11T17:00:04.438Z
2023-10-23T14:59:05.064Z
{'Vendor': 'Nesote', 'Product': 'Inout Blockchain FiatExchanger', 'Versions': '3.0'}
CVE-2023-3331
Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to delete specific files in the product.
https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html
2023-06-20T01:14:08.079Z
2023-06-28T01:19:45.378Z
2023-07-03T02:10:13.150Z
{'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'}
CVE-2023-3761
A vulnerability was found in Intergard SGS 8.7.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Password Change Handler. The manipulation leads to cleartext transmission of sensitive information. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-234446 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234446
2023-07-18T19:29:01.654Z
2023-07-19T06:00:04.545Z
2023-10-23T17:35:11.389Z
{'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'}
CVE-2023-3018
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/?page=user/list. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230362 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230362
2023-05-31T13:13:40.338Z
2023-05-31T14:31:04.073Z
2023-10-23T07:41:26.447Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-3829
A vulnerability was found in Bug Finder ICOGenie 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user/ticket/create of the component Support Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. VDB-235150 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235150
2023-07-21T20:29:40.483Z
2023-07-22T11:31:03.726Z
2023-10-24T06:17:14.996Z
{'Vendor': 'Bug Finder', 'Product': 'ICOGenie', 'Versions': '1.0'}
CVE-2023-3983
An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection.
https://www.tenable.com/security/research/tra-2023-24
2023-07-27T00:00:00
2023-07-31T00:00:00
2023-07-31T00:00:00
{'Vendor': 'n/a', 'Product': 'Advantech iView', 'Versions': 'versions prior to v5.7.4 build 6752'}
CVE-2023-3080
The WP Mail Catcher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1525e1c9-4b94-4f9f-92c5-fc69fe000771?source=cve
2023-06-02T22:50:01.288Z
2023-07-12T04:38:42.645Z
2023-07-12T04:38:42.645Z
{'Vendor': 'wardee', 'Product': 'Mail logging – WP Mail Catcher', 'Versions': '*'}
CVE-2023-3595
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010
2023-07-10T15:34:52.031Z
2023-07-12T12:37:01.939Z
2023-07-12T13:15:20.247Z
{'Vendor': 'Rockwell Automation', 'Product': '1756-EN2T Series A, B, C', 'Versions': '<=5.008 & 5.028'}
CVE-2023-3716
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oduyo Online Collection Software allows SQL Injection.This issue affects Online Collection Software: before 1.0.1.
https://www.usom.gov.tr/bildirim/tr-23-0442
2023-07-17T14:57:58.421Z
2023-08-08T11:02:50.114Z
2023-08-08T11:02:50.114Z
{'Vendor': 'Oduyo', 'Product': 'Online Collection Software', 'Versions': '0'}
CVE-2023-3346
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in MITSUBSHI CNC Series allows a remote unauthenticated attacker to cause Denial of Service (DoS) condition and execute arbitrary code on the product by sending specially crafted packets. In addition, system reset is required for recovery.
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-007_en.pdf
2023-06-21T00:16:48.923Z
2023-08-03T04:00:43.294Z
2023-12-05T23:56:39.824Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MITSUBISHI CNC M800V Series M800VW', 'Versions': 'System Number BND-2051W000 versions A8 and prior'}
CVE-2023-3653
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digital Ant E-Commerce Software allows Stored XSS.This issue affects E-Commerce Software: before 11.
https://https://www.usom.gov.tr/bildirim/tr-23-0443
2023-07-13T06:19:06.113Z
2023-08-08T14:42:18.887Z
2023-08-16T07:26:33.147Z
{'Vendor': 'Digital Ant', 'Product': 'E-Commerce Software', 'Versions': '0'}
CVE-2023-3203
The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_limit_product function. This makes it possible for unauthenticated attackers to update limit the number of product per category to use cache data in home screen via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1aed51a2-9fd4-43bb-b72d-ae8e51ee6e87?source=cve
2023-06-12T14:04:02.287Z
2023-06-14T01:47:48.730Z
2023-06-14T01:47:48.730Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-3487
An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.
https://github.com/SiliconLabs/gecko_sdk/releases
2023-06-30T18:44:04.589Z
2023-10-20T14:12:44.805Z
2023-10-20T14:12:44.805Z
{'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0'}
CVE-2023-3891
Race condition in Lapce v0.2.8 allows an attacker to elevate privileges on the system
https://fluidattacks.com/advisories/aerosmith
2023-07-24T17:48:57.293Z
2023-09-15T02:07:22.888Z
2023-09-15T02:07:22.888Z
{'Vendor': 'Lapce', 'Product': 'Lapce', 'Versions': '0.2.8'}
CVE-2023-3192
Session Fixation in GitHub repository froxlor/froxlor prior to 2.1.0.
https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551
2023-06-11T00:00:00
2023-06-11T00:00:00
2023-06-11T00:00:00
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-3038
SQL injection vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the rows parameter of the jsonGrid route and extract all the information stored in the application.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community
2023-06-01T14:15:09.870Z
2023-10-04T11:11:44.513Z
2023-10-04T11:11:44.513Z
{'Vendor': 'HelpDezk', 'Product': 'HelpDezk Community', 'Versions': '1.1.10'}
CVE-2023-3311
A vulnerability, which was classified as problematic, was found in PuneethReddyHC online-shopping-system-advanced 1.0. This affects an unknown part of the file addsuppliers.php. The manipulation of the argument First name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231807.
https://vuldb.com/?id.231807
2023-06-18T14:32:21.076Z
2023-06-18T15:00:04.431Z
2023-10-23T13:33:12.178Z
{'Vendor': 'PuneethReddyHC', 'Product': 'online-shopping-system-advanced', 'Versions': '1.0'}
CVE-2023-3741
An OS Command injection vulnerability in NEC Platforms DT900 and DT900S Series all versions allows an attacker to execute any command on the device.
https://https://jpn.nec.com/security-info/secinfo/nv23-011_en.html
2023-07-18T00:45:34.513Z
2023-11-30T00:55:50.692Z
2023-11-30T00:55:52.643Z
{'Vendor': 'NEC Platforms, Ltd', 'Product': 'ITK-6DGS-1(BK) TEL', 'Versions': 'all versions'}
CVE-2023-3254
The Widgets for Google Reviews plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 10.9. This is due to missing or incorrect nonce validation within setup_no_reg_header.php. This makes it possible for unauthenticated attackers to reset plugin settings and remove reviews via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/70968476-b064-477f-999f-4aa2c51d89cc?source=cve
2023-06-14T20:28:17.065Z
2023-10-18T04:32:21.078Z
2023-10-18T04:32:21.078Z
{'Vendor': 'trustindex', 'Product': 'Widgets for Google Reviews', 'Versions': '*'}
CVE-2023-3604
The Change WP Admin Login WordPress plugin before 1.1.4 discloses the URL of the hidden login page when accessing a crafted URL, bypassing the protection offered.
https://wpscan.com/vulnerability/8f6615e8-f607-4ce4-a0e0-d5fc841ead16
2023-07-10T18:49:55.896Z
2023-08-21T12:29:51.285Z
2023-08-21T12:29:51.285Z
{'Vendor': 'Unknown', 'Product': 'Change WP Admin Login', 'Versions': '0'}
CVE-2023-3491
Unrestricted Upload of File with Dangerous Type in GitHub repository fossbilling/fossbilling prior to 0.5.3.
https://huntr.dev/bounties/043bd900-ac78-44d2-a340-84ddd0bc4a1d
2023-06-30T21:10:57.830Z
2023-06-30T21:11:09.527Z
2023-06-30T21:11:09.527Z
{'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'}
CVE-2023-3184
A vulnerability was found in SourceCodester Sales Tracker Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=save. The manipulation of the argument firstname/middlename/lastname/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231164.
https://vuldb.com/?id.231164
2023-06-09T12:40:47.249Z
2023-06-09T13:00:04.777Z
2023-10-23T13:02:41.803Z
{'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'}
CVE-2023-3887
A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235249 was assigned to this vulnerability.
https://vuldb.com/?id.235249
2023-07-24T16:55:12.854Z
2023-07-25T07:31:03.135Z
2023-10-24T07:17:02.303Z
{'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'}
CVE-2023-3757
A vulnerability classified as problematic has been found in GZ Scripts Car Rental Script 1.8. Affected is an unknown function of the file /EventBookingCalendar/load.php?controller=GzFront/action=checkout/cid=1/layout=calendar/show_header=T/local=3. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234432. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.234432
2023-07-18T16:43:50.441Z
2023-07-19T04:31:03.319Z
2023-10-23T17:31:31.817Z
{'Vendor': 'GZ Scripts', 'Product': 'Car Rental Script', 'Versions': '1.8'}
CVE-2023-3307
A vulnerability was found in miniCal 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /booking/show_bookings/. The manipulation of the argument search_query leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231803. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.231803
2023-06-18T07:06:40.091Z
2023-06-18T08:31:03.693Z
2023-10-23T13:28:19.385Z
{'Vendor': 'n/a', 'Product': 'miniCal', 'Versions': '1.0.0'}
CVE-2023-3612
Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content.
https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10
2023-07-11T06:15:11.185Z
2023-09-11T09:04:09.924Z
2023-09-13T06:17:09.814Z
{'Vendor': 'Govee', 'Product': 'Govee Home', 'Versions': '5.7.03'}
CVE-2023-3242
Allocation of Resources Without Limits or Throttling, Improper Initialization vulnerability in B&R Industrial Automation B&R Automation Runtime allows Flooding, Leveraging Race Conditions.This issue affects B&R Automation Runtime: <G4.93.
https://www.br-automation.com/downloads_br_productcatalogue/assets/1689787619746-en-original-1.0.pdf
2023-06-14T11:28:13.641Z
2023-07-26T17:36:18.417Z
2023-07-26T17:36:18.417Z
{'Vendor': 'B&R Industrial Automation', 'Product': 'B&R Automation Runtime', 'Versions': '<G4.93'}
CVE-2023-3096
A vulnerability was found in KylinSoft kylin-software-properties on KylinOS. It has been declared as critical. This vulnerability affects the function changedSource. The manipulation leads to improper access controls. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.1-130 is able to address this issue. It is recommended to upgrade the affected component. VDB-230686 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230686
2023-06-05T05:07:47.547Z
2023-06-05T05:31:02.930Z
2023-10-23T07:58:31.165Z
{'Vendor': 'KylinSoft', 'Product': 'kylin-software-properties', 'Versions': 'n/a'}
CVE-2023-3995
null
null
2023-07-28T13:49:22.742Z
null
2023-09-04T19:58:12.058Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-3079
Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html
2023-06-02T21:29:44.556Z
2023-06-05T21:40:06.622Z
2023-06-05T21:40:06.622Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.110'}
CVE-2023-3350
A Cryptographic Issue vulnerability has been found on IBERMATICA RPS, affecting version 2019. By firstly downloading the log file, an attacker could retrieve the SQL query sent to the application in plaint text. This log file contains the password hashes coded with AES-CBC-128 bits algorithm, which can be decrypted with a .NET function, obtaining the username's password in plain text.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019
2023-06-21T11:12:47.284Z
2023-10-03T13:26:03.410Z
2023-10-03T13:26:03.410Z
{'Vendor': 'IBERMATICA', 'Product': 'IBERMATICA RPS 2019', 'Versions': 'RPS 2019'}
CVE-2023-3700
Authorization Bypass Through User-Controlled Key in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
https://huntr.dev/bounties/e8d530db-a6a7-4f79-a95d-b77654cc04f8
2023-07-17T06:16:09.605Z
2023-07-17T06:16:21.610Z
2023-08-02T08:53:27.829Z
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
CVE-2023-3215
Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
2023-06-13T00:12:15.212Z
2023-06-13T17:51:08.540Z
2023-06-13T17:51:08.540Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'}
CVE-2023-3645
The Contact Form Builder by Bit Form WordPress plugin before 2.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/58c11f1e-6ea0-468c-b974-4aea9eb94b82
2023-07-12T17:28:05.523Z
2023-08-14T19:10:16.523Z
2024-01-16T15:54:05.991Z
{'Vendor': 'Unknown', 'Product': 'Contact Form Builder by Bit Form', 'Versions': '0'}
CVE-2023-3452
The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a76077c6-700a-4d21-a930-b0d6455d959c?source=cve
2023-06-28T19:14:28.550Z
2023-08-12T02:05:19.117Z
2023-08-12T02:05:19.117Z
{'Vendor': 'flightbycanto', 'Product': 'Canto', 'Versions': '*'}
CVE-2023-3517
Hitachi Vantara Pentaho Data Integration & Analytics versions before 9.5.0.1 and 9.3.0.5, including 8.3.x does not restrict JNDI identifiers during the creation of XActions, allowing control of system level data sources.
https://support.pentaho.com/hc/en-us/articles/19668665099533
2023-07-05T16:19:15.295Z
2023-12-12T22:28:08.559Z
2023-12-12T22:28:08.559Z
{'Vendor': 'Hitachi Vantara', 'Product': 'Pentaho Data Integration & Analytics', 'Versions': '1.0, 9.4.0.0'}
CVE-2023-3147
A vulnerability has been found in SourceCodester Online Discussion Forum Site 1.0 and classified as critical. This vulnerability affects unknown code of the file admin\categories\view_category.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231016.
https://vuldb.com/?id.231016
2023-06-07T13:55:51.319Z
2023-06-07T16:00:03.375Z
2023-10-23T12:49:15.585Z
{'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'}
CVE-2023-3844
A vulnerability was found in mooSocial mooDating 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /friends of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235195. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
https://vuldb.com/?id.235195
2023-07-22T13:57:18.672Z
2023-07-23T05:31:03.490Z
2023-10-24T06:35:32.786Z
{'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'}
CVE-2023-3794
A vulnerability classified as problematic has been found in Bug Finder ChainCity Real Estate Investment Platform 1.0. Affected is an unknown function of the file /chaincity/user/ticket/create of the component New Ticket Handler. The manipulation of the argument subject leads to cross site scripting. It is possible to launch the attack remotely. VDB-235062 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.235062
2023-07-20T07:53:24.950Z
2023-07-20T20:00:06.153Z
2023-10-23T18:37:18.113Z
{'Vendor': 'Bug Finder', 'Product': 'ChainCity Real Estate Investment Platform', 'Versions': '1.0'}
CVE-2023-3055
The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.27.133. This is due to missing or incorrect nonce validation on the 'azh_save' function. This makes it possible for unauthenticated attackers to update the post content and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/2efeffa2-b21a-4aa1-93b0-51c775758ab1?source=cve
2023-06-02T11:21:14.579Z
2023-06-02T23:37:55.642Z
2023-06-02T23:37:55.642Z
{'Vendor': 'azexo', 'Product': 'Page Builder with Image Map by AZEXO', 'Versions': '*'}
CVE-2023-3405
Unchecked parameter value in M-Files Server in versions before 23.6.12695.3 (excluding 23.2 SR2 and newer) allows anonymous user to cause denial of service
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-3405
2023-06-26T13:25:05.119Z
2023-06-27T14:24:40.316Z
2023-06-27T14:24:40.316Z
{'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0, 23.2.12340.11'}
CVE-2023-3956
The InstaWP Connect plugin for WordPress is vulnerable to unauthorized access of data, modification of data and loss of data due to a missing capability check on the 'events_receiver' function in versions up to, and including, 0.0.9.18. This makes it possible for unauthenticated attackers to add, modify or delete post and taxonomy, install, activate or deactivate plugin, change customizer settings, add or modify or delete user including administrator user.
https://www.wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b?source=cve
2023-07-26T17:41:07.986Z
2023-07-27T06:54:14.804Z
2023-07-27T06:54:14.804Z
{'Vendor': 'instawp', 'Product': 'InstaWP Connect – 1-click WP Staging & Migration (beta)', 'Versions': '*'}
CVE-2023-3813
The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents of arbitrary files on the server, which can contain sensitive information. The requires the premium version of the plugin to be activated.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f767d94b-fe92-4b69-9d81-96de51e12983?source=cve
2023-07-20T13:36:48.574Z
2023-07-21T02:04:26.822Z
2023-07-21T02:04:26.822Z
{'Vendor': 'artbees/', 'Product': 'Jupiter X Core', 'Versions': '*'}