CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-3035 | A vulnerability has been found in Guangdong Pythagorean OA Office System up to 4.50.31 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Schedule Handler. The manipulation of the argument description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230467. | https://vuldb.com/?id.230467 | 2023-06-01T13:17:55.863Z | 2023-06-01T13:31:03.225Z | 2023-10-23T07:43:52.843Z | {'Vendor': 'Guangdong', 'Product': 'Pythagorean OA Office System', 'Versions': '4.50.0, 4.50.1, 4.50.2, 4.50.3, 4.50.4, 4.50.5, 4.50.6, 4.50.7, 4.50.8, 4.50.9, 4.50.10, 4.50.11, 4.50.12, 4.50.13, 4.50.14, 4.50.15, 4.50.16, 4.50.17, 4.50.18, 4.50.19, 4.50.20, 4.50.21, 4.50.22, 4.50.23, 4.50.24, 4.50.25, 4.50.26, 4.50.27, 4.50.28, 4.50.29, 4.50.30, 4.50.31'} |
CVE-2023-3465 | A vulnerability was found in SimplePHPscripts Classified Ads Script 1.8. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file user.php of the component HTTP POST Request Handler. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-232711. | https://vuldb.com/?id.232711 | 2023-06-29T20:15:53.005Z | 2023-06-29T21:00:04.953Z | 2023-10-23T13:52:43.508Z | {'Vendor': 'SimplePHPscripts', 'Product': 'Classified Ads Script', 'Versions': '1.8'} |
CVE-2023-3936 | The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/6d09a5d3-046d-47ef-86b4-c024ea09dc0f | 2023-07-25T13:13:43.226Z | 2023-08-21T12:29:49.665Z | 2023-08-21T12:29:49.665Z | {'Vendor': 'Unknown', 'Product': 'Blog2Social: Social Media Auto Post & Scheduler', 'Versions': '7.1.0'} |
CVE-2023-3609 | A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.
If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.
We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc | 2023-07-10T20:52:53.660Z | 2023-07-21T20:47:12.172Z | 2023-07-21T20:47:12.172Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '4.14'} |
CVE-2023-3259 | The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:48:44.547Z | 2023-08-14T03:49:59.889Z | 2023-08-14T03:49:59.889Z | {'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'} |
CVE-2023-3577 | Mattermost fails to properly restrict requests to localhost/intranet during the interactive dialog, which could allow an attacker to perform a limited blind SSRF.
| https://mattermost.com/security-updates | 2023-07-10T09:47:27.158Z | 2023-07-17T15:18:07.871Z | 2023-07-17T15:18:07.871Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.7, 7.10.3'} |
CVE-2023-3127 | An unauthenticated user could log into iSTAR Ultra, iSTAR Ultra LT, iSTAR Ultra G2, and iSTAR Edge G2 with administrator rights. | https://www.johnsoncontrols.com/cyber-solutions/security-advisories | 2023-06-06T14:51:53.713Z | 2023-07-11T21:06:29.003Z | 2023-07-11T21:06:29.003Z | {'Vendor': 'Sensormatic Electronics, a subsidiary of Johnson Controls, Inc.', 'Product': 'iSTAR Ultra', 'Versions': '>6.8.6'} |
CVE-2023-3824 | In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
| https://github.com/php/php-src/security/advisories/GHSA-jqcx-ccgc-xwhv | 2023-07-21T16:57:23.334Z | 2023-08-11T05:48:34.082Z | 2023-08-11T05:48:34.082Z | {'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.*, 8.1.*, 8.2.*'} |
CVE-2023-3961 | A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes. | https://access.redhat.com/errata/RHSA-2023:6209 | 2023-07-26T21:21:23.933Z | 2023-11-03T12:32:29.558Z | 2024-01-23T01:16:55.377Z | {'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.19.1, 4.18.8, 4.17.12'} |
CVE-2023-3432 | Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plantuml prior to 1.2023.9. | https://huntr.dev/bounties/8ac3316f-431c-468d-87e4-3dafff2ecf51 | 2023-06-27T14:30:17.372Z | 2023-06-27T14:30:23.442Z | 2023-06-27T14:30:23.442Z | {'Vendor': 'plantuml', 'Product': 'plantuml/plantuml', 'Versions': 'unspecified'} |
CVE-2023-3062 | A vulnerability was found in code-projects Agro-School Management System 1.0. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-230568. | https://vuldb.com/?id.230568 | 2023-06-02T12:46:21.536Z | 2023-06-02T14:00:05.404Z | 2023-10-23T07:52:25.191Z | {'Vendor': 'code-projects', 'Product': 'Agro-School Management System', 'Versions': '1.0'} |
CVE-2023-3598 | Out of bounds read and write in ANGLE in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-07-10T17:04:59.077Z | 2023-07-28T20:06:31.600Z | 2023-07-28T20:06:31.600Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-3576 | A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service. | https://access.redhat.com/errata/RHSA-2023:6575 | 2023-07-10T09:16:33.670Z | 2023-10-04T18:02:23.926Z | 2024-01-23T00:56:24.964Z | {'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': '4.5.1'} |
CVE-2023-3126 | The B2BKing plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'b2bkingdownloadpricelist' function in versions up to, and including, 4.6.00. This makes it possible for Authenticated attackers with subscriber or customer-level permissions to retrieve the full pricing list of all products on the site. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e3ac14-1421-49f0-9c60-7f7d5c9d7654?source=cve | 2023-06-06T13:19:00.656Z | 2023-06-07T01:51:44.695Z | 2023-06-07T01:51:44.695Z | {'Vendor': 'webwizardsdev', 'Product': 'B2BKing — Ultimate WooCommerce Wholesale and B2B Solution', 'Versions': '*'} |
CVE-2023-3825 |
PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 | 2023-07-21T20:08:42.706Z | 2023-07-31T22:53:56.568Z | 2023-07-31T22:53:56.568Z | {'Vendor': 'PTC', 'Product': 'KEPServerEX', 'Versions': '6.0'} |
CVE-2023-3433 | The "nickname" field within Savoir-faire Linux's Jami application is susceptible to a failed state when a user inserts special characters into the field. When present, these special characters, make it so the application cannot create the signature for the user and results in a local denial of service to the application. | https://review.jami.net/c/jami-daemon/+/23575 | 2023-06-27T15:27:47.858Z | 2023-07-14T12:28:53.363Z | 2023-07-14T12:28:53.363Z | {'Vendor': 'Savoir-faire Linux', 'Product': 'Jami', 'Versions': '20222284'} |
CVE-2023-3063 | The SP Project & Document Manager plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 4.67. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with subscriber privileges or above, to change user passwords and potentially take over administrator accounts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6dc2e720-85d9-42d9-94ef-eb172425993d?source=cve | 2023-06-02T13:00:09.740Z | 2023-06-30T01:56:17.054Z | 2023-06-30T01:56:17.054Z | {'Vendor': 'smartypants', 'Product': 'SP Project & Document Manager', 'Versions': '*'} |
CVE-2023-3599 | A vulnerability was found in SourceCodester Best Fee Management System 1.0. It has been rated as critical. Affected by this issue is the function save_user of the file admin_class.php of the component Add User Handler. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-233450 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.233450 | 2023-07-10T17:15:12.108Z | 2023-07-10T17:31:03.077Z | 2023-10-23T14:48:06.291Z | {'Vendor': 'SourceCodester', 'Product': 'Best Fee Management System', 'Versions': '1.0'} |
CVE-2023-3608 | A vulnerability was found in Ruijie BCR810W 2.5.10. It has been rated as critical. This issue affects some unknown processing of the component Tracert Page. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233477 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233477 | 2023-07-10T19:51:32.093Z | 2023-07-10T21:31:03.835Z | 2023-10-23T14:52:59.102Z | {'Vendor': 'Ruijie', 'Product': 'BCR810W', 'Versions': '2.5.10'} |
CVE-2023-3872 | A vulnerability classified as critical was found in Campcodes Beauty Salon Management System 1.0. This vulnerability affects unknown code of the file /admin/edit-services.php. The manipulation of the argument editid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235234 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.235234 | 2023-07-24T16:40:18.281Z | 2023-07-24T22:00:03.976Z | 2023-10-24T06:58:44.008Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3171 | A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service. | https://access.redhat.com/errata/RHSA-2023:5484 | 2023-06-08T19:52:58.072Z | 2023-12-27T15:45:33.293Z | 2023-12-27T15:45:33.293Z | {'Vendor': 'n/a', 'Product': 'eap', 'Versions': ''} |
CVE-2023-3521 | Cross-site Scripting (XSS) - Reflected in GitHub repository fossbilling/fossbilling prior to 0.5.4. | https://huntr.dev/bounties/76a3441d-7f75-4a8d-a7a0-95a7f5456eb0 | 2023-07-06T01:45:26.009Z | 2023-07-06T01:45:39.229Z | 2023-07-06T01:45:39.229Z | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3034 | Reflected XSS affects the ‘mode’ parameter in the /admin functionality of the web application in versions <=2.0.44 | https://igs.bkg.bund.de/ntrip/bkgcaster | 2023-06-01T08:53:55.239Z | 2023-06-28T08:09:04.348Z | 2023-06-28T08:09:04.348Z | {'Vendor': 'BKG', 'Product': 'NTRIP Professional Caster', 'Versions': '<=2.0.44'} |
CVE-2023-3464 | A vulnerability was found in SimplePHPscripts Classified Ads Script 1.8. It has been classified as problematic. Affected is an unknown function of the file /preview.php of the component URL Parameter Handler. The manipulation of the argument p leads to cross site scripting. It is possible to launch the attack remotely. It is recommended to upgrade the affected component. VDB-232710 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.232710 | 2023-06-29T20:15:50.727Z | 2023-06-29T20:31:03.852Z | 2023-10-23T13:51:30.373Z | {'Vendor': 'SimplePHPscripts', 'Product': 'Classified Ads Script', 'Versions': '1.8'} |
CVE-2023-3937 | Cross site scripting vulnerability in web portal in Snow Software License Manager from version 9.0.0 up to and including 9.30.1 on Windows allows an authenticated user with high privileges to trigger cross site scripting attack via the web browser | https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC | 2023-07-25T13:29:16.203Z | 2023-08-11T11:28:30.185Z | 2023-08-11T13:53:50.811Z | {'Vendor': 'Snow Software', 'Product': 'Snow License Manager', 'Versions': '9.0.0'} |
CVE-2023-3537 | A vulnerability classified as problematic has been found in SimplePHPscripts News Script PHP Pro 2.4. This affects an unknown part of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-233289 was assigned to this vulnerability. | https://vuldb.com/?id.233289 | 2023-07-07T11:58:22.407Z | 2023-07-07T13:31:03.298Z | 2023-10-23T14:13:29.121Z | {'Vendor': 'SimplePHPscripts', 'Product': 'News Script PHP Pro', 'Versions': '2.4'} |
CVE-2023-3167 | The Mail Queue plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d4aaca22-76b9-42ec-a960-65d44d696324?source=cve | 2023-06-08T18:16:09.799Z | 2023-07-12T04:38:50.820Z | 2023-07-12T04:38:50.820Z | {'Vendor': 'wdm-team', 'Product': 'Mail Queue', 'Versions': '*'} |
CVE-2023-3864 | Blind SQL injection in a service running in Snow Software license manager from version 8.0.0 up to and including 9.30.1 on Windows allows a logged in user with high privileges to inject SQL commands via the web portal. | https://community.snowsoftware.com/s/feed/0D56M00009gUexuSAC | 2023-07-24T13:51:33.771Z | 2023-08-11T11:24:05.823Z | 2023-08-11T11:24:05.823Z | {'Vendor': 'Snow Software', 'Product': 'SLM', 'Versions': '8.0.0'} |
CVE-2023-3472 | Use after free vulnerability in Panasonic KW Watcher versions 1.00 through 2.82 may allow attackers to execute arbitrary code. | https://www3.panasonic.biz/ac/e/fasys/software_info/eco/kwwatcher_versioninfo.jsp | 2023-06-30T05:37:48.608Z | 2023-09-06T04:05:43.051Z | 2023-09-06T04:05:43.051Z | {'Vendor': 'Panasonic', 'Product': 'KW Watcher on Windows', 'Versions': '1.00'} |
CVE-2023-3188 | Server-Side Request Forgery (SSRF) in GitHub repository owncast/owncast prior to 0.1.0. | https://huntr.dev/bounties/0d0d526a-1c39-4e6a-b081-d3914468e495 | 2023-06-10T00:00:00 | 2023-06-10T00:00:00 | 2023-06-10T00:00:00 | {'Vendor': 'owncast', 'Product': 'owncast/owncast', 'Versions': 'unspecified'} |
CVE-2023-3022 | A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress. | https://bugzilla.redhat.com/show_bug.cgi?id=2211440 | 2023-05-31T00:00:00 | 2023-06-19T00:00:00 | 2023-06-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux Kernel (IPv6)', 'Versions': 'Fixed in kernel 5.2-rc1'} |
CVE-2023-3649 | iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-22.html | 2023-07-13T02:21:11.517Z | 2023-07-14T06:16:45.767Z | 2023-07-14T06:16:45.767Z | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0'} |
CVE-2023-3219 | The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post. | https://wpscan.com/vulnerability/72d80887-0270-4987-9739-95b1a178c1fd | 2023-06-13T14:48:58.415Z | 2023-07-10T12:41:20.078Z | 2023-07-10T12:41:20.078Z | {'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'} |
CVE-2023-3833 | A vulnerability was found in Bug Finder Montage 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235159 | 2023-07-21T20:43:05.854Z | 2023-07-22T16:00:05.360Z | 2023-10-24T06:22:07.733Z | {'Vendor': 'Bug Finder', 'Product': 'Montage', 'Versions': '1.0'} |
CVE-2023-3999 | The Waiting: One-click countdowns plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on its AJAX calls in versions up to, and including, 0.6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to create and delete countdowns as well as manipulate other plugin settings. | https://www.wordfence.com/threat-intel/vulnerabilities/id/293070c8-783f-404d-9250-392713703ce4?source=cve | 2023-07-28T20:13:32.968Z | 2023-08-31T05:33:04.838Z | 2023-08-31T05:33:04.838Z | {'Vendor': 'pluginbuilders', 'Product': 'Waiting: One-click countdowns', 'Versions': '*'} |
CVE-2023-3130 | The Short URL WordPress plugin before 1.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/6e167864-c304-402e-8b2d-d47b5a3767d1 | 2023-06-06T18:27:07.424Z | 2023-07-31T09:37:34.152Z | 2023-07-31T09:37:34.152Z | {'Vendor': 'Unknown', 'Product': 'Short URL', 'Versions': '0'} |
CVE-2023-3560 | A vulnerability, which was classified as problematic, has been found in GZ Scripts Ticket Booking Script 1.8. Affected by this issue is some unknown functionality of the file /load.php. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. The attack may be launched remotely. VDB-233354 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233354 | 2023-07-08T11:56:12.862Z | 2023-07-08T15:00:04.138Z | 2023-10-23T14:30:34.692Z | {'Vendor': 'GZ Scripts', 'Product': 'Ticket Booking Script', 'Versions': '1.8'} |
CVE-2023-3075 | Cross-Site Request Forgery (CSRF) in GitHub repository tsolucio/corebos prior to 8. | https://huntr.dev/bounties/0f5448a6-d551-424f-887d-80f9bcfaa6e4 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | 2023-06-02T00:00:00 | {'Vendor': 'tsolucio', 'Product': 'tsolucio/corebos', 'Versions': 'unspecified'} |
CVE-2023-3425 | Out-of-bounds read issue in M-Files Server versions below 23.8.12892.6 and LTS Service Release Versions before 23.2 LTS SR3 allows unauthenticated user to read restricted amount of bytes from memory. | https://www.m-files.com/about/trust-center/security-advisories/cve-2023-3425 | 2023-06-27T05:38:34.710Z | 2023-08-25T08:08:05.954Z | 2023-08-25T08:08:05.954Z | {'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0, 23.2.12340.14'} |
CVE-2023-3632 | Use of Hard-coded Cryptographic Key vulnerability in Sifir Bes Education and Informatics Kunduz - Homework Helper App allows Authentication Abuse, Authentication Bypass.This issue affects Kunduz - Homework Helper App: before 6.2.3.
| https://www.usom.gov.tr/bildirim/tr-23-0446 | 2023-07-12T07:54:24.491Z | 2023-08-09T08:05:57.144Z | 2023-08-16T07:26:12.454Z | {'Vendor': 'Sifir Bes Education and Informatics', 'Product': 'Kunduz - Homework Helper App', 'Versions': '0'} |
CVE-2023-3262 | The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database.A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records. | https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html | 2023-06-15T06:50:25.309Z | 2023-08-14T03:59:51.212Z | 2023-08-25T05:09:31.582Z | {'Vendor': 'Dataprobe', 'Product': 'iBoot PDU', 'Versions': '1.43.03312023'} |
CVE-2023-3798 | A vulnerability has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0 and classified as critical. This vulnerability affects unknown code of the file /App_Resource/UEditor/server/upload.aspx. The manipulation of the argument file leads to unrestricted upload. The exploit has been disclosed to the public and may be used. VDB-235066 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235066 | 2023-07-20T08:10:57.282Z | 2023-07-20T22:00:05.350Z | 2023-10-23T18:42:11.212Z | {'Vendor': 'Chengdu', 'Product': 'Flash Flood Disaster Monitoring and Warning System', 'Versions': '2.0'} |
CVE-2023-3777 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.
We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 | 2023-07-19T16:02:06.626Z | 2023-09-06T13:50:26.344Z | 2023-09-06T13:50:26.344Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.9'} |
CVE-2023-3327 | null | null | 2023-06-19T00:00:00 | null | 2023-06-27T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3848 | A vulnerability, which was classified as problematic, has been found in mooSocial mooDating 1.2. This issue affects some unknown processing of the file /users/view of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235199. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | https://vuldb.com/?id.235199 | 2023-07-22T13:57:39.186Z | 2023-07-23T08:00:04.071Z | 2023-10-24T06:40:25.354Z | {'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'} |
CVE-2023-3235 | A vulnerability was found in mccms up to 2.6.5. It has been rated as critical. Affected by this issue is the function pic_api of the file sys/apps/controllers/admin/Comic.php. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-231506 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.231506 | 2023-06-14T05:48:15.111Z | 2023-06-14T07:00:04.704Z | 2023-10-23T13:13:40.688Z | {'Vendor': 'n/a', 'Product': 'mccms', 'Versions': '2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5'} |
CVE-2023-3665 |
A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables,
leading to denial of service and or the execution of arbitrary code.
| https://kcm.trellix.com/corporate/index?page=content&id=SB10405 | 2023-07-13T14:30:54.711Z | 2023-10-04T14:32:52.925Z | 2023-10-04T14:32:52.925Z | {'Vendor': 'Trellix ', 'Product': 'Trellix Endpoint Security', 'Versions': '10.7.0'} |
CVE-2023-3370 | null | null | 2023-06-22T14:14:22.948Z | null | 2023-07-02T21:50:51.619260Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3720 | The Upload Media By URL WordPress plugin before 1.0.8 does not have CSRF check when uploading files, which could allow attackers to make logged in admins upload files (including HTML containing JS code for users with the unfiltered_html capability) on their behalf. | https://wpscan.com/vulnerability/16375a7f-0a9f-4961-8510-d047ffbf3954 | 2023-07-17T17:38:35.876Z | 2023-08-30T14:22:00.303Z | 2023-08-30T14:22:00.303Z | {'Vendor': 'Unknown', 'Product': 'Upload Media By URL', 'Versions': '0'} |
CVE-2023-3059 | A vulnerability, which was classified as critical, was found in SourceCodester Online Exam Form Submission 1.0. This affects an unknown part of the file /admin/update_s6.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230565 was assigned to this vulnerability. | https://vuldb.com/?id.230565 | 2023-06-02T12:39:12.199Z | 2023-06-02T13:00:05.607Z | 2023-10-23T07:48:45.701Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam Form Submission', 'Versions': '1.0'} |
CVE-2023-3673 | SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.24. | https://huntr.dev/bounties/46ca0934-5260-477b-9e86-7b16bb18d0a9 | 2023-07-14T12:18:52.623Z | 2023-07-14T12:19:04.063Z | 2023-07-14T12:19:04.063Z | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-3389 | A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.
Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.
We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).
| https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663 | 2023-06-23T13:43:00.034Z | 2023-06-28T19:33:55.097Z | 2023-07-10T16:48:01.844Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.13, 5.10.162'} |
CVE-2023-3223 | A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null. | https://access.redhat.com/errata/RHSA-2023:4505 | 2023-06-13T15:50:40.922Z | 2023-09-27T13:54:44.682Z | 2023-09-27T13:54:44.682Z | {'Vendor': 'n/a', 'Product': 'undertow', 'Versions': '2.2.24'} |
CVE-2023-3736 | Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 115.0.5790.98 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html | 2023-07-18T00:34:21.033Z | 2023-08-01T22:39:18.093Z | 2023-08-01T22:39:18.093Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '115.0.5790.98'} |
CVE-2023-3366 | The MultiParcels Shipping For WooCommerce WordPress plugin before 1.15.2 does not have CRSF check when deleting a shipment, allowing attackers to make any logged in user, delete arbitrary shipment via a CSRF attack | https://wpscan.com/vulnerability/b2f06223-9352-4227-ae94-32061e2c5611 | 2023-06-22T08:52:30.487Z | 2023-08-21T12:29:50.443Z | 2023-08-21T12:29:50.443Z | {'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'} |
CVE-2023-3809 | A vulnerability was found in Hospital Management System 1.0. It has been classified as critical. This affects an unknown part of the file patient.php. The manipulation of the argument address leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235077 was assigned to this vulnerability. | https://vuldb.com/?id.235077 | 2023-07-20T08:44:11.176Z | 2023-07-21T03:31:03.395Z | 2023-10-24T06:08:42.670Z | {'Vendor': 'n/a', 'Product': 'Hospital Management System', 'Versions': '1.0'} |
CVE-2023-3274 | A vulnerability classified as critical has been found in code-projects Supplier Management System 1.0. Affected is an unknown function of the file btn_functions.php of the component Picture Handler. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231624. | https://vuldb.com/?id.231624 | 2023-06-15T12:08:29.479Z | 2023-06-15T12:31:02.902Z | 2023-10-23T13:22:13.279Z | {'Vendor': 'code-projects', 'Product': 'Supplier Management System', 'Versions': '1.0'} |
CVE-2023-3624 | A vulnerability classified as critical has been found in Nesote Inout Blockchain FiatExchanger 3.0. This affects an unknown part of the file /index.php/coins/update_marketboxslider of the component POST Parameter Handler. The manipulation of the argument marketcurrency leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-233577 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.233577 | 2023-07-11T15:26:11.791Z | 2023-07-11T17:00:04.438Z | 2023-10-23T14:59:05.064Z | {'Vendor': 'Nesote', 'Product': 'Inout Blockchain FiatExchanger', 'Versions': '3.0'} |
CVE-2023-3331 | Improper Limitation of a Pathname to a Restricted Directory vulnerability in NEC Corporation Aterm Aterm WG2600HP2, WG2600HP, WG2200HP, WG1800HP2, WG1800HP, WG1400HP, WG600HP, WG300HP, WF300HP, WR9500N, WR9300N, WR8750N, WR8700N, WR8600N, WR8370N, WR8175N and WR8170N all versions allows a attacker to delete
specific files in the product. | https://https://jpn.nec.com/security-info/secinfo/nv23-007_en.html | 2023-06-20T01:14:08.079Z | 2023-06-28T01:19:45.378Z | 2023-07-03T02:10:13.150Z | {'Vendor': 'NEC Corporation', 'Product': 'Aterm WG2600HP2', 'Versions': 'all versions'} |
CVE-2023-3761 | A vulnerability was found in Intergard SGS 8.7.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Password Change Handler. The manipulation leads to cleartext transmission of sensitive information. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-234446 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234446 | 2023-07-18T19:29:01.654Z | 2023-07-19T06:00:04.545Z | 2023-10-23T17:35:11.389Z | {'Vendor': 'Intergard', 'Product': 'SGS', 'Versions': '8.7.0'} |
CVE-2023-3018 | A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/?page=user/list. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230362 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230362 | 2023-05-31T13:13:40.338Z | 2023-05-31T14:31:04.073Z | 2023-10-23T07:41:26.447Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-3829 | A vulnerability was found in Bug Finder ICOGenie 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user/ticket/create of the component Support Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. VDB-235150 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235150 | 2023-07-21T20:29:40.483Z | 2023-07-22T11:31:03.726Z | 2023-10-24T06:17:14.996Z | {'Vendor': 'Bug Finder', 'Product': 'ICOGenie', 'Versions': '1.0'} |
CVE-2023-3983 | An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection. | https://www.tenable.com/security/research/tra-2023-24 | 2023-07-27T00:00:00 | 2023-07-31T00:00:00 | 2023-07-31T00:00:00 | {'Vendor': 'n/a', 'Product': 'Advantech iView', 'Versions': 'versions prior to v5.7.4 build 6752'} |
CVE-2023-3080 | The WP Mail Catcher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1525e1c9-4b94-4f9f-92c5-fc69fe000771?source=cve | 2023-06-02T22:50:01.288Z | 2023-07-12T04:38:42.645Z | 2023-07-12T04:38:42.645Z | {'Vendor': 'wardee', 'Product': 'Mail logging – WP Mail Catcher', 'Versions': '*'} |
CVE-2023-3595 |
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140010 | 2023-07-10T15:34:52.031Z | 2023-07-12T12:37:01.939Z | 2023-07-12T13:15:20.247Z | {'Vendor': 'Rockwell Automation', 'Product': '1756-EN2T Series A, B, C', 'Versions': '<=5.008 & 5.028'} |
CVE-2023-3716 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oduyo Online Collection Software allows SQL Injection.This issue affects Online Collection Software: before 1.0.1.
| https://www.usom.gov.tr/bildirim/tr-23-0442 | 2023-07-17T14:57:58.421Z | 2023-08-08T11:02:50.114Z | 2023-08-08T11:02:50.114Z | {'Vendor': 'Oduyo', 'Product': 'Online Collection Software', 'Versions': '0'} |
CVE-2023-3346 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in MITSUBSHI CNC Series allows a remote unauthenticated attacker to cause Denial of Service (DoS) condition and execute arbitrary code on the product by sending specially crafted packets. In addition, system reset is required for recovery. | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-007_en.pdf | 2023-06-21T00:16:48.923Z | 2023-08-03T04:00:43.294Z | 2023-12-05T23:56:39.824Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MITSUBISHI CNC M800V Series M800VW', 'Versions': 'System Number BND-2051W000 versions A8 and prior'} |
CVE-2023-3653 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digital Ant E-Commerce Software allows Stored XSS.This issue affects E-Commerce Software: before 11.
| https://https://www.usom.gov.tr/bildirim/tr-23-0443 | 2023-07-13T06:19:06.113Z | 2023-08-08T14:42:18.887Z | 2023-08-16T07:26:33.147Z | {'Vendor': 'Digital Ant', 'Product': 'E-Commerce Software', 'Versions': '0'} |
CVE-2023-3203 | The MStore API plugin for WordPress is vulnerable to Cross-Site Request Forgery due to missing nonce validation on the mstore_update_limit_product function. This makes it possible for unauthenticated attackers to update limit the number of product per category to use cache data in home screen via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1aed51a2-9fd4-43bb-b72d-ae8e51ee6e87?source=cve | 2023-06-12T14:04:02.287Z | 2023-06-14T01:47:48.730Z | 2023-06-14T01:47:48.730Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-3487 |
An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.
| https://github.com/SiliconLabs/gecko_sdk/releases | 2023-06-30T18:44:04.589Z | 2023-10-20T14:12:44.805Z | 2023-10-20T14:12:44.805Z | {'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0'} |
CVE-2023-3891 | Race condition in Lapce v0.2.8 allows an attacker to elevate privileges on the system | https://fluidattacks.com/advisories/aerosmith | 2023-07-24T17:48:57.293Z | 2023-09-15T02:07:22.888Z | 2023-09-15T02:07:22.888Z | {'Vendor': 'Lapce', 'Product': 'Lapce', 'Versions': '0.2.8'} |
CVE-2023-3192 | Session Fixation in GitHub repository froxlor/froxlor prior to 2.1.0. | https://huntr.dev/bounties/f3644772-9c86-4f55-a0fa-aeb11f411551 | 2023-06-11T00:00:00 | 2023-06-11T00:00:00 | 2023-06-11T00:00:00 | {'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'} |
CVE-2023-3038 | SQL injection vulnerability in HelpDezk Community affecting version 1.1.10. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the rows parameter of the jsonGrid route and extract all the information stored in the application. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-helpdezk-community | 2023-06-01T14:15:09.870Z | 2023-10-04T11:11:44.513Z | 2023-10-04T11:11:44.513Z | {'Vendor': 'HelpDezk', 'Product': 'HelpDezk Community', 'Versions': '1.1.10'} |
CVE-2023-3311 | A vulnerability, which was classified as problematic, was found in PuneethReddyHC online-shopping-system-advanced 1.0. This affects an unknown part of the file addsuppliers.php. The manipulation of the argument First name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231807. | https://vuldb.com/?id.231807 | 2023-06-18T14:32:21.076Z | 2023-06-18T15:00:04.431Z | 2023-10-23T13:33:12.178Z | {'Vendor': 'PuneethReddyHC', 'Product': 'online-shopping-system-advanced', 'Versions': '1.0'} |
CVE-2023-3741 | An OS Command injection vulnerability in NEC Platforms DT900 and DT900S Series all versions allows an attacker to execute any command on the device.
| https://https://jpn.nec.com/security-info/secinfo/nv23-011_en.html | 2023-07-18T00:45:34.513Z | 2023-11-30T00:55:50.692Z | 2023-11-30T00:55:52.643Z | {'Vendor': 'NEC Platforms, Ltd', 'Product': 'ITK-6DGS-1(BK) TEL', 'Versions': 'all versions'} |
CVE-2023-3254 | The Widgets for Google Reviews plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 10.9. This is due to missing or incorrect nonce validation within setup_no_reg_header.php. This makes it possible for unauthenticated attackers to reset plugin settings and remove reviews via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/70968476-b064-477f-999f-4aa2c51d89cc?source=cve | 2023-06-14T20:28:17.065Z | 2023-10-18T04:32:21.078Z | 2023-10-18T04:32:21.078Z | {'Vendor': 'trustindex', 'Product': 'Widgets for Google Reviews', 'Versions': '*'} |
CVE-2023-3604 | The Change WP Admin Login WordPress plugin before 1.1.4 discloses the URL of the hidden login page when accessing a crafted URL, bypassing the protection offered. | https://wpscan.com/vulnerability/8f6615e8-f607-4ce4-a0e0-d5fc841ead16 | 2023-07-10T18:49:55.896Z | 2023-08-21T12:29:51.285Z | 2023-08-21T12:29:51.285Z | {'Vendor': 'Unknown', 'Product': 'Change WP Admin Login', 'Versions': '0'} |
CVE-2023-3491 | Unrestricted Upload of File with Dangerous Type in GitHub repository fossbilling/fossbilling prior to 0.5.3. | https://huntr.dev/bounties/043bd900-ac78-44d2-a340-84ddd0bc4a1d | 2023-06-30T21:10:57.830Z | 2023-06-30T21:11:09.527Z | 2023-06-30T21:11:09.527Z | {'Vendor': 'fossbilling', 'Product': 'fossbilling/fossbilling', 'Versions': 'unspecified'} |
CVE-2023-3184 | A vulnerability was found in SourceCodester Sales Tracker Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=save. The manipulation of the argument firstname/middlename/lastname/username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231164. | https://vuldb.com/?id.231164 | 2023-06-09T12:40:47.249Z | 2023-06-09T13:00:04.777Z | 2023-10-23T13:02:41.803Z | {'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'} |
CVE-2023-3887 | A vulnerability was found in Campcodes Beauty Salon Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/search-appointment.php. The manipulation of the argument searchdata leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235249 was assigned to this vulnerability. | https://vuldb.com/?id.235249 | 2023-07-24T16:55:12.854Z | 2023-07-25T07:31:03.135Z | 2023-10-24T07:17:02.303Z | {'Vendor': 'Campcodes', 'Product': 'Beauty Salon Management System', 'Versions': '1.0'} |
CVE-2023-3757 | A vulnerability classified as problematic has been found in GZ Scripts Car Rental Script 1.8. Affected is an unknown function of the file /EventBookingCalendar/load.php?controller=GzFront/action=checkout/cid=1/layout=calendar/show_header=T/local=3. The manipulation of the argument first_name/second_name/phone/address_1/country leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-234432. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.234432 | 2023-07-18T16:43:50.441Z | 2023-07-19T04:31:03.319Z | 2023-10-23T17:31:31.817Z | {'Vendor': 'GZ Scripts', 'Product': 'Car Rental Script', 'Versions': '1.8'} |
CVE-2023-3307 | A vulnerability was found in miniCal 1.0.0. It has been rated as critical. This issue affects some unknown processing of the file /booking/show_bookings/. The manipulation of the argument search_query leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-231803. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.231803 | 2023-06-18T07:06:40.091Z | 2023-06-18T08:31:03.693Z | 2023-10-23T13:28:19.385Z | {'Vendor': 'n/a', 'Product': 'miniCal', 'Versions': '1.0.0'} |
CVE-2023-3612 | Govee Home app has unprotected access to WebView component which can be opened by any app on the device. By sending an URL to a specially crafted site, the attacker can execute JavaScript in context of WebView or steal sensitive user data by displaying phishing content. | https://www.sk-cert.sk/threat/sk-cert-bezpecnostne-varovanie-v20230811-10 | 2023-07-11T06:15:11.185Z | 2023-09-11T09:04:09.924Z | 2023-09-13T06:17:09.814Z | {'Vendor': 'Govee', 'Product': 'Govee Home', 'Versions': '5.7.03'} |
CVE-2023-3242 | Allocation of Resources Without Limits or Throttling, Improper Initialization vulnerability in B&R Industrial Automation B&R Automation Runtime allows Flooding, Leveraging Race Conditions.This issue affects B&R Automation Runtime: <G4.93.
| https://www.br-automation.com/downloads_br_productcatalogue/assets/1689787619746-en-original-1.0.pdf | 2023-06-14T11:28:13.641Z | 2023-07-26T17:36:18.417Z | 2023-07-26T17:36:18.417Z | {'Vendor': 'B&R Industrial Automation', 'Product': 'B&R Automation Runtime', 'Versions': '<G4.93'} |
CVE-2023-3096 | A vulnerability was found in KylinSoft kylin-software-properties on KylinOS. It has been declared as critical. This vulnerability affects the function changedSource. The manipulation leads to improper access controls. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.1-130 is able to address this issue. It is recommended to upgrade the affected component. VDB-230686 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230686 | 2023-06-05T05:07:47.547Z | 2023-06-05T05:31:02.930Z | 2023-10-23T07:58:31.165Z | {'Vendor': 'KylinSoft', 'Product': 'kylin-software-properties', 'Versions': 'n/a'} |
CVE-2023-3995 | null | null | 2023-07-28T13:49:22.742Z | null | 2023-09-04T19:58:12.058Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-3079 | Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html | 2023-06-02T21:29:44.556Z | 2023-06-05T21:40:06.622Z | 2023-06-05T21:40:06.622Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.110'} |
CVE-2023-3350 | A Cryptographic Issue vulnerability has been found on IBERMATICA RPS, affecting version 2019. By firstly downloading the log file, an attacker could retrieve the SQL query sent to the application in plaint text. This log file contains the password hashes coded with AES-CBC-128 bits algorithm, which can be decrypted with a .NET function, obtaining the username's password in plain text. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-ibermatica-rps-2019 | 2023-06-21T11:12:47.284Z | 2023-10-03T13:26:03.410Z | 2023-10-03T13:26:03.410Z | {'Vendor': 'IBERMATICA', 'Product': 'IBERMATICA RPS 2019', 'Versions': 'RPS 2019'} |
CVE-2023-3700 | Authorization Bypass Through User-Controlled Key in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
| https://huntr.dev/bounties/e8d530db-a6a7-4f79-a95d-b77654cc04f8 | 2023-07-17T06:16:09.605Z | 2023-07-17T06:16:21.610Z | 2023-08-02T08:53:27.829Z | {'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'} |
CVE-2023-3215 | Use after free in WebRTC in Google Chrome prior to 114.0.5735.133 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html | 2023-06-13T00:12:15.212Z | 2023-06-13T17:51:08.540Z | 2023-06-13T17:51:08.540Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.133'} |
CVE-2023-3645 | The Contact Form Builder by Bit Form WordPress plugin before 2.2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/58c11f1e-6ea0-468c-b974-4aea9eb94b82 | 2023-07-12T17:28:05.523Z | 2023-08-14T19:10:16.523Z | 2024-01-16T15:54:05.991Z | {'Vendor': 'Unknown', 'Product': 'Contact Form Builder by Bit Form', 'Versions': '0'} |
CVE-2023-3452 | The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. Local File Inclusion is also possible, albeit less useful because it requires that the attacker be able to upload a malicious php file via FTP or some other means into a directory readable by the web server. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a76077c6-700a-4d21-a930-b0d6455d959c?source=cve | 2023-06-28T19:14:28.550Z | 2023-08-12T02:05:19.117Z | 2023-08-12T02:05:19.117Z | {'Vendor': 'flightbycanto', 'Product': 'Canto', 'Versions': '*'} |
CVE-2023-3517 |
Hitachi Vantara Pentaho Data Integration & Analytics versions before 9.5.0.1 and 9.3.0.5, including
8.3.x does not restrict JNDI identifiers during the creation of XActions, allowing control of system level data sources.
| https://support.pentaho.com/hc/en-us/articles/19668665099533 | 2023-07-05T16:19:15.295Z | 2023-12-12T22:28:08.559Z | 2023-12-12T22:28:08.559Z | {'Vendor': 'Hitachi Vantara', 'Product': 'Pentaho Data Integration & Analytics', 'Versions': '1.0, 9.4.0.0'} |
CVE-2023-3147 | A vulnerability has been found in SourceCodester Online Discussion Forum Site 1.0 and classified as critical. This vulnerability affects unknown code of the file admin\categories\view_category.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231016. | https://vuldb.com/?id.231016 | 2023-06-07T13:55:51.319Z | 2023-06-07T16:00:03.375Z | 2023-10-23T12:49:15.585Z | {'Vendor': 'SourceCodester', 'Product': 'Online Discussion Forum Site', 'Versions': '1.0'} |
CVE-2023-3844 | A vulnerability was found in mooSocial mooDating 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /friends of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235195. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly. | https://vuldb.com/?id.235195 | 2023-07-22T13:57:18.672Z | 2023-07-23T05:31:03.490Z | 2023-10-24T06:35:32.786Z | {'Vendor': 'mooSocial', 'Product': 'mooDating', 'Versions': '1.2'} |
CVE-2023-3794 | A vulnerability classified as problematic has been found in Bug Finder ChainCity Real Estate Investment Platform 1.0. Affected is an unknown function of the file /chaincity/user/ticket/create of the component New Ticket Handler. The manipulation of the argument subject leads to cross site scripting. It is possible to launch the attack remotely. VDB-235062 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.235062 | 2023-07-20T07:53:24.950Z | 2023-07-20T20:00:06.153Z | 2023-10-23T18:37:18.113Z | {'Vendor': 'Bug Finder', 'Product': 'ChainCity Real Estate Investment Platform', 'Versions': '1.0'} |
CVE-2023-3055 | The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.27.133. This is due to missing or incorrect nonce validation on the 'azh_save' function. This makes it possible for unauthenticated attackers to update the post content and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/2efeffa2-b21a-4aa1-93b0-51c775758ab1?source=cve | 2023-06-02T11:21:14.579Z | 2023-06-02T23:37:55.642Z | 2023-06-02T23:37:55.642Z | {'Vendor': 'azexo', 'Product': 'Page Builder with Image Map by AZEXO', 'Versions': '*'} |
CVE-2023-3405 | Unchecked parameter value in M-Files Server in versions before 23.6.12695.3 (excluding 23.2 SR2 and newer) allows anonymous user to cause denial of service | https://www.m-files.com/about/trust-center/security-advisories/cve-2023-3405 | 2023-06-26T13:25:05.119Z | 2023-06-27T14:24:40.316Z | 2023-06-27T14:24:40.316Z | {'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0, 23.2.12340.11'} |
CVE-2023-3956 | The InstaWP Connect plugin for WordPress is vulnerable to unauthorized access of data, modification of data and loss of data due to a missing capability check on the 'events_receiver' function in versions up to, and including, 0.0.9.18. This makes it possible for unauthenticated attackers to add, modify or delete post and taxonomy, install, activate or deactivate plugin, change customizer settings, add or modify or delete user including administrator user. | https://www.wordfence.com/threat-intel/vulnerabilities/id/48e7acf2-61d4-4762-8657-0701910ce69b?source=cve | 2023-07-26T17:41:07.986Z | 2023-07-27T06:54:14.804Z | 2023-07-27T06:54:14.804Z | {'Vendor': 'instawp', 'Product': 'InstaWP Connect – 1-click WP Staging & Migration (beta)', 'Versions': '*'} |
CVE-2023-3813 | The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents of arbitrary files on the server, which can contain sensitive information. The requires the premium version of the plugin to be activated. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f767d94b-fe92-4b69-9d81-96de51e12983?source=cve | 2023-07-20T13:36:48.574Z | 2023-07-21T02:04:26.822Z | 2023-07-21T02:04:26.822Z | {'Vendor': 'artbees/', 'Product': 'Jupiter X Core', 'Versions': '*'} |
Subsets and Splits