CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2791
When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.
https://mattermost.com/security-updates/
2023-05-18T12:09:01.562Z
2023-06-16T08:59:16.854Z
2023-06-16T08:59:16.854Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.9.2, 7.8.3, 7.7.4, 7.10.1'}
CVE-2023-2284
The WP Activity Log Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_switch_db function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers with subscriber-level or higher to make changes to the plugin's settings.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6e29fd6b-462a-42be-9a2a-b6717b20a937?source=cve
2023-04-25T19:24:08.595Z
2023-06-09T12:32:00.238Z
2023-06-09T12:32:00.238Z
{'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log Premium', 'Versions': '*'}
CVE-2023-2912
Use After Free vulnerability in Secomea SiteManager Embedded allows Obstruction.
https://www.secomea.com/support/cybersecurity-advisory/
2023-05-26T12:17:30.753Z
2023-07-17T12:31:05.854Z
2023-07-17T12:31:05.854Z
{'Vendor': 'Secomea', 'Product': 'SiteManager Embedded', 'Versions': '0'}
CVE-2023-2504
Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11
2023-05-03T15:23:57.707Z
2023-05-22T21:10:48.553Z
2023-05-22T21:10:48.553Z
{'Vendor': 'BirdDog', 'Product': 'STUDIO R3', 'Versions': '3.6.4'}
CVE-2023-2154
A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/?page=reminders/view_reminder. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226275.
https://vuldb.com/?id.226275
2023-04-18T11:15:12.973Z
2023-04-18T14:00:07.432Z
2023-10-22T14:31:48.293Z
{'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'}
CVE-2023-2857
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-13.html
2023-05-24T00:00:00
2023-05-26T00:00:00
2023-09-17T06:06:26.730710
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'}
CVE-2023-2787
Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.
https://mattermost.com/security-updates/
2023-05-18T11:46:01.638Z
2023-06-16T08:55:39.391Z
2023-06-16T08:55:39.391Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.9.3, 7.8.4, 7.1.9, 7.10.1'}
CVE-2023-2338
SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2768
A vulnerability was found in Sucms 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin_ads.php?action=add. The manipulation of the argument intro leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229274 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.229274
2023-05-17T16:40:16.915Z
2023-05-17T17:00:03.679Z
2023-10-23T06:29:28.592Z
{'Vendor': 'n/a', 'Product': 'Sucms', 'Versions': '1.0'}
CVE-2023-2046
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yontem Informatics Vehicle Tracking System allows SQL Injection.This issue affects Vehicle Tracking System: before 8.
https://www.usom.gov.tr/bildirim/tr-23-0389
2023-04-14T07:02:56.400Z
2023-07-09T17:12:48.463Z
2023-07-09T17:12:48.463Z
{'Vendor': 'Yontem Informatics', 'Product': 'Vehicle Tracking System', 'Versions': '0'}
CVE-2023-2416
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the vcita_logout_callback function in versions up to, and including, 4.2.10. This makes it possible for unauthenticated to logout a vctia connected account which would cause a denial of service on the appointment scheduler, via a forged request granted they can trick a site user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f434585c-8533-4788-b0bc-5650390c29a8?source=cve
2023-04-28T16:40:07.496Z
2023-06-03T04:35:16.752Z
2023-06-03T04:35:16.752Z
{'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'}
CVE-2023-2945
Missing Authorization in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/62de71bd-333d-4593-91a5-534ef7f0c435
2023-05-27T00:00:00
2023-05-27T00:00:00
2023-05-27T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2800
Insecure Temporary File in GitHub repository huggingface/transformers prior to 4.30.0.
https://huntr.dev/bounties/a3867b4e-6701-4418-8c20-3c6e7084a44a
2023-05-18T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'huggingface', 'Product': 'huggingface/transformers', 'Versions': 'unspecified'}
CVE-2023-2103
Cross-site Scripting (XSS) - Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
https://huntr.dev/bounties/1df09505-9923-43b9-82ef-15d94bc3f9dc
2023-04-15T00:00:00
2023-04-15T00:00:00
2023-04-15T00:00:00
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
CVE-2023-2553
Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to 2.2.0.
https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978
2023-05-05T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
CVE-2023-2380
A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227658 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227658
2023-04-28T11:48:11.567Z
2023-04-28T16:54:01.674Z
2023-10-22T18:39:10.412Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2695
A vulnerability was found in SourceCodester Online Exam System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /kelas/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228976.
https://vuldb.com/?id.228976
2023-05-14T07:52:37.190Z
2023-05-14T10:31:03.231Z
2023-10-23T06:17:16.173Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2318
DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.
https://github.com/marktext/marktext/issues/3618
2023-04-27T04:51:16.289Z
2023-08-19T05:43:56.387Z
2023-08-19T05:43:56.387Z
{'Vendor': 'MarkText', 'Product': 'MarkText', 'Versions': '0'}
CVE-2023-2524
A vulnerability classified as critical has been found in Control iD RHiD 23.3.19.0. This affects an unknown part of the file /v2/#/. The manipulation leads to direct request. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-228015. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228015
2023-05-04T16:21:42.872Z
2023-05-04T18:31:03.558Z
2023-10-23T05:26:00.260Z
{'Vendor': 'Control iD', 'Product': 'RHiD', 'Versions': '23.3.19.0'}
CVE-2023-2174
The BadgeOS plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_badgeos_log_entries function in versions up to, and including, 3.7.1.6. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the plugin's log entries.
https://www.wordfence.com/threat-intel/vulnerabilities/id/64e0adbc-c524-4f9d-9741-ce69edf888f7?source=cve
2023-04-18T22:32:10.319Z
2023-08-31T05:33:08.533Z
2023-08-31T05:33:08.533Z
{'Vendor': 'learningtimes', 'Product': 'BadgeOS', 'Versions': '*'}
CVE-2023-2877
The Formidable Forms WordPress plugin before 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution.
https://wpscan.com/vulnerability/33765da5-c56e-42c1-83dd-fcaad976b402
2023-05-24T19:06:14.128Z
2023-06-27T13:17:12.873Z
2023-06-27T13:17:12.873Z
{'Vendor': 'Unknown', 'Product': 'Formidable Forms', 'Versions': '0'}
CVE-2023-2898
There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.
https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao%40kernel.org/
2023-05-25T00:00:00
2023-05-26T00:00:00
2023-10-19T23:06:18.459561
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'NA'}
CVE-2023-2932
Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:14.014Z
2023-05-30T21:31:39.288Z
2023-05-30T21:31:39.288Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2461
Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
2023-05-01T23:09:49.597Z
2023-05-02T23:47:58.104Z
2023-05-02T23:47:58.104Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'}
CVE-2023-2031
The Locatoraid Store Locator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dba0a90b-f13c-4914-b6b7-278227ffc122?source=cve
2023-04-13T18:40:34.536Z
2023-06-09T05:33:35.642Z
2023-06-09T05:33:35.642Z
{'Vendor': 'plainware', 'Product': 'Locatoraid Store Locator', 'Versions': '*'}
CVE-2023-2820
An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected. 
https://www.proofpoint.com/security/security-advisories/pfpt-sa-2023-0003
2023-05-19T21:09:14.480Z
2023-06-14T21:26:31.248Z
2023-06-16T20:24:43.802Z
{'Vendor': 'Proofpoint', 'Product': 'Threat Response Auto Pull', 'Versions': '0'}
CVE-2023-2123
The WP Inventory Manager WordPress plugin before 2.1.0.13 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting.
https://wpscan.com/vulnerability/44448888-cd5d-482e-859e-123e442ce5c1
2023-04-17T15:33:19.189Z
2023-08-16T11:03:22.025Z
2023-08-16T11:03:22.025Z
{'Vendor': 'Unknown', 'Product': 'WP Inventory Manager', 'Versions': '0'}
CVE-2023-2573
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.
https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3
2023-05-08T11:13:17.725Z
2023-05-08T12:33:06.707Z
2023-05-11T11:14:33.348Z
{'Vendor': 'Advantech', 'Product': 'EKI-1524', 'Versions': '0'}
CVE-2023-2089
A vulnerability was found in SourceCodester Complaint Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/userprofile.php of the component GET Parameter Handler. The manipulation of the argument uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226097 was assigned to this vulnerability.
https://vuldb.com/?id.226097
2023-04-15T06:56:13.341Z
2023-04-15T07:07:52.123Z
2023-10-22T14:00:05.087Z
{'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'}
CVE-2023-2066
The Announcement & Notification Banner – Bulletin plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'bulletinwp_update_bulletin_status', 'bulletinwp_update_bulletin', 'bulletinwp_update_settings', 'bulletinwp_update_status', 'bulletinwp_export_bulletins', and 'bulletinwp_import_bulletins' functions functions in versions up to, and including, 3.6.0. This makes it possible for authenticated attackers with subscriber-level access, and above, to modify the plugin's settings, modify bulletins, create new bulletins, and more.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d242a466-0611-4e64-8145-29f64100e62b?source=cve
2023-04-14T13:37:20.286Z
2023-06-09T05:33:34.407Z
2023-06-09T05:33:34.407Z
{'Vendor': 'mikewire_rocksolid', 'Product': 'Announcement & Notification Banner – Bulletin', 'Versions': '*'}
CVE-2023-2436
The Blog-in-Blog plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'blog_in_blog' shortcode in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5c6a88c3-18b7-470f-8014-373ead66dcfa?source=cve
2023-05-01T09:26:00.652Z
2023-05-31T02:40:20.038Z
2023-05-31T02:40:20.038Z
{'Vendor': 'timhodson', 'Product': 'Blog-in-Blog', 'Versions': '*'}
CVE-2023-2359
The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations.
https://wpscan.com/vulnerability/a8350890-e6d4-4b04-a158-2b0ee3748e65
2023-04-27T19:06:49.720Z
2023-06-19T10:52:49.053Z
2023-06-19T10:52:49.053Z
{'Vendor': 'Unknown', 'Product': 'Slider Revolution', 'Versions': '0'}
CVE-2023-2709
The AN_GradeBook WordPress plugin through 5.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/2504dadb-1086-4fa9-8fc7-b93018423515
2023-05-15T12:44:49.086Z
2023-07-10T12:40:49.989Z
2023-07-10T13:05:47.790Z
{'Vendor': 'Unknown', 'Product': 'AN_GradeBook', 'Versions': '0'}
CVE-2023-2565
A vulnerability has been found in SourceCodester Multi Language Hotel Management Software 1.0 and classified as problematic. This vulnerability affects unknown code of the file ajax.php of the component POST Parameter Handler. The manipulation of the argument complaint_type with the input <script>alert(document.cookie)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228172.
https://vuldb.com/?id.228172
2023-05-07T14:36:09.212Z
2023-05-07T15:00:04.944Z
2023-10-23T05:28:26.684Z
{'Vendor': 'SourceCodester', 'Product': 'Multi Language Hotel Management Software', 'Versions': '1.0'}
CVE-2023-2135
Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
2023-04-17T22:27:00.340Z
2023-04-19T03:40:26.399Z
2023-04-19T03:40:26.399Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'}
CVE-2023-2836
The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/de11636b-a051-4e76-bc26-ed76f66fe0df?source=cve
2023-05-22T12:59:57.087Z
2023-05-31T03:36:11.324Z
2023-05-31T03:36:11.324Z
{'Vendor': 'crmperks', 'Product': 'CRM Perks Forms – WordPress Form Builder', 'Versions': '*'}
CVE-2023-2973
A vulnerability, which was classified as problematic, has been found in SourceCodester Students Online Internship Timesheet Syste 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=save_company. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230204.
https://vuldb.com/?id.230204
2023-05-30T09:56:22.690Z
2023-05-30T10:31:02.680Z
2023-10-23T07:24:21.595Z
{'Vendor': 'SourceCodester', 'Product': 'Students Online Internship Timesheet Syste', 'Versions': '1.0'}
CVE-2023-2420
A vulnerability was found in MLECMS 3.0. It has been rated as critical. This issue affects the function get_url in the library /upload/inc/lib/admin of the file upload\inc\include\common.func.php. The manipulation of the argument $_SERVER['REQUEST_URI'] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227717 was assigned to this vulnerability.
https://vuldb.com/?id.227717
2023-04-28T17:01:08.401Z
2023-04-29T01:31:03.540Z
2023-10-23T05:07:41.703Z
{'Vendor': 'n/a', 'Product': 'MLECMS', 'Versions': '3.0'}
CVE-2023-2861
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.
https://access.redhat.com/security/cve/CVE-2023-2861
2023-05-24T07:54:12.009Z
2023-12-06T06:19:40.625Z
2023-12-06T06:19:40.625Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-2162
A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.
https://www.spinics.net/lists/linux-scsi/msg181542.html
2023-04-18T00:00:00
2023-04-19T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel version prior to Kernel 6.2 RC6'}
CVE-2023-2498
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.19 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1c3d4c96-63a7-4f3b-a9ac-095be241f840?source=cve
2023-05-03T14:47:26.651Z
2023-05-23T23:36:46.492Z
2023-05-23T23:36:46.492Z
{'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'}
CVE-2023-2027
The ZM Ajax Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.2. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b10d01ec-54ef-456b-9410-ed013343a962?source=cve
2023-04-13T16:18:50.856Z
2023-04-15T07:42:23.833Z
2023-04-15T07:42:23.833Z
{'Vendor': 'zanematthew', 'Product': 'ZM Ajax Login & Register', 'Versions': '*'}
CVE-2023-2477
A vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability.
https://vuldb.com/?id.227869
2023-05-02T12:07:02.319Z
2023-05-02T14:00:06.199Z
2023-10-23T05:18:41.036Z
{'Vendor': 'n/a', 'Product': 'Funadmin', 'Versions': '3.2.0, 3.2.1, 3.2.2, 3.2.3'}
CVE-2023-2924
A vulnerability, which was classified as critical, has been found in Supcon SimField up to 1.80.00.00. Affected by this issue is some unknown functionality of the file /admin/reportupload.aspx. The manipulation of the argument files[] leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230078 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.230078
2023-05-27T07:08:34.882Z
2023-05-27T08:00:03.835Z
2023-10-23T07:13:22.865Z
{'Vendor': 'Supcon', 'Product': 'SimField', 'Versions': '1.80.00'}
CVE-2023-2660
A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_categories.php. The manipulation of the argument c leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228802 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228802
2023-05-11T13:01:39.761Z
2023-05-11T15:00:04.984Z
2023-10-23T05:55:16.698Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-2230
null
null
2023-04-21T13:59:01.073Z
null
2023-08-08T17:20:17.976Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2725
Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html
2023-05-15T21:16:58.727Z
2023-05-16T18:45:34.352Z
2023-05-16T18:45:34.352Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'}
CVE-2023-2375
A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This issue affects some unknown processing of the component Web Management Interface. The manipulation of the argument src leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227651.
https://vuldb.com/?id.227651
2023-04-28T11:29:56.309Z
2023-04-28T15:00:07.068Z
2023-10-22T18:33:04.616Z
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'}
CVE-2023-2119
The Responsive Filterable Portfolio plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.0.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e67dfe0f-ac1c-4a78-bfc9-0cfd6c3040d4?source=cve
2023-04-17T13:26:47.974Z
2023-04-18T01:57:07.181Z
2023-04-18T01:57:07.181Z
{'Vendor': 'nik00726', 'Product': 'Responsive Filterable Portfolio', 'Versions': '*'}
CVE-2023-2549
The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address.
https://www.wordfence.com/threat-intel/vulnerabilities/id/12560b8e-9c47-4f7f-ac9c-d86f17914ba3?source=cve
2023-05-05T17:13:28.059Z
2023-05-31T02:40:19.517Z
2023-05-31T02:40:19.517Z
{'Vendor': 'featherplugins', 'Product': 'Custom Login Page | Temporary Users | Rebrand Login | Login Captcha', 'Versions': '1.0.7'}
CVE-2023-2267
An Improper Input Validation vulnerability in Schweitzer Engineering Laboratories SEL-411L could allow an attacker to perform reflection attacks against an authorized and authenticated user. See product Instruction Manual Appendix A dated 20230830 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:21:10.937Z
2023-11-30T16:58:44.063Z
2023-11-30T16:58:44.063Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'}
CVE-2023-2637
Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.  Hard-coded cryptographic key may lead to privilege escalation.  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683
2023-05-10T20:31:38.532Z
2023-06-13T20:15:07.735Z
2023-06-13T20:15:07.735Z
{'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk System Services', 'Versions': '<= 6.20'}
CVE-2023-2322
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2772
A vulnerability, which was classified as critical, was found in SourceCodester Budget and Expense Tracker System 1.0. Affected is an unknown function of the file /admin/budget/manage_budget.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-229278 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.229278
2023-05-17T16:53:40.265Z
2023-05-17T18:31:04.581Z
2023-10-23T06:34:21.320Z
{'Vendor': 'SourceCodester', 'Product': 'Budget and Expense Tracker System', 'Versions': '1.0'}
CVE-2023-2288
The Otter WordPress plugin before 2.2.6 does not sanitize some user-controlled file paths before performing file operations on them. This leads to a PHAR deserialization vulnerability on PHP < 8.0 using the phar:// stream wrapper.
https://wpscan.com/vulnerability/93acb4ee-1053-48e1-8b69-c09dc3b2f302
2023-04-25T19:32:37.641Z
2023-05-30T07:49:15.477Z
2023-05-30T07:49:15.477Z
{'Vendor': 'Unknown', 'Product': 'Otter', 'Versions': '0'}
CVE-2023-2908
A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
https://access.redhat.com/security/cve/CVE-2023-2908
2023-05-26T00:00:00
2023-06-30T00:00:00
2024-01-23T01:44:14.895Z
{'Vendor': 'n/a', 'Product': 'Libtiff', 'Versions': '4.5.1rc1'}
CVE-2023-2621
The McFeeder server (distributed as part of SSW package), is susceptible to an arbitrary file write vulnerability on the MAIN computer system. This vulnerability stems from the use of an outdated version of a third-party library, which is used to extract archives uploaded to McFeeder server. An authenticated malicious client can exploit this vulnerability by uploading a crafted ZIP archive via the network to McFeeder’s service endpoint.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000177&languageCode=en&Preview=true
2023-05-10T08:59:13.964Z
2023-11-01T02:10:56.475Z
2023-11-01T02:10:56.475Z
{'Vendor': 'Hitachi Energy', 'Product': 'MACH System Software', 'Versions': '5.0'}
CVE-2023-2271
The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when deleting its shortcode, which could allow attackers to make logged in admins delete arbitrary shortcode via a CSRF attack
https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b
2023-04-25T07:30:51.495Z
2023-08-16T11:03:22.861Z
2023-08-16T11:03:22.861Z
{'Vendor': 'Unknown', 'Product': 'Tiempo.com', 'Versions': '0'}
CVE-2023-2764
The Draw Attention plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_set_featured_image function in versions up to, and including, 2.0.11. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change the featured image of arbitrary posts with an image that exists in the media library.
https://www.wordfence.com/threat-intel/vulnerabilities/id/18530601-a294-448c-a1b2-c3995f9042ac?source=cve
2023-05-17T16:02:05.108Z
2023-06-09T05:33:11.613Z
2023-06-09T05:33:11.613Z
{'Vendor': 'croixhaug', 'Product': 'Interactive Image Map Plugin – Draw Attention', 'Versions': '*'}
CVE-2023-2158
Code Dx versions prior to 2023.4.2 are vulnerable to user impersonation attack where a malicious actor is able to gain access to another user's account by crafting a custom "Remember Me" token. This is possible due to the use of a hard-coded cipher which was used when generating the token. A malicious actor who creates this token can supply it to a separate Code Dx system, provided they know the username they want to impersonate, and impersonate the user.  Score 6.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
https://community.synopsys.com/s/question/0D5Hr00006VdZblKAF/announcement-changelog-code-dx-202342
2023-04-18T14:08:54.082Z
2023-04-27T17:04:22.879Z
2023-04-27T17:04:22.879Z
{'Vendor': 'Synopsys', 'Product': 'Code Dx', 'Versions': '0'}
CVE-2023-2508
The `PaperCutNG Mobility Print` version 1.0.3512 application allows an unauthenticated attacker to perform a CSRF attack on an instance administrator to configure the clients host (in the "configure printer discovery" section). This is possible because the application has no protections against CSRF attacks, like Anti-CSRF tokens, header origin validation, samesite cookies, etc.
https://fluidattacks.com/advisories/solveig/
2023-05-03T22:24:15.839Z
2023-09-20T15:05:35.512Z
2023-09-20T15:05:35.512Z
{'Vendor': 'PaperCut MF/NG', 'Product': 'Mobility Print', 'Versions': ' 1.0.3512'}
CVE-2023-2226
Due to insufficient validation in the PE and OLE parsers in Rapid7's Velociraptor versions earlier than 0.6.8 allows attacker to crash Velociraptor during parsing of maliciously malformed files.  For this attack to succeed, the attacker needs to be able to introduce malicious files to the system at the same time that Velociraptor attempts to collect any artifacts that attempt to parse PE files, Authenticode signatures, or OLE files. After crashing, the Velociraptor service will restart and it will still be possible to collect other artifacts.
https://github.com/Velocidex/velociraptor
2023-04-21T11:40:07.131Z
2023-04-21T11:48:46.279Z
2023-04-21T11:48:46.279Z
{'Vendor': 'Rapid7', 'Product': 'Velociraptor', 'Versions': '0'}
CVE-2023-2676
A vulnerability, which was classified as critical, has been found in H3C R160 V1004004. Affected by this issue is some unknown functionality of the file /goForm/aspForm. The manipulation of the argument go leads to stack-based buffer overflow. The exploit has been disclosed to the public and may be used. VDB-228890 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228890
2023-05-12T08:13:35.991Z
2023-05-12T09:00:06.842Z
2023-10-23T06:05:03.391Z
{'Vendor': 'H3C', 'Product': 'R160', 'Versions': 'V1004004'}
CVE-2023-2363
A vulnerability, which was classified as critical, has been found in SourceCodester Resort Reservation System 1.0. This issue affects some unknown processing of the file view_room.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227639.
https://vuldb.com/?id.227639
2023-04-28T10:53:07.900Z
2023-04-28T11:00:05.188Z
2023-10-22T16:11:07.619Z
{'Vendor': 'SourceCodester', 'Product': 'Resort Reservation System', 'Versions': '1.0'}
CVE-2023-2699
A vulnerability, which was classified as critical, has been found in SourceCodester Lost and Found Information System 1.0. Affected by this issue is some unknown functionality of the file admin/?page=items/view_item of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228980.
https://vuldb.com/?id.228980
2023-05-14T07:59:41.914Z
2023-05-14T12:00:04.999Z
2023-10-23T06:22:09.083Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-2733
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.0. This is due to insufficient verification on the user being supplied during the coupon redemption REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c726d8f0-7f2a-414b-9d73-a053921074d9?source=cve
2023-05-16T12:40:28.750Z
2023-05-25T02:05:34.551Z
2023-05-25T02:05:34.551Z
{'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'}
CVE-2023-2949
Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4
2023-05-28T00:00:00
2023-05-28T00:00:00
2023-05-28T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2462
Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to obfuscate main origin data via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
2023-05-01T23:09:49.704Z
2023-05-02T23:47:58.271Z
2023-05-02T23:47:58.271Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'}
CVE-2023-2198
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint.
https://gitlab.com/gitlab-org/gitlab/-/issues/408273
2023-04-20T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=8.7, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2032
The Custom 404 Pro WordPress plugin before 3.8.1 does not properly sanitize database inputs, leading to multiple SQL Injection vulnerabilities.
https://wpscan.com/vulnerability/17acde5d-44ea-4e77-8670-260d22e28ffe
2023-04-13T19:29:43.789Z
2023-06-27T13:17:14.009Z
2023-06-27T13:17:14.009Z
{'Vendor': 'Unknown', 'Product': 'Custom 404 Pro', 'Versions': '0'}
CVE-2023-2931
Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:13.849Z
2023-05-30T21:31:39.136Z
2023-05-30T21:31:39.136Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2874
A vulnerability, which was classified as problematic, has been found in Twister Antivirus 8. This issue affects the function 0x804f2158/0x804f2154/0x804f2150/0x804f215c/0x804f2160/0x80800040/0x804f214c/0x804f2148/0x804f2144/0x801120e4/0x804f213c/0x804f2140 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-229853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229853
2023-05-24T17:17:54.555Z
2023-05-24T18:31:03.531Z
2023-10-23T07:02:24.413Z
{'Vendor': 'Twister', 'Product': 'Antivirus', 'Versions': '8'}
CVE-2023-2527
The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
https://wpscan.com/vulnerability/8051142a-4e55-4dc2-9cb1-1b724c67574f
2023-05-04T18:28:34.593Z
2023-06-19T10:52:50.844Z
2023-07-04T09:31:21.138Z
{'Vendor': 'Unknown', 'Product': 'Integration for Contact Form 7 and Zoho CRM, Bigin', 'Versions': '0'}
CVE-2023-2177
A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
2023-04-19T00:00:00
2023-04-20T00:00:00
2023-04-20T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux', 'Versions': 'Linux Kernel prior to Kernel 5.19 RC17'}
CVE-2023-2659
A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file view_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228801 was assigned to this vulnerability.
https://vuldb.com/?id.228801
2023-05-11T13:01:35.259Z
2023-05-11T14:31:03.535Z
2023-10-23T05:54:03.550Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-2209
A vulnerability, which was classified as critical, was found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/sales/view_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226974 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226974
2023-04-21T06:28:52.121Z
2023-04-21T08:00:08.467Z
2023-10-22T14:40:22.133Z
{'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'}
CVE-2023-2065
Authorization Bypass Through User-Controlled Key vulnerability in Armoli Technology Cargo Tracking System allows Authentication Abuse, Authentication Bypass.This issue affects Cargo Tracking System: before 3558f28 .
https://https://www.usom.gov.tr/bildirim/tr-23-0287
2023-04-14T10:27:06.992Z
2023-05-24T12:04:41.020Z
2023-05-24T12:04:41.020Z
{'Vendor': 'Armoli Technology', 'Product': 'Cargo Tracking System', 'Versions': '0'}
CVE-2023-2435
The Blog-in-Blog plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 1.1.1 via a shortcode attribute. This allows editor-level, and above, attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d53161ad-cc5f-4433-b288-a8095cdfd7db?source=cve
2023-05-01T09:21:50.539Z
2023-05-31T02:40:21.694Z
2023-05-31T02:40:21.694Z
{'Vendor': 'timhodson', 'Product': 'Blog-in-Blog', 'Versions': '*'}
CVE-2023-2120
The Thumbnail carousel slider plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f4bf4e12-5cbb-45bc-938e-62163baaa15d?source=cve
2023-04-17T13:47:13.874Z
2023-04-18T01:57:09.113Z
2023-04-18T01:57:09.113Z
{'Vendor': 'nik00726', 'Product': 'Thumbnail carousel slider', 'Versions': '*'}
CVE-2023-2570
A CWE-129: Improper Validation of Array Index vulnerability exists that could cause local denial-of-service, and potentially kernel execution when a malicious actor with local user access crafts a script/program using an unpredictable index to an IOCTL call in the Foxboro.sys driver.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-164-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-164-04.pdf
2023-05-08T09:54:21.534Z
2023-06-14T07:52:24.608Z
2023-06-14T07:52:24.608Z
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Foxboro DCS Control Core Services', 'Versions': 'All versions prior to patch HF9857795'}
CVE-2023-2823
A vulnerability was found in SourceCodester Class Scheduling System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_subject.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229597 was assigned to this vulnerability.
https://vuldb.com/?id.229597
2023-05-20T06:49:11.123Z
2023-05-20T07:31:04.549Z
2023-10-23T06:48:59.646Z
{'Vendor': 'SourceCodester', 'Product': 'Class Scheduling System', 'Versions': '1.0'}
CVE-2023-2989
Fortra Globalscape EFT versions before 8.1.0.16 suffer from an out of bounds memory read in their administration server, which can allow an attacker to crash the service or bypass authentication if successfully exploited
https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
2023-05-30T15:58:50.975Z
2023-06-22T19:14:17.275Z
2023-06-22T19:14:17.275Z
{'Vendor': 'Fortra', 'Product': 'Globalscape EFT', 'Versions': '8.0.0'}
CVE-2023-2423
A vulnerability was discovered in the Rockwell Automation Armor PowerFlex device when the product sends communications to the local event log. Threat actors could exploit this vulnerability by sending an influx of network commands, causing the product to generate an influx of event log traffic at a high rate. If exploited, the product would stop normal operations and self-reset creating a denial-of-service condition. The error code would need to be cleared prior to resuming normal operations.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140371
2023-04-28T19:37:27.989Z
2023-08-08T14:24:26.886Z
2023-08-08T14:24:49.798Z
{'Vendor': 'Rockwell Automation', 'Product': 'Armor PowerFlex', 'Versions': '<=1.003'}
CVE-2023-2073
A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Login.php. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226051.
https://vuldb.com/?id.226051
2023-04-14T18:33:08.898Z
2023-04-14T19:00:05.837Z
2023-10-22T13:53:57.610Z
{'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'}
CVE-2023-2589
An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker can clone a repository from a public project, from a disallowed IP, even after the top-level group has enabled IP restrictions on the group.
https://gitlab.com/gitlab-org/gitlab/-/issues/407891
2023-05-08T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=12.0, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2970
A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation leads to memory corruption. The name of the patch is 30f4729ea2c01e1ed437ba92a81e2fc098d608a9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-230176.
https://vuldb.com/?id.230176
2023-05-30T04:58:32.620Z
2023-05-30T05:31:03.695Z
2023-10-23T07:23:08.445Z
{'Vendor': 'n/a', 'Product': 'MindSpore', 'Versions': '2.0.0-alpha, 2.0.0-rc1'}
CVE-2023-2835
The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search' parameter in versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/847f1c00-0e8f-4d38-84af-fe959e2efe5c?source=cve
2023-05-22T12:52:46.312Z
2023-06-02T06:06:47.562Z
2023-06-02T06:06:47.562Z
{'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'}
CVE-2023-2566
Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/47d6fc2a-989a-44eb-9cb7-ab4f8bd44496
2023-05-08T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2136
Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
2023-04-17T22:27:00.468Z
2023-04-19T03:40:26.644Z
2023-04-19T03:40:26.644Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'}
CVE-2023-2618
A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548.
https://vuldb.com/?id.228548
2023-05-10T05:06:29.634Z
2023-05-10T05:31:04.406Z
2023-10-23T05:34:32.672Z
{'Vendor': 'OpenCV', 'Product': 'wechat_qrcode Module', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7'}
CVE-2023-2248
null
null
2023-04-24T10:49:20.882Z
2023-05-01T12:49:59.123Z
2023-05-08T11:25:42.511Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2927
A vulnerability was found in JIZHICMS 2.4.5. It has been classified as critical. Affected is the function index of the file TemplateController.php. The manipulation of the argument webapi leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230082 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230082
2023-05-27T07:36:35.765Z
2023-05-27T09:00:04.620Z
2023-10-23T07:17:02.564Z
{'Vendor': 'n/a', 'Product': 'JIZHICMS', 'Versions': '2.4.5'}
CVE-2023-2024
Improper authentication in OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 allow access to an unauthorized user under certain circumstances.
https://www.johnsoncontrols.com/cyber-solutions/security-advisories
2023-04-13T15:11:18.916Z
2023-05-18T20:45:01.376Z
2023-05-18T20:45:01.376Z
{'Vendor': 'Johnson Controls', 'Product': 'OpenBlue Enterprise Manager Data Collector', 'Versions': '0'}
CVE-2023-2474
A vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227866
2023-05-02T11:52:54.046Z
2023-05-02T12:31:03.658Z
2023-10-23T05:15:01.327Z
{'Vendor': 'n/a', 'Product': 'Rebuild', 'Versions': '3.2'}
CVE-2023-2161
A CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could cause unauthorized read access to the file system when a malicious configuration file is loaded on to the software by a local user. 
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-129-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-129-01.pdf
2023-04-18T15:35:46.157Z
2023-05-16T04:31:26.482Z
2023-05-16T04:31:26.482Z
{'Vendor': 'Schneider Electric', 'Product': 'OPC Factory Server (OFS)', 'Versions': 'Versions prior to V3.63SP2'}
CVE-2023-2531
Improper Restriction of Excessive Authentication Attempts in GitHub repository azuracast/azuracast prior to 0.18.3.
https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02
2023-05-05T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'azuracast', 'Product': 'azuracast/azuracast', 'Versions': 'unspecified'}
CVE-2023-2862
A vulnerability, which was classified as problematic, was found in SiteServer CMS up to 7.2.1. Affected is an unknown function of the file /api/stl/actions/search. The manipulation of the argument ajaxDivId leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-229818 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.229818
2023-05-24T09:18:05.179Z
2023-05-24T09:31:03.789Z
2023-10-23T06:52:39.187Z
{'Vendor': 'SiteServer', 'Product': 'CMS', 'Versions': '7.2.0, 7.2.1'}
CVE-2023-2726
Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html
2023-05-15T21:16:59.067Z
2023-05-16T18:45:34.470Z
2023-05-16T18:45:34.470Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'}
CVE-2023-2376
A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been classified as critical. Affected is an unknown function of the component Web Management Interface. The manipulation of the argument dpi leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227652.
https://vuldb.com/?id.227652
2023-04-28T11:29:59.758Z
2023-04-28T15:00:08.881Z
2023-10-22T18:34:17.869Z
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'}
CVE-2023-2663
 In Xpdf 4.04 (and earlier), a PDF object loop in the page label tree leads to infinite recursion and a stack overflow.
https://forum.xpdfreader.com/viewtopic.php?t=42421
2023-05-11T20:10:12.645Z
2023-05-11T20:16:59.111Z
2023-05-11T20:19:20.402Z
{'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'}