CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2791 | When creating a playbook run via the /dialog API, Mattermost fails to validate all parameters, allowing an authenticated attacker to edit an arbitrary channel post.
| https://mattermost.com/security-updates/ | 2023-05-18T12:09:01.562Z | 2023-06-16T08:59:16.854Z | 2023-06-16T08:59:16.854Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.9.2, 7.8.3, 7.7.4, 7.10.1'} |
CVE-2023-2284 | The WP Activity Log Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_switch_db function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers with subscriber-level or higher to make changes to the plugin's settings. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6e29fd6b-462a-42be-9a2a-b6717b20a937?source=cve | 2023-04-25T19:24:08.595Z | 2023-06-09T12:32:00.238Z | 2023-06-09T12:32:00.238Z | {'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log Premium', 'Versions': '*'} |
CVE-2023-2912 | Use After Free vulnerability in Secomea SiteManager Embedded allows Obstruction. | https://www.secomea.com/support/cybersecurity-advisory/ | 2023-05-26T12:17:30.753Z | 2023-07-17T12:31:05.854Z | 2023-07-17T12:31:05.854Z | {'Vendor': 'Secomea', 'Product': 'SiteManager Embedded', 'Versions': '0'} |
CVE-2023-2504 |
Files present on firmware images could allow an attacker to gain unauthorized access as a root user using hard-coded credentials.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11 | 2023-05-03T15:23:57.707Z | 2023-05-22T21:10:48.553Z | 2023-05-22T21:10:48.553Z | {'Vendor': 'BirdDog', 'Product': 'STUDIO R3', 'Versions': '3.6.4'} |
CVE-2023-2154 | A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/?page=reminders/view_reminder. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226275. | https://vuldb.com/?id.226275 | 2023-04-18T11:15:12.973Z | 2023-04-18T14:00:07.432Z | 2023-10-22T14:31:48.293Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-2857 | BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-13.html | 2023-05-24T00:00:00 | 2023-05-26T00:00:00 | 2023-09-17T06:06:26.730710 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'} |
CVE-2023-2787 | Mattermost fails to check channel membership when accessing message threads, allowing an attacker to access arbitrary posts by using the message threads API.
| https://mattermost.com/security-updates/ | 2023-05-18T11:46:01.638Z | 2023-06-16T08:55:39.391Z | 2023-06-16T08:55:39.391Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.9.3, 7.8.4, 7.1.9, 7.10.1'} |
CVE-2023-2338 | SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/bbf59fa7-cf5b-4945-81b0-328adc710462 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2768 | A vulnerability was found in Sucms 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin_ads.php?action=add. The manipulation of the argument intro leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229274 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.229274 | 2023-05-17T16:40:16.915Z | 2023-05-17T17:00:03.679Z | 2023-10-23T06:29:28.592Z | {'Vendor': 'n/a', 'Product': 'Sucms', 'Versions': '1.0'} |
CVE-2023-2046 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yontem Informatics Vehicle Tracking System allows SQL Injection.This issue affects Vehicle Tracking System: before 8.
| https://www.usom.gov.tr/bildirim/tr-23-0389 | 2023-04-14T07:02:56.400Z | 2023-07-09T17:12:48.463Z | 2023-07-09T17:12:48.463Z | {'Vendor': 'Yontem Informatics', 'Product': 'Vehicle Tracking System', 'Versions': '0'} |
CVE-2023-2416 | The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery due to a missing nonce check on the vcita_logout_callback function in versions up to, and including, 4.2.10. This makes it possible for unauthenticated to logout a vctia connected account which would cause a denial of service on the appointment scheduler, via a forged request granted they can trick a site user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f434585c-8533-4788-b0bc-5650390c29a8?source=cve | 2023-04-28T16:40:07.496Z | 2023-06-03T04:35:16.752Z | 2023-06-03T04:35:16.752Z | {'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'} |
CVE-2023-2945 | Missing Authorization in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/62de71bd-333d-4593-91a5-534ef7f0c435 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2800 | Insecure Temporary File in GitHub repository huggingface/transformers prior to 4.30.0. | https://huntr.dev/bounties/a3867b4e-6701-4418-8c20-3c6e7084a44a | 2023-05-18T00:00:00 | 2023-05-18T00:00:00 | 2023-05-18T00:00:00 | {'Vendor': 'huggingface', 'Product': 'huggingface/transformers', 'Versions': 'unspecified'} |
CVE-2023-2103 | Cross-site Scripting (XSS) - Stored in GitHub repository alextselegidis/easyappointments prior to 1.5.0. | https://huntr.dev/bounties/1df09505-9923-43b9-82ef-15d94bc3f9dc | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | {'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'} |
CVE-2023-2553 | Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to 2.2.0. | https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'} |
CVE-2023-2380 | A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227658 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227658 | 2023-04-28T11:48:11.567Z | 2023-04-28T16:54:01.674Z | 2023-10-22T18:39:10.412Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2695 | A vulnerability was found in SourceCodester Online Exam System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /kelas/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228976. | https://vuldb.com/?id.228976 | 2023-05-14T07:52:37.190Z | 2023-05-14T10:31:03.231Z | 2023-10-23T06:17:16.173Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2318 | DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText. | https://github.com/marktext/marktext/issues/3618 | 2023-04-27T04:51:16.289Z | 2023-08-19T05:43:56.387Z | 2023-08-19T05:43:56.387Z | {'Vendor': 'MarkText', 'Product': 'MarkText', 'Versions': '0'} |
CVE-2023-2524 | A vulnerability classified as critical has been found in Control iD RHiD 23.3.19.0. This affects an unknown part of the file /v2/#/. The manipulation leads to direct request. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-228015. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228015 | 2023-05-04T16:21:42.872Z | 2023-05-04T18:31:03.558Z | 2023-10-23T05:26:00.260Z | {'Vendor': 'Control iD', 'Product': 'RHiD', 'Versions': '23.3.19.0'} |
CVE-2023-2174 | The BadgeOS plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_badgeos_log_entries function in versions up to, and including, 3.7.1.6. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the plugin's log entries. | https://www.wordfence.com/threat-intel/vulnerabilities/id/64e0adbc-c524-4f9d-9741-ce69edf888f7?source=cve | 2023-04-18T22:32:10.319Z | 2023-08-31T05:33:08.533Z | 2023-08-31T05:33:08.533Z | {'Vendor': 'learningtimes', 'Product': 'BadgeOS', 'Versions': '*'} |
CVE-2023-2877 | The Formidable Forms WordPress plugin before 6.3.1 does not adequately authorize the user or validate the plugin URL in its functionality for installing add-ons. This allows a user with a role as low as Subscriber to install and activate arbitrary plugins of arbitrary versions from the WordPress.org plugin repository onto the site, leading to Remote Code Execution. | https://wpscan.com/vulnerability/33765da5-c56e-42c1-83dd-fcaad976b402 | 2023-05-24T19:06:14.128Z | 2023-06-27T13:17:12.873Z | 2023-06-27T13:17:12.873Z | {'Vendor': 'Unknown', 'Product': 'Formidable Forms', 'Versions': '0'} |
CVE-2023-2898 | There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem. | https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao%40kernel.org/ | 2023-05-25T00:00:00 | 2023-05-26T00:00:00 | 2023-10-19T23:06:18.459561 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'NA'} |
CVE-2023-2932 | Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:14.014Z | 2023-05-30T21:31:39.288Z | 2023-05-30T21:31:39.288Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2461 | Use after free in OS Inputs in Google Chrome on ChromeOS prior to 113.0.5672.63 allowed a remote attacker who convinced a user to enage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html | 2023-05-01T23:09:49.597Z | 2023-05-02T23:47:58.104Z | 2023-05-02T23:47:58.104Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'} |
CVE-2023-2031 | The Locatoraid Store Locator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/dba0a90b-f13c-4914-b6b7-278227ffc122?source=cve | 2023-04-13T18:40:34.536Z | 2023-06-09T05:33:35.642Z | 2023-06-09T05:33:35.642Z | {'Vendor': 'plainware', 'Product': 'Locatoraid Store Locator', 'Versions': '*'} |
CVE-2023-2820 | An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected.
| https://www.proofpoint.com/security/security-advisories/pfpt-sa-2023-0003 | 2023-05-19T21:09:14.480Z | 2023-06-14T21:26:31.248Z | 2023-06-16T20:24:43.802Z | {'Vendor': 'Proofpoint', 'Product': 'Threat Response Auto Pull', 'Versions': '0'} |
CVE-2023-2123 | The WP Inventory Manager WordPress plugin before 2.1.0.13 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting. | https://wpscan.com/vulnerability/44448888-cd5d-482e-859e-123e442ce5c1 | 2023-04-17T15:33:19.189Z | 2023-08-16T11:03:22.025Z | 2023-08-16T11:03:22.025Z | {'Vendor': 'Unknown', 'Product': 'WP Inventory Manager', 'Versions': '0'} |
CVE-2023-2573 | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.
| https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3 | 2023-05-08T11:13:17.725Z | 2023-05-08T12:33:06.707Z | 2023-05-11T11:14:33.348Z | {'Vendor': 'Advantech', 'Product': 'EKI-1524', 'Versions': '0'} |
CVE-2023-2089 | A vulnerability was found in SourceCodester Complaint Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/userprofile.php of the component GET Parameter Handler. The manipulation of the argument uid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226097 was assigned to this vulnerability. | https://vuldb.com/?id.226097 | 2023-04-15T06:56:13.341Z | 2023-04-15T07:07:52.123Z | 2023-10-22T14:00:05.087Z | {'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'} |
CVE-2023-2066 | The Announcement & Notification Banner – Bulletin plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'bulletinwp_update_bulletin_status', 'bulletinwp_update_bulletin', 'bulletinwp_update_settings', 'bulletinwp_update_status', 'bulletinwp_export_bulletins', and 'bulletinwp_import_bulletins' functions functions in versions up to, and including, 3.6.0. This makes it possible for authenticated attackers with subscriber-level access, and above, to modify the plugin's settings, modify bulletins, create new bulletins, and more. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d242a466-0611-4e64-8145-29f64100e62b?source=cve | 2023-04-14T13:37:20.286Z | 2023-06-09T05:33:34.407Z | 2023-06-09T05:33:34.407Z | {'Vendor': 'mikewire_rocksolid', 'Product': 'Announcement & Notification Banner – Bulletin', 'Versions': '*'} |
CVE-2023-2436 | The Blog-in-Blog plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'blog_in_blog' shortcode in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5c6a88c3-18b7-470f-8014-373ead66dcfa?source=cve | 2023-05-01T09:26:00.652Z | 2023-05-31T02:40:20.038Z | 2023-05-31T02:40:20.038Z | {'Vendor': 'timhodson', 'Product': 'Blog-in-Blog', 'Versions': '*'} |
CVE-2023-2359 | The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations. | https://wpscan.com/vulnerability/a8350890-e6d4-4b04-a158-2b0ee3748e65 | 2023-04-27T19:06:49.720Z | 2023-06-19T10:52:49.053Z | 2023-06-19T10:52:49.053Z | {'Vendor': 'Unknown', 'Product': 'Slider Revolution', 'Versions': '0'} |
CVE-2023-2709 | The AN_GradeBook WordPress plugin through 5.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/2504dadb-1086-4fa9-8fc7-b93018423515 | 2023-05-15T12:44:49.086Z | 2023-07-10T12:40:49.989Z | 2023-07-10T13:05:47.790Z | {'Vendor': 'Unknown', 'Product': 'AN_GradeBook', 'Versions': '0'} |
CVE-2023-2565 | A vulnerability has been found in SourceCodester Multi Language Hotel Management Software 1.0 and classified as problematic. This vulnerability affects unknown code of the file ajax.php of the component POST Parameter Handler. The manipulation of the argument complaint_type with the input <script>alert(document.cookie)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228172. | https://vuldb.com/?id.228172 | 2023-05-07T14:36:09.212Z | 2023-05-07T15:00:04.944Z | 2023-10-23T05:28:26.684Z | {'Vendor': 'SourceCodester', 'Product': 'Multi Language Hotel Management Software', 'Versions': '1.0'} |
CVE-2023-2135 | Use after free in DevTools in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who convinced a user to enable specific preconditions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html | 2023-04-17T22:27:00.340Z | 2023-04-19T03:40:26.399Z | 2023-04-19T03:40:26.399Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'} |
CVE-2023-2836 | The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/de11636b-a051-4e76-bc26-ed76f66fe0df?source=cve | 2023-05-22T12:59:57.087Z | 2023-05-31T03:36:11.324Z | 2023-05-31T03:36:11.324Z | {'Vendor': 'crmperks', 'Product': 'CRM Perks Forms – WordPress Form Builder', 'Versions': '*'} |
CVE-2023-2973 | A vulnerability, which was classified as problematic, has been found in SourceCodester Students Online Internship Timesheet Syste 1.0. Affected by this issue is some unknown functionality of the file /ajax.php?action=save_company. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230204. | https://vuldb.com/?id.230204 | 2023-05-30T09:56:22.690Z | 2023-05-30T10:31:02.680Z | 2023-10-23T07:24:21.595Z | {'Vendor': 'SourceCodester', 'Product': 'Students Online Internship Timesheet Syste', 'Versions': '1.0'} |
CVE-2023-2420 | A vulnerability was found in MLECMS 3.0. It has been rated as critical. This issue affects the function get_url in the library /upload/inc/lib/admin of the file upload\inc\include\common.func.php. The manipulation of the argument $_SERVER['REQUEST_URI'] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227717 was assigned to this vulnerability. | https://vuldb.com/?id.227717 | 2023-04-28T17:01:08.401Z | 2023-04-29T01:31:03.540Z | 2023-10-23T05:07:41.703Z | {'Vendor': 'n/a', 'Product': 'MLECMS', 'Versions': '3.0'} |
CVE-2023-2861 | A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder. | https://access.redhat.com/security/cve/CVE-2023-2861 | 2023-05-24T07:54:12.009Z | 2023-12-06T06:19:40.625Z | 2023-12-06T06:19:40.625Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''} |
CVE-2023-2162 | A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information. | https://www.spinics.net/lists/linux-scsi/msg181542.html | 2023-04-18T00:00:00 | 2023-04-19T00:00:00 | 2023-05-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel version prior to Kernel 6.2 RC6'} |
CVE-2023-2498 | The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.19 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1c3d4c96-63a7-4f3b-a9ac-095be241f840?source=cve | 2023-05-03T14:47:26.651Z | 2023-05-23T23:36:46.492Z | 2023-05-23T23:36:46.492Z | {'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'} |
CVE-2023-2027 | The ZM Ajax Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.2. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b10d01ec-54ef-456b-9410-ed013343a962?source=cve | 2023-04-13T16:18:50.856Z | 2023-04-15T07:42:23.833Z | 2023-04-15T07:42:23.833Z | {'Vendor': 'zanematthew', 'Product': 'ZM Ajax Login & Register', 'Versions': '*'} |
CVE-2023-2477 | A vulnerability was found in Funadmin up to 3.2.3. It has been declared as problematic. Affected by this vulnerability is the function tagLoad of the file Cx.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227869 was assigned to this vulnerability. | https://vuldb.com/?id.227869 | 2023-05-02T12:07:02.319Z | 2023-05-02T14:00:06.199Z | 2023-10-23T05:18:41.036Z | {'Vendor': 'n/a', 'Product': 'Funadmin', 'Versions': '3.2.0, 3.2.1, 3.2.2, 3.2.3'} |
CVE-2023-2924 | A vulnerability, which was classified as critical, has been found in Supcon SimField up to 1.80.00.00. Affected by this issue is some unknown functionality of the file /admin/reportupload.aspx. The manipulation of the argument files[] leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230078 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.230078 | 2023-05-27T07:08:34.882Z | 2023-05-27T08:00:03.835Z | 2023-10-23T07:13:22.865Z | {'Vendor': 'Supcon', 'Product': 'SimField', 'Versions': '1.80.00'} |
CVE-2023-2660 | A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. This vulnerability affects unknown code of the file view_categories.php. The manipulation of the argument c leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228802 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228802 | 2023-05-11T13:01:39.761Z | 2023-05-11T15:00:04.984Z | 2023-10-23T05:55:16.698Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
CVE-2023-2230 | null | null | 2023-04-21T13:59:01.073Z | null | 2023-08-08T17:20:17.976Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2725 | Use after free in Guest View in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html | 2023-05-15T21:16:58.727Z | 2023-05-16T18:45:34.352Z | 2023-05-16T18:45:34.352Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'} |
CVE-2023-2375 | A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. This issue affects some unknown processing of the component Web Management Interface. The manipulation of the argument src leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227651. | https://vuldb.com/?id.227651 | 2023-04-28T11:29:56.309Z | 2023-04-28T15:00:07.068Z | 2023-10-22T18:33:04.616Z | {'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'} |
CVE-2023-2119 | The Responsive Filterable Portfolio plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.0.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e67dfe0f-ac1c-4a78-bfc9-0cfd6c3040d4?source=cve | 2023-04-17T13:26:47.974Z | 2023-04-18T01:57:07.181Z | 2023-04-18T01:57:07.181Z | {'Vendor': 'nik00726', 'Product': 'Responsive Filterable Portfolio', 'Versions': '*'} |
CVE-2023-2549 | The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address. | https://www.wordfence.com/threat-intel/vulnerabilities/id/12560b8e-9c47-4f7f-ac9c-d86f17914ba3?source=cve | 2023-05-05T17:13:28.059Z | 2023-05-31T02:40:19.517Z | 2023-05-31T02:40:19.517Z | {'Vendor': 'featherplugins', 'Product': 'Custom Login Page | Temporary Users | Rebrand Login | Login Captcha', 'Versions': '1.0.7'} |
CVE-2023-2267 | An Improper Input Validation vulnerability in Schweitzer Engineering Laboratories SEL-411L could allow an attacker to perform reflection attacks against an authorized and authenticated user.
See product Instruction Manual Appendix A dated 20230830 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:21:10.937Z | 2023-11-30T16:58:44.063Z | 2023-11-30T16:58:44.063Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'} |
CVE-2023-2637 |
Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies. Hard-coded cryptographic key may lead to privilege escalation. This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | 2023-05-10T20:31:38.532Z | 2023-06-13T20:15:07.735Z | 2023-06-13T20:15:07.735Z | {'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk System Services', 'Versions': '<= 6.20'} |
CVE-2023-2322 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/f7228f3f-3bef-46fe-b0e3-56c432048a67 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2772 | A vulnerability, which was classified as critical, was found in SourceCodester Budget and Expense Tracker System 1.0. Affected is an unknown function of the file /admin/budget/manage_budget.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-229278 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.229278 | 2023-05-17T16:53:40.265Z | 2023-05-17T18:31:04.581Z | 2023-10-23T06:34:21.320Z | {'Vendor': 'SourceCodester', 'Product': 'Budget and Expense Tracker System', 'Versions': '1.0'} |
CVE-2023-2288 | The Otter WordPress plugin before 2.2.6 does not sanitize some user-controlled file paths before performing file operations on them. This leads to a PHAR deserialization vulnerability on PHP < 8.0 using the phar:// stream wrapper. | https://wpscan.com/vulnerability/93acb4ee-1053-48e1-8b69-c09dc3b2f302 | 2023-04-25T19:32:37.641Z | 2023-05-30T07:49:15.477Z | 2023-05-30T07:49:15.477Z | {'Vendor': 'Unknown', 'Product': 'Otter', 'Versions': '0'} |
CVE-2023-2908 | A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service. | https://access.redhat.com/security/cve/CVE-2023-2908 | 2023-05-26T00:00:00 | 2023-06-30T00:00:00 | 2024-01-23T01:44:14.895Z | {'Vendor': 'n/a', 'Product': 'Libtiff', 'Versions': '4.5.1rc1'} |
CVE-2023-2621 |
The McFeeder server (distributed as part of SSW package), is susceptible to an arbitrary file write vulnerability on the MAIN computer
system. This vulnerability stems from the use of an outdated version of a third-party library, which is used to extract archives uploaded to McFeeder server. An authenticated malicious client can
exploit this vulnerability by uploading a crafted ZIP archive via the
network to McFeeder’s service endpoint.
| https://publisher.hitachienergy.com/preview?DocumentId=8DBD000177&languageCode=en&Preview=true | 2023-05-10T08:59:13.964Z | 2023-11-01T02:10:56.475Z | 2023-11-01T02:10:56.475Z | {'Vendor': 'Hitachi Energy', 'Product': 'MACH System Software', 'Versions': '5.0'} |
CVE-2023-2271 | The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when deleting its shortcode, which could allow attackers to make logged in admins delete arbitrary shortcode via a CSRF attack | https://wpscan.com/vulnerability/31512f33-c310-4b36-b665-19293097cc8b | 2023-04-25T07:30:51.495Z | 2023-08-16T11:03:22.861Z | 2023-08-16T11:03:22.861Z | {'Vendor': 'Unknown', 'Product': 'Tiempo.com', 'Versions': '0'} |
CVE-2023-2764 | The Draw Attention plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_set_featured_image function in versions up to, and including, 2.0.11. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change the featured image of arbitrary posts with an image that exists in the media library. | https://www.wordfence.com/threat-intel/vulnerabilities/id/18530601-a294-448c-a1b2-c3995f9042ac?source=cve | 2023-05-17T16:02:05.108Z | 2023-06-09T05:33:11.613Z | 2023-06-09T05:33:11.613Z | {'Vendor': 'croixhaug', 'Product': 'Interactive Image Map Plugin – Draw Attention', 'Versions': '*'} |
CVE-2023-2158 | Code Dx versions prior to 2023.4.2 are vulnerable to user impersonation attack where a malicious actor is able to gain access to another user's account by crafting a custom "Remember Me" token. This is possible due to the use of a hard-coded cipher which was used when generating the token. A malicious actor who creates this token can supply it to a separate Code Dx system, provided they know the username they want to impersonate, and impersonate the user. Score 6.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
| https://community.synopsys.com/s/question/0D5Hr00006VdZblKAF/announcement-changelog-code-dx-202342 | 2023-04-18T14:08:54.082Z | 2023-04-27T17:04:22.879Z | 2023-04-27T17:04:22.879Z | {'Vendor': 'Synopsys', 'Product': 'Code Dx', 'Versions': '0'} |
CVE-2023-2508 | The `PaperCutNG Mobility Print` version 1.0.3512 application allows an
unauthenticated attacker to perform a CSRF attack on an instance
administrator to configure the clients host (in the "configure printer
discovery" section). This is possible because the application has no
protections against CSRF attacks, like Anti-CSRF tokens, header origin
validation, samesite cookies, etc.
| https://fluidattacks.com/advisories/solveig/ | 2023-05-03T22:24:15.839Z | 2023-09-20T15:05:35.512Z | 2023-09-20T15:05:35.512Z | {'Vendor': 'PaperCut MF/NG', 'Product': 'Mobility Print', 'Versions': ' 1.0.3512'} |
CVE-2023-2226 | Due to insufficient validation in the PE and OLE parsers in Rapid7's Velociraptor versions earlier than 0.6.8 allows attacker to crash Velociraptor during parsing of maliciously malformed files.
For this attack to succeed, the attacker needs to be able to introduce malicious files to the system at the same time that Velociraptor attempts to collect any artifacts that attempt to parse PE files, Authenticode signatures, or OLE files. After crashing, the Velociraptor service will restart and it will still be possible to collect other artifacts.
| https://github.com/Velocidex/velociraptor | 2023-04-21T11:40:07.131Z | 2023-04-21T11:48:46.279Z | 2023-04-21T11:48:46.279Z | {'Vendor': 'Rapid7', 'Product': 'Velociraptor', 'Versions': '0'} |
CVE-2023-2676 | A vulnerability, which was classified as critical, has been found in H3C R160 V1004004. Affected by this issue is some unknown functionality of the file /goForm/aspForm. The manipulation of the argument go leads to stack-based buffer overflow. The exploit has been disclosed to the public and may be used. VDB-228890 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228890 | 2023-05-12T08:13:35.991Z | 2023-05-12T09:00:06.842Z | 2023-10-23T06:05:03.391Z | {'Vendor': 'H3C', 'Product': 'R160', 'Versions': 'V1004004'} |
CVE-2023-2363 | A vulnerability, which was classified as critical, has been found in SourceCodester Resort Reservation System 1.0. This issue affects some unknown processing of the file view_room.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227639. | https://vuldb.com/?id.227639 | 2023-04-28T10:53:07.900Z | 2023-04-28T11:00:05.188Z | 2023-10-22T16:11:07.619Z | {'Vendor': 'SourceCodester', 'Product': 'Resort Reservation System', 'Versions': '1.0'} |
CVE-2023-2699 | A vulnerability, which was classified as critical, has been found in SourceCodester Lost and Found Information System 1.0. Affected by this issue is some unknown functionality of the file admin/?page=items/view_item of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228980. | https://vuldb.com/?id.228980 | 2023-05-14T07:59:41.914Z | 2023-05-14T12:00:04.999Z | 2023-10-23T06:22:09.083Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2733 | The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.0. This is due to insufficient verification on the user being supplied during the coupon redemption REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c726d8f0-7f2a-414b-9d73-a053921074d9?source=cve | 2023-05-16T12:40:28.750Z | 2023-05-25T02:05:34.551Z | 2023-05-25T02:05:34.551Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-2949 | Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4 | 2023-05-28T00:00:00 | 2023-05-28T00:00:00 | 2023-05-28T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2462 | Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to obfuscate main origin data via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html | 2023-05-01T23:09:49.704Z | 2023-05-02T23:47:58.271Z | 2023-05-02T23:47:58.271Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'} |
CVE-2023-2198 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A Regular Expression Denial of Service was possible via sending crafted payloads to the preview_markdown endpoint. | https://gitlab.com/gitlab-org/gitlab/-/issues/408273 | 2023-04-20T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=8.7, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2032 | The Custom 404 Pro WordPress plugin before 3.8.1 does not properly sanitize database inputs, leading to multiple SQL Injection vulnerabilities. | https://wpscan.com/vulnerability/17acde5d-44ea-4e77-8670-260d22e28ffe | 2023-04-13T19:29:43.789Z | 2023-06-27T13:17:14.009Z | 2023-06-27T13:17:14.009Z | {'Vendor': 'Unknown', 'Product': 'Custom 404 Pro', 'Versions': '0'} |
CVE-2023-2931 | Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:13.849Z | 2023-05-30T21:31:39.136Z | 2023-05-30T21:31:39.136Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2874 | A vulnerability, which was classified as problematic, has been found in Twister Antivirus 8. This issue affects the function 0x804f2158/0x804f2154/0x804f2150/0x804f215c/0x804f2160/0x80800040/0x804f214c/0x804f2148/0x804f2144/0x801120e4/0x804f213c/0x804f2140 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-229853 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229853 | 2023-05-24T17:17:54.555Z | 2023-05-24T18:31:03.531Z | 2023-10-23T07:02:24.413Z | {'Vendor': 'Twister', 'Product': 'Antivirus', 'Versions': '8'} |
CVE-2023-2527 | The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin | https://wpscan.com/vulnerability/8051142a-4e55-4dc2-9cb1-1b724c67574f | 2023-05-04T18:28:34.593Z | 2023-06-19T10:52:50.844Z | 2023-07-04T09:31:21.138Z | {'Vendor': 'Unknown', 'Product': 'Integration for Contact Form 7 and Zoho CRM, Bigin', 'Versions': '0'} |
CVE-2023-2177 | A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service. | https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0 | 2023-04-19T00:00:00 | 2023-04-20T00:00:00 | 2023-04-20T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux', 'Versions': 'Linux Kernel prior to Kernel 5.19 RC17'} |
CVE-2023-2659 | A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file view_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228801 was assigned to this vulnerability. | https://vuldb.com/?id.228801 | 2023-05-11T13:01:35.259Z | 2023-05-11T14:31:03.535Z | 2023-10-23T05:54:03.550Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
CVE-2023-2209 | A vulnerability, which was classified as critical, was found in Campcodes Coffee Shop POS System 1.0. Affected is an unknown function of the file /admin/sales/view_details.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226974 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226974 | 2023-04-21T06:28:52.121Z | 2023-04-21T08:00:08.467Z | 2023-10-22T14:40:22.133Z | {'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'} |
CVE-2023-2065 | Authorization Bypass Through User-Controlled Key vulnerability in Armoli Technology Cargo Tracking System allows Authentication Abuse, Authentication Bypass.This issue affects Cargo Tracking System: before 3558f28 .
| https://https://www.usom.gov.tr/bildirim/tr-23-0287 | 2023-04-14T10:27:06.992Z | 2023-05-24T12:04:41.020Z | 2023-05-24T12:04:41.020Z | {'Vendor': 'Armoli Technology', 'Product': 'Cargo Tracking System', 'Versions': '0'} |
CVE-2023-2435 | The Blog-in-Blog plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 1.1.1 via a shortcode attribute. This allows editor-level, and above, attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d53161ad-cc5f-4433-b288-a8095cdfd7db?source=cve | 2023-05-01T09:21:50.539Z | 2023-05-31T02:40:21.694Z | 2023-05-31T02:40:21.694Z | {'Vendor': 'timhodson', 'Product': 'Blog-in-Blog', 'Versions': '*'} |
CVE-2023-2120 | The Thumbnail carousel slider plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f4bf4e12-5cbb-45bc-938e-62163baaa15d?source=cve | 2023-04-17T13:47:13.874Z | 2023-04-18T01:57:09.113Z | 2023-04-18T01:57:09.113Z | {'Vendor': 'nik00726', 'Product': 'Thumbnail carousel slider', 'Versions': '*'} |
CVE-2023-2570 |
A CWE-129: Improper Validation of Array Index vulnerability exists that could cause local
denial-of-service, and potentially kernel execution when a malicious actor with local user access
crafts a script/program using an unpredictable index to an IOCTL call in the Foxboro.sys driver.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-164-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-164-04.pdf | 2023-05-08T09:54:21.534Z | 2023-06-14T07:52:24.608Z | 2023-06-14T07:52:24.608Z | {'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Foxboro DCS Control Core Services', 'Versions': 'All versions prior to patch HF9857795'} |
CVE-2023-2823 | A vulnerability was found in SourceCodester Class Scheduling System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/edit_subject.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229597 was assigned to this vulnerability. | https://vuldb.com/?id.229597 | 2023-05-20T06:49:11.123Z | 2023-05-20T07:31:04.549Z | 2023-10-23T06:48:59.646Z | {'Vendor': 'SourceCodester', 'Product': 'Class Scheduling System', 'Versions': '1.0'} |
CVE-2023-2989 | Fortra Globalscape EFT versions before 8.1.0.16 suffer from an out of bounds memory read in their administration server, which can allow an attacker to crash the service or bypass authentication if successfully exploited
| https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ | 2023-05-30T15:58:50.975Z | 2023-06-22T19:14:17.275Z | 2023-06-22T19:14:17.275Z | {'Vendor': 'Fortra', 'Product': 'Globalscape EFT', 'Versions': '8.0.0'} |
CVE-2023-2423 |
A vulnerability was discovered in the Rockwell Automation Armor PowerFlex device when the product sends communications to the local event log. Threat actors could exploit this vulnerability by sending an influx of network commands, causing the product to generate an influx of event log traffic at a high rate. If exploited, the product would stop normal operations and self-reset creating a denial-of-service condition. The error code would need to be cleared prior to resuming normal operations.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140371 | 2023-04-28T19:37:27.989Z | 2023-08-08T14:24:26.886Z | 2023-08-08T14:24:49.798Z | {'Vendor': 'Rockwell Automation', 'Product': 'Armor PowerFlex', 'Versions': '<=1.003'} |
CVE-2023-2073 | A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Login.php. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226051. | https://vuldb.com/?id.226051 | 2023-04-14T18:33:08.898Z | 2023-04-14T19:00:05.837Z | 2023-10-22T13:53:57.610Z | {'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'} |
CVE-2023-2589 | An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker can clone a repository from a public project, from a disallowed IP, even after the top-level group has enabled IP restrictions on the group. | https://gitlab.com/gitlab-org/gitlab/-/issues/407891 | 2023-05-08T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=12.0, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2970 | A vulnerability classified as problematic was found in MindSpore 2.0.0-alpha/2.0.0-rc1. This vulnerability affects the function JsonHelper::UpdateArray of the file mindspore/ccsrc/minddata/dataset/util/json_helper.cc. The manipulation leads to memory corruption. The name of the patch is 30f4729ea2c01e1ed437ba92a81e2fc098d608a9. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-230176. | https://vuldb.com/?id.230176 | 2023-05-30T04:58:32.620Z | 2023-05-30T05:31:03.695Z | 2023-10-23T07:23:08.445Z | {'Vendor': 'n/a', 'Product': 'MindSpore', 'Versions': '2.0.0-alpha, 2.0.0-rc1'} |
CVE-2023-2835 | The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search' parameter in versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/847f1c00-0e8f-4d38-84af-fe959e2efe5c?source=cve | 2023-05-22T12:52:46.312Z | 2023-06-02T06:06:47.562Z | 2023-06-02T06:06:47.562Z | {'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'} |
CVE-2023-2566 | Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/47d6fc2a-989a-44eb-9cb7-ab4f8bd44496 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2136 | Integer overflow in Skia in Google Chrome prior to 112.0.5615.137 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html | 2023-04-17T22:27:00.468Z | 2023-04-19T03:40:26.644Z | 2023-04-19T03:40:26.644Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'} |
CVE-2023-2618 | A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548. | https://vuldb.com/?id.228548 | 2023-05-10T05:06:29.634Z | 2023-05-10T05:31:04.406Z | 2023-10-23T05:34:32.672Z | {'Vendor': 'OpenCV', 'Product': 'wechat_qrcode Module', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7'} |
CVE-2023-2248 | null | null | 2023-04-24T10:49:20.882Z | 2023-05-01T12:49:59.123Z | 2023-05-08T11:25:42.511Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2927 | A vulnerability was found in JIZHICMS 2.4.5. It has been classified as critical. Affected is the function index of the file TemplateController.php. The manipulation of the argument webapi leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230082 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230082 | 2023-05-27T07:36:35.765Z | 2023-05-27T09:00:04.620Z | 2023-10-23T07:17:02.564Z | {'Vendor': 'n/a', 'Product': 'JIZHICMS', 'Versions': '2.4.5'} |
CVE-2023-2024 | Improper authentication in OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 allow access to an unauthorized user under certain circumstances. | https://www.johnsoncontrols.com/cyber-solutions/security-advisories | 2023-04-13T15:11:18.916Z | 2023-05-18T20:45:01.376Z | 2023-05-18T20:45:01.376Z | {'Vendor': 'Johnson Controls', 'Product': 'OpenBlue Enterprise Manager Data Collector', 'Versions': '0'} |
CVE-2023-2474 | A vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227866 | 2023-05-02T11:52:54.046Z | 2023-05-02T12:31:03.658Z | 2023-10-23T05:15:01.327Z | {'Vendor': 'n/a', 'Product': 'Rebuild', 'Versions': '3.2'} |
CVE-2023-2161 |
A CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that
could cause unauthorized read access to the file system when a malicious configuration file is
loaded on to the software by a local user. | https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-129-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-129-01.pdf | 2023-04-18T15:35:46.157Z | 2023-05-16T04:31:26.482Z | 2023-05-16T04:31:26.482Z | {'Vendor': 'Schneider Electric', 'Product': 'OPC Factory Server (OFS)', 'Versions': 'Versions prior to V3.63SP2'} |
CVE-2023-2531 | Improper Restriction of Excessive Authentication Attempts in GitHub repository azuracast/azuracast prior to 0.18.3. | https://huntr.dev/bounties/20463eb2-0f9d-4ea3-a2c8-93f80e7aca02 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'azuracast', 'Product': 'azuracast/azuracast', 'Versions': 'unspecified'} |
CVE-2023-2862 | A vulnerability, which was classified as problematic, was found in SiteServer CMS up to 7.2.1. Affected is an unknown function of the file /api/stl/actions/search. The manipulation of the argument ajaxDivId leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-229818 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.229818 | 2023-05-24T09:18:05.179Z | 2023-05-24T09:31:03.789Z | 2023-10-23T06:52:39.187Z | {'Vendor': 'SiteServer', 'Product': 'CMS', 'Versions': '7.2.0, 7.2.1'} |
CVE-2023-2726 | Inappropriate implementation in WebApp Installs in Google Chrome prior to 113.0.5672.126 allowed an attacker who convinced a user to install a malicious web app to bypass install dialog via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html | 2023-05-15T21:16:59.067Z | 2023-05-16T18:45:34.470Z | 2023-05-16T18:45:34.470Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'} |
CVE-2023-2376 | A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been classified as critical. Affected is an unknown function of the component Web Management Interface. The manipulation of the argument dpi leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227652. | https://vuldb.com/?id.227652 | 2023-04-28T11:29:59.758Z | 2023-04-28T15:00:08.881Z | 2023-10-22T18:34:17.869Z | {'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'} |
CVE-2023-2663 | In Xpdf 4.04 (and earlier), a PDF object loop in the page label tree leads to infinite recursion and a stack overflow.
| https://forum.xpdfreader.com/viewtopic.php?t=42421 | 2023-05-11T20:10:12.645Z | 2023-05-11T20:16:59.111Z | 2023-05-11T20:19:20.402Z | {'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'} |
Subsets and Splits