CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2399 | The QuBot WordPress plugin before 1.1.6 doesn't filter user input on chat, leading to bad code inserted on it be reflected on the user dashboard. | https://wpscan.com/vulnerability/deca3cd3-f7cf-469f-9f7e-3612f7ae514d | 2023-04-28T13:13:45.325Z | 2023-06-19T10:52:51.650Z | 2023-06-19T10:52:51.650Z | {'Vendor': 'Unknown', 'Product': 'QuBot', 'Versions': '0'} |
CVE-2023-2233 | An improper authorization issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.2.8, all versions starting from 16.3 before 16.3.5 and all versions starting from 16.4 before 16.4.1. It allows a project reporter to leak the owner's Sentry instance projects. | https://gitlab.com/gitlab-org/gitlab/-/issues/408359 | 2023-04-21T14:27:20.134Z | 2023-09-29T06:30:51.179Z | 2023-09-29T06:30:51.179Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.8, 16.3, 16.4'} |
CVE-2023-2819 | A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type. This could result in arbitrary javascript code execution in an admin context. All versions prior to 5.10.0 are affected. | https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0002 | 2023-05-19T21:05:55.711Z | 2023-06-14T21:14:38.212Z | 2023-06-14T21:14:38.212Z | {'Vendor': 'Proofpoint', 'Product': 'Threat Response Auto Pull', 'Versions': '0'} |
CVE-2023-2321 | The WPForms Google Sheet Connector WordPress plugin before 3.4.6, gsheetconnector-wpforms-pro WordPress plugin through 3.4.6 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/79a56359-f7e8-4c8c-b0aa-6300f5d57880 | 2023-04-27T07:35:56.141Z | 2023-07-04T07:23:29.639Z | 2023-07-05T10:47:55.626Z | {'Vendor': 'Unknown', 'Product': 'WPForms Google Sheet Connector', 'Versions': '0'} |
CVE-2023-2771 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Exam System 1.0. This issue affects some unknown processing of the file /jurusanmatkul/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229277 was assigned to this vulnerability. | https://vuldb.com/?id.229277 | 2023-05-17T16:50:37.118Z | 2023-05-17T18:31:03.622Z | 2023-10-23T06:33:08.172Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2264 | An improper input validation vulnerability in the Schweitzer Engineering Laboratories SEL-411L could allow a malicious actor to manipulate authorized users to click on a link that could allow undesired behavior.
See product Instruction Manual Appendix A dated 20230830 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:18:40.218Z | 2023-11-30T16:55:28.541Z | 2023-11-30T16:55:28.541Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'} |
CVE-2023-2634 | The Get your number WordPress plugin through 1.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/1df111aa-6057-47a2-8e8b-9ef5ec3bb472 | 2023-05-10T18:35:27.069Z | 2023-06-05T13:39:00.960Z | 2023-06-05T13:39:00.960Z | {'Vendor': 'Unknown', 'Product': 'Get your number', 'Versions': '0'} |
CVE-2023-2458 | Use after free in ChromeOS Camera in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-chromeos.html | 2023-05-01T23:09:48.960Z | 2023-05-12T17:36:05.999Z | 2023-05-12T17:36:05.999Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.114'} |
CVE-2023-2008 | A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. | https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4 | 2023-04-12T00:00:00 | 2023-04-14T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux kernel udmabuf device driver', 'Versions': 'Fixed in kernel v5.19-rc4'} |
CVE-2023-2767 | The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.19.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/23334d94-e5b8-4c88-8765-02ad19e17248?source=cve | 2023-05-17T16:34:10.953Z | 2023-06-09T05:33:13.295Z | 2023-06-09T05:33:13.295Z | {'Vendor': 'nickboss', 'Product': 'WordPress File Upload', 'Versions': '*'} |
CVE-2023-2337 | The ConvertKit WordPress plugin before 2.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/e5a6f834-80a4-406b-acae-57ffeec2e689 | 2023-04-27T10:18:12.239Z | 2023-06-05T13:39:01.309Z | 2023-06-05T13:39:01.309Z | {'Vendor': 'Unknown', 'Product': 'ConvertKit', 'Versions': '0'} |
CVE-2023-2622 |
Authenticated clients can read arbitrary files on the MAIN Computer
system using the remote procedure call (RPC) of the InspectSetup
service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.
| https://publisher.hitachienergy.com/preview?DocumentId=8DBD000177&languageCode=en&Preview=true | 2023-05-10T08:59:58.079Z | 2023-11-01T02:24:51.988Z | 2023-11-01T02:24:51.988Z | {'Vendor': 'Hitachi Energy', 'Product': 'MACH System Software', 'Versions': '7.10.0.0'} |
CVE-2023-2272 | The Tiempo.com WordPress plugin through 0.1.2 does not sanitise and escape the page parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/dba60216-2753-40b7-8f2b-6caeba684b2e | 2023-04-25T07:33:50.107Z | 2023-08-16T11:03:24.487Z | 2023-08-16T11:03:24.487Z | {'Vendor': 'Unknown', 'Product': 'Tiempo.com', 'Versions': '0'} |
CVE-2023-2788 | Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.
| https://mattermost.com/security-updates/ | 2023-05-18T11:58:33.058Z | 2023-06-16T08:58:15.392Z | 2023-06-16T08:58:15.392Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10, 7.8.5, 7.9.4, 7.10.1'} |
CVE-2023-2858 | NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-15.html | 2023-05-24T00:00:00 | 2023-05-26T00:00:00 | 2023-09-17T06:06:18.422481 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'} |
CVE-2023-2360 | Sensitive information disclosure due to CORS misconfiguration. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.2.0-135. | https://security-advisory.acronis.com/advisories/SEC-4215 | 2023-04-27T19:07:59.822Z | 2023-04-28T11:10:46.100Z | 2023-04-28T11:10:46.100Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Infrastructure', 'Versions': 'unspecified'} |
CVE-2023-2730 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3. | https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878 | 2023-05-16T00:00:00 | 2023-05-16T00:00:00 | 2023-05-16T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2225 | The SEO ALert WordPress plugin through 1.59 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/0af475ba-5c02-4f62-876d-6235a745bbd6 | 2023-04-21T10:41:54.429Z | 2023-08-16T11:03:25.318Z | 2023-08-16T11:03:25.318Z | {'Vendor': 'Unknown', 'Product': 'SEO ALert', 'Versions': '0'} |
CVE-2023-2675 | Improper Restriction of Excessive Authentication Attempts in GitHub repository linagora/twake prior to 2023.Q1.1223. | https://huntr.dev/bounties/474d3b39-1882-4d2c-b8f7-ff9f68f14cee | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'linagora', 'Product': 'linagora/twake', 'Versions': 'unspecified'} |
CVE-2023-2419 | A vulnerability was found in Zhong Bang CRMEB 4.6.0. It has been declared as critical. This vulnerability affects the function videoUpload of the file \crmeb\app\services\system\attachment\SystemAttachmentServices.php. The manipulation of the argument filename leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227716. | https://vuldb.com/?id.227716 | 2023-04-28T16:56:37.249Z | 2023-04-29T01:00:06.164Z | 2023-10-22T19:10:52.942Z | {'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.6.0'} |
CVE-2023-2049 | A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ballot_up.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-225934 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.225934 | 2023-04-14T07:41:48.119Z | 2023-04-14T11:00:05.122Z | 2023-10-22T09:54:59.490Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2897 | The Brizy Page Builder plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.4.18. This is due to an implicit trust of user-supplied IP addresses in an 'X-Forwarded-For' HTTP header for the purpose of validating allowed IP addresses against a Maintenance Mode whitelist. Supplying a whitelisted IP address within the 'X-Forwarded-For' header allows maintenance mode to be bypassed and may result in the disclosure of potentially sensitive information or allow access to restricted functionality. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve | 2023-05-25T17:46:23.832Z | 2023-06-09T06:48:49.496Z | 2023-06-09T06:48:49.496Z | {'Vendor': 'themefusecom', 'Product': 'Brizy – Page Builder', 'Versions': '*'} |
CVE-2023-2194 | An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. | https://bugzilla.redhat.com/show_bug.cgi?id=2188396 | 2023-04-20T00:00:00 | 2023-04-20T00:00:00 | 2023-05-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux kernel: i2c: xgene-slimpro', 'Versions': 'Fixed in kernel v6.3-rc4'} |
CVE-2023-2481 |
Compiler removal of buffer clearing in
sli_se_opaque_import_key
in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.
| https://github.com/SiliconLabs/gecko_sdk | 2023-05-02T13:57:02.209Z | 2023-05-18T18:44:48.742Z | 2023-05-18T18:44:48.742Z | {'Vendor': 'silabs.com', 'Product': 'Gecko Platform', 'Versions': '0'} |
CVE-2023-2878 | Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs.
| https://github.com/kubernetes/kubernetes/issues/118419 | 2023-05-24T22:10:01.825Z | 2023-06-07T14:35:10.295Z | 2023-06-07T14:37:59.908Z | {'Vendor': 'Kubernetes', 'Product': 'secrets-store-csi-driver', 'Versions': '0, 1.3.3'} |
CVE-2023-2602 | A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory. | https://bugzilla.redhat.com/show_bug.cgi?id=2209114 | 2023-05-09T00:00:00 | 2023-06-06T00:00:00 | 2023-11-30T05:06:19.565354 | {'Vendor': 'n/a', 'Product': 'libcap', 'Versions': 'NA'} |
CVE-2023-2252 | The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files. | https://wpscan.com/vulnerability/9da6eede-10d0-4609-8b97-4a5d38fa8e69/ | 2023-04-24T13:20:39.810Z | 2024-01-16T15:55:41.055Z | 2024-01-16T15:55:41.055Z | {'Vendor': 'Unknown', 'Product': 'Directorist', 'Versions': '0'} |
CVE-2023-2747 |
The initialization vector (IV) used by the secure engine (SE) for encrypting data stored in the SE flash memory is uninitialized.
| https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U2sFvQAJ?operationContext=S1 | 2023-05-16T20:15:31.493Z | 2023-06-15T19:49:29.785Z | 2023-06-15T19:49:29.785Z | {'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '2.0.0'} |
CVE-2023-2317 | DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. | https://support.typora.io/What's-New-1.6/ | 2023-04-27T04:51:13.390Z | 2023-08-19T05:35:36.603Z | 2023-08-19T05:35:36.603Z | {'Vendor': 'Typora', 'Product': 'Typora', 'Versions': '0'} |
CVE-2023-2069 | An issue has been discovered in GitLab affecting all versions starting from 10.0 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. A user with the role of developer could use the import project feature to leak CI/CD variables. | https://gitlab.com/gitlab-org/gitlab/-/issues/407374 | 2023-04-14T00:00:00 | 2023-05-03T00:00:00 | 2023-05-03T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=10.0, <12.9.8, >=12.10, <12.10.7, >=13.0, <13.0.1'} |
CVE-2023-2985 | A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07db5e247ab5858439b14dd7cc1fe538b9efcf32 | 2023-05-30T00:00:00 | 2023-06-01T00:00:00 | 2023-06-01T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to l 6.3-rc1'} |
CVE-2023-2086 | The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. | https://www.wordfence.com/threat-intel/vulnerabilities/id/9efc782a-ec61-4741-81fd-a263a2739e16?source=cve | 2023-04-14T20:31:32.849Z | 2023-06-09T05:33:25.247Z | 2023-06-09T05:33:25.247Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'} |
CVE-2023-2205 | A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226970 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226970 | 2023-04-21T06:21:19.002Z | 2023-04-21T07:00:05.285Z | 2023-10-22T14:35:28.477Z | {'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'} |
CVE-2023-2655 | The Contact Form by WD WordPress plugin through 1.13.23 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin | https://wpscan.com/vulnerability/b3f2d38f-8eeb-45e9-bb58-2957e416e1cd/ | 2023-05-11T12:32:48.856Z | 2024-01-16T15:55:22.590Z | 2024-01-16T15:55:22.590Z | {'Vendor': 'Unknown', 'Product': 'Contact Form by WD', 'Versions': '0'} |
CVE-2023-2340 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2710 | The video carousel slider with lightbox plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.0.22 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e88bb3a8-de24-46fb-a3e4-9ca3fdd4cca7?source=cve | 2023-05-15T13:03:24.345Z | 2023-05-16T02:04:29.448Z | 2023-05-16T02:04:29.448Z | {'Vendor': 'nik00726', 'Product': 'video carousel slider with lightbox', 'Versions': '*'} |
CVE-2023-2585 | Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client. | https://access.redhat.com/errata/RHSA-2023:3883 | 2023-05-08T19:39:58.370Z | 2023-12-21T09:24:16.632Z | 2023-12-21T09:24:16.632Z | {'Vendor': 'n/a', 'Product': 'keycloak', 'Versions': ''} |
CVE-2023-2090 | A vulnerability classified as critical has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is an unknown function of the file /admin/maintenance/view_designation.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226098 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226098 | 2023-04-15T08:35:21.085Z | 2023-04-15T09:00:05.981Z | 2023-10-22T14:01:18.266Z | {'Vendor': 'SourceCodester', 'Product': 'Employee and Visitor Gate Pass Logging System', 'Versions': '1.0'} |
CVE-2023-2839 | Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-2993 | A valid, authenticated user with limited privileges may be able to use specifically crafted web management server API calls to execute a limited number of commands on SMM v1, SMM v2, and FPC that the user does not normally have sufficient privileges to execute. | https://support.lenovo.com/us/en/product_security/LEN-127357 | 2023-05-30T16:27:50.393Z | 2023-06-26T19:44:50.040Z | 2023-06-26T19:44:50.040Z | {'Vendor': 'Lenovo', 'Product': 'System Management Module (SMM) ', 'Versions': 'various'} |
CVE-2023-2643 | A vulnerability classified as critical was found in SourceCodester File Tracker Manager System 1.0. This vulnerability affects unknown code of the file register/update_password.php of the component POST Parameter Handler. The manipulation of the argument new_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228772. | https://vuldb.com/?id.228772 | 2023-05-11T05:17:47.181Z | 2023-05-11T06:31:03.763Z | 2023-10-23T05:39:25.282Z | {'Vendor': 'SourceCodester', 'Product': 'File Tracker Manager System', 'Versions': '1.0'} |
CVE-2023-2213 | A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/products/manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226978 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226978 | 2023-04-21T06:29:05.107Z | 2023-04-21T09:31:04.618Z | 2023-10-22T14:45:15.062Z | {'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'} |
CVE-2023-2706 | The OTP Login Woocommerce & Gravity Forms plugin for WordPress is vulnerable to authentication bypass. This is due to the fact that when generating OTP codes for users to use in order to login via phone number, the plugin returns these codes in an AJAX response. This makes it possible for unauthenticated attackers to obtain login codes for administrators. This does require an attacker have access to the phone number configured for an account, which can be obtained via social engineering or reconnaissance. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b1b7b653-496f-467a-9513-4be1891f38ae?source=cve | 2023-05-15T12:23:20.740Z | 2023-05-17T01:58:49.447Z | 2023-06-05T21:25:27.755Z | {'Vendor': 'xootix', 'Product': 'OTP Login Woocommerce & Gravity Forms', 'Versions': '*'} |
CVE-2023-2356 | Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. | https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896 | 2023-04-27T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-2478 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, a malicious unauthorized GitLab user may use a GraphQL endpoint to attach a malicious runner to any project. | https://gitlab.com/gitlab-org/gitlab/-/issues/409470 | 2023-05-02T00:00:00 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.4, <15.9.7, >=15.10, <15.10.6, >=15.11, <15.11.2'} |
CVE-2023-2182 | An issue has been discovered in GitLab EE affecting all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Under certain conditions when OpenID Connect is enabled on an instance, it may allow users who are marked as 'external' to become 'regular' users thus leading to privilege escalation for those users. | https://gitlab.com/gitlab-org/gitlab/-/issues/403012 | 2023-04-19T00:00:00 | 2023-05-03T00:00:00 | 2023-05-03T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.10, <15.10.5, >=15.11, <15.11.1'} |
CVE-2023-2028 | The Call Now Accessibility Button WordPress plugin before 1.1 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/0f1c1f1c-acdd-4c8a-bd5e-a21f4915e69f | 2023-04-13T16:31:49.225Z | 2023-07-10T12:40:57.309Z | 2023-07-10T13:05:48.923Z | {'Vendor': 'Unknown', 'Product': 'Call Now Accessibility Button', 'Versions': '0'} |
CVE-2023-2881 | Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10. | https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416 | 2023-05-25T00:00:00 | 2023-05-25T00:00:00 | 2023-05-25T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'} |
CVE-2023-2497 | The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.0. This is due to missing or incorrect nonce validation on the 'import_settings' function. This makes it possible for unauthenticated attackers to exploit PHP Object Injection due to the use of unserialize() on the user supplied parameter via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/fbb601ce-a884-4894-af13-dab14885c7eb?source=cve | 2023-05-03T14:46:27.855Z | 2023-11-22T15:33:39.114Z | 2023-11-22T15:33:39.114Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2244 | A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects an unknown part of the file /admin/orders/update_status.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227229 was assigned to this vulnerability. | https://vuldb.com/?id.227229 | 2023-04-22T15:50:22.630Z | 2023-04-22T16:31:04.904Z | 2023-10-22T14:59:53.147Z | {'Vendor': 'SourceCodester', 'Product': 'Online Eyewear Shop', 'Versions': '1.0'} |
CVE-2023-2614 | Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2301 | The Contact Form Builder by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.9.1. This is due to missing nonce validation on the ls_parse_vcita_callback function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/61c39f5f-3b17-4e4d-824e-241159a73400?source=cve | 2023-04-26T12:26:13.327Z | 2023-06-03T04:35:15.116Z | 2023-06-03T04:35:15.116Z | {'Vendor': 'eyale-vc', 'Product': 'Contact Form Builder by vcita', 'Versions': '*'} |
CVE-2023-2751 | The Upload Resume WordPress plugin through 1.2.0 does not validate the captcha parameter when uploading a resume via the resume_upload_form shortcode, allowing unauthenticated visitors to upload arbitrary media files to the site. | https://wpscan.com/vulnerability/1b0fe0ac-d0d1-473d-af5b-dad6217933d4 | 2023-05-17T06:26:03.200Z | 2023-06-19T10:52:52.446Z | 2023-06-19T10:52:52.446Z | {'Vendor': 'Unknown', 'Product': 'Upload Resume', 'Versions': '0'} |
CVE-2023-2815 | A vulnerability classified as critical was found in SourceCodester Online Jewelry Store 1.0. Affected by this vulnerability is an unknown functionality of the file supplier.php of the component POST Parameter Handler. The manipulation of the argument suppid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229429 was assigned to this vulnerability. | https://vuldb.com/?id.229429 | 2023-05-19T15:30:09.832Z | 2023-05-19T16:31:03.368Z | 2023-10-23T06:46:33.323Z | {'Vendor': 'SourceCodester', 'Product': 'Online Jewelry Store', 'Versions': '1.0'} |
CVE-2023-2546 | The WP User Switch plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.2. This is due to incorrect authentication checking in the 'wpus_allow_user_to_admin_bar_menu' function with the 'wpus_who_switch' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the username. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e89d912d-fa7a-4fb1-8872-95fa861c21ca?source=cve | 2023-05-05T17:11:57.789Z | 2023-06-06T01:55:07.908Z | 2023-06-13T12:53:43.785Z | {'Vendor': 'iqbalrony', 'Product': 'WP User Switch', 'Versions': '*'} |
CVE-2023-2053 | A vulnerability, which was classified as critical, has been found in Campcodes Advanced Online Voting System 1.0. Affected by this issue is some unknown functionality of the file /admin/candidates_row.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225938 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.225938 | 2023-04-14T07:42:05.144Z | 2023-04-14T12:31:03.691Z | 2023-10-22T09:59:51.962Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2950 | Improper Authorization in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86 | 2023-05-28T00:00:00 | 2023-05-28T00:00:00 | 2023-05-28T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2680 | This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750. | https://access.redhat.com/security/cve/CVE-2023-2680 | 2023-05-12T09:57:43.190Z | 2023-09-13T16:50:53.532Z | 2023-09-13T16:50:53.532Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''} |
CVE-2023-2395 | A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the component Web Management Interface. The manipulation of the argument Login.userAgent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227673 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227673 | 2023-04-28T11:49:07.265Z | 2023-04-28T21:31:03.804Z | 2023-10-22T18:57:27.923Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2141 | An unsafe .NET object deserialization in DELMIA Apriso Release 2017 through Release 2022 could lead to post-authentication remote code execution.
| https://www.3ds.com/vulnerability/advisories | 2023-04-18T07:52:31.574Z | 2023-04-21T15:48:39.800Z | 2023-04-21T15:48:39.800Z | {'Vendor': 'Dassault Systèmes', 'Product': 'DELMIA Apriso', 'Versions': 'Apriso 2017 Golden, Apriso 2018 Golden, Apriso 2019 Golden, Apriso 2020 Golden, Apriso 2021 Golden, Apriso 2022 Golden'} |
CVE-2023-2511 | null | null | 2023-05-04T00:00:00 | null | 2023-05-12T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2842 | The WP Inventory Manager WordPress plugin before 2.1.0.14 does not have CSRF checks, which could allow attackers to make logged-in admins delete Inventory Items via a CSRF attack | https://wpscan.com/vulnerability/0357ecc7-56f5-4843-a928-bf2d3ce75596 | 2023-05-22T20:54:42.850Z | 2023-06-27T13:17:17.414Z | 2023-06-27T13:17:17.414Z | {'Vendor': 'Unknown', 'Product': 'WP Inventory Manager', 'Versions': '0'} |
CVE-2023-2907 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Marksoft allows SQL Injection.This issue affects Marksoft: through Mobile:v.7.1.7 ; Login:1.4 ; API:20230605.
| https://www.usom.gov.tr/bildirim/tr-23-0363 | 2023-05-26T08:11:11.095Z | 2023-06-19T12:41:53.278Z | 2023-06-19T12:41:53.278Z | {'Vendor': 'Marksoft', 'Product': 'Marksoft', 'Versions': '0'} |
CVE-2023-2004 | null | null | 2023-04-12T00:00:00 | null | 2023-05-26T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2454 | schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code. | https://access.redhat.com/security/cve/CVE-2023-2454 | 2023-05-01T00:00:00 | 2023-06-09T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'postgresql', 'Versions': 'PostgreSQL 15.3, PostgreSQL 14.8, PostgreSQL 13.11, PostgreSQL 12.15, PostgreSQL 11.20'} |
CVE-2023-2287 | The Orbit Fox by ThemeIsle WordPress plugin before 2.10.24 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing. | https://wpscan.com/vulnerability/1b36a184-2138-4a65-8940-07e7764669bb | 2023-04-25T19:27:58.424Z | 2023-05-30T07:49:17.119Z | 2023-05-30T07:49:17.119Z | {'Vendor': 'Unknown', 'Product': 'Orbit Fox by ThemeIsle', 'Versions': '0'} |
CVE-2023-2638 |
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.
Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives. This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | 2023-05-10T20:31:39.989Z | 2023-06-13T20:25:03.375Z | 2023-06-13T20:25:03.375Z | {'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk System Services', 'Versions': '<= 6.20'} |
CVE-2023-2268 | Plane version 0.7.1 allows an unauthenticated attacker to view all stored server files of all users.
| https://fluidattacks.com/advisories/giardino/ | 2023-04-24T23:54:14.636Z | 2023-07-15T18:37:04.977Z | 2023-07-15T18:37:04.977Z | {'Vendor': 'Plane', 'Product': 'Plane', 'Versions': '0.7.1'} |
CVE-2023-2792 | Mattermost fails to sanitize ephemeral error messages, allowing an attacker to obtain arbitrary message contents by a specially crafted /groupmsg command.
| https://mattermost.com/security-updates/ | 2023-05-18T12:10:39.031Z | 2023-06-16T09:01:43.650Z | 2023-06-16T09:01:43.650Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10, 7.9.4, 7.8.5, 7.10.1'} |
CVE-2023-2854 | BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-17.html | 2023-05-24T00:00:00 | 2023-05-26T00:00:00 | 2023-09-17T06:06:20.020893 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'} |
CVE-2023-2507 | CleverTap Cordova Plugin version 2.6.2 allows a remote attacker to execute JavaScript code in any application that is opened via a specially constructed deeplink by an attacker.
This is possible because the plugin does not correctly validate the data coming from the deeplinks before using them.
| https://fluidattacks.com/advisories/maiden/ | 2023-05-03T22:24:15.786Z | 2023-07-15T18:45:18.866Z | 2023-07-15T18:45:18.866Z | {'Vendor': 'CleverTap', 'Product': 'Cordova Plugin', 'Versions': '2.6.2'} |
CVE-2023-2157 | A heap-based buffer overflow vulnerability was found in the ImageMagick package that can lead to the application crashing. | https://bugzilla.redhat.com/show_bug.cgi?id=2208537 | 2023-04-18T00:00:00 | 2023-06-06T00:00:00 | 2023-08-24T02:06:25.384196 | {'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'ImageMagick 7.1.1-9'} |
CVE-2023-2442 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A specially crafted merge request could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims. | https://gitlab.com/gitlab-org/gitlab/-/issues/409346 | 2023-05-01T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2911 | If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly due to a stack overflow.
This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. | https://kb.isc.org/docs/cve-2023-2911 | 2023-05-26T11:20:45.872Z | 2023-06-21T16:26:36.587Z | 2023-06-21T16:26:36.587Z | {'Vendor': 'ISC', 'Product': 'BIND 9', 'Versions': '9.16.33, 9.18.7, 9.16.33-S1, 9.18.11-S1'} |
CVE-2023-2291 | Static credentials exist in the PostgreSQL data used in ManageEngine Access Manager Plus (AMP) build 4309, ManageEngine Password Manager Pro, and ManageEngine PAM360. These credentials could allow a malicious actor to modify configuration data that would escalate their permissions from that of a low-privileged user to an Administrative user. | https://tenable.com/security/research/tra-2023-16 | 2023-04-25T00:00:00 | 2023-04-26T00:00:00 | 2023-04-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'Zoho ManageEngine Multiple Products', 'Versions': 'All'} |
CVE-2023-2784 | Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps. | https://mattermost.com/security-updates | 2023-05-18T10:27:20.883Z | 2023-06-16T08:41:59.270Z | 2023-06-16T08:41:59.270Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost App Framework', 'Versions': '0, 0, 7.10.0, v7.8.5, v7.9.4, v7.10.1'} |
CVE-2023-2100 | A vulnerability classified as problematic was found in SourceCodester Vehicle Service Management System 1.0. This vulnerability affects unknown code of the file /admin/report/index.php. The manipulation of the argument date_end leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226108. | https://vuldb.com/?id.226108 | 2023-04-15T09:12:05.320Z | 2023-04-15T12:31:02.994Z | 2023-10-22T14:13:30.312Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2550 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-2803 | The Ultimate Addons for Contact Form 7 WordPress plugin before 3.1.29 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://wpscan.com/vulnerability/ec640d47-bb22-478d-9668-1dab72f12f8d | 2023-05-18T20:38:01.754Z | 2023-08-14T19:10:17.443Z | 2024-01-16T15:54:03.225Z | {'Vendor': 'Unknown', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': '0'} |
CVE-2023-2946 | Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/e550f4b0-945c-4886-af7f-ee0dc30b2a08 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2045 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ipekyolu Software Auto Damage Tracking Software allows SQL Injection.This issue affects Auto Damage Tracking Software: before 4.
| https://www.usom.gov.tr/bildirim/tr-23-0289 | 2023-04-14T07:02:35.616Z | 2023-05-24T13:35:48.498Z | 2023-05-24T13:35:48.498Z | {'Vendor': 'Ipekyolu Software', 'Product': 'Auto Damage Tracking Software', 'Versions': '0'} |
CVE-2023-2415 | The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_logout_callback function in versions up to, and including, 4.2.10. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to logout a vctia connected account which would cause a denial of service on the appointment scheduler. | https://www.wordfence.com/threat-intel/vulnerabilities/id/731cbeed-d4aa-448f-878a-8c51a3da4e18?source=cve | 2023-04-28T16:37:09.494Z | 2023-06-03T04:35:15.529Z | 2023-06-03T04:35:15.529Z | {'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'} |
CVE-2023-2696 | A vulnerability was found in SourceCodester Online Exam System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /matkul/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228977 was assigned to this vulnerability. | https://vuldb.com/?id.228977 | 2023-05-14T07:56:39.849Z | 2023-05-14T11:00:04.623Z | 2023-10-23T06:18:29.321Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2679 | Data leakage in Adobe connector in Snow Software SPE 9.27.0 on Windows allows privileged user to observe other users data. | https://community.snowsoftware.com/s/feed/0D56M00009Ex9dySAB | 2023-05-12T09:08:48.538Z | 2023-05-17T12:55:58.193Z | 2023-05-17T12:56:03.381Z | {'Vendor': 'Snow Software', 'Product': 'SPE SLM', 'Versions': '9.27.0'} |
CVE-2023-2383 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been classified as problematic. This affects an unknown part of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227661 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227661 | 2023-04-28T11:48:21.320Z | 2023-04-28T17:31:03.442Z | 2023-10-22T18:42:49.849Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2229 | The Quick Post Duplicator for WordPress is vulnerable to SQL Injection via the ‘post_id’ parameter in versions up to, and including, 2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/34e31a0f-27de-4536-9a7e-b8f68e557b3f?source=cve | 2023-04-21T13:11:25.946Z | 2023-08-31T05:33:05.292Z | 2023-08-31T05:33:05.292Z | {'Vendor': 'rahulsingh74388', 'Product': 'Quick Post Duplicator', 'Versions': '*'} |
CVE-2023-2697 | A vulnerability classified as critical has been found in SourceCodester Online Exam System 1.0. Affected is an unknown function of the file /jurusan/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-228978 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228978 | 2023-05-14T07:56:41.545Z | 2023-05-14T11:31:03.337Z | 2023-10-23T06:19:42.485Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2678 | A vulnerability has been found in SourceCodester File Tracker Manager System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /file_manager/admin/save_user.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228892. | https://vuldb.com/?id.228892 | 2023-05-12T08:19:06.467Z | 2023-05-12T09:31:04.719Z | 2023-10-23T06:07:29.853Z | {'Vendor': 'SourceCodester', 'Product': 'File Tracker Manager System', 'Versions': '1.0'} |
CVE-2023-2382 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument sysLogInfo.serverName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227660 | 2023-04-28T11:48:17.622Z | 2023-04-28T17:00:06.639Z | 2023-10-22T18:41:36.697Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2228 | Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.1.0. | https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9 | 2023-04-21T00:00:00 | 2023-04-21T00:00:00 | 2023-04-21T00:00:00 | {'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'} |
CVE-2023-2101 | A vulnerability, which was classified as problematic, has been found in moxi624 Mogu Blog v2 up to 5.2. This issue affects the function uploadPictureByUrl of the file /mogu-picture/file/uploadPicsByUrl. The manipulation of the argument urlList leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226109 was assigned to this vulnerability. | https://vuldb.com/?id.226109 | 2023-04-15T09:22:03.992Z | 2023-04-15T12:31:03.981Z | 2023-10-22T14:14:43.458Z | {'Vendor': 'moxi624', 'Product': 'Mogu Blog v2', 'Versions': '5.0, 5.1, 5.2'} |
CVE-2023-2551 | PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1. | https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'} |
CVE-2023-2802 | The Ultimate Addons for Contact Form 7 WordPress plugin before 3.1.29 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/c5cc136a-2fa6-44ff-b5b5-26d367937df9 | 2023-05-18T20:35:32.992Z | 2023-08-14T19:10:20.199Z | 2024-01-16T15:54:03.822Z | {'Vendor': 'Unknown', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': '0'} |
CVE-2023-2947 | Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/52534def-acab-4200-a79a-89ef4ce6a0b0 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2044 | A vulnerability has been found in Control iD iDSecure 4.7.29.1 and classified as problematic. This vulnerability affects unknown code of the component Dispositivos Page. The manipulation of the argument IP-DNS leads to cross site scripting. The attack can be initiated remotely. VDB-225922 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.225922 | 2023-04-14T06:55:48.287Z | 2023-04-14T10:00:05.920Z | 2023-10-22T09:51:19.858Z | {'Vendor': 'Control iD', 'Product': 'iDSecure', 'Versions': '4.7.29.1'} |
CVE-2023-2414 | The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_save_settings_callback function in versions up to, and including, 4.2.10. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to modify the plugins settings, upload media files, and inject malicious JavaScript. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3c99aab5-a995-44ae-bc14-09f73e6b22c5?source=cve | 2023-04-28T16:32:42.560Z | 2023-06-09T05:33:14.568Z | 2023-06-09T05:33:14.568Z | {'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'} |
CVE-2023-2290 | A potential vulnerability in the LenovoFlashDeviceInterface SMI handler may allow an attacker with local access and elevated privileges to execute arbitrary code. | https://support.lenovo.com/us/en/product_security/LEN-106014 | 2023-04-25T19:41:49.164Z | 2023-06-26T19:44:19.989Z | 2023-06-26T19:44:19.989Z | {'Vendor': 'Lenovo', 'Product': 'ThinkPad ', 'Versions': 'various'} |
CVE-2023-2785 | Mattermost fails to properly truncate the postgres error log message of a search query failure allowing an attacker to cause the creation of large log files which can result in Denial of Service
| https://mattermost.com/security-updates | 2023-05-18T10:35:58.147Z | 2023-06-16T09:07:28.235Z | 2023-06-28T09:38:30.371Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.10.1, 7.9.4, 7.8.5, 7.1.10'} |
CVE-2023-2855 | Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-12.html | 2023-05-24T00:00:00 | 2023-05-26T00:00:00 | 2023-09-17T06:06:34.910049 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'} |
CVE-2023-2156 | A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system. | https://www.zerodayinitiative.com/advisories/ZDI-23-547/ | 2023-04-18T00:00:00 | 2023-05-09T00:00:00 | 2023-08-02T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux kernel (RPL protocol)', 'Versions': 'Reproducible on the latest mainline.'} |
Subsets and Splits