CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2399
The QuBot WordPress plugin before 1.1.6 doesn't filter user input on chat, leading to bad code inserted on it be reflected on the user dashboard.
https://wpscan.com/vulnerability/deca3cd3-f7cf-469f-9f7e-3612f7ae514d
2023-04-28T13:13:45.325Z
2023-06-19T10:52:51.650Z
2023-06-19T10:52:51.650Z
{'Vendor': 'Unknown', 'Product': 'QuBot', 'Versions': '0'}
CVE-2023-2233
An improper authorization issue has been discovered in GitLab CE/EE affecting all versions starting from 11.8 before 16.2.8, all versions starting from 16.3 before 16.3.5 and all versions starting from 16.4 before 16.4.1. It allows a project reporter to leak the owner's Sentry instance projects.
https://gitlab.com/gitlab-org/gitlab/-/issues/408359
2023-04-21T14:27:20.134Z
2023-09-29T06:30:51.179Z
2023-09-29T06:30:51.179Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '11.8, 16.3, 16.4'}
CVE-2023-2819
A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type.  This could result in arbitrary javascript code execution in an admin context. All versions prior to 5.10.0 are affected.  
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0002
2023-05-19T21:05:55.711Z
2023-06-14T21:14:38.212Z
2023-06-14T21:14:38.212Z
{'Vendor': 'Proofpoint', 'Product': 'Threat Response Auto Pull', 'Versions': '0'}
CVE-2023-2321
The WPForms Google Sheet Connector WordPress plugin before 3.4.6, gsheetconnector-wpforms-pro WordPress plugin through 3.4.6 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/79a56359-f7e8-4c8c-b0aa-6300f5d57880
2023-04-27T07:35:56.141Z
2023-07-04T07:23:29.639Z
2023-07-05T10:47:55.626Z
{'Vendor': 'Unknown', 'Product': 'WPForms Google Sheet Connector', 'Versions': '0'}
CVE-2023-2771
A vulnerability, which was classified as critical, has been found in SourceCodester Online Exam System 1.0. This issue affects some unknown processing of the file /jurusanmatkul/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229277 was assigned to this vulnerability.
https://vuldb.com/?id.229277
2023-05-17T16:50:37.118Z
2023-05-17T18:31:03.622Z
2023-10-23T06:33:08.172Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2264
An improper input validation vulnerability in the Schweitzer Engineering Laboratories SEL-411L could allow a malicious actor to manipulate authorized users to click on a link that could allow undesired behavior. See product Instruction Manual Appendix A dated 20230830 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:18:40.218Z
2023-11-30T16:55:28.541Z
2023-11-30T16:55:28.541Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'}
CVE-2023-2634
The Get your number WordPress plugin through 1.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/1df111aa-6057-47a2-8e8b-9ef5ec3bb472
2023-05-10T18:35:27.069Z
2023-06-05T13:39:00.960Z
2023-06-05T13:39:00.960Z
{'Vendor': 'Unknown', 'Product': 'Get your number', 'Versions': '0'}
CVE-2023-2458
Use after free in ChromeOS Camera in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via UI interaction. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-chromeos.html
2023-05-01T23:09:48.960Z
2023-05-12T17:36:05.999Z
2023-05-12T17:36:05.999Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.114'}
CVE-2023-2008
A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4
2023-04-12T00:00:00
2023-04-14T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel udmabuf device driver', 'Versions': 'Fixed in kernel v5.19-rc4'}
CVE-2023-2767
The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 4.19.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/23334d94-e5b8-4c88-8765-02ad19e17248?source=cve
2023-05-17T16:34:10.953Z
2023-06-09T05:33:13.295Z
2023-06-09T05:33:13.295Z
{'Vendor': 'nickboss', 'Product': 'WordPress File Upload', 'Versions': '*'}
CVE-2023-2337
The ConvertKit WordPress plugin before 2.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/e5a6f834-80a4-406b-acae-57ffeec2e689
2023-04-27T10:18:12.239Z
2023-06-05T13:39:01.309Z
2023-06-05T13:39:01.309Z
{'Vendor': 'Unknown', 'Product': 'ConvertKit', 'Versions': '0'}
CVE-2023-2622
Authenticated clients can read arbitrary files on the MAIN Computer system using the remote procedure call (RPC) of the InspectSetup service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000177&languageCode=en&Preview=true
2023-05-10T08:59:58.079Z
2023-11-01T02:24:51.988Z
2023-11-01T02:24:51.988Z
{'Vendor': 'Hitachi Energy', 'Product': 'MACH System Software', 'Versions': '7.10.0.0'}
CVE-2023-2272
The Tiempo.com WordPress plugin through 0.1.2 does not sanitise and escape the page parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/dba60216-2753-40b7-8f2b-6caeba684b2e
2023-04-25T07:33:50.107Z
2023-08-16T11:03:24.487Z
2023-08-16T11:03:24.487Z
{'Vendor': 'Unknown', 'Product': 'Tiempo.com', 'Versions': '0'}
CVE-2023-2788
Mattermost fails to check if an admin user account active after an oauth2 flow is started, allowing an attacker with admin privileges to retain persistent access to Mattermost by obtaining an oauth2 access token while the attacker's account is deactivated.
https://mattermost.com/security-updates/
2023-05-18T11:58:33.058Z
2023-06-16T08:58:15.392Z
2023-06-16T08:58:15.392Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10, 7.8.5, 7.9.4, 7.10.1'}
CVE-2023-2858
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-15.html
2023-05-24T00:00:00
2023-05-26T00:00:00
2023-09-17T06:06:18.422481
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'}
CVE-2023-2360
Sensitive information disclosure due to CORS misconfiguration. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.2.0-135.
https://security-advisory.acronis.com/advisories/SEC-4215
2023-04-27T19:07:59.822Z
2023-04-28T11:10:46.100Z
2023-04-28T11:10:46.100Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Infrastructure', 'Versions': 'unspecified'}
CVE-2023-2730
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.
https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878
2023-05-16T00:00:00
2023-05-16T00:00:00
2023-05-16T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2225
The SEO ALert WordPress plugin through 1.59 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/0af475ba-5c02-4f62-876d-6235a745bbd6
2023-04-21T10:41:54.429Z
2023-08-16T11:03:25.318Z
2023-08-16T11:03:25.318Z
{'Vendor': 'Unknown', 'Product': 'SEO ALert', 'Versions': '0'}
CVE-2023-2675
Improper Restriction of Excessive Authentication Attempts in GitHub repository linagora/twake prior to 2023.Q1.1223.
https://huntr.dev/bounties/474d3b39-1882-4d2c-b8f7-ff9f68f14cee
2023-05-12T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'linagora', 'Product': 'linagora/twake', 'Versions': 'unspecified'}
CVE-2023-2419
A vulnerability was found in Zhong Bang CRMEB 4.6.0. It has been declared as critical. This vulnerability affects the function videoUpload of the file \crmeb\app\services\system\attachment\SystemAttachmentServices.php. The manipulation of the argument filename leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227716.
https://vuldb.com/?id.227716
2023-04-28T16:56:37.249Z
2023-04-29T01:00:06.164Z
2023-10-22T19:10:52.942Z
{'Vendor': 'Zhong Bang', 'Product': 'CRMEB', 'Versions': '4.6.0'}
CVE-2023-2049
A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/ballot_up.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-225934 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225934
2023-04-14T07:41:48.119Z
2023-04-14T11:00:05.122Z
2023-10-22T09:54:59.490Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2897
The Brizy Page Builder plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 2.4.18. This is due to an implicit trust of user-supplied IP addresses in an 'X-Forwarded-For' HTTP header for the purpose of validating allowed IP addresses against a Maintenance Mode whitelist. Supplying a whitelisted IP address within the 'X-Forwarded-For' header allows maintenance mode to be bypassed and may result in the disclosure of potentially sensitive information or allow access to restricted functionality.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ae342dd9-2f5f-4356-8fb4-9a3e5f4f8316?source=cve
2023-05-25T17:46:23.832Z
2023-06-09T06:48:49.496Z
2023-06-09T06:48:49.496Z
{'Vendor': 'themefusecom', 'Product': 'Brizy – Page Builder', 'Versions': '*'}
CVE-2023-2194
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.
https://bugzilla.redhat.com/show_bug.cgi?id=2188396
2023-04-20T00:00:00
2023-04-20T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel: i2c: xgene-slimpro', 'Versions': 'Fixed in kernel v6.3-rc4'}
CVE-2023-2481
Compiler removal of buffer clearing in sli_se_opaque_import_key in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.
https://github.com/SiliconLabs/gecko_sdk
2023-05-02T13:57:02.209Z
2023-05-18T18:44:48.742Z
2023-05-18T18:44:48.742Z
{'Vendor': 'silabs.com', 'Product': 'Gecko Platform', 'Versions': '0'}
CVE-2023-2878
Kubernetes secrets-store-csi-driver in versions before 1.3.3 discloses service account tokens in logs.
https://github.com/kubernetes/kubernetes/issues/118419
2023-05-24T22:10:01.825Z
2023-06-07T14:35:10.295Z
2023-06-07T14:37:59.908Z
{'Vendor': 'Kubernetes', 'Product': 'secrets-store-csi-driver', 'Versions': '0, 1.3.3'}
CVE-2023-2602
A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
https://bugzilla.redhat.com/show_bug.cgi?id=2209114
2023-05-09T00:00:00
2023-06-06T00:00:00
2023-11-30T05:06:19.565354
{'Vendor': 'n/a', 'Product': 'libcap', 'Versions': 'NA'}
CVE-2023-2252
The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.
https://wpscan.com/vulnerability/9da6eede-10d0-4609-8b97-4a5d38fa8e69/
2023-04-24T13:20:39.810Z
2024-01-16T15:55:41.055Z
2024-01-16T15:55:41.055Z
{'Vendor': 'Unknown', 'Product': 'Directorist', 'Versions': '0'}
CVE-2023-2747
The initialization vector (IV) used by the secure engine (SE) for encrypting data stored in the SE flash memory is uninitialized. 
https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U2sFvQAJ?operationContext=S1
2023-05-16T20:15:31.493Z
2023-06-15T19:49:29.785Z
2023-06-15T19:49:29.785Z
{'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '2.0.0'}
CVE-2023-2317
DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
https://support.typora.io/What's-New-1.6/
2023-04-27T04:51:13.390Z
2023-08-19T05:35:36.603Z
2023-08-19T05:35:36.603Z
{'Vendor': 'Typora', 'Product': 'Typora', 'Versions': '0'}
CVE-2023-2069
An issue has been discovered in GitLab affecting all versions starting from 10.0 before 12.9.8, all versions starting from 12.10 before 12.10.7, all versions starting from 13.0 before 13.0.1. A user with the role of developer could use the import project feature to leak CI/CD variables.
https://gitlab.com/gitlab-org/gitlab/-/issues/407374
2023-04-14T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=10.0, <12.9.8, >=12.10, <12.10.7, >=13.0, <13.0.1'}
CVE-2023-2985
A use after free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service problem.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07db5e247ab5858439b14dd7cc1fe538b9efcf32
2023-05-30T00:00:00
2023-06-01T00:00:00
2023-06-01T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel version prior to l 6.3-rc1'}
CVE-2023-2086
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
https://www.wordfence.com/threat-intel/vulnerabilities/id/9efc782a-ec61-4741-81fd-a263a2739e16?source=cve
2023-04-14T20:31:32.849Z
2023-06-09T05:33:25.247Z
2023-06-09T05:33:25.247Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'}
CVE-2023-2205
A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-226970 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226970
2023-04-21T06:21:19.002Z
2023-04-21T07:00:05.285Z
2023-10-22T14:35:28.477Z
{'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'}
CVE-2023-2655
The Contact Form by WD WordPress plugin through 1.13.23 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
https://wpscan.com/vulnerability/b3f2d38f-8eeb-45e9-bb58-2957e416e1cd/
2023-05-11T12:32:48.856Z
2024-01-16T15:55:22.590Z
2024-01-16T15:55:22.590Z
{'Vendor': 'Unknown', 'Product': 'Contact Form by WD', 'Versions': '0'}
CVE-2023-2340
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2710
The video carousel slider with lightbox plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.0.22 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e88bb3a8-de24-46fb-a3e4-9ca3fdd4cca7?source=cve
2023-05-15T13:03:24.345Z
2023-05-16T02:04:29.448Z
2023-05-16T02:04:29.448Z
{'Vendor': 'nik00726', 'Product': 'video carousel slider with lightbox', 'Versions': '*'}
CVE-2023-2585
Keycloak's device authorization grant does not correctly validate the device code and client ID. An attacker client could abuse the missing validation to spoof a client consent request and trick an authorization admin into granting consent to a malicious OAuth client or possible unauthorized access to an existing OAuth client.
https://access.redhat.com/errata/RHSA-2023:3883
2023-05-08T19:39:58.370Z
2023-12-21T09:24:16.632Z
2023-12-21T09:24:16.632Z
{'Vendor': 'n/a', 'Product': 'keycloak', 'Versions': ''}
CVE-2023-2090
A vulnerability classified as critical has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is an unknown function of the file /admin/maintenance/view_designation.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226098 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226098
2023-04-15T08:35:21.085Z
2023-04-15T09:00:05.981Z
2023-10-22T14:01:18.266Z
{'Vendor': 'SourceCodester', 'Product': 'Employee and Visitor Gate Pass Logging System', 'Versions': '1.0'}
CVE-2023-2839
Divide By Zero in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/42dce889-f63d-4ea9-970f-1f20fc573d5f
2023-05-22T00:00:00
2023-05-22T00:00:00
2023-05-27T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-2993
A valid, authenticated user with limited privileges may be able to use specifically crafted web management server API calls to execute a limited number of commands on SMM v1, SMM v2, and FPC that the user does not normally have sufficient privileges to execute.
https://support.lenovo.com/us/en/product_security/LEN-127357
2023-05-30T16:27:50.393Z
2023-06-26T19:44:50.040Z
2023-06-26T19:44:50.040Z
{'Vendor': 'Lenovo', 'Product': 'System Management Module (SMM) ', 'Versions': 'various'}
CVE-2023-2643
A vulnerability classified as critical was found in SourceCodester File Tracker Manager System 1.0. This vulnerability affects unknown code of the file register/update_password.php of the component POST Parameter Handler. The manipulation of the argument new_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228772.
https://vuldb.com/?id.228772
2023-05-11T05:17:47.181Z
2023-05-11T06:31:03.763Z
2023-10-23T05:39:25.282Z
{'Vendor': 'SourceCodester', 'Product': 'File Tracker Manager System', 'Versions': '1.0'}
CVE-2023-2213
A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/products/manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226978 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226978
2023-04-21T06:29:05.107Z
2023-04-21T09:31:04.618Z
2023-10-22T14:45:15.062Z
{'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'}
CVE-2023-2706
The OTP Login Woocommerce & Gravity Forms plugin for WordPress is vulnerable to authentication bypass. This is due to the fact that when generating OTP codes for users to use in order to login via phone number, the plugin returns these codes in an AJAX response. This makes it possible for unauthenticated attackers to obtain login codes for administrators. This does require an attacker have access to the phone number configured for an account, which can be obtained via social engineering or reconnaissance.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b1b7b653-496f-467a-9513-4be1891f38ae?source=cve
2023-05-15T12:23:20.740Z
2023-05-17T01:58:49.447Z
2023-06-05T21:25:27.755Z
{'Vendor': 'xootix', 'Product': 'OTP Login Woocommerce & Gravity Forms', 'Versions': '*'}
CVE-2023-2356
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1.
https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896
2023-04-27T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-2478
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.9.7, all versions starting from 15.10 before 15.10.6, all versions starting from 15.11 before 15.11.2. Under certain conditions, a malicious unauthorized GitLab user may use a GraphQL endpoint to attach a malicious runner to any project.
https://gitlab.com/gitlab-org/gitlab/-/issues/409470
2023-05-02T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.4, <15.9.7, >=15.10, <15.10.6, >=15.11, <15.11.2'}
CVE-2023-2182
An issue has been discovered in GitLab EE affecting all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Under certain conditions when OpenID Connect is enabled on an instance, it may allow users who are marked as 'external' to become 'regular' users thus leading to privilege escalation for those users.
https://gitlab.com/gitlab-org/gitlab/-/issues/403012
2023-04-19T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.10, <15.10.5, >=15.11, <15.11.1'}
CVE-2023-2028
The Call Now Accessibility Button WordPress plugin before 1.1 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/0f1c1f1c-acdd-4c8a-bd5e-a21f4915e69f
2023-04-13T16:31:49.225Z
2023-07-10T12:40:57.309Z
2023-07-10T13:05:48.923Z
{'Vendor': 'Unknown', 'Product': 'Call Now Accessibility Button', 'Versions': '0'}
CVE-2023-2881
Storing Passwords in a Recoverable Format in GitHub repository pimcore/customer-data-framework prior to 3.3.10.
https://huntr.dev/bounties/db6c32f4-742e-4262-8fd5-cefd0f133416
2023-05-25T00:00:00
2023-05-25T00:00:00
2023-05-25T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'}
CVE-2023-2497
The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.0. This is due to missing or incorrect nonce validation on the 'import_settings' function. This makes it possible for unauthenticated attackers to exploit PHP Object Injection due to the use of unserialize() on the user supplied parameter via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/fbb601ce-a884-4894-af13-dab14885c7eb?source=cve
2023-05-03T14:46:27.855Z
2023-11-22T15:33:39.114Z
2023-11-22T15:33:39.114Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2244
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects an unknown part of the file /admin/orders/update_status.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227229 was assigned to this vulnerability.
https://vuldb.com/?id.227229
2023-04-22T15:50:22.630Z
2023-04-22T16:31:04.904Z
2023-10-22T14:59:53.147Z
{'Vendor': 'SourceCodester', 'Product': 'Online Eyewear Shop', 'Versions': '1.0'}
CVE-2023-2614
Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/1a5e6c65-2c5e-4617-9411-5b47a7e743a6
2023-05-10T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2301
The Contact Form Builder by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.9.1. This is due to missing nonce validation on the ls_parse_vcita_callback function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/61c39f5f-3b17-4e4d-824e-241159a73400?source=cve
2023-04-26T12:26:13.327Z
2023-06-03T04:35:15.116Z
2023-06-03T04:35:15.116Z
{'Vendor': 'eyale-vc', 'Product': 'Contact Form Builder by vcita', 'Versions': '*'}
CVE-2023-2751
The Upload Resume WordPress plugin through 1.2.0 does not validate the captcha parameter when uploading a resume via the resume_upload_form shortcode, allowing unauthenticated visitors to upload arbitrary media files to the site.
https://wpscan.com/vulnerability/1b0fe0ac-d0d1-473d-af5b-dad6217933d4
2023-05-17T06:26:03.200Z
2023-06-19T10:52:52.446Z
2023-06-19T10:52:52.446Z
{'Vendor': 'Unknown', 'Product': 'Upload Resume', 'Versions': '0'}
CVE-2023-2815
A vulnerability classified as critical was found in SourceCodester Online Jewelry Store 1.0. Affected by this vulnerability is an unknown functionality of the file supplier.php of the component POST Parameter Handler. The manipulation of the argument suppid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229429 was assigned to this vulnerability.
https://vuldb.com/?id.229429
2023-05-19T15:30:09.832Z
2023-05-19T16:31:03.368Z
2023-10-23T06:46:33.323Z
{'Vendor': 'SourceCodester', 'Product': 'Online Jewelry Store', 'Versions': '1.0'}
CVE-2023-2546
The WP User Switch plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.2. This is due to incorrect authentication checking in the 'wpus_allow_user_to_admin_bar_menu' function with the 'wpus_who_switch' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the username.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e89d912d-fa7a-4fb1-8872-95fa861c21ca?source=cve
2023-05-05T17:11:57.789Z
2023-06-06T01:55:07.908Z
2023-06-13T12:53:43.785Z
{'Vendor': 'iqbalrony', 'Product': 'WP User Switch', 'Versions': '*'}
CVE-2023-2053
A vulnerability, which was classified as critical, has been found in Campcodes Advanced Online Voting System 1.0. Affected by this issue is some unknown functionality of the file /admin/candidates_row.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225938 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225938
2023-04-14T07:42:05.144Z
2023-04-14T12:31:03.691Z
2023-10-22T09:59:51.962Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2950
Improper Authorization in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/612d13cf-2ef9-44ea-b8fb-e797948a9a86
2023-05-28T00:00:00
2023-05-28T00:00:00
2023-05-28T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2680
This CVE exists because of an incomplete fix for CVE-2021-3750. More specifically, the qemu-kvm package as released for Red Hat Enterprise Linux 9.1 via RHSA-2022:7967 included a version of qemu-kvm that was actually missing the fix for CVE-2021-3750.
https://access.redhat.com/security/cve/CVE-2023-2680
2023-05-12T09:57:43.190Z
2023-09-13T16:50:53.532Z
2023-09-13T16:50:53.532Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-2395
A vulnerability classified as problematic has been found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the component Web Management Interface. The manipulation of the argument Login.userAgent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227673 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227673
2023-04-28T11:49:07.265Z
2023-04-28T21:31:03.804Z
2023-10-22T18:57:27.923Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2141
An unsafe .NET object deserialization in DELMIA Apriso Release 2017 through Release 2022 could lead to post-authentication remote code execution.
https://www.3ds.com/vulnerability/advisories
2023-04-18T07:52:31.574Z
2023-04-21T15:48:39.800Z
2023-04-21T15:48:39.800Z
{'Vendor': 'Dassault Systèmes', 'Product': 'DELMIA Apriso', 'Versions': 'Apriso 2017 Golden, Apriso 2018 Golden, Apriso 2019 Golden, Apriso 2020 Golden, Apriso 2021 Golden, Apriso 2022 Golden'}
CVE-2023-2511
null
null
2023-05-04T00:00:00
null
2023-05-12T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2842
The WP Inventory Manager WordPress plugin before 2.1.0.14 does not have CSRF checks, which could allow attackers to make logged-in admins delete Inventory Items via a CSRF attack
https://wpscan.com/vulnerability/0357ecc7-56f5-4843-a928-bf2d3ce75596
2023-05-22T20:54:42.850Z
2023-06-27T13:17:17.414Z
2023-06-27T13:17:17.414Z
{'Vendor': 'Unknown', 'Product': 'WP Inventory Manager', 'Versions': '0'}
CVE-2023-2907
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Marksoft allows SQL Injection.This issue affects Marksoft: through Mobile:v.7.1.7 ; Login:1.4 ; API:20230605.
https://www.usom.gov.tr/bildirim/tr-23-0363
2023-05-26T08:11:11.095Z
2023-06-19T12:41:53.278Z
2023-06-19T12:41:53.278Z
{'Vendor': 'Marksoft', 'Product': 'Marksoft', 'Versions': '0'}
CVE-2023-2004
null
null
2023-04-12T00:00:00
null
2023-05-26T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2454
schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.
https://access.redhat.com/security/cve/CVE-2023-2454
2023-05-01T00:00:00
2023-06-09T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'postgresql', 'Versions': 'PostgreSQL 15.3, PostgreSQL 14.8, PostgreSQL 13.11, PostgreSQL 12.15, PostgreSQL 11.20'}
CVE-2023-2287
The Orbit Fox by ThemeIsle WordPress plugin before 2.10.24 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.
https://wpscan.com/vulnerability/1b36a184-2138-4a65-8940-07e7764669bb
2023-04-25T19:27:58.424Z
2023-05-30T07:49:17.119Z
2023-05-30T07:49:17.119Z
{'Vendor': 'Unknown', 'Product': 'Orbit Fox by ThemeIsle', 'Versions': '0'}
CVE-2023-2638
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.   Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.  This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683
2023-05-10T20:31:39.989Z
2023-06-13T20:25:03.375Z
2023-06-13T20:25:03.375Z
{'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk System Services', 'Versions': '<= 6.20'}
CVE-2023-2268
Plane version 0.7.1 allows an unauthenticated attacker to view all stored server files of all users.
https://fluidattacks.com/advisories/giardino/
2023-04-24T23:54:14.636Z
2023-07-15T18:37:04.977Z
2023-07-15T18:37:04.977Z
{'Vendor': 'Plane', 'Product': 'Plane', 'Versions': '0.7.1'}
CVE-2023-2792
Mattermost fails to sanitize ephemeral error messages, allowing an attacker to obtain arbitrary message contents by a specially crafted /groupmsg command.
https://mattermost.com/security-updates/
2023-05-18T12:10:39.031Z
2023-06-16T09:01:43.650Z
2023-06-16T09:01:43.650Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10, 7.9.4, 7.8.5, 7.10.1'}
CVE-2023-2854
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-17.html
2023-05-24T00:00:00
2023-05-26T00:00:00
2023-09-17T06:06:20.020893
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'}
CVE-2023-2507
CleverTap Cordova Plugin version 2.6.2 allows a remote attacker to execute JavaScript code in any application that is opened via a specially constructed deeplink by an attacker. This is possible because the plugin does not correctly validate the data coming from the deeplinks before using them.
https://fluidattacks.com/advisories/maiden/
2023-05-03T22:24:15.786Z
2023-07-15T18:45:18.866Z
2023-07-15T18:45:18.866Z
{'Vendor': 'CleverTap', 'Product': 'Cordova Plugin', 'Versions': '2.6.2'}
CVE-2023-2157
A heap-based buffer overflow vulnerability was found in the ImageMagick package that can lead to the application crashing.
https://bugzilla.redhat.com/show_bug.cgi?id=2208537
2023-04-18T00:00:00
2023-06-06T00:00:00
2023-08-24T02:06:25.384196
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'ImageMagick 7.1.1-9'}
CVE-2023-2442
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A specially crafted merge request could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims.
https://gitlab.com/gitlab-org/gitlab/-/issues/409346
2023-05-01T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2911
If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly due to a stack overflow. This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
https://kb.isc.org/docs/cve-2023-2911
2023-05-26T11:20:45.872Z
2023-06-21T16:26:36.587Z
2023-06-21T16:26:36.587Z
{'Vendor': 'ISC', 'Product': 'BIND 9', 'Versions': '9.16.33, 9.18.7, 9.16.33-S1, 9.18.11-S1'}
CVE-2023-2291
Static credentials exist in the PostgreSQL data used in ManageEngine Access Manager Plus (AMP) build 4309, ManageEngine Password Manager Pro, and ManageEngine PAM360. These credentials could allow a malicious actor to modify configuration data that would escalate their permissions from that of a low-privileged user to an Administrative user.
https://tenable.com/security/research/tra-2023-16
2023-04-25T00:00:00
2023-04-26T00:00:00
2023-04-26T00:00:00
{'Vendor': 'n/a', 'Product': 'Zoho ManageEngine Multiple Products', 'Versions': 'All'}
CVE-2023-2784
Mattermost fails to verify if the requestor is a sysadmin or not, before allowing `install` requests to the Apps allowing a regular user send install requests to the Apps.
https://mattermost.com/security-updates
2023-05-18T10:27:20.883Z
2023-06-16T08:41:59.270Z
2023-06-16T08:41:59.270Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost App Framework', 'Versions': '0, 0, 7.10.0, v7.8.5, v7.9.4, v7.10.1'}
CVE-2023-2100
A vulnerability classified as problematic was found in SourceCodester Vehicle Service Management System 1.0. This vulnerability affects unknown code of the file /admin/report/index.php. The manipulation of the argument date_end leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226108.
https://vuldb.com/?id.226108
2023-04-15T09:12:05.320Z
2023-04-15T12:31:02.994Z
2023-10-22T14:13:30.312Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2550
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b
2023-05-05T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-2803
The Ultimate Addons for Contact Form 7 WordPress plugin before 3.1.29 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/ec640d47-bb22-478d-9668-1dab72f12f8d
2023-05-18T20:38:01.754Z
2023-08-14T19:10:17.443Z
2024-01-16T15:54:03.225Z
{'Vendor': 'Unknown', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': '0'}
CVE-2023-2946
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/e550f4b0-945c-4886-af7f-ee0dc30b2a08
2023-05-27T00:00:00
2023-05-27T00:00:00
2023-05-27T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2045
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ipekyolu Software Auto Damage Tracking Software allows SQL Injection.This issue affects Auto Damage Tracking Software: before 4.
https://www.usom.gov.tr/bildirim/tr-23-0289
2023-04-14T07:02:35.616Z
2023-05-24T13:35:48.498Z
2023-05-24T13:35:48.498Z
{'Vendor': 'Ipekyolu Software', 'Product': 'Auto Damage Tracking Software', 'Versions': '0'}
CVE-2023-2415
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_logout_callback function in versions up to, and including, 4.2.10. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to logout a vctia connected account which would cause a denial of service on the appointment scheduler.
https://www.wordfence.com/threat-intel/vulnerabilities/id/731cbeed-d4aa-448f-878a-8c51a3da4e18?source=cve
2023-04-28T16:37:09.494Z
2023-06-03T04:35:15.529Z
2023-06-03T04:35:15.529Z
{'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'}
CVE-2023-2696
A vulnerability was found in SourceCodester Online Exam System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /matkul/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228977 was assigned to this vulnerability.
https://vuldb.com/?id.228977
2023-05-14T07:56:39.849Z
2023-05-14T11:00:04.623Z
2023-10-23T06:18:29.321Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2679
Data leakage in Adobe connector in Snow Software SPE 9.27.0 on Windows allows privileged user to observe other users data.
https://community.snowsoftware.com/s/feed/0D56M00009Ex9dySAB
2023-05-12T09:08:48.538Z
2023-05-17T12:55:58.193Z
2023-05-17T12:56:03.381Z
{'Vendor': 'Snow Software', 'Product': 'SPE SLM', 'Versions': '9.27.0'}
CVE-2023-2383
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been classified as problematic. This affects an unknown part of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227661 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227661
2023-04-28T11:48:21.320Z
2023-04-28T17:31:03.442Z
2023-10-22T18:42:49.849Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2229
The Quick Post Duplicator for WordPress is vulnerable to SQL Injection via the ‘post_id’ parameter in versions up to, and including, 2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/34e31a0f-27de-4536-9a7e-b8f68e557b3f?source=cve
2023-04-21T13:11:25.946Z
2023-08-31T05:33:05.292Z
2023-08-31T05:33:05.292Z
{'Vendor': 'rahulsingh74388', 'Product': 'Quick Post Duplicator', 'Versions': '*'}
CVE-2023-2697
A vulnerability classified as critical has been found in SourceCodester Online Exam System 1.0. Affected is an unknown function of the file /jurusan/data of the component POST Parameter Handler. The manipulation of the argument columns[1][data] leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-228978 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228978
2023-05-14T07:56:41.545Z
2023-05-14T11:31:03.337Z
2023-10-23T06:19:42.485Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2678
A vulnerability has been found in SourceCodester File Tracker Manager System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /file_manager/admin/save_user.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228892.
https://vuldb.com/?id.228892
2023-05-12T08:19:06.467Z
2023-05-12T09:31:04.719Z
2023-10-23T06:07:29.853Z
{'Vendor': 'SourceCodester', 'Product': 'File Tracker Manager System', 'Versions': '1.0'}
CVE-2023-2382
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument sysLogInfo.serverName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227660
2023-04-28T11:48:17.622Z
2023-04-28T17:00:06.639Z
2023-10-22T18:41:36.697Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2228
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.1.0.
https://huntr.dev/bounties/619fb490-69ad-4a2a-b686-4c42a62404a9
2023-04-21T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-2101
A vulnerability, which was classified as problematic, has been found in moxi624 Mogu Blog v2 up to 5.2. This issue affects the function uploadPictureByUrl of the file /mogu-picture/file/uploadPicsByUrl. The manipulation of the argument urlList leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226109 was assigned to this vulnerability.
https://vuldb.com/?id.226109
2023-04-15T09:22:03.992Z
2023-04-15T12:31:03.981Z
2023-10-22T14:14:43.458Z
{'Vendor': 'moxi624', 'Product': 'Mogu Blog v2', 'Versions': '5.0, 5.1, 5.2'}
CVE-2023-2551
PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1.
https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a
2023-05-05T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
CVE-2023-2802
The Ultimate Addons for Contact Form 7 WordPress plugin before 3.1.29 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/c5cc136a-2fa6-44ff-b5b5-26d367937df9
2023-05-18T20:35:32.992Z
2023-08-14T19:10:20.199Z
2024-01-16T15:54:03.822Z
{'Vendor': 'Unknown', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': '0'}
CVE-2023-2947
Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/52534def-acab-4200-a79a-89ef4ce6a0b0
2023-05-27T00:00:00
2023-05-27T00:00:00
2023-05-27T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2044
A vulnerability has been found in Control iD iDSecure 4.7.29.1 and classified as problematic. This vulnerability affects unknown code of the component Dispositivos Page. The manipulation of the argument IP-DNS leads to cross site scripting. The attack can be initiated remotely. VDB-225922 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.225922
2023-04-14T06:55:48.287Z
2023-04-14T10:00:05.920Z
2023-10-22T09:51:19.858Z
{'Vendor': 'Control iD', 'Product': 'iDSecure', 'Versions': '4.7.29.1'}
CVE-2023-2414
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_save_settings_callback function in versions up to, and including, 4.2.10. This makes it possible for authenticated attackers with minimal permissions, such as a subscriber, to modify the plugins settings, upload media files, and inject malicious JavaScript.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3c99aab5-a995-44ae-bc14-09f73e6b22c5?source=cve
2023-04-28T16:32:42.560Z
2023-06-09T05:33:14.568Z
2023-06-09T05:33:14.568Z
{'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'}
CVE-2023-2290
A potential vulnerability in the LenovoFlashDeviceInterface SMI handler may allow an attacker with local access and elevated privileges to execute arbitrary code.
https://support.lenovo.com/us/en/product_security/LEN-106014
2023-04-25T19:41:49.164Z
2023-06-26T19:44:19.989Z
2023-06-26T19:44:19.989Z
{'Vendor': 'Lenovo', 'Product': 'ThinkPad ', 'Versions': 'various'}
CVE-2023-2785
Mattermost fails to properly truncate the postgres error log message of a search query failure allowing an attacker to cause the creation of large log files which can result in Denial of Service
https://mattermost.com/security-updates
2023-05-18T10:35:58.147Z
2023-06-16T09:07:28.235Z
2023-06-28T09:38:30.371Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.10.1, 7.9.4, 7.8.5, 7.1.10'}
CVE-2023-2855
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-12.html
2023-05-24T00:00:00
2023-05-26T00:00:00
2023-09-17T06:06:34.910049
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'}
CVE-2023-2156
A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
https://www.zerodayinitiative.com/advisories/ZDI-23-547/
2023-04-18T00:00:00
2023-05-09T00:00:00
2023-08-02T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel (RPL protocol)', 'Versions': 'Reproducible on the latest mainline.'}