CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-0587
|
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
|
https://www.tenable.com/security/research/tra-2023-5
|
2023-01-30T00:00:00
|
2023-02-01T00:00:00
|
2023-02-03T22:11:40.626064Z
|
{'Vendor': 'n/a', 'Product': 'Trend Micro Apex One', 'Versions': 'Build 11110'}
|
CVE-2023-0138
|
Heap buffer overflow in libphonenumber in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
|
2023-01-09T00:00:00
|
2023-01-10T00:00:00
|
2023-11-25T11:07:23.063244
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0568
|
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
|
https://bugs.php.net/bug.php?id=81746
|
2023-01-29T07:46:39.833Z
|
2023-02-16T06:34:04.101Z
|
2023-02-16T06:34:04.101Z
|
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.x, 8.1.x, 8.2.x'}
|
CVE-2023-0641
|
A vulnerability was found in PHPGurukul Employee Leaves Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file changepassword.php. The manipulation of the argument newpassword/confirmpassword leads to weak password requirements. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-220021 was assigned to this vulnerability.
|
https://vuldb.com/?id.220021
|
2023-02-02T08:15:56.199Z
|
2023-02-02T08:16:53.067Z
|
2023-10-20T20:32:29.586Z
|
{'Vendor': 'PHPGurukul', 'Product': 'Employee Leaves Management System', 'Versions': '1.0'}
|
CVE-2023-0704
|
Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low)
|
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
|
2023-02-06T00:00:00
|
2023-02-07T00:00:00
|
2023-09-30T10:07:24.307614
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0354
|
The Akuvox E11 web server can be accessed without any user authentication, and this could allow an attacker to access sensitive information, as well as create and download packet captures with known default URLs.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
|
2023-01-17T19:27:54.246Z
|
2023-03-13T20:04:43.540Z
|
2023-03-13T20:04:43.540Z
|
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
|
CVE-2023-0975
|
A vulnerability exists in Trellix Agent for Windows version 5.7.8 and earlier, that allows local users, during install/upgrade workflow, to replace one of the Agent’s executables before it can be executed. This allows the user to elevate their permissions.
|
https://kcm.trellix.com/corporate/index?page=content&id=SB10396
|
2023-02-23T04:06:37.513Z
|
2023-04-03T15:27:34.022Z
|
2023-04-03T15:27:34.022Z
|
{'Vendor': 'Trellix', 'Product': 'Trellix Agent', 'Versions': '5.7.8'}
|
CVE-2023-0426
|
ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves
the reported vulnerabilities in the product versions under maintenance.
An attacker who successfully exploited one or more of these vulnerabilities could cause the product to
stop or make the product inaccessible.
Stack-based Buffer Overflow vulnerability in ABB Freelance controllers AC 700F (conroller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects:
Freelance controllers AC 700F:
from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019 , through Freelance 2019 SP1, through Freelance 2019 SP1 FP1;
Freelance controllers AC 900F:
through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.
|
https://search.abb.com/library/Download.aspx?DocumentID=7PAA007517&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.68514131.339223974.1691382343-1911411808.1686627590
|
2023-01-20T10:59:38.448Z
|
2023-08-07T05:23:45.868Z
|
2023-08-07T05:23:45.868Z
|
{'Vendor': 'ABB', 'Product': ' Freelance controllers AC 700F', 'Versions': '9.0;0, 0, 0, 0, 0, 0, 0, 0'}
|
CVE-2023-0076
|
The Download Attachments WordPress plugin through 1.2.24 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/a0a44f8a-877c-40df-a3ba-b9b806ffb772
|
2023-01-05T04:20:08.106Z
|
2023-03-06T13:33:57.963Z
|
2023-03-06T13:33:57.963Z
|
{'Vendor': 'Unknown', 'Product': 'Download Attachments', 'Versions': '0'}
|
CVE-2023-0099
|
The Simple URLs WordPress plugin before 115 does not sanitise and escape some parameters before outputting them back in some pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8
|
2023-01-06T10:28:17.820Z
|
2023-02-13T14:32:05.647Z
| null |
{'Vendor': 'Unknown', 'Product': 'Simple URLs', 'Versions': '0'}
|
CVE-2023-0563
|
A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219717 was assigned to this vulnerability.
|
https://vuldb.com/?id.219717
|
2023-01-28T22:23:09.493Z
|
2023-01-28T22:24:06.709Z
|
2023-10-20T19:46:55.725Z
|
{'Vendor': 'PHPGurukul', 'Product': 'Bank Locker Management System', 'Versions': '1.0'}
|
CVE-2023-0133
|
Inappropriate implementation in in Permission prompts in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to bypass main origin permission delegation via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
|
2023-01-09T00:00:00
|
2023-01-10T00:00:00
|
2023-11-25T11:06:16.400048
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0830
|
A vulnerability classified as critical has been found in EasyNAS 1.1.0. Affected is the function system of the file /backup.pl. The manipulation leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-220950 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.220950
|
2023-02-14T16:12:10.052Z
|
2023-02-14T16:13:43.586Z
|
2023-10-20T21:04:12.606Z
|
{'Vendor': 'n/a', 'Product': 'EasyNAS', 'Versions': '1.1.0'}
|
CVE-2023-0021
|
Due to insufficient encoding of user input, SAP NetWeaver - versions 700, 701, 702, 731, 740, 750, allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password, which could lead to reflected Cross-Site scripting. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.
|
https://launchpad.support.sap.com/#/notes/3274920
|
2022-12-22T15:07:12.503Z
|
2023-03-14T04:34:41.118Z
|
2023-03-14T04:34:41.118Z
|
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver', 'Versions': '700, 701, 702, 731, 740, 750'}
|
CVE-2023-0471
|
Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html
|
2023-01-24T00:00:00
|
2023-01-24T00:00:00
|
2023-02-20T00:00:00
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0922
|
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
|
https://www.samba.org/samba/security/CVE-2023-0922.html
|
2023-02-20T00:00:00
|
2023-04-03T00:00:00
|
2023-09-17T08:06:29.031505
|
{'Vendor': 'n/a', 'Product': 'Samba', 'Versions': 'samba 4.18.1, samba 4.17.7, samba 4.16.10'}
|
CVE-2023-0888
|
An improper neutralization of directives in dynamically evaluated code vulnerability in the WiFi Battery embedded web server in versions L90/U70 and L92/U92 can be used to gain administrative access to the WiFi communication module. An authenticated user, having access to both the medical device WiFi network (such as a biomedical engineering staff member) and the specific B.Braun Battery Pack SP with WiFi web server credentials, could get administrative (root) access on the infusion pump communication module. This could be used as a vector to start further attacks
|
https://www.bbraun.com/productsecurity
|
2023-02-17T09:22:21.832Z
|
2023-03-13T08:14:32.358Z
|
2023-03-13T08:14:32.358Z
|
{'Vendor': 'B. Braun ', 'Product': 'Space Battery Pack SP with Wi-Fi', 'Versions': '0, 0'}
|
CVE-2023-0867
|
Multiple stored and reflected cross-site scripting vulnerabilities in webapp jsp pages in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to confidential session information. Users
should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and
Horizon installation instructions state that they are intended for installation
within an organization's private networks and should not be directly accessible
from the Internet.
|
https://github.com/OpenNMS/opennms/pull/5765
|
2023-02-16T18:23:18.131Z
|
2023-02-23T14:49:30.832Z
|
2023-02-27T18:55:07.981Z
|
{'Vendor': 'The OpenNMS Group', 'Product': 'Meridian', 'Versions': '2020.1.0, 2021.1.0, 2022.1.0, 2023.1.0'}
|
CVE-2023-0164
|
OrangeScrum version 2.0.11 allows an authenticated external attacker to execute arbitrary commands on the server. This is possible because the application injects an attacker-controlled parameter into a system function.
|
https://fluidattacks.com/advisories/queen/
|
2023-01-10T00:00:00
|
2023-01-18T00:00:00
|
2023-01-18T00:00:00
|
{'Vendor': 'n/a', 'Product': 'OrangeScrum', 'Versions': '2.0.11'}
|
CVE-2023-0534
|
A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file admin/expense_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219603.
|
https://vuldb.com/?id.219603
|
2023-01-27T10:42:09.812Z
|
2023-01-27T10:42:36.207Z
|
2023-10-20T19:40:49.682Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-0758
|
A vulnerability was found in glorylion JFinalOA 1.0.2 and classified as critical. This issue affects some unknown processing of the file src/main/java/com/pointlion/mvc/common/model/SysOrg.java. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220469 was assigned to this vulnerability.
|
https://vuldb.com/?id.220469
|
2023-02-09T10:59:11.691Z
|
2023-02-09T10:59:53.003Z
|
2023-10-20T20:54:27.209Z
|
{'Vendor': 'glorylion', 'Product': 'JFinalOA', 'Versions': '1.0.2'}
|
CVE-2023-0308
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
|
https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69
|
2023-01-15T00:00:00
|
2023-01-15T00:00:00
|
2023-01-15T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-0934
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.
|
https://huntr.dev/bounties/cd213098-5bab-487f-82c7-13698ad43b51
|
2023-02-21T00:00:00
|
2023-02-21T00:00:00
|
2023-02-21T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-0467
|
The WP Dark Mode WordPress plugin before 4.0.8 does not properly sanitize the style parameter in shortcodes before using it to load a PHP template. This leads to Local File Inclusion on servers where non-existent directories may be traversed, or when chained with another vulnerability allowing arbitrary directory creation.
|
https://wpscan.com/vulnerability/8eb431a6-59a5-4cee-84e0-156c0b31cfc4
|
2023-01-24T14:43:46.549Z
|
2023-03-27T15:37:26.271Z
|
2023-03-27T15:37:26.271Z
|
{'Vendor': 'Unknown', 'Product': 'WP Dark Mode', 'Versions': '0'}
|
CVE-2023-0037
|
The 10Web Map Builder for Google Maps WordPress plugin before 1.0.73 does not properly sanitise and escape some parameters before using them in an SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
|
https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56
|
2023-01-03T13:33:27.282Z
|
2023-03-13T16:03:32.276Z
|
2023-03-13T16:03:32.276Z
|
{'Vendor': 'Unknown', 'Product': '10Web Map Builder for Google Maps', 'Versions': '0'}
|
CVE-2023-0522
|
The Enable/Disable Auto Login when Register WordPress plugin through 1.1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
|
https://wpscan.com/vulnerability/c7984bfb-86a3-4530-90ae-17ab39af1c54
|
2023-01-26T21:37:29.943Z
|
2023-05-08T13:58:07.769Z
|
2023-05-08T13:58:07.769Z
|
{'Vendor': 'Unknown', 'Product': 'Enable/Disable Auto Login when Register', 'Versions': '0'}
|
CVE-2023-0488
|
Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.
|
https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a
|
2023-01-25T00:00:00
|
2023-01-26T00:00:00
|
2023-01-26T00:00:00
|
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
|
CVE-2023-0172
|
The Juicer WordPress plugin before 1.11 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/c8982b8d-985f-4a5d-840d-e8be7c3405bd
|
2023-01-11T03:09:39.011Z
|
2023-03-13T16:03:33.143Z
|
2023-03-13T16:03:33.143Z
|
{'Vendor': 'Unknown', 'Product': 'Embed, curate & aggregate social media feeds into your website using JUICER', 'Versions': '0'}
|
CVE-2023-0871
|
XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.
|
https://github.com/OpenNMS/opennms/pull/6355
|
2023-02-16T18:29:35.727Z
|
2023-08-11T16:13:50.714Z
|
2023-08-22T18:29:33.329Z
|
{'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8, 0'}
|
CVE-2023-0060
|
The Responsive Gallery Grid WordPress plugin before 2.3.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/be2fc859-3158-4f06-861d-382381a7551b
|
2023-01-05T04:18:32.308Z
|
2023-02-13T14:32:06.427Z
| null |
{'Vendor': 'Unknown', 'Product': 'Responsive Gallery Grid', 'Versions': '0'}
|
CVE-2023-0430
|
Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1.
|
https://www.mozilla.org/security/advisories/mfsa2023-04/
|
2023-01-20T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
|
CVE-2023-0963
|
A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file Users.php of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221633 was assigned to this vulnerability.
|
https://vuldb.com/?id.221633
|
2023-02-22T18:08:12.918Z
|
2023-02-22T18:12:53.599Z
|
2023-10-20T21:43:19.556Z
|
{'Vendor': 'SourceCodester', 'Product': 'Music Gallery Site', 'Versions': '1.0'}
|
CVE-2023-0125
|
A vulnerability was found in Control iD Gerencia Web 1.30. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability.
|
https://vuldb.com/?id.217717
|
2023-01-09T20:49:21.260Z
|
2023-01-09T20:51:06.425Z
|
2023-10-20T18:06:50.252Z
|
{'Vendor': 'Control iD', 'Product': 'Gerencia Web', 'Versions': '1.30'}
|
CVE-2023-0575
|
External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py.
This issue affects Yugabyte DB: Lesser then 2.2.0.0
|
https://www.yugabyte.com/
|
2023-01-30T08:16:20.523Z
|
2023-02-09T16:12:46.327Z
|
2023-11-10T22:22:52.652Z
|
{'Vendor': 'YugabyteDB', 'Product': 'YugabyteDB', 'Versions': '2.0'}
|
CVE-2023-0719
|
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_sort_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/9b26604b-2423-4130-b0ef-8f63a392c760
|
2023-02-07T16:27:32.352Z
|
2023-02-07T22:56:45.358Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0349
|
The Akuvox E11 libvoice library provides unauthenticated access to the camera capture for image and video. This could allow an attacker to view and record image and video from the camera.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
|
2023-01-17T19:26:25.206Z
|
2023-03-13T20:23:34.393Z
|
2023-03-13T20:23:34.393Z
|
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
|
CVE-2023-0918
|
A vulnerability has been found in codeprojects Pharmacy Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file add.php of the component Avatar Image Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221494 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221494
|
2023-02-19T08:19:07.383Z
|
2023-02-19T08:19:27.685Z
|
2023-10-20T21:31:03.006Z
|
{'Vendor': 'codeprojects', 'Product': 'Pharmacy Management System', 'Versions': '1.0'}
|
CVE-2023-0298
|
Incorrect Authorization in GitHub repository firefly-iii/firefly-iii prior to 5.8.0.
|
https://huntr.dev/bounties/9689052c-c1d7-4aae-aa08-346c9b6e04ed
|
2023-01-14T00:00:00
|
2023-01-14T00:00:00
|
2023-03-02T00:00:00
|
{'Vendor': 'firefly-iii', 'Product': 'firefly-iii/firefly-iii', 'Versions': 'unspecified'}
|
CVE-2023-0762
|
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting designations, which could allow attackers to make logged in admins delete arbitrary designations via a CSRF attack
|
https://wpscan.com/vulnerability/9be952e0-d8ae-440f-8819-cb19485f35f3
|
2023-02-09T13:57:40.858Z
|
2023-05-15T12:15:32.523Z
|
2023-05-15T12:15:32.523Z
|
{'Vendor': 'Unknown', 'Product': 'Clock In Portal- Staff & Attendance Management', 'Versions': '0'}
|
CVE-2023-0332
|
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been classified as critical. Affected is an unknown function of the file admin/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218472.
|
https://vuldb.com/?id.218472
|
2023-01-17T07:27:15.368Z
|
2023-01-17T07:29:05.823Z
|
2023-10-20T19:27:24.388Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
|
CVE-2023-0627
|
Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).This issue affects Docker Desktop: 4.11.X.
|
https://docs.docker.com/desktop/release-notes/#4120
|
2023-02-01T22:31:05.774Z
|
2023-09-25T15:31:58.782Z
|
2023-09-25T15:31:58.782Z
|
{'Vendor': 'Docker Inc.', 'Product': 'Docker Desktop', 'Versions': '4.11.x'}
|
CVE-2023-0277
|
The WC Fields Factory WordPress plugin through 4.1.5 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
|
https://wpscan.com/vulnerability/69ffb2f1-b291-49bf-80a8-08d03ceca53b
|
2023-01-13T08:59:18.116Z
|
2023-04-17T12:17:40.775Z
|
2023-04-17T12:17:40.775Z
|
{'Vendor': 'Unknown', 'Product': 'WC Fields Factory', 'Versions': '0'}
|
CVE-2023-0559
|
The GS Portfolio for Envato WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/e5549261-66e2-4a5e-8781-bc555b629ccc
|
2023-01-27T23:06:50.923Z
|
2023-02-21T08:50:46.871Z
|
2023-02-21T08:50:46.871Z
|
{'Vendor': 'Unknown', 'Product': 'GS Portfolio for Envato', 'Versions': '0'}
|
CVE-2023-0365
|
The React Webcam WordPress plugin through 1.2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/d268d7a3-82fd-4444-bc0e-27c7cc279b5a
|
2023-01-18T06:56:46.874Z
|
2023-03-20T15:52:09.937Z
|
2023-03-20T15:52:09.937Z
|
{'Vendor': 'Unknown', 'Product': 'React Webcam', 'Versions': '0'}
|
CVE-2023-0735
|
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.5.4.
|
https://huntr.dev/bounties/8bc78cb1-b10b-4152-842e-ceb999fc5508
|
2023-02-07T00:00:00
|
2023-02-07T00:00:00
|
2023-02-07T00:00:00
|
{'Vendor': 'wallabag', 'Product': 'wallabag/wallabag', 'Versions': 'unspecified'}
|
CVE-2023-0220
|
The Pinpoint Booking System WordPress plugin before 2.9.9.2.9 does not validate and escape one of its shortcode attributes before using it in a SQL statement, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks.
|
https://wpscan.com/vulnerability/d6d976be-31d1-419d-8729-4a36fbd2755c
|
2023-01-11T15:31:54.840Z
|
2023-02-13T14:32:08.000Z
| null |
{'Vendor': 'Unknown', 'Product': 'Pinpoint Booking System', 'Versions': '0'}
|
CVE-2023-0670
|
Ulearn version a5a7ca20de859051ea0470542844980a66dfc05d allows an attacker with administrator permissions to obtain remote code execution on the server through the image upload functionality. This occurs because the application does not validate that the uploaded image is actually an image.
|
https://fluidattacks.com/advisories/scott/
|
2023-02-03T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Ulearn', 'Versions': 'a5a7ca20de859051ea0470542844980a66dfc05d'}
|
CVE-2023-0959
|
Bhima version 1.27.0 allows a remote attacker to update the privileges of any account registered in the application via a malicious link sent to an administrator. This is possible because the application is vulnerable to CSRF.
|
https://github.com/IMA-WorldHealth/bhima/
|
2023-02-22T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Bhima', 'Versions': '1.27.0'}
|
CVE-2023-0723
|
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_move_object function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc01108f-e781-484b-997a-c1d4e218a3f4
|
2023-02-07T17:17:23.195Z
|
2023-02-07T22:57:37.080Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0689
|
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_first_name' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about arbitrary form submissions, including the submitter's first name.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/356cf06e-16e7-438b-83b5-c8a52a21f903?source=cve
|
2023-02-06T20:52:00.344Z
|
2023-08-31T05:33:05.767Z
|
2023-08-31T05:33:05.767Z
|
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder', 'Versions': '*'}
|
CVE-2023-0373
|
The Lightweight Accordion WordPress plugin before 1.5.15 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/fe60ea83-b584-465a-8128-b7358d8da3af
|
2023-01-18T07:14:51.631Z
|
2023-02-13T14:32:09.595Z
| null |
{'Vendor': 'Unknown', 'Product': 'Lightweight Accordion', 'Versions': '0'}
|
CVE-2023-0666
|
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
|
https://takeonme.org/cves/CVE-2023-0666.html
|
2023-02-03T22:06:14.542Z
|
2023-06-07T02:25:27.974Z
|
2023-06-07T02:42:41.249Z
|
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0, 4.0.6'}
|
CVE-2023-0236
|
The Tutor LMS WordPress plugin before 2.0.10 does not sanitise and escape the reset_key and user_id parameters before outputting then back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
https://wpscan.com/vulnerability/503835db-426d-4b49-85f7-c9a20d6ff5b8
|
2023-01-12T11:40:16.049Z
|
2023-02-06T19:59:21.460Z
| null |
{'Vendor': 'Unknown', 'Product': 'Tutor LMS', 'Versions': '0'}
|
CVE-2023-0518
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. It was possible to trigger a DoS attack by uploading a malicious Helm chart.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/383082
|
2023-01-26T00:00:00
|
2023-02-13T00:00:00
|
2023-02-13T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=14.0, <15.6.7, >=15.7, <15.7.6, >=15.8, <15.8.1'}
|
CVE-2023-0148
|
The Gallery Factory Lite WordPress plugin through 2.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/f15f2f2c-2053-4b93-8064-15b5243a4021
|
2023-01-10T10:58:05.126Z
|
2023-02-06T19:59:22.291Z
| null |
{'Vendor': 'Unknown', 'Product': 'Gallery Factory Lite', 'Versions': '0'}
|
CVE-2023-0324
|
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/page-login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-218426 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.218426
|
2023-01-16T14:33:28.552Z
|
2023-01-16T14:58:03.549Z
|
2023-10-20T18:23:55.228Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-0774
|
A vulnerability has been found in SourceCodester Medical Certificate Generator App 1.0 and classified as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument lastname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220558 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.220558
|
2023-02-10T11:50:14.600Z
|
2023-02-10T11:52:38.683Z
|
2023-10-20T20:55:40.370Z
|
{'Vendor': 'SourceCodester', 'Product': 'Medical Certificate Generator App', 'Versions': '1.0'}
|
CVE-2023-0261
|
The WP TripAdvisor Review Slider WordPress plugin before 10.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
|
https://wpscan.com/vulnerability/6a3b6752-8d72-4ab4-9d49-b722a947d2b0
|
2023-01-12T22:01:40.795Z
|
2023-02-13T14:32:10.388Z
| null |
{'Vendor': 'Unknown', 'Product': 'WP TripAdvisor Review Slider', 'Versions': '0'}
|
CVE-2023-0631
|
The Paid Memberships Pro WordPress plugin before 2.9.12 does not prevent subscribers from rendering shortcodes that concatenate attributes directly into an SQL query.
|
https://wpscan.com/vulnerability/19ef92fd-b493-4488-91f0-e6ba51362f79
|
2023-02-01T22:57:30.482Z
|
2023-03-20T15:52:10.755Z
|
2023-03-20T15:52:10.755Z
|
{'Vendor': 'Unknown', 'Product': 'Paid Memberships Pro', 'Versions': '1.5.5'}
|
CVE-2023-0646
|
A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220033 was assigned to this vulnerability.
|
https://vuldb.com/?id.220033
|
2023-02-02T13:26:01.834Z
|
2023-02-02T13:26:30.361Z
|
2023-10-20T20:33:42.756Z
|
{'Vendor': 'n/a', 'Product': 'dst-admin', 'Versions': '1.5.0'}
|
CVE-2023-0216
|
An invalid pointer dereference on read can be triggered when an
application tries to load malformed PKCS7 data with the
d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.
The result of the dereference is an application crash which could
lead to a denial of service attack. The TLS implementation in OpenSSL
does not call this function however third party applications might
call these functions on untrusted data.
|
https://www.openssl.org/news/secadv/20230207.txt
|
2023-01-11T12:01:06.675Z
|
2023-02-08T19:03:05.652Z
|
2023-02-24T14:44:35.753Z
|
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0'}
|
CVE-2023-0703
|
Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
|
2023-02-06T00:00:00
|
2023-02-07T00:00:00
|
2023-09-30T10:06:37.352959
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0353
|
Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
|
2023-01-17T19:27:33.597Z
|
2023-03-13T20:07:22.716Z
|
2023-03-13T20:07:22.716Z
|
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
|
CVE-2023-0580
|
Insecure Storage of Sensitive Information vulnerability in ABB My Control System (on-premise) allows an attacker who successfully exploited this vulnerability to gain access to the secure application data or take control of the application.
Of the services that make up the My Control System (on-premise) application, the following ones are affected by this vulnerability:
User Interface
System Monitoring1
Asset Inventory
This issue affects My Control System (on-premise): from 5.0;0 through 5.13.
|
https://search.abb.com/library/Download.aspx?DocumentID=7PAA007893&LanguageCode=en&DocumentPartId=&Action=Launch
|
2023-01-30T12:33:45.875Z
|
2023-04-06T16:19:51.149Z
|
2023-04-06T16:19:51.149Z
|
{'Vendor': 'ABB', 'Product': 'My Control System (on-premise)', 'Versions': '5.0;0'}
|
CVE-2023-0979
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MedData MedDataPACS allows SQL Injection.This issue affects MedDataPACS : before 2023-03-03.
|
https://www.usom.gov.tr/bildirim/tr-23-0129
|
2023-02-23T06:44:22.207Z
|
2023-03-06T14:10:49.417Z
|
2023-09-07T07:45:51.907Z
|
{'Vendor': 'MedData', 'Product': 'MedDataPACS ', 'Versions': '0'}
|
CVE-2023-0996
|
There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif. An attacker could exploit this through a crafted image file to cause a buffer overflow in linear memory during a memcpy call.
|
https://github.com/strukturag/libheif/pull/759
|
2023-02-24T03:17:18.663Z
|
2023-02-24T03:35:58.752Z
|
2023-02-24T03:35:58.752Z
|
{'Vendor': 'Struktur', 'Product': 'libheif', 'Versions': '1.14.2'}
|
CVE-2023-0095
|
The Page View Count WordPress plugin before 2.6.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f
|
2023-01-06T07:35:35.265Z
|
2023-02-06T19:59:23.089Z
| null |
{'Vendor': 'Unknown', 'Product': 'Page View Count', 'Versions': '0'}
|
CVE-2023-0241
|
pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.
|
https://github.com/pgadmin-org/pgadmin4/issues/5734
|
2023-01-12T00:00:00
|
2023-03-27T00:00:00
|
2023-03-27T00:00:00
|
{'Vendor': 'n/a', 'Product': 'pgadmin', 'Versions': 'pgadmin 6.19'}
|
CVE-2023-0611
|
A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219935.
|
https://vuldb.com/?id.219935
|
2023-02-01T13:23:00.625Z
|
2023-02-01T13:24:46.450Z
|
2023-10-20T19:50:35.460Z
|
{'Vendor': 'TRENDnet', 'Product': 'TEW-652BRP', 'Versions': '3.04B01'}
|
CVE-2023-0304
|
A vulnerability classified as critical has been found in SourceCodester Online Food Ordering System. This affects an unknown part of the file admin_class.php of the component Signup Module. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218385 was assigned to this vulnerability.
|
https://vuldb.com/?id.218385
|
2023-01-15T09:01:30.502Z
|
2023-01-15T11:58:04.380Z
|
2023-10-20T18:21:28.918Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': 'n/a'}
|
CVE-2023-0754
|
The affected products are vulnerable to an integer
overflow or wraparound, which could allow an attacker to crash the server and remotely
execute arbitrary code.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01
|
2023-02-08T20:15:58.394Z
|
2023-02-23T21:27:09.964Z
|
2023-02-23T21:27:09.964Z
|
{'Vendor': 'PTC', 'Product': 'ThingWorx Edge C-SDK', 'Versions': '0'}
|
CVE-2023-0884
| null | null |
2023-02-17T00:00:00
| null |
2023-02-23T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-0187
|
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read can lead to denial of service.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:43.753Z
|
2023-04-01T04:44:23.877Z
|
2023-04-01T04:44:23.877Z
|
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0538
|
The Campaign URL Builder WordPress plugin before 1.8.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/4869fdc7-4fc7-4917-bc00-b6ced9ccc871
|
2023-01-27T11:58:56.859Z
|
2023-03-13T16:03:33.950Z
|
2023-03-13T16:03:33.950Z
|
{'Vendor': 'Unknown', 'Product': 'Campaign URL Builder', 'Versions': '0'}
|
CVE-2023-0492
|
The GS Products Slider for WooCommerce WordPress plugin before 1.5.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/ea3b129d-32d8-40e3-b1af-8b92a760db23
|
2023-01-25T02:26:48.971Z
|
2023-02-21T08:50:47.672Z
|
2023-02-21T08:50:47.672Z
|
{'Vendor': 'Unknown', 'Product': 'GS Products Slider for WooCommerce', 'Versions': '0'}
|
CVE-2023-0168
|
The Olevmedia Shortcodes WordPress plugin through 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/e854efee-16fc-4379-9e66-d2883e01fb32
|
2023-01-11T03:09:09.086Z
|
2023-02-27T15:24:33.172Z
|
2023-02-27T15:24:33.172Z
|
{'Vendor': 'Unknown', 'Product': 'Olevmedia Shortcodes', 'Versions': '0'}
|
CVE-2023-0607
|
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
|
https://huntr.dev/bounties/9294743d-7818-4264-b973-59de027d549b
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
{'Vendor': 'projectsend', 'Product': 'projectsend/projectsend', 'Versions': 'unspecified'}
|
CVE-2023-0257
|
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fos/admin/index.php?page=menu of the component Menu Form. The manipulation of the argument Image with the input <?php system($_GET['c']); ?> leads to unrestricted upload. The attack can be launched remotely. The identifier VDB-218185 was assigned to this vulnerability.
|
https://vuldb.com/?id.218185
|
2023-01-12T21:09:17.469Z
|
2023-01-12T21:09:33.279Z
|
2023-10-20T18:14:09.484Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
|
CVE-2023-0742
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
|
https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad
|
2023-02-08T00:00:00
|
2023-02-08T00:00:00
|
2023-02-08T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-0312
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
|
https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9
|
2023-01-15T00:00:00
|
2023-01-15T00:00:00
|
2023-01-15T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-0191
|
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:46.459Z
|
2023-04-01T04:51:09.537Z
|
2023-04-01T04:51:09.537Z
|
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0938
|
A vulnerability classified as critical has been found in SourceCodester Music Gallery Site 1.0. This affects an unknown part of the file music_list.php of the component GET Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221553 was assigned to this vulnerability.
|
https://vuldb.com/?id.221553
|
2023-02-21T09:28:52.107Z
|
2023-02-21T09:30:25.360Z
|
2023-10-20T21:34:42.503Z
|
{'Vendor': 'SourceCodester', 'Product': 'Music Gallery Site', 'Versions': '1.0'}
|
CVE-2023-0892
|
The BizLibrary WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/54150be5-a53f-4b94-8ce5-04e073e3ab1f
|
2023-02-17T14:44:09.370Z
|
2023-05-15T12:15:34.079Z
|
2023-05-15T12:15:34.079Z
|
{'Vendor': 'Unknown', 'Product': 'BizLibrary', 'Versions': '0'}
|
CVE-2023-0484
|
The Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/e61fb245-0d7f-42b0-9b96-c17ade8c04c5
|
2023-01-24T20:38:26.290Z
|
2023-03-27T15:37:28.083Z
|
2023-03-27T15:37:28.083Z
|
{'Vendor': 'Unknown', 'Product': 'Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks', 'Versions': '0'}
|
CVE-2023-0200
|
NVIDIA DGX-2 contains a vulnerability in OFBD where a user with high privileges and a pre-conditioned heap can cause an access beyond a buffers end, which may lead to code execution, escalation of privileges, denial of service, and information disclosure.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5449
|
2023-01-11T05:48:51.778Z
|
2023-04-22T02:21:13.210Z
|
2023-04-22T02:21:13.210Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 1.08.00'}
|
CVE-2023-0650
|
A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The identifier of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability.
|
https://vuldb.com/?id.220037
|
2023-02-02T13:37:29.535Z
|
2023-02-02T13:38:51.044Z
|
2023-10-20T20:38:35.480Z
|
{'Vendor': 'n/a', 'Product': 'YAFNET', 'Versions': '3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.1.10, 3.1.11'}
|
CVE-2023-0345
|
The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. This password cannot be changed by the user.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
|
2023-01-17T19:23:07.627Z
|
2023-03-13T20:29:30.386Z
|
2023-03-13T20:29:30.386Z
|
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
|
CVE-2023-0715
|
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_clone_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/c3728280-3487-4cb2-8e37-f33811bc0a22
|
2023-02-07T16:02:32.377Z
|
2023-02-08T01:11:21.815Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0083
|
The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions,
OpenHarmony-v3.0.7 and prior versions
has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.
|
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md
|
2023-01-05T12:32:56.058Z
|
2023-03-10T10:44:22.877Z
|
2023-03-10T10:44:22.877Z
|
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': '3.0, 3.1'}
|
CVE-2023-0579
|
The YARPP WordPress plugin before 5.30.3 does not validate and escape some of its shortcode attributes before using them in SQL statement/s, which could allow any authenticated users, such as subscribers to perform SQL Injection attacks.
|
https://wpscan.com/vulnerability/574f7607-96d8-4ef8-b96c-0425ad7e7690
|
2023-01-30T11:13:36.310Z
|
2023-08-16T11:03:21.175Z
|
2023-08-16T11:03:21.175Z
|
{'Vendor': 'Unknown', 'Product': 'YARPP', 'Versions': '0'}
|
CVE-2023-0129
|
Heap buffer overflow in Network Service in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and specific interactions. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
|
2023-01-09T00:00:00
|
2023-01-10T00:00:00
|
2023-11-25T11:07:40.973066
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0980
|
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/registrations/update_status.php of the component Status Update Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221675.
|
https://vuldb.com/?id.221675
|
2023-02-23T11:05:34.862Z
|
2023-02-23T11:06:18.278Z
|
2023-10-20T21:46:59.114Z
|
{'Vendor': 'SourceCodester', 'Product': 'Yoga Class Registration System', 'Versions': '1.0'}
|
CVE-2023-0294
|
The Mediamatic – Media Library Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.8.1. This is due to missing or incorrect nonce validation on its AJAX actions function. This makes it possible for unauthenticated attackers to change image categories used by the plugin, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/d81ed8d9-4a7a-4b75-aab4-8e4dbd554f32
|
2023-01-13T19:46:10.874Z
|
2023-01-13T19:46:14.739Z
| null |
{'Vendor': 'plugincraft', 'Product': 'Mediamatic – Media Library Folders', 'Versions': '*'}
|
CVE-2023-0781
|
A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been declared as critical. This vulnerability affects the function query of the file removeOrder.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220624.
|
https://vuldb.com/?id.220624
|
2023-02-11T10:05:18.663Z
|
2023-02-11T10:06:45.744Z
|
2023-10-20T20:56:53.513Z
|
{'Vendor': 'SourceCodester', 'Product': 'Canteen Management System', 'Versions': '1.0'}
|
CVE-2023-0502
|
The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/c959f4ce-b6ea-4aee-9a98-aa98d2a62138
|
2023-01-25T10:08:31.434Z
|
2023-03-27T15:37:29.087Z
|
2023-03-27T15:37:29.087Z
|
{'Vendor': 'Unknown', 'Product': 'WP News', 'Versions': '0'}
|
CVE-2023-0152
|
The WP Multi Store Locator WordPress plugin through 2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/8281fce2-6f24-4d3f-895f-4d8694806609
|
2023-01-10T10:58:23.541Z
|
2023-06-05T13:39:00.208Z
|
2023-06-05T13:39:00.208Z
|
{'Vendor': 'Unknown', 'Product': 'WP Multi Store Locator', 'Versions': '0'}
|
CVE-2023-0851
|
Buffer overflow in CPCA Resource Download process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
|
https://www.canon-europe.com/support/product-security-latest-news/
|
2023-02-16T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
|
CVE-2023-0914
|
Improper Authorization in GitHub repository pixelfed/pixelfed prior to 0.11.4.
|
https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec
|
2023-02-19T00:00:00
|
2023-02-19T00:00:00
|
2023-02-19T00:00:00
|
{'Vendor': 'pixelfed', 'Product': 'pixelfed/pixelfed', 'Versions': 'unspecified'}
|
CVE-2023-0447
|
The My YouTube Channel plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the clear_all_cache function in versions up to, and including, 3.0.12.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to clear the plugin's cache.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/486b6a75-d101-4f3a-8436-6c23dd0ff200
|
2023-01-23T16:24:59.453Z
|
2023-01-23T16:30:26.228Z
|
2023-01-23T16:31:15.592Z
|
{'Vendor': 'urkekg', 'Product': 'My YouTube Channel', 'Versions': '*'}
|
CVE-2023-0017
|
An unauthenticated attacker in SAP NetWeaver AS for Java - version 7.50, due to improper access control, can attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data on the current system. This could allow the attacker to have full read access to user data, make modifications to user data, and make services within the system unavailable.
|
https://launchpad.support.sap.com/#/notes/3268093
|
2022-12-20T03:49:32.991Z
|
2023-01-10T03:18:57.927Z
| null |
{'Vendor': 'SAP', 'Product': 'NetWeaver AS for Java', 'Versions': '7.50'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.