CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-0587
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
https://www.tenable.com/security/research/tra-2023-5
2023-01-30T00:00:00
2023-02-01T00:00:00
2023-02-03T22:11:40.626064Z
{'Vendor': 'n/a', 'Product': 'Trend Micro Apex One', 'Versions': 'Build 11110'}
CVE-2023-0138
Heap buffer overflow in libphonenumber in Google Chrome prior to 109.0.5414.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
2023-01-09T00:00:00
2023-01-10T00:00:00
2023-11-25T11:07:23.063244
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0568
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification. 
https://bugs.php.net/bug.php?id=81746
2023-01-29T07:46:39.833Z
2023-02-16T06:34:04.101Z
2023-02-16T06:34:04.101Z
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.x, 8.1.x, 8.2.x'}
CVE-2023-0641
A vulnerability was found in PHPGurukul Employee Leaves Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file changepassword.php. The manipulation of the argument newpassword/confirmpassword leads to weak password requirements. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-220021 was assigned to this vulnerability.
https://vuldb.com/?id.220021
2023-02-02T08:15:56.199Z
2023-02-02T08:16:53.067Z
2023-10-20T20:32:29.586Z
{'Vendor': 'PHPGurukul', 'Product': 'Employee Leaves Management System', 'Versions': '1.0'}
CVE-2023-0704
Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
2023-02-06T00:00:00
2023-02-07T00:00:00
2023-09-30T10:07:24.307614
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0354
The Akuvox E11 web server can be accessed without any user authentication, and this could allow an attacker to access sensitive information, as well as create and download packet captures with known default URLs.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
2023-01-17T19:27:54.246Z
2023-03-13T20:04:43.540Z
2023-03-13T20:04:43.540Z
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
CVE-2023-0975
A vulnerability exists in Trellix Agent for Windows version 5.7.8 and earlier, that allows local users, during install/upgrade workflow, to replace one of the Agent’s executables before it can be executed. This allows the user to elevate their permissions.
https://kcm.trellix.com/corporate/index?page=content&id=SB10396
2023-02-23T04:06:37.513Z
2023-04-03T15:27:34.022Z
2023-04-03T15:27:34.022Z
{'Vendor': 'Trellix', 'Product': 'Trellix Agent', 'Versions': '5.7.8'}
CVE-2023-0426
ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves the reported vulnerabilities in the product versions under maintenance. An attacker who successfully exploited one or more of these vulnerabilities could cause the product to stop or make the product inaccessible. Stack-based Buffer Overflow vulnerability in ABB Freelance controllers AC 700F (conroller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects:  Freelance controllers AC 700F:  from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019 , through Freelance 2019 SP1, through Freelance 2019 SP1 FP1;  Freelance controllers AC 900F:  through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.
https://search.abb.com/library/Download.aspx?DocumentID=7PAA007517&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.68514131.339223974.1691382343-1911411808.1686627590
2023-01-20T10:59:38.448Z
2023-08-07T05:23:45.868Z
2023-08-07T05:23:45.868Z
{'Vendor': 'ABB', 'Product': ' Freelance controllers AC 700F', 'Versions': '9.0;0, 0, 0, 0, 0, 0, 0, 0'}
CVE-2023-0076
The Download Attachments WordPress plugin through 1.2.24 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/a0a44f8a-877c-40df-a3ba-b9b806ffb772
2023-01-05T04:20:08.106Z
2023-03-06T13:33:57.963Z
2023-03-06T13:33:57.963Z
{'Vendor': 'Unknown', 'Product': 'Download Attachments', 'Versions': '0'}
CVE-2023-0099
The Simple URLs WordPress plugin before 115 does not sanitise and escape some parameters before outputting them back in some pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/fd50f2d6-e420-4220-b485-73f33227e8f8
2023-01-06T10:28:17.820Z
2023-02-13T14:32:05.647Z
null
{'Vendor': 'Unknown', 'Product': 'Simple URLs', 'Versions': '0'}
CVE-2023-0563
A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219717 was assigned to this vulnerability.
https://vuldb.com/?id.219717
2023-01-28T22:23:09.493Z
2023-01-28T22:24:06.709Z
2023-10-20T19:46:55.725Z
{'Vendor': 'PHPGurukul', 'Product': 'Bank Locker Management System', 'Versions': '1.0'}
CVE-2023-0133
Inappropriate implementation in in Permission prompts in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to bypass main origin permission delegation via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
2023-01-09T00:00:00
2023-01-10T00:00:00
2023-11-25T11:06:16.400048
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0830
A vulnerability classified as critical has been found in EasyNAS 1.1.0. Affected is the function system of the file /backup.pl. The manipulation leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. VDB-220950 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.220950
2023-02-14T16:12:10.052Z
2023-02-14T16:13:43.586Z
2023-10-20T21:04:12.606Z
{'Vendor': 'n/a', 'Product': 'EasyNAS', 'Versions': '1.1.0'}
CVE-2023-0021
Due to insufficient encoding of user input, SAP NetWeaver - versions 700, 701, 702, 731, 740, 750, allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password, which could lead to reflected Cross-Site scripting. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.
https://launchpad.support.sap.com/#/notes/3274920
2022-12-22T15:07:12.503Z
2023-03-14T04:34:41.118Z
2023-03-14T04:34:41.118Z
{'Vendor': 'SAP_SE', 'Product': 'SAP NetWeaver', 'Versions': '700, 701, 702, 731, 740, 750'}
CVE-2023-0471
Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html
2023-01-24T00:00:00
2023-01-24T00:00:00
2023-02-20T00:00:00
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0922
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
https://www.samba.org/samba/security/CVE-2023-0922.html
2023-02-20T00:00:00
2023-04-03T00:00:00
2023-09-17T08:06:29.031505
{'Vendor': 'n/a', 'Product': 'Samba', 'Versions': 'samba 4.18.1, samba 4.17.7, samba 4.16.10'}
CVE-2023-0888
An improper neutralization of directives in dynamically evaluated code vulnerability in the WiFi Battery embedded web server in versions L90/U70 and L92/U92 can be used to gain administrative access to the WiFi communication module. An authenticated user, having access to both the medical device WiFi network (such as a biomedical engineering staff member) and the specific B.Braun Battery Pack SP with WiFi web server credentials, could get administrative (root) access on the infusion pump communication module. This could be used as a vector to start further attacks
https://www.bbraun.com/productsecurity
2023-02-17T09:22:21.832Z
2023-03-13T08:14:32.358Z
2023-03-13T08:14:32.358Z
{'Vendor': 'B. Braun ', 'Product': 'Space Battery Pack SP with Wi-Fi', 'Versions': '0, 0'}
CVE-2023-0867
Multiple stored and reflected cross-site scripting vulnerabilities in webapp jsp pages in multiple versions of OpenNMS Meridian and Horizon could allow an attacker access to confidential session information. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
https://github.com/OpenNMS/opennms/pull/5765
2023-02-16T18:23:18.131Z
2023-02-23T14:49:30.832Z
2023-02-27T18:55:07.981Z
{'Vendor': 'The OpenNMS Group', 'Product': 'Meridian', 'Versions': '2020.1.0, 2021.1.0, 2022.1.0, 2023.1.0'}
CVE-2023-0164
OrangeScrum version 2.0.11 allows an authenticated external attacker to execute arbitrary commands on the server. This is possible because the application injects an attacker-controlled parameter into a system function.
https://fluidattacks.com/advisories/queen/
2023-01-10T00:00:00
2023-01-18T00:00:00
2023-01-18T00:00:00
{'Vendor': 'n/a', 'Product': 'OrangeScrum', 'Versions': '2.0.11'}
CVE-2023-0534
A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file admin/expense_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219603.
https://vuldb.com/?id.219603
2023-01-27T10:42:09.812Z
2023-01-27T10:42:36.207Z
2023-10-20T19:40:49.682Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-0758
A vulnerability was found in glorylion JFinalOA 1.0.2 and classified as critical. This issue affects some unknown processing of the file src/main/java/com/pointlion/mvc/common/model/SysOrg.java. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220469 was assigned to this vulnerability.
https://vuldb.com/?id.220469
2023-02-09T10:59:11.691Z
2023-02-09T10:59:53.003Z
2023-10-20T20:54:27.209Z
{'Vendor': 'glorylion', 'Product': 'JFinalOA', 'Versions': '1.0.2'}
CVE-2023-0308
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69
2023-01-15T00:00:00
2023-01-15T00:00:00
2023-01-15T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-0934
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.
https://huntr.dev/bounties/cd213098-5bab-487f-82c7-13698ad43b51
2023-02-21T00:00:00
2023-02-21T00:00:00
2023-02-21T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-0467
The WP Dark Mode WordPress plugin before 4.0.8 does not properly sanitize the style parameter in shortcodes before using it to load a PHP template. This leads to Local File Inclusion on servers where non-existent directories may be traversed, or when chained with another vulnerability allowing arbitrary directory creation.
https://wpscan.com/vulnerability/8eb431a6-59a5-4cee-84e0-156c0b31cfc4
2023-01-24T14:43:46.549Z
2023-03-27T15:37:26.271Z
2023-03-27T15:37:26.271Z
{'Vendor': 'Unknown', 'Product': 'WP Dark Mode', 'Versions': '0'}
CVE-2023-0037
The 10Web Map Builder for Google Maps WordPress plugin before 1.0.73 does not properly sanitise and escape some parameters before using them in an SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
https://wpscan.com/vulnerability/33ab1fe2-6611-4f43-91ba-52c56f02ed56
2023-01-03T13:33:27.282Z
2023-03-13T16:03:32.276Z
2023-03-13T16:03:32.276Z
{'Vendor': 'Unknown', 'Product': '10Web Map Builder for Google Maps', 'Versions': '0'}
CVE-2023-0522
The Enable/Disable Auto Login when Register WordPress plugin through 1.1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
https://wpscan.com/vulnerability/c7984bfb-86a3-4530-90ae-17ab39af1c54
2023-01-26T21:37:29.943Z
2023-05-08T13:58:07.769Z
2023-05-08T13:58:07.769Z
{'Vendor': 'Unknown', 'Product': 'Enable/Disable Auto Login when Register', 'Versions': '0'}
CVE-2023-0488
Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.
https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a
2023-01-25T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
CVE-2023-0172
The Juicer WordPress plugin before 1.11 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/c8982b8d-985f-4a5d-840d-e8be7c3405bd
2023-01-11T03:09:39.011Z
2023-03-13T16:03:33.143Z
2023-03-13T16:03:33.143Z
{'Vendor': 'Unknown', 'Product': 'Embed, curate & aggregate social media feeds into your website using JUICER', 'Versions': '0'}
CVE-2023-0871
XXE injection in /rtc/post/ endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to XML external entity (XXE) injection, which can be used for instance to force Horizon to make arbitrary HTTP requests to internal and external services. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter and Moshe Apelbaum for reporting this issue.
https://github.com/OpenNMS/opennms/pull/6355
2023-02-16T18:29:35.727Z
2023-08-11T16:13:50.714Z
2023-08-22T18:29:33.329Z
{'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8, 0'}
CVE-2023-0060
The Responsive Gallery Grid WordPress plugin before 2.3.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/be2fc859-3158-4f06-861d-382381a7551b
2023-01-05T04:18:32.308Z
2023-02-13T14:32:06.427Z
null
{'Vendor': 'Unknown', 'Product': 'Responsive Gallery Grid', 'Versions': '0'}
CVE-2023-0430
Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird < 102.7.1.
https://www.mozilla.org/security/advisories/mfsa2023-04/
2023-01-20T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
CVE-2023-0963
A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file Users.php of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221633 was assigned to this vulnerability.
https://vuldb.com/?id.221633
2023-02-22T18:08:12.918Z
2023-02-22T18:12:53.599Z
2023-10-20T21:43:19.556Z
{'Vendor': 'SourceCodester', 'Product': 'Music Gallery Site', 'Versions': '1.0'}
CVE-2023-0125
A vulnerability was found in Control iD Gerencia Web 1.30. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability.
https://vuldb.com/?id.217717
2023-01-09T20:49:21.260Z
2023-01-09T20:51:06.425Z
2023-10-20T18:06:50.252Z
{'Vendor': 'Control iD', 'Product': 'Gerencia Web', 'Versions': '1.30'}
CVE-2023-0575
External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py. This issue affects Yugabyte DB: Lesser then 2.2.0.0
https://www.yugabyte.com/
2023-01-30T08:16:20.523Z
2023-02-09T16:12:46.327Z
2023-11-10T22:22:52.652Z
{'Vendor': 'YugabyteDB', 'Product': 'YugabyteDB', 'Versions': '2.0'}
CVE-2023-0719
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_sort_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/9b26604b-2423-4130-b0ef-8f63a392c760
2023-02-07T16:27:32.352Z
2023-02-07T22:56:45.358Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0349
The Akuvox E11 libvoice library provides unauthenticated access to the camera capture for image and video. This could allow an attacker to view and record image and video from the camera.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
2023-01-17T19:26:25.206Z
2023-03-13T20:23:34.393Z
2023-03-13T20:23:34.393Z
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
CVE-2023-0918
A vulnerability has been found in codeprojects Pharmacy Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file add.php of the component Avatar Image Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221494 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221494
2023-02-19T08:19:07.383Z
2023-02-19T08:19:27.685Z
2023-10-20T21:31:03.006Z
{'Vendor': 'codeprojects', 'Product': 'Pharmacy Management System', 'Versions': '1.0'}
CVE-2023-0298
Incorrect Authorization in GitHub repository firefly-iii/firefly-iii prior to 5.8.0.
https://huntr.dev/bounties/9689052c-c1d7-4aae-aa08-346c9b6e04ed
2023-01-14T00:00:00
2023-01-14T00:00:00
2023-03-02T00:00:00
{'Vendor': 'firefly-iii', 'Product': 'firefly-iii/firefly-iii', 'Versions': 'unspecified'}
CVE-2023-0762
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting designations, which could allow attackers to make logged in admins delete arbitrary designations via a CSRF attack
https://wpscan.com/vulnerability/9be952e0-d8ae-440f-8819-cb19485f35f3
2023-02-09T13:57:40.858Z
2023-05-15T12:15:32.523Z
2023-05-15T12:15:32.523Z
{'Vendor': 'Unknown', 'Product': 'Clock In Portal- Staff & Attendance Management', 'Versions': '0'}
CVE-2023-0332
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been classified as critical. Affected is an unknown function of the file admin/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218472.
https://vuldb.com/?id.218472
2023-01-17T07:27:15.368Z
2023-01-17T07:29:05.823Z
2023-10-20T19:27:24.388Z
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
CVE-2023-0627
Docker Desktop 4.11.x allows --no-windows-containers flag bypass via IPC response spoofing which may lead to Local Privilege Escalation (LPE).This issue affects Docker Desktop: 4.11.X.
https://docs.docker.com/desktop/release-notes/#4120
2023-02-01T22:31:05.774Z
2023-09-25T15:31:58.782Z
2023-09-25T15:31:58.782Z
{'Vendor': 'Docker Inc.', 'Product': 'Docker Desktop', 'Versions': '4.11.x'}
CVE-2023-0277
The WC Fields Factory WordPress plugin through 4.1.5 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
https://wpscan.com/vulnerability/69ffb2f1-b291-49bf-80a8-08d03ceca53b
2023-01-13T08:59:18.116Z
2023-04-17T12:17:40.775Z
2023-04-17T12:17:40.775Z
{'Vendor': 'Unknown', 'Product': 'WC Fields Factory', 'Versions': '0'}
CVE-2023-0559
The GS Portfolio for Envato WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/e5549261-66e2-4a5e-8781-bc555b629ccc
2023-01-27T23:06:50.923Z
2023-02-21T08:50:46.871Z
2023-02-21T08:50:46.871Z
{'Vendor': 'Unknown', 'Product': 'GS Portfolio for Envato', 'Versions': '0'}
CVE-2023-0365
The React Webcam WordPress plugin through 1.2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/d268d7a3-82fd-4444-bc0e-27c7cc279b5a
2023-01-18T06:56:46.874Z
2023-03-20T15:52:09.937Z
2023-03-20T15:52:09.937Z
{'Vendor': 'Unknown', 'Product': 'React Webcam', 'Versions': '0'}
CVE-2023-0735
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.5.4.
https://huntr.dev/bounties/8bc78cb1-b10b-4152-842e-ceb999fc5508
2023-02-07T00:00:00
2023-02-07T00:00:00
2023-02-07T00:00:00
{'Vendor': 'wallabag', 'Product': 'wallabag/wallabag', 'Versions': 'unspecified'}
CVE-2023-0220
The Pinpoint Booking System WordPress plugin before 2.9.9.2.9 does not validate and escape one of its shortcode attributes before using it in a SQL statement, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks.
https://wpscan.com/vulnerability/d6d976be-31d1-419d-8729-4a36fbd2755c
2023-01-11T15:31:54.840Z
2023-02-13T14:32:08.000Z
null
{'Vendor': 'Unknown', 'Product': 'Pinpoint Booking System', 'Versions': '0'}
CVE-2023-0670
Ulearn version a5a7ca20de859051ea0470542844980a66dfc05d allows an attacker with administrator permissions to obtain remote code execution on the server through the image upload functionality. This occurs because the application does not validate that the uploaded image is actually an image.
https://fluidattacks.com/advisories/scott/
2023-02-03T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'n/a', 'Product': 'Ulearn', 'Versions': 'a5a7ca20de859051ea0470542844980a66dfc05d'}
CVE-2023-0959
Bhima version 1.27.0 allows a remote attacker to update the privileges of any account registered in the application via a malicious link sent to an administrator. This is possible because the application is vulnerable to CSRF.
https://github.com/IMA-WorldHealth/bhima/
2023-02-22T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'n/a', 'Product': 'Bhima', 'Versions': '1.27.0'}
CVE-2023-0723
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_move_object function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc01108f-e781-484b-997a-c1d4e218a3f4
2023-02-07T17:17:23.195Z
2023-02-07T22:57:37.080Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0689
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_first_name' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about arbitrary form submissions, including the submitter's first name.
https://www.wordfence.com/threat-intel/vulnerabilities/id/356cf06e-16e7-438b-83b5-c8a52a21f903?source=cve
2023-02-06T20:52:00.344Z
2023-08-31T05:33:05.767Z
2023-08-31T05:33:05.767Z
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder', 'Versions': '*'}
CVE-2023-0373
The Lightweight Accordion WordPress plugin before 1.5.15 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/fe60ea83-b584-465a-8128-b7358d8da3af
2023-01-18T07:14:51.631Z
2023-02-13T14:32:09.595Z
null
{'Vendor': 'Unknown', 'Product': 'Lightweight Accordion', 'Versions': '0'}
CVE-2023-0666
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
https://takeonme.org/cves/CVE-2023-0666.html
2023-02-03T22:06:14.542Z
2023-06-07T02:25:27.974Z
2023-06-07T02:42:41.249Z
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0, 4.0.6'}
CVE-2023-0236
The Tutor LMS WordPress plugin before 2.0.10 does not sanitise and escape the reset_key and user_id parameters before outputting then back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/503835db-426d-4b49-85f7-c9a20d6ff5b8
2023-01-12T11:40:16.049Z
2023-02-06T19:59:21.460Z
null
{'Vendor': 'Unknown', 'Product': 'Tutor LMS', 'Versions': '0'}
CVE-2023-0518
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. It was possible to trigger a DoS attack by uploading a malicious Helm chart.
https://gitlab.com/gitlab-org/gitlab/-/issues/383082
2023-01-26T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=14.0, <15.6.7, >=15.7, <15.7.6, >=15.8, <15.8.1'}
CVE-2023-0148
The Gallery Factory Lite WordPress plugin through 2.0.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/f15f2f2c-2053-4b93-8064-15b5243a4021
2023-01-10T10:58:05.126Z
2023-02-06T19:59:22.291Z
null
{'Vendor': 'Unknown', 'Product': 'Gallery Factory Lite', 'Versions': '0'}
CVE-2023-0324
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/page-login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-218426 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.218426
2023-01-16T14:33:28.552Z
2023-01-16T14:58:03.549Z
2023-10-20T18:23:55.228Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-0774
A vulnerability has been found in SourceCodester Medical Certificate Generator App 1.0 and classified as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument lastname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220558 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.220558
2023-02-10T11:50:14.600Z
2023-02-10T11:52:38.683Z
2023-10-20T20:55:40.370Z
{'Vendor': 'SourceCodester', 'Product': 'Medical Certificate Generator App', 'Versions': '1.0'}
CVE-2023-0261
The WP TripAdvisor Review Slider WordPress plugin before 10.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
https://wpscan.com/vulnerability/6a3b6752-8d72-4ab4-9d49-b722a947d2b0
2023-01-12T22:01:40.795Z
2023-02-13T14:32:10.388Z
null
{'Vendor': 'Unknown', 'Product': 'WP TripAdvisor Review Slider', 'Versions': '0'}
CVE-2023-0631
The Paid Memberships Pro WordPress plugin before 2.9.12 does not prevent subscribers from rendering shortcodes that concatenate attributes directly into an SQL query.
https://wpscan.com/vulnerability/19ef92fd-b493-4488-91f0-e6ba51362f79
2023-02-01T22:57:30.482Z
2023-03-20T15:52:10.755Z
2023-03-20T15:52:10.755Z
{'Vendor': 'Unknown', 'Product': 'Paid Memberships Pro', 'Versions': '1.5.5'}
CVE-2023-0646
A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220033 was assigned to this vulnerability.
https://vuldb.com/?id.220033
2023-02-02T13:26:01.834Z
2023-02-02T13:26:30.361Z
2023-10-20T20:33:42.756Z
{'Vendor': 'n/a', 'Product': 'dst-admin', 'Versions': '1.5.0'}
CVE-2023-0216
An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data.
https://www.openssl.org/news/secadv/20230207.txt
2023-01-11T12:01:06.675Z
2023-02-08T19:03:05.652Z
2023-02-24T14:44:35.753Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0'}
CVE-2023-0703
Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
2023-02-06T00:00:00
2023-02-07T00:00:00
2023-09-30T10:06:37.352959
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0353
Akuvox E11 uses a weak encryption algorithm for stored passwords and uses a hard-coded password for decryption which could allow the encrypted passwords to be decrypted from the configuration file.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
2023-01-17T19:27:33.597Z
2023-03-13T20:07:22.716Z
2023-03-13T20:07:22.716Z
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
CVE-2023-0580
Insecure Storage of Sensitive Information vulnerability in ABB My Control System (on-premise) allows an attacker who successfully exploited this vulnerability to gain access to the secure application data or take control of the application. Of the services that make up the My Control System (on-premise) application, the following ones are affected by this vulnerability: User Interface System Monitoring1 Asset Inventory This issue affects My Control System (on-premise): from 5.0;0 through 5.13.
https://search.abb.com/library/Download.aspx?DocumentID=7PAA007893&LanguageCode=en&DocumentPartId=&Action=Launch
2023-01-30T12:33:45.875Z
2023-04-06T16:19:51.149Z
2023-04-06T16:19:51.149Z
{'Vendor': 'ABB', 'Product': 'My Control System (on-premise)', 'Versions': '5.0;0'}
CVE-2023-0979
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MedData MedDataPACS allows SQL Injection.This issue affects MedDataPACS : before 2023-03-03.
https://www.usom.gov.tr/bildirim/tr-23-0129
2023-02-23T06:44:22.207Z
2023-03-06T14:10:49.417Z
2023-09-07T07:45:51.907Z
{'Vendor': 'MedData', 'Product': 'MedDataPACS ', 'Versions': '0'}
CVE-2023-0996
There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif. An attacker could exploit this through a crafted image file to cause a buffer overflow in linear memory during a memcpy call.
https://github.com/strukturag/libheif/pull/759
2023-02-24T03:17:18.663Z
2023-02-24T03:35:58.752Z
2023-02-24T03:35:58.752Z
{'Vendor': 'Struktur', 'Product': 'libheif', 'Versions': '1.14.2'}
CVE-2023-0095
The Page View Count WordPress plugin before 2.6.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/009ca72e-e8fa-4fdc-ab2d-4210f8f4710f
2023-01-06T07:35:35.265Z
2023-02-06T19:59:23.089Z
null
{'Vendor': 'Unknown', 'Product': 'Page View Count', 'Versions': '0'}
CVE-2023-0241
pgAdmin 4 versions prior to v6.19 contains a directory traversal vulnerability. A user of the product may change another user's settings or alter the database.
https://github.com/pgadmin-org/pgadmin4/issues/5734
2023-01-12T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'n/a', 'Product': 'pgadmin', 'Versions': 'pgadmin 6.19'}
CVE-2023-0611
A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219935.
https://vuldb.com/?id.219935
2023-02-01T13:23:00.625Z
2023-02-01T13:24:46.450Z
2023-10-20T19:50:35.460Z
{'Vendor': 'TRENDnet', 'Product': 'TEW-652BRP', 'Versions': '3.04B01'}
CVE-2023-0304
A vulnerability classified as critical has been found in SourceCodester Online Food Ordering System. This affects an unknown part of the file admin_class.php of the component Signup Module. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218385 was assigned to this vulnerability.
https://vuldb.com/?id.218385
2023-01-15T09:01:30.502Z
2023-01-15T11:58:04.380Z
2023-10-20T18:21:28.918Z
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': 'n/a'}
CVE-2023-0754
The affected products are vulnerable to an integer overflow or wraparound, which could  allow an attacker to crash the server and remotely execute arbitrary code.
https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01
2023-02-08T20:15:58.394Z
2023-02-23T21:27:09.964Z
2023-02-23T21:27:09.964Z
{'Vendor': 'PTC', 'Product': 'ThingWorx Edge C-SDK', 'Versions': '0'}
CVE-2023-0884
null
null
2023-02-17T00:00:00
null
2023-02-23T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-0187
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds read can lead to denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:43.753Z
2023-04-01T04:44:23.877Z
2023-04-01T04:44:23.877Z
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0538
The Campaign URL Builder WordPress plugin before 1.8.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/4869fdc7-4fc7-4917-bc00-b6ced9ccc871
2023-01-27T11:58:56.859Z
2023-03-13T16:03:33.950Z
2023-03-13T16:03:33.950Z
{'Vendor': 'Unknown', 'Product': 'Campaign URL Builder', 'Versions': '0'}
CVE-2023-0492
The GS Products Slider for WooCommerce WordPress plugin before 1.5.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/ea3b129d-32d8-40e3-b1af-8b92a760db23
2023-01-25T02:26:48.971Z
2023-02-21T08:50:47.672Z
2023-02-21T08:50:47.672Z
{'Vendor': 'Unknown', 'Product': 'GS Products Slider for WooCommerce', 'Versions': '0'}
CVE-2023-0168
The Olevmedia Shortcodes WordPress plugin through 1.1.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/e854efee-16fc-4379-9e66-d2883e01fb32
2023-01-11T03:09:09.086Z
2023-02-27T15:24:33.172Z
2023-02-27T15:24:33.172Z
{'Vendor': 'Unknown', 'Product': 'Olevmedia Shortcodes', 'Versions': '0'}
CVE-2023-0607
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
https://huntr.dev/bounties/9294743d-7818-4264-b973-59de027d549b
2023-02-01T00:00:00
2023-02-01T00:00:00
2023-02-01T00:00:00
{'Vendor': 'projectsend', 'Product': 'projectsend/projectsend', 'Versions': 'unspecified'}
CVE-2023-0257
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fos/admin/index.php?page=menu of the component Menu Form. The manipulation of the argument Image with the input <?php system($_GET['c']); ?> leads to unrestricted upload. The attack can be launched remotely. The identifier VDB-218185 was assigned to this vulnerability.
https://vuldb.com/?id.218185
2023-01-12T21:09:17.469Z
2023-01-12T21:09:33.279Z
2023-10-20T18:14:09.484Z
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
CVE-2023-0742
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad
2023-02-08T00:00:00
2023-02-08T00:00:00
2023-02-08T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-0312
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9
2023-01-15T00:00:00
2023-01-15T00:00:00
2023-01-15T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-0191
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds access may lead to denial of service or data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:46.459Z
2023-04-01T04:51:09.537Z
2023-04-01T04:51:09.537Z
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0938
A vulnerability classified as critical has been found in SourceCodester Music Gallery Site 1.0. This affects an unknown part of the file music_list.php of the component GET Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221553 was assigned to this vulnerability.
https://vuldb.com/?id.221553
2023-02-21T09:28:52.107Z
2023-02-21T09:30:25.360Z
2023-10-20T21:34:42.503Z
{'Vendor': 'SourceCodester', 'Product': 'Music Gallery Site', 'Versions': '1.0'}
CVE-2023-0892
The BizLibrary WordPress plugin through 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/54150be5-a53f-4b94-8ce5-04e073e3ab1f
2023-02-17T14:44:09.370Z
2023-05-15T12:15:34.079Z
2023-05-15T12:15:34.079Z
{'Vendor': 'Unknown', 'Product': 'BizLibrary', 'Versions': '0'}
CVE-2023-0484
The Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/e61fb245-0d7f-42b0-9b96-c17ade8c04c5
2023-01-24T20:38:26.290Z
2023-03-27T15:37:28.083Z
2023-03-27T15:37:28.083Z
{'Vendor': 'Unknown', 'Product': 'Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks', 'Versions': '0'}
CVE-2023-0200
NVIDIA DGX-2 contains a vulnerability in OFBD where a user with high privileges and a pre-conditioned heap can cause an access beyond a buffers end, which may lead to code execution, escalation of privileges, denial of service, and information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5449
2023-01-11T05:48:51.778Z
2023-04-22T02:21:13.210Z
2023-04-22T02:21:13.210Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 1.08.00'}
CVE-2023-0650
A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The identifier of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability.
https://vuldb.com/?id.220037
2023-02-02T13:37:29.535Z
2023-02-02T13:38:51.044Z
2023-10-20T20:38:35.480Z
{'Vendor': 'n/a', 'Product': 'YAFNET', 'Versions': '3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.1.10, 3.1.11'}
CVE-2023-0345
The Akuvox E11 secure shell (SSH) server is enabled by default and can be accessed by the root user. This password cannot be changed by the user.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
2023-01-17T19:23:07.627Z
2023-03-13T20:29:30.386Z
2023-03-13T20:29:30.386Z
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
CVE-2023-0715
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_clone_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c3728280-3487-4cb2-8e37-f33811bc0a22
2023-02-07T16:02:32.377Z
2023-02-08T01:11:21.815Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0083
The ArKUI framework subsystem within OpenHarmony-v3.1.5 and prior versions, OpenHarmony-v3.0.7 and prior versions has an Improper Input Validation vulnerability which local attackers can exploit this vulnerability to send malicious data, causing the current application to crash.
https://gitee.com/openharmony/security/blob/master/en/security-disclosure/2023/2023-02.md
2023-01-05T12:32:56.058Z
2023-03-10T10:44:22.877Z
2023-03-10T10:44:22.877Z
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': '3.0, 3.1'}
CVE-2023-0579
The YARPP WordPress plugin before 5.30.3 does not validate and escape some of its shortcode attributes before using them in SQL statement/s, which could allow any authenticated users, such as subscribers to perform SQL Injection attacks.
https://wpscan.com/vulnerability/574f7607-96d8-4ef8-b96c-0425ad7e7690
2023-01-30T11:13:36.310Z
2023-08-16T11:03:21.175Z
2023-08-16T11:03:21.175Z
{'Vendor': 'Unknown', 'Product': 'YARPP', 'Versions': '0'}
CVE-2023-0129
Heap buffer overflow in Network Service in Google Chrome prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and specific interactions. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
2023-01-09T00:00:00
2023-01-10T00:00:00
2023-11-25T11:07:40.973066
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0980
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/registrations/update_status.php of the component Status Update Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221675.
https://vuldb.com/?id.221675
2023-02-23T11:05:34.862Z
2023-02-23T11:06:18.278Z
2023-10-20T21:46:59.114Z
{'Vendor': 'SourceCodester', 'Product': 'Yoga Class Registration System', 'Versions': '1.0'}
CVE-2023-0294
The Mediamatic – Media Library Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.8.1. This is due to missing or incorrect nonce validation on its AJAX actions function. This makes it possible for unauthenticated attackers to change image categories used by the plugin, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d81ed8d9-4a7a-4b75-aab4-8e4dbd554f32
2023-01-13T19:46:10.874Z
2023-01-13T19:46:14.739Z
null
{'Vendor': 'plugincraft', 'Product': 'Mediamatic – Media Library Folders', 'Versions': '*'}
CVE-2023-0781
A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been declared as critical. This vulnerability affects the function query of the file removeOrder.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220624.
https://vuldb.com/?id.220624
2023-02-11T10:05:18.663Z
2023-02-11T10:06:45.744Z
2023-10-20T20:56:53.513Z
{'Vendor': 'SourceCodester', 'Product': 'Canteen Management System', 'Versions': '1.0'}
CVE-2023-0502
The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/c959f4ce-b6ea-4aee-9a98-aa98d2a62138
2023-01-25T10:08:31.434Z
2023-03-27T15:37:29.087Z
2023-03-27T15:37:29.087Z
{'Vendor': 'Unknown', 'Product': 'WP News', 'Versions': '0'}
CVE-2023-0152
The WP Multi Store Locator WordPress plugin through 2.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/8281fce2-6f24-4d3f-895f-4d8694806609
2023-01-10T10:58:23.541Z
2023-06-05T13:39:00.208Z
2023-06-05T13:39:00.208Z
{'Vendor': 'Unknown', 'Product': 'WP Multi Store Locator', 'Versions': '0'}
CVE-2023-0851
Buffer overflow in CPCA Resource Download process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
https://www.canon-europe.com/support/product-security-latest-news/
2023-02-16T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
CVE-2023-0914
Improper Authorization in GitHub repository pixelfed/pixelfed prior to 0.11.4.
https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec
2023-02-19T00:00:00
2023-02-19T00:00:00
2023-02-19T00:00:00
{'Vendor': 'pixelfed', 'Product': 'pixelfed/pixelfed', 'Versions': 'unspecified'}
CVE-2023-0447
The My YouTube Channel plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the clear_all_cache function in versions up to, and including, 3.0.12.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to clear the plugin's cache.
https://www.wordfence.com/threat-intel/vulnerabilities/id/486b6a75-d101-4f3a-8436-6c23dd0ff200
2023-01-23T16:24:59.453Z
2023-01-23T16:30:26.228Z
2023-01-23T16:31:15.592Z
{'Vendor': 'urkekg', 'Product': 'My YouTube Channel', 'Versions': '*'}
CVE-2023-0017
An unauthenticated attacker in SAP NetWeaver AS for Java - version 7.50, due to improper access control, can attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data on the current system. This could allow the attacker to have full read access to user data, make modifications to user data, and make services within the system unavailable.
https://launchpad.support.sap.com/#/notes/3268093
2022-12-20T03:49:32.991Z
2023-01-10T03:18:57.927Z
null
{'Vendor': 'SAP', 'Product': 'NetWeaver AS for Java', 'Versions': '7.50'}