CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-0739
|
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4.
|
https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae
|
2023-02-08T00:00:00
|
2023-02-08T00:00:00
|
2023-03-02T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-0693
|
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_transaction_id' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the transaction ids of arbitrary form submissions that included payment.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/1f33a8db-7cd0-4a53-b2c1-cd5b7cd16214?source=cve
|
2023-02-06T21:03:31.719Z
|
2023-06-09T05:33:12.877Z
|
2023-06-09T05:33:12.877Z
|
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}
|
CVE-2023-0369
|
The GoToWP WordPress plugin through 5.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/351f31e0-cd13-4079-8fd1-447f319133c9
|
2023-01-18T07:07:35.501Z
|
2023-03-20T15:52:11.669Z
|
2023-03-20T15:52:11.669Z
|
{'Vendor': 'Unknown', 'Product': 'GoToWP', 'Versions': '0'}
|
CVE-2023-0386
|
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
|
2023-01-18T00:00:00
|
2023-03-22T00:00:00
|
2023-06-22T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.2-rc6'}
|
CVE-2023-0105
|
A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.
|
https://access.redhat.com/security/cve/CVE-2023-0105
|
2023-01-06T22:29:12.661Z
|
2023-01-11T20:46:51.617Z
|
2023-01-13T04:22:02.451274Z
|
{'Vendor': 'redhat.com', 'Product': 'Keycloak', 'Versions': 'n/a'}
|
CVE-2023-0555
|
The Quick Restaurant Menu plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those actions intended for administrator use. Actions include menu item creation, update and deletion and other menu management functions. Since the plugin does not verify that a post ID passed to one of its AJAX actions belongs to a menu item, this can lead to arbitrary post deletion/alteration.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/97984c7d-d6ff-480c-acfe-20ab0eb04141
|
2023-01-27T20:29:31.315Z
|
2023-01-27T20:31:13.539Z
| null |
{'Vendor': 'alejandropascual', 'Product': 'Quick Restaurant Menu', 'Versions': '*'}
|
CVE-2023-0040
|
Versions of Async HTTP Client prior to 1.13.2 are vulnerable to a form of targeted request manipulation called CRLF injection. This vulnerability was the result of insufficient validation of HTTP header field values before sending them to the network. Users are vulnerable if they pass untrusted data into HTTP header field values without prior sanitisation. Common use-cases here might be to place usernames from a database into HTTP header fields. This vulnerability allows attackers to inject new HTTP header fields, or entirely new requests, into the data stream. This can cause requests to be understood very differently by the remote server than was intended. In general, this is unlikely to result in data disclosure, but it can result in a number of logical errors and other misbehaviours.
|
https://github.com/swift-server/async-http-client/security/advisories/GHSA-v3r5-pjpm-mwgq
|
2023-01-03T00:00:00
|
2023-01-18T00:00:00
|
2023-01-18T00:00:00
|
{'Vendor': 'Swift Project', 'Product': 'Async HTTP Client', 'Versions': 'unspecified'}
|
CVE-2023-0410
|
Cross-site Scripting (XSS) - Generic in GitHub repository builderio/qwik prior to 0.1.0-beta5.
|
https://huntr.dev/bounties/2da583f0-7f66-4ba7-9bed-8e7229aa578e
|
2023-01-20T00:00:00
|
2023-01-20T00:00:00
|
2023-01-20T00:00:00
|
{'Vendor': 'builderio', 'Product': 'builderio/qwik', 'Versions': 'unspecified'}
|
CVE-2023-0943
|
A vulnerability, which was classified as problematic, has been found in SourceCodester Best POS Management System 1.0. This issue affects some unknown processing of the file index.php?page=site_settings of the component Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221591.
|
https://vuldb.com/?id.221591
|
2023-02-21T19:58:48.187Z
|
2023-02-21T19:59:38.409Z
|
2023-10-20T21:36:00.420Z
|
{'Vendor': 'SourceCodester', 'Product': 'Best POS Management System', 'Versions': '1.0'}
|
CVE-2023-0685
|
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_unassign_folders function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin..
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/e52b27fa-10e8-43d0-be29-774c2f5487ae
|
2023-02-06T17:29:55.499Z
|
2023-02-08T01:03:50.648Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0543
|
The Arigato Autoresponder and Newsletter WordPress plugin before 2.1.7.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
|
https://wpscan.com/vulnerability/e3771938-40b5-4e8b-bb5a-847131a2b4a7
|
2023-01-27T12:24:40.397Z
|
2023-02-27T15:24:34.100Z
|
2023-02-27T15:24:34.100Z
|
{'Vendor': 'Unknown', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': '0'}
|
CVE-2023-0113
|
A vulnerability was found in Netis Netcore Router up to 2.2.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file param.file.tgz of the component Backup Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-217591.
|
https://vuldb.com/?id.217591
|
2023-01-07T08:16:56.225Z
|
2023-01-07T08:22:36.918Z
|
2023-10-20T18:04:23.858Z
|
{'Vendor': 'Netis', 'Product': 'Netcore Router', 'Versions': '2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6'}
|
CVE-2023-0810
|
Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.11.
|
https://huntr.dev/bounties/a48414ea-63d9-453c-b3f3-2c927b71ec68
|
2023-02-13T00:00:00
|
2023-02-13T00:00:00
|
2023-02-13T00:00:00
|
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
|
CVE-2023-0955
|
The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.
|
https://wpscan.com/vulnerability/18b7e93f-b038-4f28-918b-4015d62f0eb8
|
2023-02-22T14:48:07.477Z
|
2023-03-27T15:37:29.971Z
|
2023-03-27T15:37:29.971Z
|
{'Vendor': 'Unknown', 'Product': 'WP Statistics', 'Versions': '0'}
|
CVE-2023-0406
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
|
https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c
|
2023-01-19T00:00:00
|
2023-01-19T00:00:00
|
2023-01-19T00:00:00
|
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
|
CVE-2023-0056
|
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
|
https://access.redhat.com/security/cve/CVE-2023-0056
|
2023-01-04T00:00:00
|
2023-03-23T00:00:00
|
2023-03-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'haproxy', 'Versions': 'unknown'}
|
CVE-2023-0282
|
The YourChannel WordPress plugin before 1.2.2 does not sanitize and escape some parameters, which could allow users with a role as low as Subscriber to perform Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/93693d45-5217-4571-bae5-aab8878cfe62
|
2023-01-13T09:18:37.848Z
|
2023-02-06T19:59:24.802Z
| null |
{'Vendor': 'Unknown', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '0'}
|
CVE-2023-0778
|
A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2168256
|
2023-02-10T00:00:00
|
2023-03-27T00:00:00
|
2023-03-27T00:00:00
|
{'Vendor': 'n/a', 'Product': 'podman', 'Versions': 'unknown'}
|
CVE-2023-0328
|
The WPCode WordPress plugin before 2.0.7 does not have adequate privilege checks in place for several AJAX actions, only checking the nonce. This may lead to allowing any authenticated user who can edit posts to call the endpoints related to WPCode Library authentication (such as update and delete the auth key).
|
https://wpscan.com/vulnerability/3c4318a9-a3c5-409b-a52e-edd8583c3c43
|
2023-01-16T18:56:21.114Z
|
2023-03-06T13:33:58.773Z
|
2023-03-06T13:33:58.773Z
|
{'Vendor': 'Unknown', 'Product': 'WPCode', 'Versions': '0'}
|
CVE-2023-0797
|
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
|
https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
|
2023-02-12T00:00:00
|
2023-02-13T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}
|
CVE-2023-0847
|
The Sub-IoT implementation of the DASH 7 Alliance protocol has a vulnerability that can lead to an out-of-bounds write prior to implementation version 0.5.0. If the protocol has been compiled using default settings, this will only grant the attacker access to allocated but unused memory. However, if it was configured using non-default settings, there is the possibility that exploiting this vulnerability could lead to system crashes and remote code execution.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-13
|
2023-02-15T19:37:55.663Z
|
2023-02-28T23:16:22.740Z
|
2023-02-28T23:16:22.740Z
|
{'Vendor': 'Sub-IoT', 'Product': 'DASH 7 Alliance Protocol stack implementation', 'Versions': '0'}
|
CVE-2023-0144
|
The Event Manager and Tickets Selling Plugin for WooCommerce WordPress plugin before 3.8.0 does not validate and escape some of its post meta before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/d7b3917a-d11f-4216-9d2c-30771d83a7b4
|
2023-01-10T03:21:55.287Z
|
2023-02-06T19:59:26.720Z
| null |
{'Vendor': 'Unknown', 'Product': 'Event Manager and Tickets Selling Plugin for WooCommerce', 'Versions': '0'}
|
CVE-2023-0514
|
The Membership Database WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
https://wpscan.com/vulnerability/c6cc400a-9bfb-417d-9206-5582a49d0f05
|
2023-01-26T15:52:48.155Z
|
2023-05-08T13:58:10.717Z
|
2023-05-08T13:58:10.717Z
|
{'Vendor': 'Unknown', 'Product': 'Membership Database', 'Versions': '0'}
|
CVE-2023-0001
|
An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent.
|
https://security.paloaltonetworks.com/CVE-2023-0001
|
2022-10-27T18:47:48.958Z
|
2023-02-08T17:20:20.774Z
|
2023-11-21T18:25:00.000Z
|
{'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XDR agent', 'Versions': '7.9 All, 7.8 All, 7.5, 5.0 All'}
|
CVE-2023-0451
|
Econolite EOS versions prior to 3.2.23 lack a password
requirement for gaining “READONLY” access to log files and certain database and
configuration files. One such file contains tables with MD5 hashes and
usernames for all defined users in the control software, including
administrators and technicians.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02
|
2023-01-23T18:19:27.265Z
|
2023-01-26T20:37:53.380Z
|
2023-06-20T15:37:19.367Z
|
{'Vendor': 'Econolite', 'Product': 'EOS', 'Versions': '0'}
|
CVE-2023-0902
|
A vulnerability was found in SourceCodester Simple Food Ordering System 1.0. It has been classified as problematic. This affects an unknown part of the file process_order.php. The manipulation of the argument order leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221451.
|
https://vuldb.com/?id.221451
|
2023-02-18T07:30:48.249Z
|
2023-02-18T07:31:22.384Z
|
2023-10-20T21:13:58.018Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Food Ordering System', 'Versions': '1.0'}
|
CVE-2023-0846
|
Unauthenticated, stored cross-site scripting in the display of alarm reduction keys in multiple versions of OpenNMS Horizon and Meridian could allow an attacker access to confidential session information. Users
should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and
Horizon installation instructions state that they are intended for installation
within an organization's private networks and should not be directly accessible
from the Internet.
|
https://github.com/OpenNMS/opennms/pull/5506/files
|
2023-02-15T19:03:13.669Z
|
2023-02-22T18:35:19.051Z
|
2023-02-27T18:56:27.133Z
|
{'Vendor': 'The OpenNMS Group ', 'Product': 'Horizon', 'Versions': '26.1.0'}
|
CVE-2023-0145
|
The Saan World Clock WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/f4e4b4a2-c7cb-42ce-9d5b-bd84efcbf54d
|
2023-01-10T10:37:08.147Z
|
2023-03-20T15:52:12.480Z
|
2023-03-20T15:52:12.480Z
|
{'Vendor': 'Unknown', 'Product': 'Saan World Clock', 'Versions': '0'}
|
CVE-2023-0515
|
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219335.
|
https://vuldb.com/?id.219335
|
2023-01-26T16:57:56.460Z
|
2023-01-26T16:58:49.834Z
|
2023-10-20T19:29:50.802Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-0450
|
An issue has been discovered in GitLab affecting all versions starting from 8.1 to 15.8.5, and from 15.9 to 15.9.4, and from 15.10 to 15.10.1. It was possible to add a branch with an ambiguous name that could be used to social engineer users.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/388962
|
2023-01-23T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=8.1, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-0903
|
A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452.
|
https://vuldb.com/?id.221452
|
2023-02-18T07:34:47.621Z
|
2023-02-18T07:35:04.544Z
|
2023-10-20T21:15:11.336Z
|
{'Vendor': 'SourceCodester', 'Product': 'Employee Task Management System', 'Versions': '1.0'}
|
CVE-2023-0283
|
A vulnerability classified as critical has been found in SourceCodester Online Flight Booking Management System. This affects an unknown part of the file review_search.php of the component POST Parameter Handler. The manipulation of the argument txtsearch leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218277 was assigned to this vulnerability.
|
https://vuldb.com/?id.218277
|
2023-01-13T09:19:36.713Z
|
2023-01-13T09:20:41.172Z
|
2023-10-20T18:17:48.981Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Flight Booking Management System', 'Versions': 'n/a'}
|
CVE-2023-0779
|
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
|
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549
|
2023-02-10T00:00:00
|
2023-05-30T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'zephyrproject-rtos', 'Product': 'zephyr', 'Versions': 'unspecified, unspecified'}
|
CVE-2023-0329
|
The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role.
|
https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493
|
2023-01-16T19:21:03.388Z
|
2023-05-30T07:49:13.896Z
|
2023-05-30T07:49:13.896Z
|
{'Vendor': 'Unknown', 'Product': 'Elementor Website Builder', 'Versions': '0'}
|
CVE-2023-0796
|
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
|
https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
|
2023-02-12T00:00:00
|
2023-02-13T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}
|
CVE-2023-0542
|
The Custom Post Type List Shortcode WordPress plugin through 1.4.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/17de2f77-3e6c-4c22-9196-6e5577ee7fcf
|
2023-01-27T12:24:34.778Z
|
2023-05-08T13:58:11.670Z
|
2023-05-08T13:58:11.670Z
|
{'Vendor': 'Unknown', 'Product': 'Custom Post Type List Shortcode', 'Versions': '0'}
|
CVE-2023-0112
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
|
https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6
|
2023-01-07T00:00:00
|
2023-01-07T00:00:00
|
2023-01-07T00:00:00
|
{'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'}
|
CVE-2023-0811
|
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-01
|
2023-02-13T15:41:55.590Z
|
2023-03-16T17:41:25.525Z
|
2023-03-16T17:45:14.919Z
|
{'Vendor': 'Omron ', 'Product': 'CJ1M SYSMAC CJ-series', 'Versions': 'All versions '}
|
CVE-2023-0954
|
A debug feature in Sensormatic Electronics Illustra Pro Gen 4 Dome and PTZ cameras allows a user to compromise credentials after a long period of sustained attack.
|
https://www.johnsoncontrols.com/cyber-solutions/security-advisories
|
2023-02-22T14:10:57.113Z
|
2023-06-08T20:05:20.697Z
|
2023-06-08T20:05:20.697Z
|
{'Vendor': 'Sensormatic Electronics, a subsidiary of Johnson Controls, Inc.', 'Product': 'Illustra Pro Gen 4 Dome', 'Versions': '0'}
|
CVE-2023-0057
|
Improper Restriction of Rendered UI Layers or Frames in GitHub repository pyload/pyload prior to 0.5.0b3.dev33.
|
https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d
|
2023-01-04T00:00:00
|
2023-01-05T00:00:00
|
2023-01-05T00:00:00
|
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
|
CVE-2023-0684
|
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_unassign_folders function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as changing the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/29358ea9-21b7-4294-8fc9-0d38e689cf53
|
2023-02-06T17:29:39.711Z
|
2023-02-08T01:12:09.622Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0391
|
MGT-COMMERCE CloudPanel ships with a static SSL certificate to encrypt communications to the administrative interface, shared across every installation of CloudPanel. This behavior was observed in version 2.2.0. There has been no indication from the vendor this has been addressed in version 2.2.1.
|
https://www.rapid7.com/blog/post/2023/03/21/cve-2023-0391-mgt-commerce-cloudpanel-shared-certificate-vulnerability-and-weak-installation-procedures/
|
2023-01-18T19:24:25.810Z
|
2023-03-21T19:25:25.895Z
|
2023-03-23T18:36:43.772Z
|
{'Vendor': 'MGT-COMMERCE', 'Product': 'CloudPanel', 'Versions': '0'}
|
CVE-2023-0104
|
The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decompiling a malicious project file. This may allow an attacker to gain control of the user’s computer or gain access to sensitive data.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-045-01
|
2023-01-06T18:50:05.156Z
|
2023-02-22T20:25:04.680Z
|
2023-02-22T20:25:04.680Z
|
{'Vendor': 'Weintek', 'Product': 'EasyBuilder Pro cMT ', 'Versions': '0, 0, 0'}
|
CVE-2023-0554
|
The Quick Restaurant Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to update menu items, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc7c214-8d76-453c-a05d-682aa425b06e
|
2023-01-27T20:28:33.450Z
|
2023-01-27T20:28:40.673Z
| null |
{'Vendor': 'alejandropascual', 'Product': 'Quick Restaurant Menu', 'Versions': '*'}
|
CVE-2023-0041
|
IBM Security Guardium 11.5 could allow a user to take over another user's session due to insufficient session expiration. IBM X-Force ID: 243657.
|
https://www.ibm.com/support/pages/node/7000021
|
2023-01-03T19:19:15.053Z
|
2023-06-05T00:53:27.660Z
|
2023-06-05T02:15:31.346Z
|
{'Vendor': 'IBM', 'Product': 'Security Guardium', 'Versions': '11.5'}
|
CVE-2023-0411
|
Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
|
https://www.wireshark.org/security/wnpa-sec-2023-06.html
|
2023-01-20T00:00:00
|
2023-01-24T00:00:00
|
2023-02-08T00:00:00
|
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.3, >=3.6.0, <3.6.11'}
|
CVE-2023-0942
|
The Japanized For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tab’ parameter in versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/bb606a30-2f7c-41e9-9ebc-9f1b0b84fff8
|
2023-02-21T19:11:32.615Z
|
2023-02-21T19:29:16.761Z
|
2023-02-21T19:29:16.761Z
|
{'Vendor': 'shoheitanaka', 'Product': 'Japanized For WooCommerce', 'Versions': '*'}
|
CVE-2023-0738
|
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
|
https://github.com/Orangescrum/orangescrum/
|
2023-02-08T00:00:00
|
2023-04-04T00:00:00
|
2023-04-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'OrangeScrum', 'Versions': '2.0.11'}
|
CVE-2023-0692
|
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_payment_status' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the payment status of arbitrary form submissions.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd85ff2-6607-4ac8-b91c-88f6f2fa6c56?source=cve
|
2023-02-06T21:01:15.623Z
|
2023-06-09T05:33:36.880Z
|
2023-06-09T05:33:36.880Z
|
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}
|
CVE-2023-0368
|
The Responsive Tabs For WPBakery Page Builder (formerly Visual Composer) WordPress plugin through 1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/b41e5c09-1034-48a7-ac0f-d4db6e7a3b3e
|
2023-01-18T07:05:39.021Z
|
2023-06-19T10:52:48.139Z
|
2023-06-19T10:52:48.139Z
|
{'Vendor': 'Unknown', 'Product': 'Responsive Tabs For WPBakery Page Builder (formerly Visual Composer)', 'Versions': '0'}
|
CVE-2023-0387
| null | null |
2023-01-18T00:00:00
| null |
2023-05-12T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-0503
|
The Free WooCommerce Theme 99fy Extension WordPress plugin before 1.2.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/3cb148fb-1f30-4316-a421-10da51d849f3
|
2023-01-25T10:08:41.675Z
|
2023-03-27T15:37:31.086Z
|
2023-03-27T15:37:31.086Z
|
{'Vendor': 'Unknown', 'Product': 'Free WooCommerce Theme 99fy Extension', 'Versions': '0'}
|
CVE-2023-0153
|
The Vimeo Video Autoplay Automute WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/f3459868-28aa-4a5d-94d8-bbc17e3ce653
|
2023-01-10T10:58:27.746Z
|
2023-02-06T19:59:28.523Z
| null |
{'Vendor': 'Unknown', 'Product': 'Vimeo Video Autoplay Automute', 'Versions': '0'}
|
CVE-2023-0850
|
A vulnerability was found in Netgear WNDR3700v2 1.0.1.14 and classified as problematic. This issue affects some unknown processing of the component Web Interface. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221153 was assigned to this vulnerability.
|
https://vuldb.com/?id.221153
|
2023-02-15T21:44:48.964Z
|
2023-02-15T21:45:33.719Z
|
2023-10-20T21:10:18.524Z
|
{'Vendor': 'Netgear', 'Product': 'WNDR3700v2', 'Versions': '1.0.1.14'}
|
CVE-2023-0915
|
A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. Affected is an unknown function of the file /adms/admin/?page=user/manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221490 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221490
|
2023-02-19T08:08:41.125Z
|
2023-02-19T08:08:58.505Z
|
2023-10-20T21:27:23.281Z
|
{'Vendor': 'SourceCodester', 'Product': 'Auto Dealer Management System', 'Versions': '1.0'}
|
CVE-2023-0446
|
The My YouTube Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 3.0.12.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/d979f899-8cdc-4230-b1b5-865c025dc86a
|
2023-01-23T16:24:10.765Z
|
2023-01-23T16:25:53.272Z
|
2023-01-23T16:31:09.896Z
|
{'Vendor': 'urkekg', 'Product': 'My YouTube Channel', 'Versions': '*'}
|
CVE-2023-0016
|
SAP BPC MS 10.0 - version 810, allows an unauthorized attacker to execute crafted database queries. The exploitation of this issue could lead to SQL injection vulnerability and could allow an attacker to access, modify, and/or delete data from the backend database.
|
https://launchpad.support.sap.com/#/notes/3275391
|
2022-12-16T03:13:55.421Z
|
2023-01-10T03:13:29.718Z
| null |
{'Vendor': 'SAP', 'Product': 'SAP BPC MS 10.0', 'Versions': '800, 810'}
|
CVE-2023-0295
|
The Launchpad plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of its settings parameters in versions up to, and including, 1.0.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/b8721c4d-d89b-4e97-af01-20327013cfb6
|
2023-01-13T19:54:30.477Z
|
2023-01-13T19:54:33.692Z
| null |
{'Vendor': 'obox', 'Product': 'Launchpad – Coming Soon & Maintenance Mode Plugin', 'Versions': '*'}
|
CVE-2023-0780
|
Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9-dev.
|
https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4
|
2023-02-11T00:00:00
|
2023-02-11T00:00:00
|
2023-02-11T00:00:00
|
{'Vendor': 'cockpit-hq', 'Product': 'cockpit-hq/cockpit', 'Versions': 'unspecified'}
|
CVE-2023-0597
|
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
|
https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
|
2023-01-31T00:00:00
|
2023-02-23T00:00:00
|
2023-07-28T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.2-rc1'}
|
CVE-2023-0082
|
The ExactMetrics WordPress plugin before 7.12.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/e1ba5047-0c39-478f-89c7-b0bb638efdff
|
2023-01-05T10:10:41.541Z
|
2023-02-06T19:59:29.364Z
| null |
{'Vendor': 'Unknown', 'Product': 'ExactMetrics', 'Versions': '0'}
|
CVE-2023-0578
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ASOS Information Technologies Book Cites allows Cross-Site Scripting (XSS).This issue affects Book Cites: before 23.01.05.
|
https://www.usom.gov.tr/bildirim/tr-23-0125
|
2023-01-30T10:09:34.950Z
|
2023-03-03T06:57:04.626Z
|
2023-03-26T19:47:40.280Z
|
{'Vendor': 'ASOS Information Technologies', 'Product': 'Book Cites', 'Versions': '0'}
|
CVE-2023-0128
|
Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
|
2023-01-09T00:00:00
|
2023-01-10T00:00:00
|
2023-11-25T11:06:28.860461
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0981
|
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been classified as critical. Affected is an unknown function of the component Delete User. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221676.
|
https://vuldb.com/?id.221676
|
2023-02-23T11:05:37.505Z
|
2023-02-23T11:06:20.728Z
|
2023-10-20T21:48:12.371Z
|
{'Vendor': 'SourceCodester', 'Product': 'Yoga Class Registration System', 'Versions': '1.0'}
|
CVE-2023-0201
|
NVIDIA DGX-2 SBIOS contains a vulnerability in Bds, where a user with high privileges can cause a write beyond the bounds of an indexable resource, which may lead to code execution, denial of service, compromised integrity, and information disclosure.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5449
|
2023-01-11T05:48:52.373Z
|
2023-04-22T02:22:51.372Z
|
2023-04-22T02:22:51.372Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 1.08.00'}
|
CVE-2023-0651
|
A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.220038
|
2023-02-02T13:42:00.288Z
|
2023-02-02T13:42:18.871Z
|
2023-10-20T20:39:48.627Z
|
{'Vendor': 'n/a', 'Product': 'FastCMS', 'Versions': '0.1.0'}
|
CVE-2023-0344
|
Akuvox E11 appears to be using a custom version of dropbear SSH server. This server allows an insecure option that by default is not in the official dropbear SSH server.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
|
2023-01-17T19:22:43.890Z
|
2023-03-31T15:43:23.608Z
|
2023-03-31T15:43:23.608Z
|
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
|
CVE-2023-0190
|
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:45.857Z
|
2023-04-22T02:19:06.133Z
|
2023-04-22T02:19:06.133Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA GPU Display Driver', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0939
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NTN Information Technologies Online Services Software allows SQL Injection.This issue affects Online Services Software: before 1.17.
|
https://www.usom.gov.tr/bildirim/tr-23-0103
|
2023-02-21T12:56:35.265Z
|
2023-02-23T07:28:57.972Z
|
2023-02-23T07:29:34.755Z
|
{'Vendor': 'NTN Information Technologies', 'Product': 'Online Services Software', 'Versions': '0'}
|
CVE-2023-0893
|
The Time Sheets WordPress plugin before 1.29.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/fd6ef6ee-15e9-44ac-a2db-976393a3b71a
|
2023-02-17T15:00:58.320Z
|
2023-04-10T13:17:53.888Z
|
2023-04-10T13:17:53.888Z
|
{'Vendor': 'Unknown', 'Product': 'Time Sheets', 'Versions': '0'}
|
CVE-2023-0485
|
An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible that a project member demoted to a user role to read project updates by doing a diff with a pre-existing fork.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/389191
|
2023-01-24T00:00:00
|
2023-05-03T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=13,11, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-0606
|
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
|
https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
{'Vendor': 'ampache', 'Product': 'ampache/ampache', 'Versions': 'unspecified'}
|
CVE-2023-0256
|
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been classified as critical. Affected is an unknown function of the file /fos/admin/ajax.php?action=login of the component Login Page. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-218184.
|
https://vuldb.com/?id.218184
|
2023-01-12T21:02:25.399Z
|
2023-01-12T21:03:04.018Z
|
2023-10-20T18:12:56.310Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
|
CVE-2023-0743
|
Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.
|
https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863
|
2023-02-08T00:00:00
|
2023-02-08T00:00:00
|
2023-02-08T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-0313
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
|
https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256
|
2023-01-15T00:00:00
|
2023-01-15T00:00:00
|
2023-01-15T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-0885
| null | null |
2023-02-17T00:00:00
| null |
2023-02-23T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-0186
|
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an out-of-bounds write can lead to denial of service and data tampering.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:43.040Z
|
2023-04-01T04:41:14.602Z
|
2023-04-01T04:41:14.602Z
|
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0539
|
The GS Insever Portfolio WordPress plugin before 1.4.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/a4b6a83a-6394-4dfc-8bb3-4982867dab7d
|
2023-01-27T12:24:13.590Z
|
2023-02-27T15:24:35.760Z
|
2023-02-27T15:24:35.760Z
|
{'Vendor': 'Unknown', 'Product': 'GS Insever Portfolio', 'Versions': '0'}
|
CVE-2023-0493
|
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5.
|
https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f
|
2023-01-25T00:00:00
|
2023-01-26T00:00:00
|
2023-10-10T07:22:20.882Z
|
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
|
CVE-2023-0169
|
The Zoho Forms WordPress plugin before 3.0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/178d71f2-4666-4f7e-ada5-cb72a50fd663
|
2023-01-11T03:09:16.304Z
|
2023-02-13T14:32:11.933Z
| null |
{'Vendor': 'Unknown', 'Product': 'Form plugin for WordPress', 'Versions': '0'}
|
CVE-2023-0240
|
There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.
In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.
|
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93
|
2023-01-12T13:04:00.937Z
|
2023-01-30T13:17:09.182Z
| null |
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.10'}
|
CVE-2023-0610
|
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
|
https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
{'Vendor': 'wallabag', 'Product': 'wallabag/wallabag', 'Versions': 'unspecified'}
|
CVE-2023-0305
|
A vulnerability classified as critical was found in SourceCodester Online Food Ordering System. This vulnerability affects unknown code of the file admin_class.php of the component Login Module. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-218386 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.218386
|
2023-01-15T09:01:37.225Z
|
2023-01-15T11:58:05.307Z
|
2023-10-20T18:22:42.098Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': 'n/a'}
|
CVE-2023-0755
|
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01
|
2023-02-08T20:21:34.258Z
|
2023-02-23T21:23:19.210Z
|
2023-02-23T21:23:19.210Z
|
{'Vendor': 'PTC', 'Product': 'ThingWorx Edge C-SDK', 'Versions': '0'}
|
CVE-2023-0581
|
The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation in versions up to, and including, 8.4.3. This is due to the plugin checking if an IP had been blocklist via client-side scripts rather than server-side. This makes it possible for unauthenticated attackers to bypass any login restrictions that may prevent a brute force attack.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/de73304e-7a28-4304-b1ed-2f6dd7738236
|
2023-01-30T14:06:16.652Z
|
2023-01-30T14:06:27.936Z
| null |
{'Vendor': 'LCWeb', 'Product': 'PrivateContent', 'Versions': '*'}
|
CVE-2023-0978
|
A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
|
https://kcm.trellix.com/corporate/index?page=content&id=SB10397
|
2023-02-23T05:28:48.678Z
|
2023-03-13T13:29:32.271Z
|
2023-04-03T15:34:38.217Z
|
{'Vendor': 'Trellix', 'Product': 'Trellix Intelligent Sandbox', 'Versions': ' 5.0'}
|
CVE-2023-0997
|
A vulnerability was found in SourceCodester Moosikay E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Moosikay/order.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221732.
|
https://vuldb.com/?id.221732
|
2023-02-24T07:28:36.437Z
|
2023-02-24T07:29:22.911Z
|
2023-10-20T21:54:18.152Z
|
{'Vendor': 'SourceCodester', 'Product': 'Moosikay E-Commerce System', 'Versions': '1.0'}
|
CVE-2023-0094
|
The UpQode Google Maps WordPress plugin through 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/1453471f-164d-4487-a736-8cea086212fe/
|
2023-01-06T03:26:50.188Z
|
2024-01-16T15:55:46.407Z
|
2024-01-16T15:55:46.407Z
|
{'Vendor': 'Unknown', 'Product': 'UpQode Google Maps', 'Versions': '0'}
|
CVE-2023-0647
|
A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.220034
|
2023-02-02T13:27:39.481Z
|
2023-02-02T13:27:57.263Z
|
2023-10-20T20:34:55.936Z
|
{'Vendor': 'n/a', 'Product': 'dst-admin', 'Versions': '1.5.0'}
|
CVE-2023-0217
|
An invalid pointer dereference on read can be triggered when an
application tries to check a malformed DSA public key by the
EVP_PKEY_public_check() function. This will most likely lead
to an application crash. This function can be called on public
keys supplied from untrusted sources which could allow an attacker
to cause a denial of service attack.
The TLS implementation in OpenSSL does not call this function
but applications might call the function if there are additional
security requirements imposed by standards such as FIPS 140-3.
|
https://www.openssl.org/news/secadv/20230207.txt
|
2023-01-11T12:02:46.441Z
|
2023-02-08T19:02:48.524Z
|
2023-02-24T14:44:48.097Z
|
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0'}
|
CVE-2023-0702
|
Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
|
2023-02-06T00:00:00
|
2023-02-07T00:00:00
|
2023-09-30T10:06:53.386266
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0352
|
The Akuvox E11 password recovery webpage can be accessed without authentication, and an attacker could download the device key file. An attacker could then use this page to reset the password back to the default.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
|
2023-01-17T19:27:15.123Z
|
2023-03-13T20:15:51.389Z
|
2023-03-13T20:20:29.714Z
|
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
|
CVE-2023-0325
|
Uvdesk version 1.1.1 allows an unauthenticated remote attacker to exploit a stored XSS in the application. This is possible because the application does not correctly validate the message sent by the clients in the ticket.
|
https://fluidattacks.com/advisories/labrinth/
|
2023-01-16T00:00:00
|
2023-04-04T00:00:00
|
2023-04-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Uvdesk', 'Versions': '1.1.1'}
|
CVE-2023-0775
|
An invalid ‘prepare write request’ command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service.
|
https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000SMMyGQAX?operationContext=S1
|
2023-02-10T14:33:56.906Z
|
2023-03-28T16:23:29.836Z
|
2023-03-29T15:17:23.197Z
|
{'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0'}
|
CVE-2023-0260
|
The WP Review Slider WordPress plugin before 12.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
|
https://wpscan.com/vulnerability/9165d46b-2a27-4e83-a096-73ffe9057c80
|
2023-01-12T22:01:11.826Z
|
2023-02-13T14:32:12.713Z
| null |
{'Vendor': 'Unknown', 'Product': 'WP Review Slider', 'Versions': '0'}
|
CVE-2023-0630
|
The Slimstat Analytics WordPress plugin before 4.9.3.3 does not prevent subscribers from rendering shortcodes that concatenates attributes directly into an SQL query.
|
https://wpscan.com/vulnerability/b82bdd02-b699-4527-86cc-d60b56ab0c55
|
2023-02-01T22:54:00.198Z
|
2023-03-20T15:52:13.523Z
|
2023-03-20T15:52:13.523Z
|
{'Vendor': 'Unknown', 'Product': 'Slimstat Analytics', 'Versions': '4.1'}
|
CVE-2023-0519
|
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
|
https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129
|
2023-01-26T00:00:00
|
2023-01-26T00:00:00
|
2023-01-26T00:00:00
|
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
|
CVE-2023-0149
|
The WordPrezi WordPress plugin before 0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/6b6f9e42-7f7f-4daa-99c9-14a24a6d76b0
|
2023-01-10T10:58:10.771Z
|
2023-02-06T19:59:30.480Z
|
2023-03-29T13:15:09.334Z
|
{'Vendor': 'Unknown', 'Product': 'WordPrezi', 'Versions': '0'}
|
CVE-2023-0722
|
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_state function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/261a1bf0-a147-48c8-878e-f9b725ac74d8
|
2023-02-07T17:13:15.660Z
|
2023-02-08T01:12:53.508Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0688
|
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_thankyou' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about form submissions, including payment status, and transaction ID.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/81fc41a4-9206-404c-bd5b-821c77ff3593?source=cve
|
2023-02-06T19:49:27.548Z
|
2023-06-09T05:33:22.696Z
|
2023-06-09T05:33:22.696Z
|
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.