CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-0739
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4.
https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae
2023-02-08T00:00:00
2023-02-08T00:00:00
2023-03-02T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-0693
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_transaction_id' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the transaction ids of arbitrary form submissions that included payment.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1f33a8db-7cd0-4a53-b2c1-cd5b7cd16214?source=cve
2023-02-06T21:03:31.719Z
2023-06-09T05:33:12.877Z
2023-06-09T05:33:12.877Z
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}
CVE-2023-0369
The GoToWP WordPress plugin through 5.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/351f31e0-cd13-4079-8fd1-447f319133c9
2023-01-18T07:07:35.501Z
2023-03-20T15:52:11.669Z
2023-03-20T15:52:11.669Z
{'Vendor': 'Unknown', 'Product': 'GoToWP', 'Versions': '0'}
CVE-2023-0386
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
2023-01-18T00:00:00
2023-03-22T00:00:00
2023-06-22T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.2-rc6'}
CVE-2023-0105
A flaw was found in Keycloak. This flaw allows impersonation and lockout due to the email trust not being handled correctly in Keycloak. An attacker can shadow other users with the same email and lockout or impersonate them.
https://access.redhat.com/security/cve/CVE-2023-0105
2023-01-06T22:29:12.661Z
2023-01-11T20:46:51.617Z
2023-01-13T04:22:02.451274Z
{'Vendor': 'redhat.com', 'Product': 'Keycloak', 'Versions': 'n/a'}
CVE-2023-0555
The Quick Restaurant Menu plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those actions intended for administrator use. Actions include menu item creation, update and deletion and other menu management functions. Since the plugin does not verify that a post ID passed to one of its AJAX actions belongs to a menu item, this can lead to arbitrary post deletion/alteration.
https://www.wordfence.com/threat-intel/vulnerabilities/id/97984c7d-d6ff-480c-acfe-20ab0eb04141
2023-01-27T20:29:31.315Z
2023-01-27T20:31:13.539Z
null
{'Vendor': 'alejandropascual', 'Product': 'Quick Restaurant Menu', 'Versions': '*'}
CVE-2023-0040
Versions of Async HTTP Client prior to 1.13.2 are vulnerable to a form of targeted request manipulation called CRLF injection. This vulnerability was the result of insufficient validation of HTTP header field values before sending them to the network. Users are vulnerable if they pass untrusted data into HTTP header field values without prior sanitisation. Common use-cases here might be to place usernames from a database into HTTP header fields. This vulnerability allows attackers to inject new HTTP header fields, or entirely new requests, into the data stream. This can cause requests to be understood very differently by the remote server than was intended. In general, this is unlikely to result in data disclosure, but it can result in a number of logical errors and other misbehaviours.
https://github.com/swift-server/async-http-client/security/advisories/GHSA-v3r5-pjpm-mwgq
2023-01-03T00:00:00
2023-01-18T00:00:00
2023-01-18T00:00:00
{'Vendor': 'Swift Project', 'Product': 'Async HTTP Client', 'Versions': 'unspecified'}
CVE-2023-0410
Cross-site Scripting (XSS) - Generic in GitHub repository builderio/qwik prior to 0.1.0-beta5.
https://huntr.dev/bounties/2da583f0-7f66-4ba7-9bed-8e7229aa578e
2023-01-20T00:00:00
2023-01-20T00:00:00
2023-01-20T00:00:00
{'Vendor': 'builderio', 'Product': 'builderio/qwik', 'Versions': 'unspecified'}
CVE-2023-0943
A vulnerability, which was classified as problematic, has been found in SourceCodester Best POS Management System 1.0. This issue affects some unknown processing of the file index.php?page=site_settings of the component Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221591.
https://vuldb.com/?id.221591
2023-02-21T19:58:48.187Z
2023-02-21T19:59:38.409Z
2023-10-20T21:36:00.420Z
{'Vendor': 'SourceCodester', 'Product': 'Best POS Management System', 'Versions': '1.0'}
CVE-2023-0685
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_unassign_folders function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin..
https://www.wordfence.com/threat-intel/vulnerabilities/id/e52b27fa-10e8-43d0-be29-774c2f5487ae
2023-02-06T17:29:55.499Z
2023-02-08T01:03:50.648Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0543
The Arigato Autoresponder and Newsletter WordPress plugin before 2.1.7.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
https://wpscan.com/vulnerability/e3771938-40b5-4e8b-bb5a-847131a2b4a7
2023-01-27T12:24:40.397Z
2023-02-27T15:24:34.100Z
2023-02-27T15:24:34.100Z
{'Vendor': 'Unknown', 'Product': 'Arigato Autoresponder and Newsletter', 'Versions': '0'}
CVE-2023-0113
A vulnerability was found in Netis Netcore Router up to 2.2.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file param.file.tgz of the component Backup Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-217591.
https://vuldb.com/?id.217591
2023-01-07T08:16:56.225Z
2023-01-07T08:22:36.918Z
2023-10-20T18:04:23.858Z
{'Vendor': 'Netis', 'Product': 'Netcore Router', 'Versions': '2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6'}
CVE-2023-0810
Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.11.
https://huntr.dev/bounties/a48414ea-63d9-453c-b3f3-2c927b71ec68
2023-02-13T00:00:00
2023-02-13T00:00:00
2023-02-13T00:00:00
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
CVE-2023-0955
The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.
https://wpscan.com/vulnerability/18b7e93f-b038-4f28-918b-4015d62f0eb8
2023-02-22T14:48:07.477Z
2023-03-27T15:37:29.971Z
2023-03-27T15:37:29.971Z
{'Vendor': 'Unknown', 'Product': 'WP Statistics', 'Versions': '0'}
CVE-2023-0406
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
https://huntr.dev/bounties/d7007f76-3dbc-48a7-a2fb-377040fe100c
2023-01-19T00:00:00
2023-01-19T00:00:00
2023-01-19T00:00:00
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-0056
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
https://access.redhat.com/security/cve/CVE-2023-0056
2023-01-04T00:00:00
2023-03-23T00:00:00
2023-03-23T00:00:00
{'Vendor': 'n/a', 'Product': 'haproxy', 'Versions': 'unknown'}
CVE-2023-0282
The YourChannel WordPress plugin before 1.2.2 does not sanitize and escape some parameters, which could allow users with a role as low as Subscriber to perform Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/93693d45-5217-4571-bae5-aab8878cfe62
2023-01-13T09:18:37.848Z
2023-02-06T19:59:24.802Z
null
{'Vendor': 'Unknown', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '0'}
CVE-2023-0778
A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
https://bugzilla.redhat.com/show_bug.cgi?id=2168256
2023-02-10T00:00:00
2023-03-27T00:00:00
2023-03-27T00:00:00
{'Vendor': 'n/a', 'Product': 'podman', 'Versions': 'unknown'}
CVE-2023-0328
The WPCode WordPress plugin before 2.0.7 does not have adequate privilege checks in place for several AJAX actions, only checking the nonce. This may lead to allowing any authenticated user who can edit posts to call the endpoints related to WPCode Library authentication (such as update and delete the auth key).
https://wpscan.com/vulnerability/3c4318a9-a3c5-409b-a52e-edd8583c3c43
2023-01-16T18:56:21.114Z
2023-03-06T13:33:58.773Z
2023-03-06T13:33:58.773Z
{'Vendor': 'Unknown', 'Product': 'WPCode', 'Versions': '0'}
CVE-2023-0797
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
2023-02-12T00:00:00
2023-02-13T00:00:00
2023-05-30T00:00:00
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}
CVE-2023-0847
The Sub-IoT implementation of the DASH 7 Alliance protocol has a vulnerability that can lead to an out-of-bounds write prior to implementation version 0.5.0. If the protocol has been compiled using default settings, this will only grant the attacker access to allocated but unused memory. However, if it was configured using non-default settings, there is the possibility that exploiting this vulnerability could lead to system crashes and remote code execution.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-13
2023-02-15T19:37:55.663Z
2023-02-28T23:16:22.740Z
2023-02-28T23:16:22.740Z
{'Vendor': 'Sub-IoT', 'Product': 'DASH 7 Alliance Protocol stack implementation', 'Versions': '0'}
CVE-2023-0144
The Event Manager and Tickets Selling Plugin for WooCommerce WordPress plugin before 3.8.0 does not validate and escape some of its post meta before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/d7b3917a-d11f-4216-9d2c-30771d83a7b4
2023-01-10T03:21:55.287Z
2023-02-06T19:59:26.720Z
null
{'Vendor': 'Unknown', 'Product': 'Event Manager and Tickets Selling Plugin for WooCommerce', 'Versions': '0'}
CVE-2023-0514
The Membership Database WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/c6cc400a-9bfb-417d-9206-5582a49d0f05
2023-01-26T15:52:48.155Z
2023-05-08T13:58:10.717Z
2023-05-08T13:58:10.717Z
{'Vendor': 'Unknown', 'Product': 'Membership Database', 'Versions': '0'}
CVE-2023-0001
An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent.
https://security.paloaltonetworks.com/CVE-2023-0001
2022-10-27T18:47:48.958Z
2023-02-08T17:20:20.774Z
2023-11-21T18:25:00.000Z
{'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XDR agent', 'Versions': '7.9 All, 7.8 All, 7.5, 5.0 All'}
CVE-2023-0451
Econolite EOS versions prior to 3.2.23 lack a password requirement for gaining “READONLY” access to log files and certain database and configuration files. One such file contains tables with MD5 hashes and usernames for all defined users in the control software, including administrators and technicians.
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02
2023-01-23T18:19:27.265Z
2023-01-26T20:37:53.380Z
2023-06-20T15:37:19.367Z
{'Vendor': 'Econolite', 'Product': 'EOS', 'Versions': '0'}
CVE-2023-0902
A vulnerability was found in SourceCodester Simple Food Ordering System 1.0. It has been classified as problematic. This affects an unknown part of the file process_order.php. The manipulation of the argument order leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221451.
https://vuldb.com/?id.221451
2023-02-18T07:30:48.249Z
2023-02-18T07:31:22.384Z
2023-10-20T21:13:58.018Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Food Ordering System', 'Versions': '1.0'}
CVE-2023-0846
Unauthenticated, stored cross-site scripting in the display of alarm reduction keys in multiple versions of OpenNMS Horizon and Meridian could allow an attacker access to confidential session information. Users should upgrade to Meridian 2023.1.0 or newer, or Horizon 31.0.4. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
https://github.com/OpenNMS/opennms/pull/5506/files
2023-02-15T19:03:13.669Z
2023-02-22T18:35:19.051Z
2023-02-27T18:56:27.133Z
{'Vendor': 'The OpenNMS Group ', 'Product': 'Horizon', 'Versions': '26.1.0'}
CVE-2023-0145
The Saan World Clock WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/f4e4b4a2-c7cb-42ce-9d5b-bd84efcbf54d
2023-01-10T10:37:08.147Z
2023-03-20T15:52:12.480Z
2023-03-20T15:52:12.480Z
{'Vendor': 'Unknown', 'Product': 'Saan World Clock', 'Versions': '0'}
CVE-2023-0515
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219335.
https://vuldb.com/?id.219335
2023-01-26T16:57:56.460Z
2023-01-26T16:58:49.834Z
2023-10-20T19:29:50.802Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-0450
An issue has been discovered in GitLab affecting all versions starting from 8.1 to 15.8.5, and from 15.9 to 15.9.4, and from 15.10 to 15.10.1. It was possible to add a branch with an ambiguous name that could be used to social engineer users.
https://gitlab.com/gitlab-org/gitlab/-/issues/388962
2023-01-23T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=8.1, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
CVE-2023-0903
A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452.
https://vuldb.com/?id.221452
2023-02-18T07:34:47.621Z
2023-02-18T07:35:04.544Z
2023-10-20T21:15:11.336Z
{'Vendor': 'SourceCodester', 'Product': 'Employee Task Management System', 'Versions': '1.0'}
CVE-2023-0283
A vulnerability classified as critical has been found in SourceCodester Online Flight Booking Management System. This affects an unknown part of the file review_search.php of the component POST Parameter Handler. The manipulation of the argument txtsearch leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218277 was assigned to this vulnerability.
https://vuldb.com/?id.218277
2023-01-13T09:19:36.713Z
2023-01-13T09:20:41.172Z
2023-10-20T18:17:48.981Z
{'Vendor': 'SourceCodester', 'Product': 'Online Flight Booking Management System', 'Versions': 'n/a'}
CVE-2023-0779
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549
2023-02-10T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'zephyrproject-rtos', 'Product': 'zephyr', 'Versions': 'unspecified, unspecified'}
CVE-2023-0329
The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role.
https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493
2023-01-16T19:21:03.388Z
2023-05-30T07:49:13.896Z
2023-05-30T07:49:13.896Z
{'Vendor': 'Unknown', 'Product': 'Elementor Website Builder', 'Versions': '0'}
CVE-2023-0796
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
2023-02-12T00:00:00
2023-02-13T00:00:00
2023-05-30T00:00:00
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}
CVE-2023-0542
The Custom Post Type List Shortcode WordPress plugin through 1.4.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/17de2f77-3e6c-4c22-9196-6e5577ee7fcf
2023-01-27T12:24:34.778Z
2023-05-08T13:58:11.670Z
2023-05-08T13:58:11.670Z
{'Vendor': 'Unknown', 'Product': 'Custom Post Type List Shortcode', 'Versions': '0'}
CVE-2023-0112
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
https://huntr.dev/bounties/ec2a29dc-79a3-44bd-a58b-15f676934af6
2023-01-07T00:00:00
2023-01-07T00:00:00
2023-01-07T00:00:00
{'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'}
CVE-2023-0811
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-01
2023-02-13T15:41:55.590Z
2023-03-16T17:41:25.525Z
2023-03-16T17:45:14.919Z
{'Vendor': 'Omron ', 'Product': 'CJ1M SYSMAC CJ-series', 'Versions': 'All versions '}
CVE-2023-0954
A debug feature in Sensormatic Electronics Illustra Pro Gen 4 Dome and PTZ cameras allows a user to compromise credentials after a long period of sustained attack.
https://www.johnsoncontrols.com/cyber-solutions/security-advisories
2023-02-22T14:10:57.113Z
2023-06-08T20:05:20.697Z
2023-06-08T20:05:20.697Z
{'Vendor': 'Sensormatic Electronics, a subsidiary of Johnson Controls, Inc.', 'Product': 'Illustra Pro Gen 4 Dome', 'Versions': '0'}
CVE-2023-0057
Improper Restriction of Rendered UI Layers or Frames in GitHub repository pyload/pyload prior to 0.5.0b3.dev33.
https://huntr.dev/bounties/12b64f91-d048-490c-94b0-37514b6d694d
2023-01-04T00:00:00
2023-01-05T00:00:00
2023-01-05T00:00:00
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
CVE-2023-0684
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_unassign_folders function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as changing the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/29358ea9-21b7-4294-8fc9-0d38e689cf53
2023-02-06T17:29:39.711Z
2023-02-08T01:12:09.622Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0391
MGT-COMMERCE CloudPanel ships with a static SSL certificate to encrypt communications to the administrative interface, shared across every installation of CloudPanel. This behavior was observed in version 2.2.0. There has been no indication from the vendor this has been addressed in version 2.2.1.
https://www.rapid7.com/blog/post/2023/03/21/cve-2023-0391-mgt-commerce-cloudpanel-shared-certificate-vulnerability-and-weak-installation-procedures/
2023-01-18T19:24:25.810Z
2023-03-21T19:25:25.895Z
2023-03-23T18:36:43.772Z
{'Vendor': 'MGT-COMMERCE', 'Product': 'CloudPanel', 'Versions': '0'}
CVE-2023-0104
The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decompiling a malicious project file. This may allow an attacker to gain control of the user’s computer or gain access to sensitive data.  
https://www.cisa.gov/uscert/ics/advisories/icsa-23-045-01
2023-01-06T18:50:05.156Z
2023-02-22T20:25:04.680Z
2023-02-22T20:25:04.680Z
{'Vendor': 'Weintek', 'Product': 'EasyBuilder Pro cMT ', 'Versions': '0, 0, 0'}
CVE-2023-0554
The Quick Restaurant Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to update menu items, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc7c214-8d76-453c-a05d-682aa425b06e
2023-01-27T20:28:33.450Z
2023-01-27T20:28:40.673Z
null
{'Vendor': 'alejandropascual', 'Product': 'Quick Restaurant Menu', 'Versions': '*'}
CVE-2023-0041
IBM Security Guardium 11.5 could allow a user to take over another user's session due to insufficient session expiration. IBM X-Force ID: 243657.
https://www.ibm.com/support/pages/node/7000021
2023-01-03T19:19:15.053Z
2023-06-05T00:53:27.660Z
2023-06-05T02:15:31.346Z
{'Vendor': 'IBM', 'Product': 'Security Guardium', 'Versions': '11.5'}
CVE-2023-0411
Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-06.html
2023-01-20T00:00:00
2023-01-24T00:00:00
2023-02-08T00:00:00
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.3, >=3.6.0, <3.6.11'}
CVE-2023-0942
The Japanized For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tab’ parameter in versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bb606a30-2f7c-41e9-9ebc-9f1b0b84fff8
2023-02-21T19:11:32.615Z
2023-02-21T19:29:16.761Z
2023-02-21T19:29:16.761Z
{'Vendor': 'shoheitanaka', 'Product': 'Japanized For WooCommerce', 'Versions': '*'}
CVE-2023-0738
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
https://github.com/Orangescrum/orangescrum/
2023-02-08T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'OrangeScrum', 'Versions': '2.0.11'}
CVE-2023-0692
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_payment_status' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the payment status of arbitrary form submissions.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd85ff2-6607-4ac8-b91c-88f6f2fa6c56?source=cve
2023-02-06T21:01:15.623Z
2023-06-09T05:33:36.880Z
2023-06-09T05:33:36.880Z
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}
CVE-2023-0368
The Responsive Tabs For WPBakery Page Builder (formerly Visual Composer) WordPress plugin through 1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/b41e5c09-1034-48a7-ac0f-d4db6e7a3b3e
2023-01-18T07:05:39.021Z
2023-06-19T10:52:48.139Z
2023-06-19T10:52:48.139Z
{'Vendor': 'Unknown', 'Product': 'Responsive Tabs For WPBakery Page Builder (formerly Visual Composer)', 'Versions': '0'}
CVE-2023-0387
null
null
2023-01-18T00:00:00
null
2023-05-12T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-0503
The Free WooCommerce Theme 99fy Extension WordPress plugin before 1.2.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/3cb148fb-1f30-4316-a421-10da51d849f3
2023-01-25T10:08:41.675Z
2023-03-27T15:37:31.086Z
2023-03-27T15:37:31.086Z
{'Vendor': 'Unknown', 'Product': 'Free WooCommerce Theme 99fy Extension', 'Versions': '0'}
CVE-2023-0153
The Vimeo Video Autoplay Automute WordPress plugin through 1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/f3459868-28aa-4a5d-94d8-bbc17e3ce653
2023-01-10T10:58:27.746Z
2023-02-06T19:59:28.523Z
null
{'Vendor': 'Unknown', 'Product': 'Vimeo Video Autoplay Automute', 'Versions': '0'}
CVE-2023-0850
A vulnerability was found in Netgear WNDR3700v2 1.0.1.14 and classified as problematic. This issue affects some unknown processing of the component Web Interface. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221153 was assigned to this vulnerability.
https://vuldb.com/?id.221153
2023-02-15T21:44:48.964Z
2023-02-15T21:45:33.719Z
2023-10-20T21:10:18.524Z
{'Vendor': 'Netgear', 'Product': 'WNDR3700v2', 'Versions': '1.0.1.14'}
CVE-2023-0915
A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. Affected is an unknown function of the file /adms/admin/?page=user/manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221490 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221490
2023-02-19T08:08:41.125Z
2023-02-19T08:08:58.505Z
2023-10-20T21:27:23.281Z
{'Vendor': 'SourceCodester', 'Product': 'Auto Dealer Management System', 'Versions': '1.0'}
CVE-2023-0446
The My YouTube Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 3.0.12.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d979f899-8cdc-4230-b1b5-865c025dc86a
2023-01-23T16:24:10.765Z
2023-01-23T16:25:53.272Z
2023-01-23T16:31:09.896Z
{'Vendor': 'urkekg', 'Product': 'My YouTube Channel', 'Versions': '*'}
CVE-2023-0016
SAP BPC MS 10.0 - version 810, allows an unauthorized attacker to execute crafted database queries. The exploitation of this issue could lead to SQL injection vulnerability and could allow an attacker to access, modify, and/or delete data from the backend database.
https://launchpad.support.sap.com/#/notes/3275391
2022-12-16T03:13:55.421Z
2023-01-10T03:13:29.718Z
null
{'Vendor': 'SAP', 'Product': 'SAP BPC MS 10.0', 'Versions': '800, 810'}
CVE-2023-0295
The Launchpad plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of its settings parameters in versions up to, and including, 1.0.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b8721c4d-d89b-4e97-af01-20327013cfb6
2023-01-13T19:54:30.477Z
2023-01-13T19:54:33.692Z
null
{'Vendor': 'obox', 'Product': 'Launchpad – Coming Soon & Maintenance Mode Plugin', 'Versions': '*'}
CVE-2023-0780
Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9-dev.
https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4
2023-02-11T00:00:00
2023-02-11T00:00:00
2023-02-11T00:00:00
{'Vendor': 'cockpit-hq', 'Product': 'cockpit-hq/cockpit', 'Versions': 'unspecified'}
CVE-2023-0597
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
2023-01-31T00:00:00
2023-02-23T00:00:00
2023-07-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.2-rc1'}
CVE-2023-0082
The ExactMetrics WordPress plugin before 7.12.1 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/e1ba5047-0c39-478f-89c7-b0bb638efdff
2023-01-05T10:10:41.541Z
2023-02-06T19:59:29.364Z
null
{'Vendor': 'Unknown', 'Product': 'ExactMetrics', 'Versions': '0'}
CVE-2023-0578
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ASOS Information Technologies Book Cites allows Cross-Site Scripting (XSS).This issue affects Book Cites: before 23.01.05.
https://www.usom.gov.tr/bildirim/tr-23-0125
2023-01-30T10:09:34.950Z
2023-03-03T06:57:04.626Z
2023-03-26T19:47:40.280Z
{'Vendor': 'ASOS Information Technologies', 'Product': 'Book Cites', 'Versions': '0'}
CVE-2023-0128
Use after free in Overview Mode in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
2023-01-09T00:00:00
2023-01-10T00:00:00
2023-11-25T11:06:28.860461
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0981
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been classified as critical. Affected is an unknown function of the component Delete User. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221676.
https://vuldb.com/?id.221676
2023-02-23T11:05:37.505Z
2023-02-23T11:06:20.728Z
2023-10-20T21:48:12.371Z
{'Vendor': 'SourceCodester', 'Product': 'Yoga Class Registration System', 'Versions': '1.0'}
CVE-2023-0201
NVIDIA DGX-2 SBIOS contains a vulnerability in Bds, where a user with high privileges can cause a write beyond the bounds of an indexable resource, which may lead to code execution, denial of service, compromised integrity, and information disclosure.
https://nvidia.custhelp.com/app/answers/detail/a_id/5449
2023-01-11T05:48:52.373Z
2023-04-22T02:22:51.372Z
2023-04-22T02:22:51.372Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA DGX servers', 'Versions': 'All BMC versions prior to 1.08.00'}
CVE-2023-0651
A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.220038
2023-02-02T13:42:00.288Z
2023-02-02T13:42:18.871Z
2023-10-20T20:39:48.627Z
{'Vendor': 'n/a', 'Product': 'FastCMS', 'Versions': '0.1.0'}
CVE-2023-0344
Akuvox E11 appears to be using a custom version of dropbear SSH server. This server allows an insecure option that by default is not in the official dropbear SSH server.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
2023-01-17T19:22:43.890Z
2023-03-31T15:43:23.608Z
2023-03-31T15:43:23.608Z
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
CVE-2023-0190
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:45.857Z
2023-04-22T02:19:06.133Z
2023-04-22T02:19:06.133Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA GPU Display Driver', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0939
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NTN Information Technologies Online Services Software allows SQL Injection.This issue affects Online Services Software: before 1.17.
https://www.usom.gov.tr/bildirim/tr-23-0103
2023-02-21T12:56:35.265Z
2023-02-23T07:28:57.972Z
2023-02-23T07:29:34.755Z
{'Vendor': 'NTN Information Technologies', 'Product': 'Online Services Software', 'Versions': '0'}
CVE-2023-0893
The Time Sheets WordPress plugin before 1.29.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/fd6ef6ee-15e9-44ac-a2db-976393a3b71a
2023-02-17T15:00:58.320Z
2023-04-10T13:17:53.888Z
2023-04-10T13:17:53.888Z
{'Vendor': 'Unknown', 'Product': 'Time Sheets', 'Versions': '0'}
CVE-2023-0485
An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible that a project member demoted to a user role to read project updates by doing a diff with a pre-existing fork.
https://gitlab.com/gitlab-org/gitlab/-/issues/389191
2023-01-24T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=13,11, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
CVE-2023-0606
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b
2023-02-01T00:00:00
2023-02-01T00:00:00
2023-02-01T00:00:00
{'Vendor': 'ampache', 'Product': 'ampache/ampache', 'Versions': 'unspecified'}
CVE-2023-0256
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been classified as critical. Affected is an unknown function of the file /fos/admin/ajax.php?action=login of the component Login Page. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-218184.
https://vuldb.com/?id.218184
2023-01-12T21:02:25.399Z
2023-01-12T21:03:04.018Z
2023-10-20T18:12:56.310Z
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
CVE-2023-0743
Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.
https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863
2023-02-08T00:00:00
2023-02-08T00:00:00
2023-02-08T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-0313
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256
2023-01-15T00:00:00
2023-01-15T00:00:00
2023-01-15T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-0885
null
null
2023-02-17T00:00:00
null
2023-02-23T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-0186
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer, where an out-of-bounds write can lead to denial of service and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:43.040Z
2023-04-01T04:41:14.602Z
2023-04-01T04:41:14.602Z
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0539
The GS Insever Portfolio WordPress plugin before 1.4.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/a4b6a83a-6394-4dfc-8bb3-4982867dab7d
2023-01-27T12:24:13.590Z
2023-02-27T15:24:35.760Z
2023-02-27T15:24:35.760Z
{'Vendor': 'Unknown', 'Product': 'GS Insever Portfolio', 'Versions': '0'}
CVE-2023-0493
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5.
https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f
2023-01-25T00:00:00
2023-01-26T00:00:00
2023-10-10T07:22:20.882Z
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
CVE-2023-0169
The Zoho Forms WordPress plugin before 3.0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/178d71f2-4666-4f7e-ada5-cb72a50fd663
2023-01-11T03:09:16.304Z
2023-02-13T14:32:11.933Z
null
{'Vendor': 'Unknown', 'Product': 'Form plugin for WordPress', 'Versions': '0'}
CVE-2023-0240
There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93
2023-01-12T13:04:00.937Z
2023-01-30T13:17:09.182Z
null
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.10'}
CVE-2023-0610
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926
2023-02-01T00:00:00
2023-02-01T00:00:00
2023-02-01T00:00:00
{'Vendor': 'wallabag', 'Product': 'wallabag/wallabag', 'Versions': 'unspecified'}
CVE-2023-0305
A vulnerability classified as critical was found in SourceCodester Online Food Ordering System. This vulnerability affects unknown code of the file admin_class.php of the component Login Module. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-218386 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.218386
2023-01-15T09:01:37.225Z
2023-01-15T11:58:05.307Z
2023-10-20T18:22:42.098Z
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': 'n/a'}
CVE-2023-0755
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01
2023-02-08T20:21:34.258Z
2023-02-23T21:23:19.210Z
2023-02-23T21:23:19.210Z
{'Vendor': 'PTC', 'Product': 'ThingWorx Edge C-SDK', 'Versions': '0'}
CVE-2023-0581
The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation in versions up to, and including, 8.4.3. This is due to the plugin checking if an IP had been blocklist via client-side scripts rather than server-side. This makes it possible for unauthenticated attackers to bypass any login restrictions that may prevent a brute force attack.
https://www.wordfence.com/threat-intel/vulnerabilities/id/de73304e-7a28-4304-b1ed-2f6dd7738236
2023-01-30T14:06:16.652Z
2023-01-30T14:06:27.936Z
null
{'Vendor': 'LCWeb', 'Product': 'PrivateContent', 'Versions': '*'}
CVE-2023-0978
A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
https://kcm.trellix.com/corporate/index?page=content&id=SB10397
2023-02-23T05:28:48.678Z
2023-03-13T13:29:32.271Z
2023-04-03T15:34:38.217Z
{'Vendor': 'Trellix', 'Product': 'Trellix Intelligent Sandbox', 'Versions': ' 5.0'}
CVE-2023-0997
A vulnerability was found in SourceCodester Moosikay E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Moosikay/order.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221732.
https://vuldb.com/?id.221732
2023-02-24T07:28:36.437Z
2023-02-24T07:29:22.911Z
2023-10-20T21:54:18.152Z
{'Vendor': 'SourceCodester', 'Product': 'Moosikay E-Commerce System', 'Versions': '1.0'}
CVE-2023-0094
The UpQode Google Maps WordPress plugin through 1.0.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/1453471f-164d-4487-a736-8cea086212fe/
2023-01-06T03:26:50.188Z
2024-01-16T15:55:46.407Z
2024-01-16T15:55:46.407Z
{'Vendor': 'Unknown', 'Product': 'UpQode Google Maps', 'Versions': '0'}
CVE-2023-0647
A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.220034
2023-02-02T13:27:39.481Z
2023-02-02T13:27:57.263Z
2023-10-20T20:34:55.936Z
{'Vendor': 'n/a', 'Product': 'dst-admin', 'Versions': '1.5.0'}
CVE-2023-0217
An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack. The TLS implementation in OpenSSL does not call this function but applications might call the function if there are additional security requirements imposed by standards such as FIPS 140-3.
https://www.openssl.org/news/secadv/20230207.txt
2023-01-11T12:02:46.441Z
2023-02-08T19:02:48.524Z
2023-02-24T14:44:48.097Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0'}
CVE-2023-0702
Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
2023-02-06T00:00:00
2023-02-07T00:00:00
2023-09-30T10:06:53.386266
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0352
The Akuvox E11 password recovery webpage can be accessed without authentication, and an attacker could download the device key file. An attacker could then use this page to reset the password back to the default.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01
2023-01-17T19:27:15.123Z
2023-03-13T20:15:51.389Z
2023-03-13T20:20:29.714Z
{'Vendor': 'Akuvox', 'Product': 'E11', 'Versions': 'All'}
CVE-2023-0325
Uvdesk version 1.1.1 allows an unauthenticated remote attacker to exploit a stored XSS in the application. This is possible because the application does not correctly validate the message sent by the clients in the ticket.
https://fluidattacks.com/advisories/labrinth/
2023-01-16T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'Uvdesk', 'Versions': '1.1.1'}
CVE-2023-0775
An invalid ‘prepare write request’ command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service.
https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000SMMyGQAX?operationContext=S1
2023-02-10T14:33:56.906Z
2023-03-28T16:23:29.836Z
2023-03-29T15:17:23.197Z
{'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0'}
CVE-2023-0260
The WP Review Slider WordPress plugin before 12.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
https://wpscan.com/vulnerability/9165d46b-2a27-4e83-a096-73ffe9057c80
2023-01-12T22:01:11.826Z
2023-02-13T14:32:12.713Z
null
{'Vendor': 'Unknown', 'Product': 'WP Review Slider', 'Versions': '0'}
CVE-2023-0630
The Slimstat Analytics WordPress plugin before 4.9.3.3 does not prevent subscribers from rendering shortcodes that concatenates attributes directly into an SQL query.
https://wpscan.com/vulnerability/b82bdd02-b699-4527-86cc-d60b56ab0c55
2023-02-01T22:54:00.198Z
2023-03-20T15:52:13.523Z
2023-03-20T15:52:13.523Z
{'Vendor': 'Unknown', 'Product': 'Slimstat Analytics', 'Versions': '4.1'}
CVE-2023-0519
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129
2023-01-26T00:00:00
2023-01-26T00:00:00
2023-01-26T00:00:00
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-0149
The WordPrezi WordPress plugin before 0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/6b6f9e42-7f7f-4daa-99c9-14a24a6d76b0
2023-01-10T10:58:10.771Z
2023-02-06T19:59:30.480Z
2023-03-29T13:15:09.334Z
{'Vendor': 'Unknown', 'Product': 'WordPrezi', 'Versions': '0'}
CVE-2023-0722
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_state function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/261a1bf0-a147-48c8-878e-f9b725ac74d8
2023-02-07T17:13:15.660Z
2023-02-08T01:12:53.508Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0688
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_thankyou' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about form submissions, including payment status, and transaction ID.
https://www.wordfence.com/threat-intel/vulnerabilities/id/81fc41a4-9206-404c-bd5b-821c77ff3593?source=cve
2023-02-06T19:49:27.548Z
2023-06-09T05:33:22.696Z
2023-06-09T05:33:22.696Z
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}