CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-0014
|
SAP NetWeaver ABAP Server and ABAP Platform - versions SAP_BASIS 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, KERNEL 7.22, 7.53, 7.77, 7.81, 7.85, 7.89, KRNL64UC 7.22, 7.22EXT, 7.53, KRNL64NUC 7.22, 7.22EXT, creates information about system identity in an ambiguous format. This could lead to capture-replay vulnerability and may be exploited by malicious users to obtain illegitimate access to the system.
|
https://launchpad.support.sap.com/#/notes/3089413
|
2022-12-16T03:13:43.141Z
|
2023-01-10T03:02:39.962Z
| null |
{'Vendor': 'SAP', 'Product': 'NetWeaver ABAP Server and ABAP Platform', 'Versions': 'SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 710, SAP_BASIS 711, SAP_BASIS 730, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, KERNEL 7.22, KERNEL 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT'}
|
CVE-2023-0917
|
A vulnerability, which was classified as critical, was found in SourceCodester Simple Customer Relationship Management System 1.0. This affects an unknown part of the file /php-scrm/login.php. The manipulation of the argument Password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221493 was assigned to this vulnerability.
|
https://vuldb.com/?id.221493
|
2023-02-19T08:12:21.383Z
|
2023-02-19T08:12:43.846Z
|
2023-10-20T21:29:49.575Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Customer Relationship Management System', 'Versions': '1.0'}
|
CVE-2023-0852
|
Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
|
https://www.canon-europe.com/support/product-security-latest-news/
|
2023-02-16T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
|
CVE-2023-0501
|
The WP Insurance WordPress plugin before 2.1.4 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/36fd6c0d-3f0c-4f7d-aa17-5b2d084ab94c
|
2023-01-25T10:08:19.563Z
|
2023-03-27T15:37:33.856Z
|
2023-03-27T15:37:33.856Z
|
{'Vendor': 'Unknown', 'Product': 'WP Insurance', 'Versions': '0'}
|
CVE-2023-0151
|
The uTubeVideo Gallery WordPress plugin before 2.0.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/d9fc6f5f-efc1-4e23-899b-e9a49330ed13
|
2023-01-10T10:58:18.464Z
|
2023-02-13T14:32:22.947Z
| null |
{'Vendor': 'Unknown', 'Product': 'uTubeVideo Gallery', 'Versions': '0'}
|
CVE-2023-0385
|
The Custom 404 Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.7.1. This is due to missing or incorrect nonce validation on the custom_404_pro_admin_init function. This makes it possible for unauthenticated attackers to delete logs, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/968920b9-febf-4d76-a16b-f27954cd72e5
|
2023-01-18T14:18:41.930Z
|
2023-01-18T14:18:55.171Z
| null |
{'Vendor': 'kunalnagar', 'Product': 'Custom 404 Pro', 'Versions': '*'}
|
CVE-2023-0690
|
HashiCorp Boundary from 0.10.0 through 0.11.2 contain an issue where when using a PKI-based worker with a Key Management Service (KMS) defined in the configuration file, new credentials created after an automatic rotation may not have been encrypted via the intended KMS. This would result in the credentials being stored in plaintext on the Boundary PKI worker’s disk.
This issue is fixed in version 0.12.0.
|
https://discuss.hashicorp.com/t/hcsec-2023-03-boundary-workers-store-rotated-credentials-in-plaintext-even-when-key-management-service-configured/49907
|
2023-02-06T20:52:57.188Z
|
2023-02-08T18:27:33.548Z
| null |
{'Vendor': 'HashiCorp', 'Product': 'Boundary', 'Versions': '0.10.0'}
|
CVE-2023-0940
|
The ProfileGrid WordPress plugin before 5.3.1 provides an AJAX endpoint for resetting a user password but does not implement proper authorization. This allows a user with low privileges, such as subscriber, to change the password of any account, including Administrator ones.
|
https://wpscan.com/vulnerability/56744f72-2d48-4f42-8195-24b4dd951bb5
|
2023-02-21T15:17:48.691Z
|
2023-03-20T15:52:16.823Z
|
2023-03-24T10:51:51.921Z
|
{'Vendor': 'Unknown', 'Product': 'ProfileGrid', 'Versions': '0'}
|
CVE-2023-0043
|
The Custom Add User WordPress plugin through 2.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
https://wpscan.com/vulnerability/e012f23a-7daf-4ef3-b116-d0e2ed5bd0a3
|
2023-01-04T06:27:36.075Z
|
2023-02-27T15:24:41.583Z
|
2023-02-27T15:24:41.583Z
|
{'Vendor': 'Unknown', 'Product': 'Custom Add User', 'Versions': '0'}
|
CVE-2023-0413
|
Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
|
https://www.wireshark.org/security/wnpa-sec-2023-03.html
|
2023-01-20T00:00:00
|
2023-01-24T00:00:00
|
2023-02-08T00:00:00
|
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.3, >=3.6.0, <3.6.11'}
|
CVE-2023-0106
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
|
https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb
|
2023-01-07T00:00:00
|
2023-01-07T00:00:00
|
2023-01-07T00:00:00
|
{'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'}
|
CVE-2023-0556
|
The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to obtain the blog metadata (via the function cstu_get_metadata) that includes the plugin's contentstudio_token. Knowing this token allows for other interactions with the plugin such as creating posts in versions prior to 1.2.5, which added other requirements to posting and updating.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/52db8d41-859a-4d68-8b83-3d3af8f1bf64
|
2023-01-27T21:02:03.555Z
|
2023-01-27T21:08:16.313Z
| null |
{'Vendor': 'contentstudio', 'Product': 'ContentStudio', 'Versions': '*'}
|
CVE-2023-0805
|
An issue has been discovered in GitLab EE affecting all versions starting from 15.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to have access to the public projects of a public group even after being banned from the public group by the owner.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/391433
|
2023-02-13T00:00:00
|
2023-05-03T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.2, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1'}
|
CVE-2023-0669
|
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
|
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1
|
2023-02-03T22:09:23.898Z
|
2023-02-06T19:16:19.265Z
|
2023-02-08T22:39:50.064Z
|
{'Vendor': 'Fortra', 'Product': 'Goanywhere MFT', 'Versions': '0'}
|
CVE-2023-0686
|
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The identifier VDB-220245 was assigned to this vulnerability.
|
https://vuldb.com/?id.220245
|
2023-02-06T18:48:46.088Z
|
2023-02-06T18:50:20.362Z
|
2023-10-20T20:49:34.225Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Eyewear Shop', 'Versions': '1.0'}
|
CVE-2023-0405
|
The GPT AI Power: Content Writer & ChatGPT & Image Generator & WooCommerce Product Writer & AI Training WordPress plugin before 1.4.38 does not perform any kind of nonce or privilege checks before letting logged-in users modify arbitrary posts.
|
https://wpscan.com/vulnerability/3ca9ac21-2bce-4480-9079-b4045b261273
|
2023-01-19T14:42:56.562Z
|
2023-02-13T14:32:23.773Z
| null |
{'Vendor': 'Unknown', 'Product': 'GPT AI Power: Content Writer & ChatGPT & Image Generator & WooCommerce Product Writer & AI Training', 'Versions': '0'}
|
CVE-2023-0055
|
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32.
|
https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce
|
2023-01-04T00:00:00
|
2023-01-04T00:00:00
|
2023-01-04T00:00:00
|
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
|
CVE-2023-0956
|
External input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03
|
2023-02-22T16:00:49.434Z
|
2023-08-03T18:08:13.924Z
|
2023-08-03T18:08:13.924Z
|
{'Vendor': 'TEL-STER', 'Product': 'TelWin SCADA WebInterface', 'Versions': '3.2, 7.0, 8.0'}
|
CVE-2023-0813
|
A flaw was found in the Network Observability plugin for OpenShift console. Unless the Loki authToken configuration is set to FORWARD mode, authentication is no longer enforced, allowing any user who can connect to the OpenShift Console in an OpenShift cluster to retrieve flows without authentication.
|
https://access.redhat.com/errata/RHSA-2023:0786
|
2023-02-13T16:49:21.409Z
|
2023-09-15T20:17:41.914Z
|
2023-09-15T20:17:41.914Z
|
{'Vendor': 'n/a', 'Product': 'network-observability-console-plugin-container', 'Versions': ''}
|
CVE-2023-0540
|
The GS Filterable Portfolio WordPress plugin before 1.6.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/b35b3da2-468d-4fe5-bff6-812432197a38
|
2023-01-27T12:24:18.146Z
|
2023-02-21T08:50:58.166Z
|
2023-02-21T08:50:58.166Z
|
{'Vendor': 'Unknown', 'Product': 'GS Filterable Portfolio', 'Versions': '0'}
|
CVE-2023-0110
|
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
|
https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c
|
2023-01-07T00:00:00
|
2023-01-07T00:00:00
|
2023-01-07T00:00:00
|
{'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'}
|
CVE-2023-0794
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb
|
2023-02-12T00:00:00
|
2023-02-12T00:00:00
|
2023-12-18T10:29:28.207Z
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-0281
|
A vulnerability was found in SourceCodester Online Flight Booking Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file judge_panel.php. The manipulation of the argument subevent_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218276.
|
https://vuldb.com/?id.218276
|
2023-01-13T09:17:35.860Z
|
2023-01-13T09:18:27.640Z
|
2023-10-20T18:16:35.846Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Flight Booking Management System', 'Versions': 'n/a'}
|
CVE-2023-0901
|
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pixelfed/pixelfed prior to 0.11.4.
|
https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010
|
2023-02-18T00:00:00
|
2023-02-18T00:00:00
|
2023-02-18T00:00:00
|
{'Vendor': 'pixelfed', 'Product': 'pixelfed/pixelfed', 'Versions': 'unspecified'}
|
CVE-2023-0002
|
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to execute privileged cytool commands that disable or uninstall the agent.
|
https://security.paloaltonetworks.com/CVE-2023-0002
|
2022-10-27T18:48:11.588Z
|
2023-02-08T17:21:47.711Z
| null |
{'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XDR agent', 'Versions': '7.9 All, 7.8 All, 7.5, 5.0'}
|
CVE-2023-0452
|
Econolite EOS versions prior to 3.2.23 use a weak hash
algorithm for encrypting privileged user credentials. A configuration file that
is accessible without authentication uses MD5 hashes for encrypting
credentials, including those of administrators and technicians.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02
|
2023-01-23T18:19:28.691Z
|
2023-01-26T20:39:37.729Z
|
2023-06-20T15:38:11.331Z
|
{'Vendor': 'Econolite', 'Product': 'EOS', 'Versions': '0'}
|
CVE-2023-0147
|
The Flexible Captcha WordPress plugin through 4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/af9cbb4a-42fc-43c5-88f3-349b417f1a6a
|
2023-01-10T10:58:01.572Z
|
2023-02-06T19:59:41.302Z
| null |
{'Vendor': 'Unknown', 'Product': 'Flexible Captcha', 'Versions': '0'}
|
CVE-2023-0844
|
The Namaste! LMS WordPress plugin before 2.6 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
https://wpscan.com/vulnerability/8d8e5852-3787-47f9-9931-8308bb81beb1
|
2023-02-15T15:18:33.795Z
|
2023-03-13T16:03:35.583Z
|
2023-03-13T16:03:35.583Z
|
{'Vendor': 'Unknown', 'Product': 'Namaste! LMS', 'Versions': '0'}
|
CVE-2023-0999
|
A vulnerability classified as problematic was found in SourceCodester Sales Tracker Management System 1.0. This vulnerability affects unknown code of the file admin/?page=user/list. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221734 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221734
|
2023-02-24T07:38:33.664Z
|
2023-02-24T07:40:26.148Z
|
2023-10-20T21:56:44.556Z
|
{'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'}
|
CVE-2023-0833
|
A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
|
https://access.redhat.com/errata/RHSA-2023:1241
|
2023-02-14T18:56:25.296Z
|
2023-09-27T13:41:12.626Z
|
2023-09-27T13:41:12.626Z
|
{'Vendor': 'n/a', 'Product': 'okhttp', 'Versions': '4.9.2'}
|
CVE-2023-0560
|
A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. This issue affects some unknown processing of the file admin/practice_pdf.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219701 was assigned to this vulnerability.
|
https://vuldb.com/?id.219701
|
2023-01-28T16:10:17.298Z
|
2023-01-28T16:10:46.083Z
|
2023-10-20T19:43:16.247Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-0130
|
Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
|
2023-01-09T00:00:00
|
2023-01-10T00:00:00
|
2023-11-25T11:06:22.613620
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0425
|
ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves
the reported vulnerabilities in the product versions under maintenance.
An attacker who successfully exploited one or more of these vulnerabilities could cause the product to
stop or make the product inaccessible.
Numeric Range Comparison Without Minimum Check vulnerability in ABB Freelance controllers AC 700F (Controller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects:
Freelance controllers AC 700F:
from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1;
Freelance controllers AC 900F:
Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.
|
https://search.abb.com/library/Download.aspx?DocumentID=7PAA007517&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.68514131.339223974.1691382343-1911411808.1686627590
|
2023-01-20T10:59:16.973Z
|
2023-08-07T05:06:46.584Z
|
2023-08-07T05:23:54.031Z
|
{'Vendor': 'ABB', 'Product': ' Freelance controllers AC 700F', 'Versions': '9.0;0, 0, 0, 0, 0, 0, 0, 0'}
|
CVE-2023-0075
|
The Amazon JS WordPress plugin through 0.10 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/097acd6f-3291-4cdc-a054-4432b6350411
|
2023-01-05T04:20:02.718Z
|
2023-02-13T14:32:24.576Z
| null |
{'Vendor': 'Unknown', 'Product': 'Amazon JS', 'Versions': '0'}
|
CVE-2023-0976
|
A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree.
|
https://kcm.trellix.com/corporate/index?page=content&id=SB10398
|
2023-02-23T04:06:41.212Z
|
2023-06-07T07:35:57.484Z
|
2023-06-08T04:48:22.104Z
|
{'Vendor': 'Trellix', 'Product': 'Trellix Agent', 'Versions': '5.7.8'}
|
CVE-2023-0219
|
The FluentSMTP WordPress plugin before 2.2.3 does not sanitize or escape email content, making it vulnerable to stored cross-site scripting attacks (XSS) when an administrator views the email logs. This exploit requires other plugins to enable users to send emails with unfiltered HTML.
|
https://wpscan.com/vulnerability/71662b72-311c-42db-86c5-a0276d25535c
|
2023-01-11T12:20:09.137Z
|
2023-03-13T16:03:36.376Z
|
2023-03-13T16:03:36.376Z
|
{'Vendor': 'Unknown', 'Product': 'FluentSMTP', 'Versions': '0'}
|
CVE-2023-0649
|
A vulnerability has been found in dst-admin 1.5.0 and classified as critical. This vulnerability affects unknown code of the file /home/sendBroadcast. The manipulation of the argument message leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220036.
|
https://vuldb.com/?id.220036
|
2023-02-02T13:33:03.138Z
|
2023-02-02T13:33:19.311Z
|
2023-10-20T20:37:22.274Z
|
{'Vendor': 'n/a', 'Product': 'dst-admin', 'Versions': '1.5.0'}
|
CVE-2023-0167
|
The GetResponse for WordPress plugin through 5.5.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/fafbf666-b908-48ef-9041-fea653e9bfeb
|
2023-01-11T03:09:01.462Z
|
2023-03-20T15:52:17.698Z
|
2023-03-20T15:52:17.698Z
|
{'Vendor': 'Unknown', 'Product': 'GetResponse for WordPress', 'Versions': '0'}
|
CVE-2023-0537
|
The Product Slider For WooCommerce Lite WordPress plugin through 1.1.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/d7369f1d-d1a0-4576-a676-c70525a6c743
|
2023-01-27T11:33:12.024Z
|
2023-05-08T13:58:22.926Z
|
2023-05-08T13:58:22.926Z
|
{'Vendor': 'Unknown', 'Product': 'Product Slider For WooCommerce Lite', 'Versions': '0'}
|
CVE-2023-0864
|
Cleartext Transmission of Sensitive Information vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (CE) (Terra AC MID), ABB Terra AC wallbox (CE) Terra AC Juno CE, ABB Terra AC wallbox (CE) Terra AC PTB, ABB Terra AC wallbox (CE) Symbiosis, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): from 1.0;0 through 1.5.5; Terra AC wallbox (UL32A) : from 1.0;0 through 1.6.5; Terra AC wallbox (CE) (Terra AC MID): from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC Juno CE: from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC PTB : from 1.0;0 through 1.5.25; Terra AC wallbox (CE) Symbiosis: from 1.0;0 through 1.2.7; Terra AC wallbox (JP): from 1.0;0 through 1.6.5.
|
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108468A1415&LanguageCode=en&DocumentPartId=&Action=Launch
|
2023-02-16T13:04:48.837Z
|
2023-05-17T07:15:52.371Z
|
2023-05-17T07:15:52.371Z
|
{'Vendor': 'ABB', 'Product': 'Terra AC wallbox (UL40/80A)', 'Versions': '1.0;0'}
|
CVE-2023-0921
|
A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/392433
|
2023-02-20T00:00:00
|
2023-06-06T00:00:00
|
2023-06-06T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=8.3, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
|
CVE-2023-0022
|
SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker to inject malicious code that can be executed by the application over the network. On successful exploitation, an attacker can perform operations that may completely compromise the application causing a high impact on the confidentiality, integrity, and availability of the application.
|
https://launchpad.support.sap.com/#/notes/3262810
|
2022-12-22T15:07:25.091Z
|
2023-01-10T03:25:36.853Z
| null |
{'Vendor': 'SAP', 'Product': 'BusinessObjects Business Intelligence platform (Analysis edition for OLAP)', 'Versions': '420, 430'}
|
CVE-2023-0188
|
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:44.434Z
|
2023-04-01T04:45:45.241Z
|
2023-04-01T04:45:45.241Z
|
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0472
|
Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html
|
2023-01-24T00:00:00
|
2023-01-24T00:00:00
|
2023-02-20T00:00:00
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0872
|
The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
OpenNMS thanks Erik Wynter for reporting this issue.
|
https://docs.opennms.com/horizon/32/releasenotes/changelog.html
|
2023-02-16T18:29:36.820Z
|
2023-08-14T17:21:58.203Z
|
2023-08-14T17:21:58.203Z
|
{'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8, 0'}
|
CVE-2023-0171
|
The jQuery T(-) Countdown Widget WordPress plugin before 2.3.24 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/32324655-ff91-4a53-a2c5-ebe6678d4a9d
|
2023-01-11T03:09:32.224Z
|
2023-02-06T19:59:42.127Z
| null |
{'Vendor': 'Unknown', 'Product': 'jQuery T(-) Countdown Widget', 'Versions': '0'}
|
CVE-2023-0464
|
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
|
https://www.openssl.org/news/secadv/20230322.txt
|
2023-01-24T13:50:25.835Z
|
2023-03-22T16:36:47.383Z
|
2023-03-22T16:36:47.383Z
|
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0, 1.1.1, 1.0.2'}
|
CVE-2023-0034
|
The JetWidgets For Elementor WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/ffbdb8a1-19c3-45e9-81b0-ad47a0791c4a
|
2023-01-03T03:26:36.722Z
|
2023-02-13T14:32:25.406Z
|
2023-03-06T13:22:49.307Z
|
{'Vendor': 'Unknown', 'Product': 'JetWidgets For Elementor', 'Versions': '0'}
|
CVE-2023-0937
|
The VK All in One Expansion Unit WordPress plugin before 9.87.1.0 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
|
https://wpscan.com/vulnerability/5110ff02-c721-43eb-b13e-50aca25e1162
|
2023-02-21T09:24:38.503Z
|
2023-03-20T15:52:18.503Z
|
2023-03-20T15:52:18.503Z
|
{'Vendor': 'Unknown', 'Product': 'VK All in One Expansion Unit', 'Versions': '0'}
|
CVE-2023-0258
|
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Category List Handler. The manipulation of the argument Reason with the input "><script>prompt(1)</script> leads to cross site scripting. The attack may be launched remotely. VDB-218186 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.218186
|
2023-01-12T21:19:16.961Z
|
2023-01-12T21:20:59.100Z
|
2023-10-20T18:15:22.676Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
|
CVE-2023-0608
|
Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
|
https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
2023-02-01T00:00:00
|
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
|
CVE-2023-0126
|
Pre-authentication path traversal vulnerability in SMA1000 firmware version 12.4.2, which allows an unauthenticated attacker to access arbitrary files and directories stored outside the web root directory.
|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0001
|
2023-01-09T00:00:00
|
2023-01-19T00:00:00
|
2023-01-19T00:00:00
|
{'Vendor': 'SonicWall', 'Product': 'SonicWall SMA1000', 'Versions': '12.4.2'}
|
CVE-2023-0576
| null | null |
2023-01-30T08:16:23.029Z
|
2023-02-02T14:57:06.911Z
|
2023-02-06T14:21:17.584Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-0960
|
A vulnerability was found in SeaCMS 11.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /data/config.ftp.php of the component Picture Management. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-221630 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221630
|
2023-02-22T17:45:18.935Z
|
2023-02-22T17:46:17.392Z
|
2023-10-20T21:39:40.042Z
|
{'Vendor': 'n/a', 'Product': 'SeaCMS', 'Versions': '11.6'}
|
CVE-2023-0599
|
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
|
https://docs.rapid7.com/release-notes/metasploit/20230130/
|
2023-01-31T17:28:37.548Z
|
2023-02-01T22:13:54.609Z
| null |
{'Vendor': 'Rapid7', 'Product': 'Metasploit Pro', 'Versions': '0'}
|
CVE-2023-0063
|
The WordPress Shortcodes WordPress plugin through 1.6.36 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/2262f2fc-8122-46ed-8e67-8c34ee35fc97
|
2023-01-05T04:18:50.897Z
|
2023-03-06T13:34:02.007Z
|
2023-03-06T13:34:02.007Z
|
{'Vendor': 'Unknown', 'Product': 'WordPress Shortcodes', 'Versions': '0'}
|
CVE-2023-0433
|
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
|
https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e
|
2023-01-21T00:00:00
|
2023-01-21T00:00:00
|
2023-03-28T00:00:00
|
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
|
CVE-2023-0018
|
Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to stored XSS attacks. As a result of the attack, information maintained in the victim's web browser can be read, modified, and sent to the attacker.
|
https://launchpad.support.sap.com/#/notes/3266006
|
2022-12-20T03:49:38.129Z
|
2023-01-10T03:21:37.871Z
| null |
{'Vendor': 'SAP', 'Product': 'BusinessObjects Business Intelligence Platform (Central management console)', 'Versions': '420, 430'}
|
CVE-2023-0448
|
The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability.
|
https://www.tenable.com/security/research/tra-2023-3
|
2023-01-23T00:00:00
|
2023-01-24T00:00:00
|
2023-01-24T00:00:00
|
{'Vendor': 'n/a', 'Product': 'WP Helper Lite Wordpress Plugin', 'Versions': 'All versions prior to version 4.3'}
|
CVE-2023-0624
|
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
|
https://github.com/Orangescrum/orangescrum/
|
2023-02-01T00:00:00
|
2023-02-09T00:00:00
|
2023-02-09T00:00:00
|
{'Vendor': 'n/a', 'Product': 'OrangeScrum', 'Versions': '2.0.11'}
|
CVE-2023-0274
|
The URL Params WordPress plugin before 2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812
|
2023-01-13T08:58:49.428Z
|
2023-08-16T11:03:26.919Z
|
2023-08-16T11:03:26.919Z
|
{'Vendor': 'Unknown', 'Product': 'URL Params', 'Versions': '0'}
|
CVE-2023-0761
|
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Staff members, which could allow attackers to make logged in admins delete arbitrary Staff via a CSRF attack
|
https://wpscan.com/vulnerability/88fb064e-0001-446c-8e43-9fe3feff6c1f
|
2023-02-09T13:57:34.629Z
|
2023-05-15T12:15:43.882Z
|
2023-05-15T12:15:43.882Z
|
{'Vendor': 'Unknown', 'Product': 'Clock In Portal- Staff & Attendance Management', 'Versions': '0'}
|
CVE-2023-0331
|
The Correos Oficial WordPress plugin through 1.2.0.2 does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server.
|
https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b
|
2023-01-16T20:38:37.691Z
|
2023-02-27T15:24:42.395Z
|
2023-02-27T15:24:42.395Z
|
{'Vendor': 'Unknown', 'Product': 'Correos Oficial', 'Versions': '0'}
|
CVE-2023-0809
|
In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.
|
https://mosquitto.org/blog/2023/08/version-2-0-16-released/
|
2023-02-13T14:04:10.012Z
|
2023-10-02T18:56:26.824Z
|
2023-10-02T19:02:43.389Z
|
{'Vendor': 'Eclipse', 'Product': 'Mosquitto', 'Versions': '0'}
|
CVE-2023-0223
|
An issue has been discovered in GitLab affecting all versions starting from 15.5 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. Non-project members could retrieve release descriptions via the API, even if the release visibility is restricted to project members only in the project settings.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/387870
|
2023-01-11T00:00:00
|
2023-03-09T00:00:00
|
2023-03-09T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.5, <15.7.8, >=15.8, <15.8.4, >=15.9, <15.9.2'}
|
CVE-2023-0389
|
The Calculated Fields Form WordPress plugin before 1.1.151 does not sanitise and escape some of its form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/090a3922-febc-4294-82d2-d8339d461893/
|
2023-01-18T17:08:53.074Z
|
2024-01-16T15:56:07.623Z
|
2024-01-16T15:56:07.623Z
|
{'Vendor': 'Unknown', 'Product': 'Calculated Fields Form', 'Versions': '0'}
|
CVE-2023-0673
|
A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The associated identifier of this vulnerability is VDB-220195.
|
https://vuldb.com/?id.220195
|
2023-02-04T07:29:04.568Z
|
2023-02-04T07:29:30.815Z
|
2023-10-20T20:44:41.477Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Eyewear Shop', 'Versions': '1.0'}
|
CVE-2023-0366
|
The Loan Comparison WordPress plugin before 1.5.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/7d68b0df-7169-46b2-b8e3-4d0c2aa8d605
|
2023-01-18T06:58:28.334Z
|
2023-02-21T08:50:59.725Z
|
2023-02-21T08:50:59.725Z
|
{'Vendor': 'Unknown', 'Product': 'Loan Comparison', 'Versions': '0'}
|
CVE-2023-0736
|
Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4.
|
https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e
|
2023-02-07T00:00:00
|
2023-02-07T00:00:00
|
2023-02-07T00:00:00
|
{'Vendor': 'wallabag', 'Product': 'wallabag/wallabag', 'Versions': 'unspecified'}
|
CVE-2023-0059
|
The Youzify WordPress plugin before 1.2.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/5e26c485-9a5a-44a3-95b3-6c063a1c321c
|
2023-01-05T04:18:24.692Z
|
2023-02-21T08:51:00.517Z
|
2023-02-21T08:51:00.517Z
|
{'Vendor': 'Unknown', 'Product': 'Youzify', 'Versions': '0'}
|
CVE-2023-0665
|
HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
|
https://discuss.hashicorp.com/t/hcsec-2023-11-vault-s-pki-issuer-endpoint-did-not-correctly-authorize-access-to-issuer-metadata/52079/1
|
2023-02-03T21:24:59.629Z
|
2023-03-30T00:21:47.676Z
|
2023-03-30T00:24:44.582Z
|
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.12.0, 1.11.0'}
|
CVE-2023-0235
| null | null |
2023-01-12T00:00:00
| null |
2023-01-13T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-0720
|
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_folder_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/8d392d0b-f286-44da-aa32-a08d0279baed
|
2023-02-07T16:30:59.342Z
|
2023-02-08T01:03:25.800Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0370
|
The WPB Advanced FAQ WordPress plugin through 1.0.6 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/4f5597f9-ab27-42d2-847c-14455b7d0849
|
2023-01-18T07:09:15.236Z
|
2023-03-20T15:52:19.368Z
|
2023-03-20T15:52:19.368Z
|
{'Vendor': 'Unknown', 'Product': 'WPB Advanced FAQ', 'Versions': '0'}
|
CVE-2023-0848
|
A vulnerability was found in Netgear WNDR3700v2 1.0.1.14. It has been rated as problematic. This issue affects some unknown processing of the component Web Management Interface. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221147.
|
https://vuldb.com/?id.221147
|
2023-02-15T21:29:44.397Z
|
2023-02-15T21:31:42.916Z
|
2023-10-20T21:07:52.131Z
|
{'Vendor': 'Netgear', 'Product': 'WNDR3700v2', 'Versions': '1.0.1.14'}
|
CVE-2023-0798
|
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
|
https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
|
2023-02-12T00:00:00
|
2023-02-13T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}
|
CVE-2023-0262
|
The WP Airbnb Review Slider WordPress plugin before 3.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
|
https://wpscan.com/vulnerability/5d8c28ac-a46c-45d3-acc9-2cd2e6356ba2
|
2023-01-12T22:01:51.762Z
|
2023-02-13T14:32:28.589Z
| null |
{'Vendor': 'Unknown', 'Product': 'WP Airbnb Review Slider', 'Versions': '0'}
|
CVE-2023-0632
|
An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/390148
|
2023-02-01T23:11:14.150Z
|
2023-08-01T23:36:30.662Z
|
2023-08-01T23:36:30.662Z
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.2, 16.1.0, 16.2.0'}
|
CVE-2023-0327
|
A vulnerability was found in saemorris TheRadSystem. It has been classified as problematic. Affected is an unknown function of the file users.php. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. VDB-218454 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.218454
|
2023-01-16T18:49:15.493Z
|
2023-01-16T18:50:23.372Z
|
2023-10-20T19:26:11.172Z
|
{'Vendor': 'saemorris', 'Product': 'TheRadSystem', 'Versions': 'n/a'}
|
CVE-2023-0777
|
Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4.
|
https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7
|
2023-02-10T00:00:00
|
2023-02-10T00:00:00
|
2023-04-06T00:00:00
|
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
|
CVE-2023-0005
|
A vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys.
|
https://security.paloaltonetworks.com/CVE-2023-0005
|
2022-10-27T18:48:14.336Z
|
2023-04-12T16:41:21.342Z
|
2023-04-12T16:41:21.342Z
|
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '11.0, 10.2, 10.1, 10.0, 9.1, 9.0, 8.1'}
|
CVE-2023-0455
|
Unrestricted Upload of File with Dangerous Type in GitHub repository unilogies/bumsys prior to v1.0.3-beta.
|
https://huntr.dev/bounties/b5e9c578-1a33-4745-bf6b-e7cdb89793f7
|
2023-01-24T00:00:00
|
2023-01-26T00:00:00
|
2023-06-01T00:00:00
|
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
|
CVE-2023-0906
|
A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. Affected by this vulnerability is the function delete_category of the file ajax.php of the component POST Parameter Handler. The manipulation leads to missing authentication. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-221455.
|
https://vuldb.com/?id.221455
|
2023-02-18T07:40:37.400Z
|
2023-02-18T07:41:49.342Z
|
2023-10-20T21:18:50.817Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
|
CVE-2023-0140
|
Inappropriate implementation in in File System API in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Low)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
|
2023-01-09T00:00:00
|
2023-01-10T00:00:00
|
2023-11-25T11:08:05.091645
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0639
|
A vulnerability was found in TRENDnet TEW-652BRP 3.04b01 and classified as problematic. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation of the argument nextPage leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-220019.
|
https://vuldb.com/?id.220019
|
2023-02-02T08:09:35.755Z
|
2023-02-02T08:10:13.488Z
|
2023-10-20T19:59:07.796Z
|
{'Vendor': 'TRENDnet', 'Product': 'TEW-652BRP', 'Versions': '3.04b01'}
|
CVE-2023-0793
|
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9
|
2023-02-12T00:00:00
|
2023-02-12T00:00:00
|
2023-12-18T10:06:58.466Z
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-0269
| null | null |
2023-01-13T00:00:00
| null |
2023-01-17T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-0286
|
There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
ASN1_STRING.
When CRL checking is enabled (i.e. the application sets the
X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
arbitrary pointers to a memcmp call, enabling them to read memory contents or
enact a denial of service. In most cases, the attack requires the attacker to
provide both the certificate chain and CRL, neither of which need to have a
valid signature. If the attacker only controls one of these inputs, the other
input must already contain an X.400 address as a CRL distribution point, which
is uncommon. As such, this vulnerability is most likely to only affect
applications which have implemented their own functionality for retrieving CRLs
over a network.
|
https://www.openssl.org/news/secadv/20230207.txt
|
2023-01-13T10:40:41.259Z
|
2023-02-08T19:01:50.514Z
|
2023-03-27T18:25:32.958867Z
|
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0, 1.1.1, 1.0.2'}
|
CVE-2023-0951
|
Improper access controls on some API endpoints in Devolutions Server 2022.3.12
and earlier could allow a standard privileged user to perform privileged
actions.
|
https://devolutions.net/security/advisories/DEVO-2023-0003
|
2023-02-22T13:11:44.596Z
|
2023-02-22T13:46:30.884Z
|
2023-03-01T05:45:13.020935Z
|
{'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'}
|
CVE-2023-0402
|
The Social Warfare plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several AJAX actions in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete post meta information and reset network access tokens.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/4bc4ba2c-32eb-46c5-bb40-7c0150fc1ca4
|
2023-01-19T14:06:58.319Z
|
2023-01-19T14:07:08.694Z
| null |
{'Vendor': 'warfareplugins', 'Product': 'Social Sharing Plugin – Social Warfare', 'Versions': '*'}
|
CVE-2023-0052
|
SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device management, an unauthorized user could access the system and modify the device configuration, which could result in the unauthorized user executing unrestricted malicious commands.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-05
|
2023-01-04T16:24:05.161Z
|
2023-01-20T21:23:08.018Z
|
2023-10-26T23:15:06.756Z
|
{'Vendor': 'SAUTER Controls', 'Product': 'Nova 220 (EYK220F001) DDC with BACnet connection', 'Versions': 'Firmware all versions, BACnetstac all versions'}
|
CVE-2023-0547
|
OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird < 102.10.
|
https://www.mozilla.org/security/advisories/mfsa2023-15/
|
2023-01-27T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
|
CVE-2023-0117
|
The online authentication provided by the hwKitAssistant lacks strict identity verification of applications. Successful exploitation of this vulnerability may affect availability of features,such as MeeTime.
|
https://consumer.huawei.com/en/support/bulletin/2023/5/
|
2023-01-09T00:00:00
|
2023-05-26T00:00:00
|
2023-05-26T00:00:00
|
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0'}
|
CVE-2023-0814
|
The Profile Builder – User Profile & User Registration Forms plugin for WordPress is vulnerable to sensitive information disclosure via the [user_meta] shortcode in versions up to, and including 3.9.0. This is due to insufficient restriction on sensitive user meta values that can be called via that shortcode. This makes it possible for authenticated attackers, with subscriber-level permissions, and above to retrieve sensitive user meta that can be used to gain access to a high privileged user account. This does require the Usermeta shortcode be enabled to be exploited.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/bbedad66-a5a6-4fb5-b03e-0ecf9fbef19a
|
2023-02-13T18:06:47.331Z
|
2023-02-14T01:13:13.326Z
|
2023-02-14T01:13:13.326Z
|
{'Vendor': 'reflectionmedia', 'Product': 'Profile Builder – User Profile & User Registration Forms', 'Versions': '*'}
|
CVE-2023-0394
|
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
|
2023-01-18T00:00:00
|
2023-01-24T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel prior to Kernel 6.2 RC4'}
|
CVE-2023-0681
|
Rapid7 InsightVM versions 6.6.178 and lower suffers from an open redirect vulnerability, whereby an attacker has the ability to redirect the user to a site of the attacker’s choice using the ‘page’ parameter of the ‘data/console/redirect’ component of the application. This issue was resolved in the February, 2023 release of version 6.6.179.
|
https://docs.rapid7.com/release-notes/nexpose/20230208/
|
2023-02-06T14:52:11.265Z
|
2023-03-20T17:26:01.588Z
|
2023-03-21T17:47:59.274Z
|
{'Vendor': 'Rapid7', 'Product': 'Nexpose', 'Versions': '0'}
|
CVE-2023-0044
|
If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.
|
https://access.redhat.com/security/cve/CVE-2023-0044
|
2023-01-04T00:00:00
|
2023-02-23T00:00:00
|
2023-02-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'quarkus-vertx-http', 'Versions': '1.11.7'}
|
CVE-2023-0414
|
Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file
|
https://www.wireshark.org/security/wnpa-sec-2023-01.html
|
2023-01-20T00:00:00
|
2023-01-24T00:00:00
|
2023-01-24T00:00:00
|
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.3'}
|
CVE-2023-0947
|
Path Traversal in GitHub repository flatpressblog/flatpress prior to 1.3.
|
https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496
|
2023-02-22T00:00:00
|
2023-02-22T00:00:00
|
2023-02-22T00:00:00
|
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
|
CVE-2023-0802
|
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
|
https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
|
2023-02-12T00:00:00
|
2023-02-13T00:00:00
|
2023-05-30T00:00:00
|
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.