CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-0014
SAP NetWeaver ABAP Server and ABAP Platform - versions SAP_BASIS 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, KERNEL 7.22, 7.53, 7.77, 7.81, 7.85, 7.89, KRNL64UC 7.22, 7.22EXT, 7.53, KRNL64NUC 7.22, 7.22EXT, creates information about system identity in an ambiguous format. This could lead to capture-replay vulnerability and may be exploited by malicious users to obtain illegitimate access to the system.
https://launchpad.support.sap.com/#/notes/3089413
2022-12-16T03:13:43.141Z
2023-01-10T03:02:39.962Z
null
{'Vendor': 'SAP', 'Product': 'NetWeaver ABAP Server and ABAP Platform', 'Versions': 'SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 710, SAP_BASIS 711, SAP_BASIS 730, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, KERNEL 7.22, KERNEL 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT'}
CVE-2023-0917
A vulnerability, which was classified as critical, was found in SourceCodester Simple Customer Relationship Management System 1.0. This affects an unknown part of the file /php-scrm/login.php. The manipulation of the argument Password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221493 was assigned to this vulnerability.
https://vuldb.com/?id.221493
2023-02-19T08:12:21.383Z
2023-02-19T08:12:43.846Z
2023-10-20T21:29:49.575Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Customer Relationship Management System', 'Versions': '1.0'}
CVE-2023-0852
Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
https://www.canon-europe.com/support/product-security-latest-news/
2023-02-16T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
CVE-2023-0501
The WP Insurance WordPress plugin before 2.1.4 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/36fd6c0d-3f0c-4f7d-aa17-5b2d084ab94c
2023-01-25T10:08:19.563Z
2023-03-27T15:37:33.856Z
2023-03-27T15:37:33.856Z
{'Vendor': 'Unknown', 'Product': 'WP Insurance', 'Versions': '0'}
CVE-2023-0151
The uTubeVideo Gallery WordPress plugin before 2.0.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/d9fc6f5f-efc1-4e23-899b-e9a49330ed13
2023-01-10T10:58:18.464Z
2023-02-13T14:32:22.947Z
null
{'Vendor': 'Unknown', 'Product': 'uTubeVideo Gallery', 'Versions': '0'}
CVE-2023-0385
The Custom 404 Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.7.1. This is due to missing or incorrect nonce validation on the custom_404_pro_admin_init function. This makes it possible for unauthenticated attackers to delete logs, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/968920b9-febf-4d76-a16b-f27954cd72e5
2023-01-18T14:18:41.930Z
2023-01-18T14:18:55.171Z
null
{'Vendor': 'kunalnagar', 'Product': 'Custom 404 Pro', 'Versions': '*'}
CVE-2023-0690
HashiCorp Boundary from 0.10.0 through 0.11.2 contain an issue where when using a PKI-based worker with a Key Management Service (KMS) defined in the configuration file, new credentials created after an automatic rotation may not have been encrypted via the intended KMS. This would result in the credentials being stored in plaintext on the Boundary PKI worker’s disk. This issue is fixed in version 0.12.0.
https://discuss.hashicorp.com/t/hcsec-2023-03-boundary-workers-store-rotated-credentials-in-plaintext-even-when-key-management-service-configured/49907
2023-02-06T20:52:57.188Z
2023-02-08T18:27:33.548Z
null
{'Vendor': 'HashiCorp', 'Product': 'Boundary', 'Versions': '0.10.0'}
CVE-2023-0940
The ProfileGrid WordPress plugin before 5.3.1 provides an AJAX endpoint for resetting a user password but does not implement proper authorization. This allows a user with low privileges, such as subscriber, to change the password of any account, including Administrator ones.
https://wpscan.com/vulnerability/56744f72-2d48-4f42-8195-24b4dd951bb5
2023-02-21T15:17:48.691Z
2023-03-20T15:52:16.823Z
2023-03-24T10:51:51.921Z
{'Vendor': 'Unknown', 'Product': 'ProfileGrid', 'Versions': '0'}
CVE-2023-0043
The Custom Add User WordPress plugin through 2.0.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/e012f23a-7daf-4ef3-b116-d0e2ed5bd0a3
2023-01-04T06:27:36.075Z
2023-02-27T15:24:41.583Z
2023-02-27T15:24:41.583Z
{'Vendor': 'Unknown', 'Product': 'Custom Add User', 'Versions': '0'}
CVE-2023-0413
Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-03.html
2023-01-20T00:00:00
2023-01-24T00:00:00
2023-02-08T00:00:00
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.3, >=3.6.0, <3.6.11'}
CVE-2023-0106
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
https://huntr.dev/bounties/5c0809cb-f4ff-4447-bed6-b5625fb374bb
2023-01-07T00:00:00
2023-01-07T00:00:00
2023-01-07T00:00:00
{'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'}
CVE-2023-0556
The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to obtain the blog metadata (via the function cstu_get_metadata) that includes the plugin's contentstudio_token. Knowing this token allows for other interactions with the plugin such as creating posts in versions prior to 1.2.5, which added other requirements to posting and updating.
https://www.wordfence.com/threat-intel/vulnerabilities/id/52db8d41-859a-4d68-8b83-3d3af8f1bf64
2023-01-27T21:02:03.555Z
2023-01-27T21:08:16.313Z
null
{'Vendor': 'contentstudio', 'Product': 'ContentStudio', 'Versions': '*'}
CVE-2023-0805
An issue has been discovered in GitLab EE affecting all versions starting from 15.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to have access to the public projects of a public group even after being banned from the public group by the owner.
https://gitlab.com/gitlab-org/gitlab/-/issues/391433
2023-02-13T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.2, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1'}
CVE-2023-0669
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1
2023-02-03T22:09:23.898Z
2023-02-06T19:16:19.265Z
2023-02-08T22:39:50.064Z
{'Vendor': 'Fortra', 'Product': 'Goanywhere MFT', 'Versions': '0'}
CVE-2023-0686
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The identifier VDB-220245 was assigned to this vulnerability.
https://vuldb.com/?id.220245
2023-02-06T18:48:46.088Z
2023-02-06T18:50:20.362Z
2023-10-20T20:49:34.225Z
{'Vendor': 'SourceCodester', 'Product': 'Online Eyewear Shop', 'Versions': '1.0'}
CVE-2023-0405
The GPT AI Power: Content Writer & ChatGPT & Image Generator & WooCommerce Product Writer & AI Training WordPress plugin before 1.4.38 does not perform any kind of nonce or privilege checks before letting logged-in users modify arbitrary posts.
https://wpscan.com/vulnerability/3ca9ac21-2bce-4480-9079-b4045b261273
2023-01-19T14:42:56.562Z
2023-02-13T14:32:23.773Z
null
{'Vendor': 'Unknown', 'Product': 'GPT AI Power: Content Writer & ChatGPT & Image Generator & WooCommerce Product Writer & AI Training', 'Versions': '0'}
CVE-2023-0055
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository pyload/pyload prior to 0.5.0b3.dev32.
https://huntr.dev/bounties/ed88e240-99ff-48a1-bf32-8e1ef5f13cce
2023-01-04T00:00:00
2023-01-04T00:00:00
2023-01-04T00:00:00
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
CVE-2023-0956
External input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03
2023-02-22T16:00:49.434Z
2023-08-03T18:08:13.924Z
2023-08-03T18:08:13.924Z
{'Vendor': 'TEL-STER', 'Product': 'TelWin SCADA WebInterface', 'Versions': '3.2, 7.0, 8.0'}
CVE-2023-0813
A flaw was found in the Network Observability plugin for OpenShift console. Unless the Loki authToken configuration is set to FORWARD mode, authentication is no longer enforced, allowing any user who can connect to the OpenShift Console in an OpenShift cluster to retrieve flows without authentication.
https://access.redhat.com/errata/RHSA-2023:0786
2023-02-13T16:49:21.409Z
2023-09-15T20:17:41.914Z
2023-09-15T20:17:41.914Z
{'Vendor': 'n/a', 'Product': 'network-observability-console-plugin-container', 'Versions': ''}
CVE-2023-0540
The GS Filterable Portfolio WordPress plugin before 1.6.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/b35b3da2-468d-4fe5-bff6-812432197a38
2023-01-27T12:24:18.146Z
2023-02-21T08:50:58.166Z
2023-02-21T08:50:58.166Z
{'Vendor': 'Unknown', 'Product': 'GS Filterable Portfolio', 'Versions': '0'}
CVE-2023-0110
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.10.0.
https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c
2023-01-07T00:00:00
2023-01-07T00:00:00
2023-01-07T00:00:00
{'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'}
CVE-2023-0794
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb
2023-02-12T00:00:00
2023-02-12T00:00:00
2023-12-18T10:29:28.207Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-0281
A vulnerability was found in SourceCodester Online Flight Booking Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file judge_panel.php. The manipulation of the argument subevent_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218276.
https://vuldb.com/?id.218276
2023-01-13T09:17:35.860Z
2023-01-13T09:18:27.640Z
2023-10-20T18:16:35.846Z
{'Vendor': 'SourceCodester', 'Product': 'Online Flight Booking Management System', 'Versions': 'n/a'}
CVE-2023-0901
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository pixelfed/pixelfed prior to 0.11.4.
https://huntr.dev/bounties/0327b1b2-6e7c-4154-a307-15f236571010
2023-02-18T00:00:00
2023-02-18T00:00:00
2023-02-18T00:00:00
{'Vendor': 'pixelfed', 'Product': 'pixelfed/pixelfed', 'Versions': 'unspecified'}
CVE-2023-0002
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to execute privileged cytool commands that disable or uninstall the agent.
https://security.paloaltonetworks.com/CVE-2023-0002
2022-10-27T18:48:11.588Z
2023-02-08T17:21:47.711Z
null
{'Vendor': 'Palo Alto Networks', 'Product': 'Cortex XDR agent', 'Versions': '7.9 All, 7.8 All, 7.5, 5.0'}
CVE-2023-0452
Econolite EOS versions prior to 3.2.23 use a weak hash algorithm for encrypting privileged user credentials. A configuration file that is accessible without authentication uses MD5 hashes for encrypting credentials, including those of administrators and technicians.
https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02
2023-01-23T18:19:28.691Z
2023-01-26T20:39:37.729Z
2023-06-20T15:38:11.331Z
{'Vendor': 'Econolite', 'Product': 'EOS', 'Versions': '0'}
CVE-2023-0147
The Flexible Captcha WordPress plugin through 4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/af9cbb4a-42fc-43c5-88f3-349b417f1a6a
2023-01-10T10:58:01.572Z
2023-02-06T19:59:41.302Z
null
{'Vendor': 'Unknown', 'Product': 'Flexible Captcha', 'Versions': '0'}
CVE-2023-0844
The Namaste! LMS WordPress plugin before 2.6 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/8d8e5852-3787-47f9-9931-8308bb81beb1
2023-02-15T15:18:33.795Z
2023-03-13T16:03:35.583Z
2023-03-13T16:03:35.583Z
{'Vendor': 'Unknown', 'Product': 'Namaste! LMS', 'Versions': '0'}
CVE-2023-0999
A vulnerability classified as problematic was found in SourceCodester Sales Tracker Management System 1.0. This vulnerability affects unknown code of the file admin/?page=user/list. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221734 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221734
2023-02-24T07:38:33.664Z
2023-02-24T07:40:26.148Z
2023-10-20T21:56:44.556Z
{'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'}
CVE-2023-0833
A flaw was found in Red Hat's AMQ-Streams, which ships a version of the OKHttp component with an information disclosure flaw via an exception triggered by a header containing an illegal value. This issue could allow an authenticated attacker to access information outside of their regular permissions.
https://access.redhat.com/errata/RHSA-2023:1241
2023-02-14T18:56:25.296Z
2023-09-27T13:41:12.626Z
2023-09-27T13:41:12.626Z
{'Vendor': 'n/a', 'Product': 'okhttp', 'Versions': '4.9.2'}
CVE-2023-0560
A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. This issue affects some unknown processing of the file admin/practice_pdf.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219701 was assigned to this vulnerability.
https://vuldb.com/?id.219701
2023-01-28T16:10:17.298Z
2023-01-28T16:10:46.083Z
2023-10-20T19:43:16.247Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-0130
Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
2023-01-09T00:00:00
2023-01-10T00:00:00
2023-11-25T11:06:22.613620
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0425
ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves the reported vulnerabilities in the product versions under maintenance. An attacker who successfully exploited one or more of these vulnerabilities could cause the product to stop or make the product inaccessible.  Numeric Range Comparison Without Minimum Check vulnerability in ABB Freelance controllers AC 700F (Controller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects: Freelance controllers AC 700F:  from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1;  Freelance controllers AC 900F:  Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.
https://search.abb.com/library/Download.aspx?DocumentID=7PAA007517&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.68514131.339223974.1691382343-1911411808.1686627590
2023-01-20T10:59:16.973Z
2023-08-07T05:06:46.584Z
2023-08-07T05:23:54.031Z
{'Vendor': 'ABB', 'Product': ' Freelance controllers AC 700F', 'Versions': '9.0;0, 0, 0, 0, 0, 0, 0, 0'}
CVE-2023-0075
The Amazon JS WordPress plugin through 0.10 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/097acd6f-3291-4cdc-a054-4432b6350411
2023-01-05T04:20:02.718Z
2023-02-13T14:32:24.576Z
null
{'Vendor': 'Unknown', 'Product': 'Amazon JS', 'Versions': '0'}
CVE-2023-0976
A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree.
https://kcm.trellix.com/corporate/index?page=content&id=SB10398
2023-02-23T04:06:41.212Z
2023-06-07T07:35:57.484Z
2023-06-08T04:48:22.104Z
{'Vendor': 'Trellix', 'Product': 'Trellix Agent', 'Versions': '5.7.8'}
CVE-2023-0219
The FluentSMTP WordPress plugin before 2.2.3 does not sanitize or escape email content, making it vulnerable to stored cross-site scripting attacks (XSS) when an administrator views the email logs. This exploit requires other plugins to enable users to send emails with unfiltered HTML.
https://wpscan.com/vulnerability/71662b72-311c-42db-86c5-a0276d25535c
2023-01-11T12:20:09.137Z
2023-03-13T16:03:36.376Z
2023-03-13T16:03:36.376Z
{'Vendor': 'Unknown', 'Product': 'FluentSMTP', 'Versions': '0'}
CVE-2023-0649
A vulnerability has been found in dst-admin 1.5.0 and classified as critical. This vulnerability affects unknown code of the file /home/sendBroadcast. The manipulation of the argument message leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220036.
https://vuldb.com/?id.220036
2023-02-02T13:33:03.138Z
2023-02-02T13:33:19.311Z
2023-10-20T20:37:22.274Z
{'Vendor': 'n/a', 'Product': 'dst-admin', 'Versions': '1.5.0'}
CVE-2023-0167
The GetResponse for WordPress plugin through 5.5.31 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/fafbf666-b908-48ef-9041-fea653e9bfeb
2023-01-11T03:09:01.462Z
2023-03-20T15:52:17.698Z
2023-03-20T15:52:17.698Z
{'Vendor': 'Unknown', 'Product': 'GetResponse for WordPress', 'Versions': '0'}
CVE-2023-0537
The Product Slider For WooCommerce Lite WordPress plugin through 1.1.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/d7369f1d-d1a0-4576-a676-c70525a6c743
2023-01-27T11:33:12.024Z
2023-05-08T13:58:22.926Z
2023-05-08T13:58:22.926Z
{'Vendor': 'Unknown', 'Product': 'Product Slider For WooCommerce Lite', 'Versions': '0'}
CVE-2023-0864
Cleartext Transmission of Sensitive Information vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (CE) (Terra AC MID), ABB Terra AC wallbox (CE) Terra AC Juno CE, ABB Terra AC wallbox (CE) Terra AC PTB, ABB Terra AC wallbox (CE) Symbiosis, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): from 1.0;0 through 1.5.5; Terra AC wallbox (UL32A) : from 1.0;0 through 1.6.5; Terra AC wallbox (CE) (Terra AC MID): from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC Juno CE: from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC PTB : from 1.0;0 through 1.5.25; Terra AC wallbox (CE) Symbiosis: from 1.0;0 through 1.2.7; Terra AC wallbox (JP): from 1.0;0 through 1.6.5.
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108468A1415&LanguageCode=en&DocumentPartId=&Action=Launch
2023-02-16T13:04:48.837Z
2023-05-17T07:15:52.371Z
2023-05-17T07:15:52.371Z
{'Vendor': 'ABB', 'Product': 'Terra AC wallbox (UL40/80A)', 'Versions': '1.0;0'}
CVE-2023-0921
A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage.
https://gitlab.com/gitlab-org/gitlab/-/issues/392433
2023-02-20T00:00:00
2023-06-06T00:00:00
2023-06-06T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=8.3, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-0022
SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker to inject malicious code that can be executed by the application over the network. On successful exploitation, an attacker can perform operations that may completely compromise the application causing a high impact on the confidentiality, integrity, and availability of the application.
https://launchpad.support.sap.com/#/notes/3262810
2022-12-22T15:07:25.091Z
2023-01-10T03:25:36.853Z
null
{'Vendor': 'SAP', 'Product': 'BusinessObjects Business Intelligence platform (Analysis edition for OLAP)', 'Versions': '420, 430'}
CVE-2023-0188
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an unprivileged user can cause improper restriction of operations within the bounds of a memory buffer cause an out-of-bounds read, which may lead to denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:44.434Z
2023-04-01T04:45:45.241Z
2023-04-01T04:45:45.241Z
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0472
Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html
2023-01-24T00:00:00
2023-01-24T00:00:00
2023-02-20T00:00:00
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0872
The Horizon REST API includes a users endpoint in OpenMNS Horizon 31.0.8 and versions earlier than 32.0.2 on multiple platforms is vulnerable to elevation of privilege. The solution is to upgrade to Meridian 2023.1.6, 2022.1.19, 2021.1.30, 2020.1.38 or Horizon 32.0.2 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Erik Wynter for reporting this issue.
https://docs.opennms.com/horizon/32/releasenotes/changelog.html
2023-02-16T18:29:36.820Z
2023-08-14T17:21:58.203Z
2023-08-14T17:21:58.203Z
{'Vendor': 'The OpenNMS Group', 'Product': 'Horizon', 'Versions': '31.0.8, 0'}
CVE-2023-0171
The jQuery T(-) Countdown Widget WordPress plugin before 2.3.24 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/32324655-ff91-4a53-a2c5-ebe6678d4a9d
2023-01-11T03:09:32.224Z
2023-02-06T19:59:42.127Z
null
{'Vendor': 'Unknown', 'Product': 'jQuery T(-) Countdown Widget', 'Versions': '0'}
CVE-2023-0464
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
https://www.openssl.org/news/secadv/20230322.txt
2023-01-24T13:50:25.835Z
2023-03-22T16:36:47.383Z
2023-03-22T16:36:47.383Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0, 1.1.1, 1.0.2'}
CVE-2023-0034
The JetWidgets For Elementor WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/ffbdb8a1-19c3-45e9-81b0-ad47a0791c4a
2023-01-03T03:26:36.722Z
2023-02-13T14:32:25.406Z
2023-03-06T13:22:49.307Z
{'Vendor': 'Unknown', 'Product': 'JetWidgets For Elementor', 'Versions': '0'}
CVE-2023-0937
The VK All in One Expansion Unit WordPress plugin before 9.87.1.0 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
https://wpscan.com/vulnerability/5110ff02-c721-43eb-b13e-50aca25e1162
2023-02-21T09:24:38.503Z
2023-03-20T15:52:18.503Z
2023-03-20T15:52:18.503Z
{'Vendor': 'Unknown', 'Product': 'VK All in One Expansion Unit', 'Versions': '0'}
CVE-2023-0258
A vulnerability was found in SourceCodester Online Food Ordering System 2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Category List Handler. The manipulation of the argument Reason with the input "><script>prompt(1)</script> leads to cross site scripting. The attack may be launched remotely. VDB-218186 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.218186
2023-01-12T21:19:16.961Z
2023-01-12T21:20:59.100Z
2023-10-20T18:15:22.676Z
{'Vendor': 'SourceCodester', 'Product': 'Online Food Ordering System', 'Versions': '2.0'}
CVE-2023-0608
Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936
2023-02-01T00:00:00
2023-02-01T00:00:00
2023-02-01T00:00:00
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-0126
Pre-authentication path traversal vulnerability in SMA1000 firmware version 12.4.2, which allows an unauthenticated attacker to access arbitrary files and directories stored outside the web root directory.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0001
2023-01-09T00:00:00
2023-01-19T00:00:00
2023-01-19T00:00:00
{'Vendor': 'SonicWall', 'Product': 'SonicWall SMA1000', 'Versions': '12.4.2'}
CVE-2023-0576
null
null
2023-01-30T08:16:23.029Z
2023-02-02T14:57:06.911Z
2023-02-06T14:21:17.584Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-0960
A vulnerability was found in SeaCMS 11.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /data/config.ftp.php of the component Picture Management. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-221630 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221630
2023-02-22T17:45:18.935Z
2023-02-22T17:46:17.392Z
2023-10-20T21:39:40.042Z
{'Vendor': 'n/a', 'Product': 'SeaCMS', 'Versions': '11.6'}
CVE-2023-0599
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
https://docs.rapid7.com/release-notes/metasploit/20230130/
2023-01-31T17:28:37.548Z
2023-02-01T22:13:54.609Z
null
{'Vendor': 'Rapid7', 'Product': 'Metasploit Pro', 'Versions': '0'}
CVE-2023-0063
The WordPress Shortcodes WordPress plugin through 1.6.36 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/2262f2fc-8122-46ed-8e67-8c34ee35fc97
2023-01-05T04:18:50.897Z
2023-03-06T13:34:02.007Z
2023-03-06T13:34:02.007Z
{'Vendor': 'Unknown', 'Product': 'WordPress Shortcodes', 'Versions': '0'}
CVE-2023-0433
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e
2023-01-21T00:00:00
2023-01-21T00:00:00
2023-03-28T00:00:00
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-0018
Due to improper input sanitization of user-controlled input in SAP BusinessObjects Business Intelligence Platform CMC application - versions 420, and 430, an attacker with basic user-level privileges can modify/upload crystal reports containing a malicious payload. Once these reports are viewable, anyone who opens those reports would be susceptible to stored XSS attacks. As a result of the attack, information maintained in the victim's web browser can be read, modified, and sent to the attacker.
https://launchpad.support.sap.com/#/notes/3266006
2022-12-20T03:49:38.129Z
2023-01-10T03:21:37.871Z
null
{'Vendor': 'SAP', 'Product': 'BusinessObjects Business Intelligence Platform (Central management console)', 'Versions': '420, 430'}
CVE-2023-0448
The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability.
https://www.tenable.com/security/research/tra-2023-3
2023-01-23T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'n/a', 'Product': 'WP Helper Lite Wordpress Plugin', 'Versions': 'All versions prior to version 4.3'}
CVE-2023-0624
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
https://github.com/Orangescrum/orangescrum/
2023-02-01T00:00:00
2023-02-09T00:00:00
2023-02-09T00:00:00
{'Vendor': 'n/a', 'Product': 'OrangeScrum', 'Versions': '2.0.11'}
CVE-2023-0274
The URL Params WordPress plugin before 2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/4f6197b6-6d4c-4986-b54c-453b17e94812
2023-01-13T08:58:49.428Z
2023-08-16T11:03:26.919Z
2023-08-16T11:03:26.919Z
{'Vendor': 'Unknown', 'Product': 'URL Params', 'Versions': '0'}
CVE-2023-0761
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Staff members, which could allow attackers to make logged in admins delete arbitrary Staff via a CSRF attack
https://wpscan.com/vulnerability/88fb064e-0001-446c-8e43-9fe3feff6c1f
2023-02-09T13:57:34.629Z
2023-05-15T12:15:43.882Z
2023-05-15T12:15:43.882Z
{'Vendor': 'Unknown', 'Product': 'Clock In Portal- Staff & Attendance Management', 'Versions': '0'}
CVE-2023-0331
The Correos Oficial WordPress plugin through 1.2.0.2 does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server.
https://wpscan.com/vulnerability/1b4dbaf3-1364-4103-9a7b-b5a1355c685b
2023-01-16T20:38:37.691Z
2023-02-27T15:24:42.395Z
2023-02-27T15:24:42.395Z
{'Vendor': 'Unknown', 'Product': 'Correos Oficial', 'Versions': '0'}
CVE-2023-0809
In Mosquitto before 2.0.16, excessive memory is allocated based on malicious initial packets that are not CONNECT packets.
https://mosquitto.org/blog/2023/08/version-2-0-16-released/
2023-02-13T14:04:10.012Z
2023-10-02T18:56:26.824Z
2023-10-02T19:02:43.389Z
{'Vendor': 'Eclipse', 'Product': 'Mosquitto', 'Versions': '0'}
CVE-2023-0223
An issue has been discovered in GitLab affecting all versions starting from 15.5 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. Non-project members could retrieve release descriptions via the API, even if the release visibility is restricted to project members only in the project settings.
https://gitlab.com/gitlab-org/gitlab/-/issues/387870
2023-01-11T00:00:00
2023-03-09T00:00:00
2023-03-09T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.5, <15.7.8, >=15.8, <15.8.4, >=15.9, <15.9.2'}
CVE-2023-0389
The Calculated Fields Form WordPress plugin before 1.1.151 does not sanitise and escape some of its form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/090a3922-febc-4294-82d2-d8339d461893/
2023-01-18T17:08:53.074Z
2024-01-16T15:56:07.623Z
2024-01-16T15:56:07.623Z
{'Vendor': 'Unknown', 'Product': 'Calculated Fields Form', 'Versions': '0'}
CVE-2023-0673
A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The associated identifier of this vulnerability is VDB-220195.
https://vuldb.com/?id.220195
2023-02-04T07:29:04.568Z
2023-02-04T07:29:30.815Z
2023-10-20T20:44:41.477Z
{'Vendor': 'SourceCodester', 'Product': 'Online Eyewear Shop', 'Versions': '1.0'}
CVE-2023-0366
The Loan Comparison WordPress plugin before 1.5.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/7d68b0df-7169-46b2-b8e3-4d0c2aa8d605
2023-01-18T06:58:28.334Z
2023-02-21T08:50:59.725Z
2023-02-21T08:50:59.725Z
{'Vendor': 'Unknown', 'Product': 'Loan Comparison', 'Versions': '0'}
CVE-2023-0736
Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4.
https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e
2023-02-07T00:00:00
2023-02-07T00:00:00
2023-02-07T00:00:00
{'Vendor': 'wallabag', 'Product': 'wallabag/wallabag', 'Versions': 'unspecified'}
CVE-2023-0059
The Youzify WordPress plugin before 1.2.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/5e26c485-9a5a-44a3-95b3-6c063a1c321c
2023-01-05T04:18:24.692Z
2023-02-21T08:51:00.517Z
2023-02-21T08:51:00.517Z
{'Vendor': 'Unknown', 'Product': 'Youzify', 'Versions': '0'}
CVE-2023-0665
HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
https://discuss.hashicorp.com/t/hcsec-2023-11-vault-s-pki-issuer-endpoint-did-not-correctly-authorize-access-to-issuer-metadata/52079/1
2023-02-03T21:24:59.629Z
2023-03-30T00:21:47.676Z
2023-03-30T00:24:44.582Z
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.12.0, 1.11.0'}
CVE-2023-0235
null
null
2023-01-12T00:00:00
null
2023-01-13T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-0720
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_folder_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8d392d0b-f286-44da-aa32-a08d0279baed
2023-02-07T16:30:59.342Z
2023-02-08T01:03:25.800Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0370
The WPB Advanced FAQ WordPress plugin through 1.0.6 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/4f5597f9-ab27-42d2-847c-14455b7d0849
2023-01-18T07:09:15.236Z
2023-03-20T15:52:19.368Z
2023-03-20T15:52:19.368Z
{'Vendor': 'Unknown', 'Product': 'WPB Advanced FAQ', 'Versions': '0'}
CVE-2023-0848
A vulnerability was found in Netgear WNDR3700v2 1.0.1.14. It has been rated as problematic. This issue affects some unknown processing of the component Web Management Interface. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221147.
https://vuldb.com/?id.221147
2023-02-15T21:29:44.397Z
2023-02-15T21:31:42.916Z
2023-10-20T21:07:52.131Z
{'Vendor': 'Netgear', 'Product': 'WNDR3700v2', 'Versions': '1.0.1.14'}
CVE-2023-0798
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
2023-02-12T00:00:00
2023-02-13T00:00:00
2023-05-30T00:00:00
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}
CVE-2023-0262
The WP Airbnb Review Slider WordPress plugin before 3.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as subscriber.
https://wpscan.com/vulnerability/5d8c28ac-a46c-45d3-acc9-2cd2e6356ba2
2023-01-12T22:01:51.762Z
2023-02-13T14:32:28.589Z
null
{'Vendor': 'Unknown', 'Product': 'WP Airbnb Review Slider', 'Versions': '0'}
CVE-2023-0632
An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry.
https://gitlab.com/gitlab-org/gitlab/-/issues/390148
2023-02-01T23:11:14.150Z
2023-08-01T23:36:30.662Z
2023-08-01T23:36:30.662Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.2, 16.1.0, 16.2.0'}
CVE-2023-0327
A vulnerability was found in saemorris TheRadSystem. It has been classified as problematic. Affected is an unknown function of the file users.php. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. VDB-218454 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.218454
2023-01-16T18:49:15.493Z
2023-01-16T18:50:23.372Z
2023-10-20T19:26:11.172Z
{'Vendor': 'saemorris', 'Product': 'TheRadSystem', 'Versions': 'n/a'}
CVE-2023-0777
Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4.
https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7
2023-02-10T00:00:00
2023-02-10T00:00:00
2023-04-06T00:00:00
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-0005
A vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys.
https://security.paloaltonetworks.com/CVE-2023-0005
2022-10-27T18:48:14.336Z
2023-04-12T16:41:21.342Z
2023-04-12T16:41:21.342Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '11.0, 10.2, 10.1, 10.0, 9.1, 9.0, 8.1'}
CVE-2023-0455
Unrestricted Upload of File with Dangerous Type in GitHub repository unilogies/bumsys prior to v1.0.3-beta.
https://huntr.dev/bounties/b5e9c578-1a33-4745-bf6b-e7cdb89793f7
2023-01-24T00:00:00
2023-01-26T00:00:00
2023-06-01T00:00:00
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
CVE-2023-0906
A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. Affected by this vulnerability is the function delete_category of the file ajax.php of the component POST Parameter Handler. The manipulation leads to missing authentication. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-221455.
https://vuldb.com/?id.221455
2023-02-18T07:40:37.400Z
2023-02-18T07:41:49.342Z
2023-10-20T21:18:50.817Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-0140
Inappropriate implementation in in File System API in Google Chrome on Windows prior to 109.0.5414.74 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
2023-01-09T00:00:00
2023-01-10T00:00:00
2023-11-25T11:08:05.091645
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0639
A vulnerability was found in TRENDnet TEW-652BRP 3.04b01 and classified as problematic. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation of the argument nextPage leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-220019.
https://vuldb.com/?id.220019
2023-02-02T08:09:35.755Z
2023-02-02T08:10:13.488Z
2023-10-20T19:59:07.796Z
{'Vendor': 'TRENDnet', 'Product': 'TEW-652BRP', 'Versions': '3.04b01'}
CVE-2023-0793
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9
2023-02-12T00:00:00
2023-02-12T00:00:00
2023-12-18T10:06:58.466Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-0269
null
null
2023-01-13T00:00:00
null
2023-01-17T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
https://www.openssl.org/news/secadv/20230207.txt
2023-01-13T10:40:41.259Z
2023-02-08T19:01:50.514Z
2023-03-27T18:25:32.958867Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0, 1.1.1, 1.0.2'}
CVE-2023-0951
Improper access controls on some API endpoints in Devolutions Server 2022.3.12 and earlier could allow a standard privileged user to perform privileged actions.
https://devolutions.net/security/advisories/DEVO-2023-0003
2023-02-22T13:11:44.596Z
2023-02-22T13:46:30.884Z
2023-03-01T05:45:13.020935Z
{'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'}
CVE-2023-0402
The Social Warfare plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several AJAX actions in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete post meta information and reset network access tokens.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4bc4ba2c-32eb-46c5-bb40-7c0150fc1ca4
2023-01-19T14:06:58.319Z
2023-01-19T14:07:08.694Z
null
{'Vendor': 'warfareplugins', 'Product': 'Social Sharing Plugin – Social Warfare', 'Versions': '*'}
CVE-2023-0052
SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device management, an unauthorized user could access the system and modify the device configuration, which could result in the unauthorized user executing unrestricted malicious commands.
https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-05
2023-01-04T16:24:05.161Z
2023-01-20T21:23:08.018Z
2023-10-26T23:15:06.756Z
{'Vendor': 'SAUTER Controls', 'Product': 'Nova 220 (EYK220F001) DDC with BACnet connection', 'Versions': 'Firmware all versions, BACnetstac all versions'}
CVE-2023-0547
OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird < 102.10.
https://www.mozilla.org/security/advisories/mfsa2023-15/
2023-01-27T00:00:00
2023-06-02T00:00:00
2023-06-02T00:00:00
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
CVE-2023-0117
The online authentication provided by the hwKitAssistant lacks strict identity verification of applications. Successful exploitation of this vulnerability may affect availability of features,such as MeeTime.
https://consumer.huawei.com/en/support/bulletin/2023/5/
2023-01-09T00:00:00
2023-05-26T00:00:00
2023-05-26T00:00:00
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0, 3.0.0'}
CVE-2023-0814
The Profile Builder – User Profile & User Registration Forms plugin for WordPress is vulnerable to sensitive information disclosure via the [user_meta] shortcode in versions up to, and including 3.9.0. This is due to insufficient restriction on sensitive user meta values that can be called via that shortcode. This makes it possible for authenticated attackers, with subscriber-level permissions, and above to retrieve sensitive user meta that can be used to gain access to a high privileged user account. This does require the Usermeta shortcode be enabled to be exploited.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bbedad66-a5a6-4fb5-b03e-0ecf9fbef19a
2023-02-13T18:06:47.331Z
2023-02-14T01:13:13.326Z
2023-02-14T01:13:13.326Z
{'Vendor': 'reflectionmedia', 'Product': 'Profile Builder – User Profile & User Registration Forms', 'Versions': '*'}
CVE-2023-0394
A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
2023-01-18T00:00:00
2023-01-24T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel prior to Kernel 6.2 RC4'}
CVE-2023-0681
Rapid7 InsightVM versions 6.6.178 and lower suffers from an open redirect vulnerability, whereby an attacker has the ability to redirect the user to a site of the attacker’s choice using the ‘page’ parameter of the ‘data/console/redirect’ component of the application. This issue was resolved in the February, 2023 release of version 6.6.179. 
https://docs.rapid7.com/release-notes/nexpose/20230208/
2023-02-06T14:52:11.265Z
2023-03-20T17:26:01.588Z
2023-03-21T17:47:59.274Z
{'Vendor': 'Rapid7', 'Product': 'Nexpose', 'Versions': '0'}
CVE-2023-0044
If the Quarkus Form Authentication session cookie Path attribute is set to `/` then a cross-site attack may be initiated which might lead to the Information Disclosure. This attack can be prevented with the Quarkus CSRF Prevention feature.
https://access.redhat.com/security/cve/CVE-2023-0044
2023-01-04T00:00:00
2023-02-23T00:00:00
2023-02-23T00:00:00
{'Vendor': 'n/a', 'Product': 'quarkus-vertx-http', 'Versions': '1.11.7'}
CVE-2023-0414
Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-01.html
2023-01-20T00:00:00
2023-01-24T00:00:00
2023-01-24T00:00:00
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.3'}
CVE-2023-0947
Path Traversal in GitHub repository flatpressblog/flatpress prior to 1.3.
https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496
2023-02-22T00:00:00
2023-02-22T00:00:00
2023-02-22T00:00:00
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
CVE-2023-0802
LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
https://gitlab.com/libtiff/libtiff/-/commit/33aee1275d9d1384791d2206776eb8152d397f00
2023-02-12T00:00:00
2023-02-13T00:00:00
2023-05-30T00:00:00
{'Vendor': 'libtiff', 'Product': 'libtiff', 'Versions': '<=4.4.0'}