CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-0101
|
A privilege escalation vulnerability was identified in Nessus versions 8.10.1 through 8.15.8 and 10.0.0 through 10.4.1. An authenticated attacker could potentially execute a specially crafted file to obtain root or NT AUTHORITY / SYSTEM privileges on the Nessus host.
|
https://www.tenable.com/security/tns-2023-01
|
2023-01-06T00:00:00
|
2023-01-20T00:00:00
|
2023-01-20T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Nessus', 'Versions': '8.10.1 through 8.15.8, 10.0.0 through 10.4.1'}
|
CVE-2023-0551
|
The REST API TO MiniProgram WordPress plugin through 4.6.1 does not have authorisation and CSRF checks in an AJAX action, allowing ay authenticated users, such as subscriber to call and delete arbitrary attachments
|
https://wpscan.com/vulnerability/de162a46-1fdb-47b9-9a61-f12a2c655a7d
|
2023-01-27T19:20:34.011Z
|
2023-08-16T11:03:30.386Z
|
2023-08-16T11:03:30.386Z
|
{'Vendor': 'Unknown', 'Product': 'REST API TO MiniProgram', 'Versions': '0'}
|
CVE-2023-0382
|
User-controlled operations could have allowed Denial of Service in M-Files Server before 23.4.12528.1
due to uncontrolled memory consumption.
|
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-0382/
|
2023-01-18T09:16:46.966Z
|
2023-04-05T06:13:59.289Z
|
2023-04-05T06:13:59.289Z
|
{'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0'}
|
CVE-2023-0678
|
Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1.
|
https://huntr.dev/bounties/8d299377-be00-46dc-bebe-3d439127982f
|
2023-02-04T00:00:00
|
2023-02-04T00:00:00
|
2023-03-02T00:00:00
|
{'Vendor': 'phpipam', 'Product': 'phpipam/phpipam', 'Versions': 'unspecified'}
|
CVE-2023-0228
|
Improper Authentication vulnerability in ABB Symphony Plus S+ Operations.This issue affects Symphony Plus S+ Operations: from 2.X through 2.1 SP2, 2.2, from 3.X through 3.3 SP1, 3.3 SP2.
|
https://search.abb.com/library/Download.aspx?DocumentID=7PAA006722&LanguageCode=en&DocumentPartId=&Action=Launch
|
2023-01-12T05:50:16.315Z
|
2023-03-02T01:44:01.106Z
|
2023-03-02T12:14:53.597Z
|
{'Vendor': 'ABB', 'Product': 'Symphony Plus S+ Operations', 'Versions': '2.x, 2.2, 3.x, 3.3 SP2'}
|
CVE-2023-0697
|
Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 110.0.5481.77 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
|
2023-02-06T00:00:00
|
2023-02-07T00:00:00
|
2023-09-30T10:06:48.900930
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0910
|
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file view_prod.php of the component GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-221476.
|
https://vuldb.com/?id.221476
|
2023-02-18T08:42:18.175Z
|
2023-02-18T08:42:39.749Z
|
2023-10-20T21:23:43.622Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
|
CVE-2023-0443
|
The AnyWhere Elementor WordPress plugin before 1.2.8 discloses a Freemius Secret Key which could be used by an attacker to purchase the pro subscription using test credit card numbers without actually paying the amount. Such key has been revoked.
|
https://wpscan.com/vulnerability/471f3226-8f90-43d1-b826-f11ef4bbd602
|
2023-01-23T14:36:37.628Z
|
2023-05-30T07:49:18.666Z
|
2023-05-30T07:49:18.666Z
|
{'Vendor': 'Unknown', 'Product': 'AnyWhere Elementor', 'Versions': '1.2.5'}
|
CVE-2023-0013
|
The ABAP Keyword Documentation of SAP NetWeaver Application Server - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, for ABAP and ABAP Platform does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploitation an attacker can cause limited impact on confidentiality and integrity of the application.
|
https://launchpad.support.sap.com/#/notes/3283283
|
2022-12-16T03:13:36.148Z
|
2023-01-10T02:50:52.294Z
| null |
{'Vendor': 'SAP', 'Product': 'NetWeaver AS for ABAP and ABAP Platform', 'Versions': '702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757'}
|
CVE-2023-0506
|
The web service of ByDemes Group Airspace CCTV Web Service in its 2.616.BY00.11 version, contains a privilege escalation vulnerability, detected in the Camera Control Panel, whose exploitation could allow a low-privileged attacker to gain administrator access.
|
https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-demes-group-products
|
2023-01-25T10:12:33.756Z
|
2023-10-03T13:12:51.965Z
|
2023-10-03T13:12:51.965Z
|
{'Vendor': 'ByDemes Group', 'Product': 'Airspace CCTV Web Service', 'Versions': '2.616.BY00.11'}
|
CVE-2023-0156
|
The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not limit what log files to display in it's settings pages, allowing an authorized user (admin+) to view the contents of arbitrary files and list directories anywhere on the server (to which the web server has access). The plugin only displays the last 50 lines of the file.
|
https://wpscan.com/vulnerability/caf1dbb5-197e-41e9-8f48-ba1f2360a759
|
2023-01-10T12:05:57.391Z
|
2023-04-10T13:17:59.914Z
|
2023-04-10T13:17:59.914Z
|
{'Vendor': 'Unknown', 'Product': 'All-In-One Security (AIOS)', 'Versions': '0'}
|
CVE-2023-0855
|
Buffer overflow in IPP number-up attribute process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
|
https://www.canon-europe.com/support/product-security-latest-news/
|
2023-02-16T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
|
CVE-2023-0785
|
A vulnerability classified as problematic was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file check_availability.php. The manipulation of the argument username leads to exposure of sensitive information through data queries. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-220645 was assigned to this vulnerability.
|
https://vuldb.com/?id.220645
|
2023-02-12T07:36:36.995Z
|
2023-02-12T07:37:15.189Z
|
2023-10-20T21:01:46.193Z
|
{'Vendor': 'SourceCodester', 'Product': 'Best Online News Portal', 'Versions': '1.0'}
|
CVE-2023-0290
|
Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client.
Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role.
To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI.
This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.
|
https://github.com/Velocidex/velociraptor
|
2023-01-13T15:10:30.966Z
|
2023-01-18T21:10:42.929Z
| null |
{'Vendor': 'Rapid7', 'Product': 'Velociraptor', 'Versions': '0'}
|
CVE-2023-0087
|
The Swifty Page Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘spm_plugin_options_page_tree_max_width’ parameter in versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/8550a405-9fa2-41a3-b556-05ff9f577ce4
|
2023-01-05T18:13:54.793Z
|
2023-01-05T18:13:58.328Z
| null |
{'Vendor': 'swiftylife', 'Product': 'Swifty Page Manager', 'Versions': '*'}
|
CVE-2023-0438
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
|
https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3
|
2023-01-23T00:00:00
|
2023-01-23T00:00:00
|
2023-01-23T00:00:00
|
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
|
CVE-2023-0592
|
A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory.This issue affects jefferson: before 0.4.1.
|
https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
|
2023-01-31T09:18:23.165Z
|
2023-01-31T09:25:10.019Z
|
2023-01-31T09:25:23.588Z
|
{'Vendor': 'sviehb', 'Product': 'jefferson', 'Versions': '0'}
|
CVE-2023-0068
|
The Product GTIN (EAN, UPC, ISBN) for WooCommerce WordPress plugin through 1.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/4abd1454-380c-4c23-8474-d7da4b2f3b8e
|
2023-01-05T04:19:25.605Z
|
2023-03-06T13:34:02.785Z
|
2023-03-06T13:34:02.785Z
|
{'Vendor': 'Unknown', 'Product': 'Product GTIN (EAN, UPC, ISBN) for WooCommerce', 'Versions': '0'}
|
CVE-2023-0341
|
A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the p_pcre buffer.
|
https://github.com/editorconfig/editorconfig-core-c/commit/41281ea82fbf24b060a9f69b9c5369350fb0529e
|
2023-01-17T16:04:01.890Z
|
2023-01-31T23:22:53.634Z
|
2023-02-09T21:53:58.452Z
|
{'Vendor': 'EditorConfig', 'Product': 'EditorConfig C Core', 'Versions': '0'}
|
CVE-2023-0711
|
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_state function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the view state of the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c43e93-69a3-407e-860e-ab25af5d7177
|
2023-02-07T15:41:29.370Z
|
2023-02-08T01:10:17.727Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0204
|
NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can cause improper handling of exceptional conditions, which may lead to denial of service.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5459
|
2023-01-11T05:48:54.210Z
|
2023-04-22T02:24:54.842Z
|
2023-04-22T02:24:54.842Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA ConnectX Firmware', 'Versions': 'All versions prior to 35.1012'}
|
CVE-2023-0654
|
Due to a misconfiguration, the WARP Mobile Client (< 6.29) for Android was susceptible to a tapjacking attack. In the event that an attacker built a malicious application and managed to install it on a victim's device, the attacker would be able to trick the user into believing that the app shown on the screen was the WARP client when in reality it was the attacker's app.
|
https://github.com/cloudflare/advisories/security/advisories/GHSA-5r97-pqv6-xpx7
|
2023-02-02T17:45:39.047Z
|
2023-08-29T15:05:19.623Z
|
2023-08-29T15:05:19.623Z
|
{'Vendor': 'Cloudflare', 'Product': 'WARP Client', 'Versions': '0'}
|
CVE-2023-0879
|
Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.12.
|
https://huntr.dev/bounties/9464e3c6-961d-4e23-8b3d-07cbb31de541
|
2023-02-17T00:00:00
|
2023-02-17T00:00:00
|
2023-10-10T07:21:01.577Z
|
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
|
CVE-2023-0480
|
VitalPBX version 3.2.3-8 allows an unauthenticated external attacker to obtain the instance administrator's account. This is possible because the application is vulnerable to CSRF.
|
https://fluidattacks.com/advisories/sharp/
|
2023-01-24T00:00:00
|
2023-04-04T00:00:00
|
2023-04-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'VitalPBX', 'Versions': '3.2.3-8'}
|
CVE-2023-0195
|
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284,
which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:48.742Z
|
2023-04-01T04:55:08.956Z
|
2023-04-01T04:55:08.956Z
|
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0896
|
A default password was reported in Lenovo Smart Clock Essential with Alexa Built In that could allow unauthorized device access to an attacker with local network access.
|
https://support.lenovo.com/us/en/product_security/LEN-113714
|
2023-02-17T18:26:05.045Z
|
2023-05-01T13:52:23.203Z
|
2023-05-01T13:52:23.203Z
|
{'Vendor': 'Lenovo', 'Product': 'Lenovo Smart Clock Essential with Alexa Built In', 'Versions': 'Versions prior to v90'}
|
CVE-2023-0746
|
The help page in GigaVUE-FM, when using GigaVUE-OS software version 5.0 202, does not require an authenticated user. An attacker could enforce a user into inserting malicious JavaScript code into the URI, that could lead to a Reflected Cross site Scripting.
|
https://www.incibe-cert.es/en/early-warning/ics-advisories/xss-vulnerability-gigavue-fm
|
2023-02-08T00:00:00
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
{'Vendor': 'Gigamon', 'Product': 'GigaVUE-FM', 'Versions': 'GigaVUE-OS 5.0 202 5.0 202'}
|
CVE-2023-0316
|
Path Traversal: '\..\filename' in GitHub repository froxlor/froxlor prior to 2.0.0.
|
https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244
|
2023-01-16T00:00:00
|
2023-01-16T00:00:00
|
2023-01-16T00:00:00
|
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
|
CVE-2023-0603
|
The Sloth Logo Customizer WordPress plugin through 2.0.2 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
|
https://wpscan.com/vulnerability/1c93ea8f-4e68-4da1-994e-35a5873278ba
|
2023-01-31T21:03:59.956Z
|
2023-05-08T13:58:23.850Z
|
2023-05-08T13:58:23.850Z
|
{'Vendor': 'Unknown', 'Product': 'Sloth Logo Customizer', 'Versions': '0'}
|
CVE-2023-0253
|
The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via folder names in versions up to, and including, 4.18.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/950d71ae-29a1-4b71-b74a-b1a5c9f3326e
|
2023-01-12T17:24:16.154Z
|
2023-02-02T14:38:56.927Z
| null |
{'Vendor': 'devowl', 'Product': 'Real Media Library: Media Library Folder & File Manager', 'Versions': '*'}
|
CVE-2023-0496
|
The HT Event WordPress plugin before 1.4.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/451b47d5-7bd2-4a82-9c8e-fe6601bcd2ab
|
2023-01-25T10:07:14.356Z
|
2023-03-27T15:37:37.404Z
|
2023-03-27T15:37:37.404Z
|
{'Vendor': 'Unknown', 'Product': 'HT Event', 'Versions': '0'}
|
CVE-2023-0880
|
Misinterpretation of Input in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c
|
2023-02-17T00:00:00
|
2023-02-17T00:00:00
|
2023-12-18T10:11:04.242Z
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-0183
|
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer where an out-of-bounds write can lead to denial of service and data tampering.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:41.145Z
|
2023-04-01T04:34:10.313Z
|
2023-04-01T04:34:10.313Z
|
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0479
|
The Print Invoice & Delivery Notes for WooCommerce WordPress plugin before 4.7.2 is vulnerable to reflected XSS by echoing a GET value in an admin note within the WooCommerce orders page. This means that this vulnerability can be exploited for users with the edit_others_shop_orders capability. WooCommerce must be installed and active. This vulnerability is caused by a urldecode() after cleanup with esc_url_raw(), allowing double encoding.
|
https://wpscan.com/vulnerability/50963747-ae8e-42b4-bb42-cc848be7b92e/
|
2023-01-24T18:43:22.807Z
|
2024-01-16T15:55:08.499Z
|
2024-01-16T15:55:08.499Z
|
{'Vendor': 'Unknown', 'Product': 'Print Invoice & Delivery Notes for WooCommerce', 'Versions': '0'}
|
CVE-2023-0029
|
A vulnerability was found in Multilaser RE708 RE1200R4GC-2T2R-V3_v3411b_MUL029B. It has been rated as problematic. This issue affects some unknown processing of the component Telnet Service. The manipulation leads to denial of service. The attack may be initiated remotely. The identifier VDB-217169 was assigned to this vulnerability.
|
https://vuldb.com/?id.217169
|
2023-01-01T13:45:38.443Z
|
2023-01-01T13:46:19.323Z
|
2023-10-20T14:46:38.810Z
|
{'Vendor': 'Multilaser', 'Product': 'RE708', 'Versions': 'RE1200R4GC-2T2R-V3_v3411b_MUL029B'}
|
CVE-2023-0300
|
Cross-site Scripting (XSS) - Reflected in GitHub repository alfio-event/alf.io prior to 2.0-M4-2301.
|
https://huntr.dev/bounties/0a91fec7-a76e-4ca3-80ba-81de1f10d59d
|
2023-01-14T00:00:00
|
2023-01-14T00:00:00
|
2023-01-14T00:00:00
|
{'Vendor': 'alfio-event', 'Product': 'alfio-event/alf.io', 'Versions': 'unspecified'}
|
CVE-2023-0750
|
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the network an attacker could bypass authentication.
This would allow an attacker to :
- Change the password, resulting in a DOS of the users
- Change the streaming source, compromising the integrity of the stream
- Change the streaming destination, compromising the confidentiality of the stream
This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.
|
https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration
|
2023-02-08T15:13:56.962Z
|
2023-04-06T13:12:11.304Z
|
2023-04-06T13:12:11.304Z
|
{'Vendor': 'Lynx Technik AG', 'Product': 'Yellowbrik', 'Versions': 'PEC 1864'}
|
CVE-2023-0245
|
A vulnerability, which was classified as critical, has been found in SourceCodester Online Flight Booking Management System. This issue affects some unknown processing of the file add_contestant.php. The manipulation of the argument add_contestant leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218153 was assigned to this vulnerability.
|
https://vuldb.com/?id.218153
|
2023-01-12T14:51:54.408Z
|
2023-01-12T14:52:10.601Z
|
2023-10-20T18:10:29.954Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Flight Booking Management System', 'Versions': 'n/a'}
|
CVE-2023-0615
|
A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2166287
|
2023-02-01T00:00:00
|
2023-02-06T00:00:00
|
2023-02-06T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.2-rc6'}
|
CVE-2023-0838
|
An issue has been discovered in GitLab affecting versions starting from 15.1 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. A maintainer could modify a webhook URL to leak masked webhook secrets by adding a new parameter to the url. This addresses an incomplete fix for CVE-2022-4342.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/391685
|
2023-02-15T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.1, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-0992
|
The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=cve
|
2023-02-23T19:18:03.577Z
|
2023-06-09T05:33:11.185Z
|
2023-06-09T05:33:11.185Z
|
{'Vendor': 'paultgoodchild', 'Product': 'Shield Security – Smart Bot Blocking & Intrusion Prevention', 'Versions': '*'}
|
CVE-2023-0091
|
A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.
|
https://access.redhat.com/security/cve/CVE-2023-0091
|
2023-01-05T20:27:38.369Z
|
2023-01-11T20:44:07.553Z
|
2023-01-13T04:22:02.451274Z
|
{'Vendor': 'redhat.com', 'Product': 'Keycloak', 'Versions': 'n/a'}
|
CVE-2023-0584
|
The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change the 'vk_font_awesome_version' option to an arbitrary value.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/b90b7f6c-df7f-48a5-b283-cf5facbd71e5?source=cve
|
2023-01-30T18:30:18.184Z
|
2023-06-03T01:59:28.995Z
|
2023-06-03T01:59:28.995Z
|
{'Vendor': 'vektor-inc', 'Product': 'VK Blocks', 'Versions': '*'}
|
CVE-2023-0707
|
A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been rated as critical. Affected by this issue is the function delete_record of the file function.php. The manipulation of the argument id leads to sql injection. VDB-220346 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.220346
|
2023-02-07T12:31:49.996Z
|
2023-02-07T12:32:24.852Z
|
2023-10-20T20:52:00.767Z
|
{'Vendor': 'SourceCodester', 'Product': 'Medical Certificate Generator App', 'Versions': '1.0'}
|
CVE-2023-0357
|
Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket.
|
https://fluidattacks.com/advisories/quayle/
|
2023-01-17T00:00:00
|
2023-04-04T00:00:00
|
2023-04-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Helpy', 'Versions': '2.8.0'}
|
CVE-2023-0642
|
Cross-Site Request Forgery (CSRF) in GitHub repository squidex/squidex prior to 7.4.0.
|
https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d
|
2023-02-02T00:00:00
|
2023-02-02T00:00:00
|
2023-02-02T00:00:00
|
{'Vendor': 'squidex', 'Product': 'squidex/squidex', 'Versions': 'unspecified'}
|
CVE-2023-0212
|
The Advanced Recent Posts WordPress plugin through 0.6.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/5fdd44aa-7f3f-423a-9fb0-dc9dc36f33a3
|
2023-01-11T08:13:20.252Z
|
2023-03-06T13:34:03.634Z
|
2023-03-06T13:34:03.634Z
|
{'Vendor': 'Unknown', 'Product': 'Advanced Recent Posts', 'Versions': '0'}
|
CVE-2023-0265
|
Uvdesk version 1.1.1 allows an authenticated remote attacker to execute commands on the server. This is possible because the application does not properly validate profile pictures uploaded by customers.
|
https://fluidattacks.com/advisories/supply/
|
2023-01-12T00:00:00
|
2023-04-04T00:00:00
|
2023-04-04T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Uvdesk', 'Versions': '1.1.1'}
|
CVE-2023-0635
|
Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.
|
https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch
|
2023-02-02T07:19:48.321Z
|
2023-06-05T03:42:04.704Z
|
2023-06-05T03:42:04.704Z
|
{'Vendor': 'ABB Ltd.', 'Product': 'ASPECT®-Enterprise', 'Versions': '3.0;0'}
|
CVE-2023-0320
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Izmir Katip Celebi University UBYS allows Stored XSS.This issue affects UBYS: before 23.03.16.
|
https://www.usom.gov.tr/bildirim/tr-23-0159
|
2023-01-16T12:51:54.497Z
|
2023-03-20T12:18:36.073Z
|
2023-04-05T05:57:47.916Z
|
{'Vendor': 'Izmir Katip Celebi University', 'Product': 'UBYS', 'Versions': '0'}
|
CVE-2023-0770
|
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.
|
https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd
|
2023-02-09T00:00:00
|
2023-02-09T00:00:00
|
2023-05-27T00:00:00
|
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
|
CVE-2023-0459
|
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
|
https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c
|
2023-01-24T09:43:39.956Z
|
2023-05-25T13:22:38.338Z
|
2023-05-25T13:22:38.338Z
|
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '4b842e4e25b12951fa10dedb4bc16bc47e3b850c'}
|
CVE-2023-0009
|
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
|
https://security.paloaltonetworks.com/CVE-2023-0009
|
2022-10-27T18:48:18.633Z
|
2023-06-14T16:31:58.622Z
|
2023-07-31T20:36:04.826Z
|
{'Vendor': 'Palo Alto Networks', 'Product': 'GlobalProtect App', 'Versions': '6.2, 6.1, 6.0, 5.2'}
|
CVE-2023-0398
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
|
https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58
|
2023-01-19T00:00:00
|
2023-01-19T00:00:00
|
2023-01-19T00:00:00
|
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
|
CVE-2023-0662
|
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.
|
https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv
|
2023-02-03T18:37:37.552Z
|
2023-02-16T06:24:01.692Z
|
2023-02-16T06:24:01.692Z
|
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.x, 8.1.x, 8.2.x'}
|
CVE-2023-0232
|
The ShopLentor WordPress plugin before 2.5.4 unserializes user input from cookies in order to track viewed products and user data, which could lead to PHP Object Injection.
|
https://wpscan.com/vulnerability/1885a708-0e8a-4f4c-8e26-069bebe9a518
|
2023-01-12T10:31:18.880Z
|
2023-02-21T08:51:02.165Z
|
2023-02-21T08:51:02.165Z
|
{'Vendor': 'Unknown', 'Product': 'ShopLentor', 'Versions': '0'}
|
CVE-2023-0727
|
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_delete_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/62b56928-7125-4211-b233-07b5b51881c1
|
2023-02-07T17:31:29.982Z
|
2023-02-07T22:49:27.218Z
| null |
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
|
CVE-2023-0377
|
The Scriptless Social Sharing WordPress plugin before 3.2.2 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/5b1aacd1-3f75-4a6f-8146-cbb98a713724
|
2023-01-18T07:24:44.825Z
|
2023-03-06T13:34:05.264Z
|
2023-03-06T13:34:05.264Z
|
{'Vendor': 'Unknown', 'Product': 'Scriptless Social Sharing', 'Versions': '0'}
|
CVE-2023-0818
|
Off-by-one Error in GitHub repository gpac/gpac prior to v2.3.0-DEV.
|
https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a
|
2023-02-13T00:00:00
|
2023-02-13T00:00:00
|
2023-05-27T00:00:00
|
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
|
CVE-2023-0224
|
The GiveWP WordPress plugin before 2.24.1 does not properly escape user input before it reaches SQL queries, which could let unauthenticated attackers perform SQL Injection attacks
|
https://wpscan.com/vulnerability/d8da539d-0a1b-46ef-b48d-710c59cf68e1/
|
2023-01-11T20:53:58.072Z
|
2024-01-16T15:54:45.597Z
|
2024-01-16T15:54:45.597Z
|
{'Vendor': 'Unknown', 'Product': 'GiveWP', 'Versions': '0'}
|
CVE-2023-0674
|
A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220196.
|
https://vuldb.com/?id.220196
|
2023-02-04T07:32:31.476Z
|
2023-02-04T07:34:05.519Z
|
2023-10-20T20:45:54.639Z
|
{'Vendor': 'n/a', 'Product': 'XXL-JOB', 'Versions': '2.3.1'}
|
CVE-2023-0361
|
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
|
https://access.redhat.com/security/cve/CVE-2023-0361
|
2023-01-18T00:00:00
|
2023-02-15T00:00:00
|
2023-07-25T00:00:00
|
{'Vendor': 'n/a', 'Product': 'gnutls', 'Versions': 'gnutls-3.7.6'}
|
CVE-2023-0731
|
The Interactive Geo Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the action content parameter in versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/95ce515a-377c-49b4-8d1b-7ac22769c759
|
2023-02-07T17:51:46.872Z
|
2023-02-07T22:48:28.550Z
| null |
{'Vendor': 'carlosmoreirapt', 'Product': 'Interactive Geo Maps', 'Versions': '*'}
|
CVE-2023-0418
|
The Video Central for WordPress plugin through 1.3.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/821751bb-feaf-45b8-91a9-e173cb0c05fc
|
2023-01-20T08:50:55.673Z
|
2023-04-24T18:31:00.385Z
|
2023-04-24T18:31:00.385Z
|
{'Vendor': 'Unknown', 'Product': 'Video Central for WordPress', 'Versions': '0'}
|
CVE-2023-0048
|
Code Injection in GitHub repository lirantal/daloradius prior to master-branch.
|
https://huntr.dev/bounties/57abd666-4b9c-4f59-825d-1ec832153e79
|
2023-01-04T00:00:00
|
2023-01-04T00:00:00
|
2023-01-04T00:00:00
|
{'Vendor': 'lirantal', 'Product': 'lirantal/daloradius', 'Versions': 'unspecified'}
|
CVE-2023-0623
|
Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04
|
2023-02-01T22:05:37.370Z
|
2023-03-09T21:12:00.661Z
|
2023-03-09T21:12:00.661Z
|
{'Vendor': 'Horner Automation', 'Product': 'Cscape Envision RV', 'Versions': '4.60'}
|
CVE-2023-0789
|
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
|
https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5
|
2023-02-12T00:00:00
|
2023-02-12T00:00:00
|
2023-12-18T10:08:16.153Z
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-0273
|
The Custom Content Shortcode WordPress plugin through 4.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/5cafbba6-478f-4f5d-a2d4-60c6a22f2f1e
|
2023-01-13T08:58:41.728Z
|
2023-03-20T15:52:21.047Z
|
2023-03-20T15:52:21.047Z
|
{'Vendor': 'Unknown', 'Product': 'Custom Content Shortcode', 'Versions': '0'}
|
CVE-2023-0766
|
The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce.
|
https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88
|
2023-02-09T16:59:39.649Z
|
2023-05-30T07:49:19.438Z
|
2023-05-30T07:49:19.438Z
|
{'Vendor': 'Unknown', 'Product': 'Newsletter Popup', 'Versions': '0'}
|
CVE-2023-0336
|
The OoohBoi Steroids for Elementor WordPress plugin before 2.1.5 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber to delete attachment.
|
https://wpscan.com/vulnerability/ac74df9a-6fbf-4411-a501-97eba1ad1895
|
2023-01-17T10:34:22.060Z
|
2023-03-27T15:37:38.218Z
|
2023-03-29T13:15:17.817Z
|
{'Vendor': 'Unknown', 'Product': 'OoohBoi Steroids for Elementor', 'Versions': '0'}
|
CVE-2023-0859
|
Arbitrary Files can be installed in the Setting Data Import function of Office / Small Office Multifunction Printers and Laser Printers(*). *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
|
https://www.canon-europe.com/support/product-security-latest-news/
|
2023-02-16T00:00:00
|
2023-05-11T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
|
CVE-2023-0658
|
A vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220053 was assigned to this vulnerability.
|
https://vuldb.com/?id.220053
|
2023-02-02T19:41:39.034Z
|
2023-02-02T19:42:09.183Z
|
2023-10-20T20:41:01.889Z
|
{'Vendor': 'Multilaser', 'Product': 'RE057', 'Versions': '2.1, 2.2'}
|
CVE-2023-0208
|
NVIDIA DCGM for Linux contains a vulnerability in HostEngine (server component) where a user may cause a heap-based buffer overflow through the bound socket. A successful exploit of this vulnerability may lead to denial of service and data tampering.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5453
|
2023-01-11T05:48:56.988Z
|
2023-04-01T03:23:19.574Z
|
2023-04-01T03:23:19.574Z
|
{'Vendor': 'NVIDIA', 'Product': 'DCGM', 'Versions': 'All versions prior to 3.1.7'}
|
CVE-2023-0822
|
The affected product DIAEnergie (versions prior to v1.9.03.001) contains improper authorization, which could allow an unauthorized user to bypass authorization and access privileged functionality.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-06
|
2023-02-14T01:24:31.882Z
|
2023-02-17T16:46:21.643Z
|
2023-02-17T16:46:21.643Z
|
{'Vendor': 'Delta Electronics ', 'Product': 'DIAEnergie ', 'Versions': '0'}
|
CVE-2023-0988
|
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability.
|
https://vuldb.com/?id.221681
|
2023-02-23T15:19:52.455Z
|
2023-02-23T15:20:31.596Z
|
2023-10-20T21:53:05.007Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
|
CVE-2023-0121
|
A denial of service issue was discovered in GitLab CE/EE affecting all versions starting from 13.2.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2 which allows an attacker to cause high resource consumption using malicious test report artifacts.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/387549
|
2023-01-09T00:00:00
|
2023-06-07T00:00:00
|
2023-06-07T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=13.2.4, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
|
CVE-2023-0571
|
A vulnerability has been found in SourceCodester Canteen Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file createcustomer.php of the component Add Customer. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219730 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.219730
|
2023-01-29T17:29:35.083Z
|
2023-01-29T17:30:35.874Z
|
2023-10-20T19:49:22.222Z
|
{'Vendor': 'SourceCodester', 'Product': 'Canteen Management System', 'Versions': '1.0'}
|
CVE-2023-0064
|
The eVision Responsive Column Layout Shortcodes WordPress plugin through 2.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a
|
2023-01-05T04:19:07.753Z
|
2023-03-06T13:34:06.078Z
|
2023-03-06T13:34:06.078Z
|
{'Vendor': 'Unknown', 'Product': 'eVision Responsive Column Layout Shortcodes', 'Versions': '0'}
|
CVE-2023-0434
|
Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40.
|
https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4
|
2023-01-21T00:00:00
|
2023-01-22T00:00:00
|
2023-01-22T00:00:00
|
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
|
CVE-2023-0967
|
Bhima version 1.27.0 allows an attacker authenticated with normal user permissions to view sensitive data of other application users and data that should only be viewed by the administrator. This is possible because the application is vulnerable to IDOR, it does not properly validate user permissions with respect to certain actions the user can perform.
|
https://github.com/IMA-WorldHealth/bhima/
|
2023-02-22T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Bhima', 'Versions': '1.27.0'}
|
CVE-2023-0526
|
The Post Shortcode WordPress plugin through 2.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/0ec58310-243d-40c8-9fa6-8753947bfa89
|
2023-01-27T10:22:42.458Z
|
2023-05-08T13:58:24.790Z
|
2023-05-08T13:58:24.790Z
|
{'Vendor': 'Unknown', 'Product': 'Post Shortcode', 'Versions': '0'}
|
CVE-2023-0176
|
The Giveaways and Contests by RafflePress WordPress plugin before 1.11.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/a762c25b-5c47-400e-8964-407cf4c94e9f
|
2023-01-11T03:10:16.372Z
|
2023-02-06T19:59:46.410Z
| null |
{'Vendor': 'Unknown', 'Product': 'Giveaways and Contests by RafflePress', 'Versions': '0'}
|
CVE-2023-0875
|
The WP Meta SEO WordPress plugin before 4.5.3 does not properly sanitize and escape inputs into SQL queries, leading to a blind SQL Injection vulnerability that can be exploited by subscriber+ users.
|
https://wpscan.com/vulnerability/d44e9a45-cbdf-46b1-8b48-7d934b617534
|
2023-02-16T22:49:47.520Z
|
2023-03-20T15:52:21.908Z
|
2023-03-20T15:52:21.908Z
|
{'Vendor': 'Unknown', 'Product': 'WP Meta SEO', 'Versions': '0'}
|
CVE-2023-0930
|
Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html
|
2023-02-20T22:58:57.833Z
|
2023-02-22T19:54:00.579Z
|
2023-02-22T19:54:00.579Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '110.0.5481.177'}
|
CVE-2023-0199
|
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
|
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
|
2023-01-11T05:48:51.162Z
|
2023-04-22T02:19:48.182Z
|
2023-04-22T02:19:48.182Z
|
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA GPU Display Driver', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
|
CVE-2023-0463
|
The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk.
|
https://devolutions.net/security/advisories/DEVO-2023-0001
|
2023-01-24T13:11:08.882Z
|
2023-01-24T16:42:58.172Z
|
2023-01-26T06:03:10.975661Z
|
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '2022.3.29'}
|
CVE-2023-0033
|
The PDF Viewer WordPress plugin before 1.0.0 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
|
https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0
|
2023-01-03T02:32:07.757Z
|
2023-01-30T20:31:53.710Z
| null |
{'Vendor': 'Unknown', 'Product': 'PDF Viewer', 'Versions': '0'}
|
CVE-2023-0619
|
The Kraken.io Image Optimizer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset image optimizations.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/f94eabc5-6e3b-46df-9e36-d7d0fad833de
|
2023-02-01T18:14:34.069Z
|
2023-02-01T19:03:40.110Z
| null |
{'Vendor': 'karim79', 'Product': 'Kraken.io Image Optimizer', 'Versions': '*'}
|
CVE-2023-0249
|
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-01
|
2023-01-12T15:55:25.434Z
|
2023-02-08T22:43:50.324Z
| null |
{'Vendor': 'Delta Electronics', 'Product': 'DIAScreen', 'Versions': 'All versions'}
|
CVE-2023-0863
|
Improper Authentication vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (CE) (Terra AC MID), ABB Terra AC wallbox (CE) Terra AC Juno CE, ABB Terra AC wallbox (CE) Terra AC PTB, ABB Terra AC wallbox (CE) Symbiosis, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): from 1.0;0 through 1.5.5; Terra AC wallbox (UL32A) : from 1.0;0 through 1.6.5; Terra AC wallbox (CE) (Terra AC MID): from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC Juno CE: from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC PTB : from 1.0;0 through 1.5.25; Terra AC wallbox (CE) Symbiosis: from 1.0;0 through 1.2.7; Terra AC wallbox (JP): from 1.0;0 through 1.6.5.
|
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108468A1415&LanguageCode=en&DocumentPartId=&Action=Launch
|
2023-02-16T13:04:45.860Z
|
2023-05-17T07:10:46.122Z
|
2023-05-17T07:10:46.122Z
|
{'Vendor': 'ABB', 'Product': 'Terra AC wallbox (UL40/80A)', 'Versions': '1.0;0'}
|
CVE-2023-0160
|
A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.
|
https://access.redhat.com/security/cve/CVE-2023-0160
|
2023-01-10T16:03:54.488Z
|
2023-07-18T16:08:23.653Z
|
2023-07-18T16:08:23.653Z
|
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.4-rc1'}
|
CVE-2023-0530
|
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/approve_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219599.
|
https://vuldb.com/?id.219599
|
2023-01-27T10:41:36.001Z
|
2023-01-27T10:42:27.021Z
|
2023-10-20T19:35:56.859Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-0025
|
SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources.
|
https://launchpad.support.sap.com/#/notes/3267442
|
2022-12-22T15:07:29.566Z
|
2023-02-14T03:10:47.861Z
|
2023-04-11T21:20:20.171Z
|
{'Vendor': 'SAP', 'Product': 'Solution Manager (BSP Application)', 'Versions': '720'}
|
CVE-2023-0475
|
HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0.
|
https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125
|
2023-01-24T17:05:24.695Z
|
2023-02-16T18:35:37.518Z
|
2023-02-16T18:35:37.518Z
|
{'Vendor': 'HashiCorp', 'Product': 'go-getter', 'Versions': '0, 0'}
|
CVE-2023-0567
|
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.
|
https://bugs.php.net/bug.php?id=81744
|
2023-01-29T07:45:55.380Z
|
2023-02-16T06:15:50.127Z
|
2023-03-01T05:45:13.020935Z
|
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.x, 8.1.x, 8.2.x'}
|
CVE-2023-0137
|
Heap buffer overflow in Platform Apps in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
|
2023-01-09T00:00:00
|
2023-01-10T00:00:00
|
2023-11-25T11:07:15.083907
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
|
CVE-2023-0834
|
Incorrect Permission Assignment for Critical Resource vulnerability in HYPR Workforce Access on MacOS allows Privilege Escalation.This issue affects Workforce Access: from 6.12 before 8.1.
|
https://www.hypr.com/security-advisories
|
2023-02-14T21:35:42.403Z
|
2023-04-28T14:54:53.201Z
|
2023-04-28T14:54:53.201Z
|
{'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '6.12'}
|
CVE-2023-0971
|
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered.
|
https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1
|
2023-02-22T20:49:08.780Z
|
2023-06-21T19:42:25.906Z
|
2023-06-21T19:42:25.906Z
|
{'Vendor': 'Silicon Labs', 'Product': 'Z/IP Gateway', 'Versions': '7.18.03'}
|
CVE-2023-0422
|
The Article Directory WordPress plugin through 1.3 does not properly sanitize the `publish_terms_text` setting before displaying it in the administration panel, which may enable administrators to conduct Stored XSS attacks in multisite contexts.
|
https://wpscan.com/vulnerability/d57f2fb2-5251-4069-8c9a-a4af269c5e62
|
2023-01-20T08:51:21.017Z
|
2023-04-10T13:18:01.633Z
|
2023-04-10T13:18:01.633Z
|
{'Vendor': 'Unknown', 'Product': 'Article Directory', 'Versions': '0'}
|
CVE-2023-0588
|
The Catalyst Connect Zoho CRM Client Portal WordPress plugin before 2.1.0 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admin.
|
https://wpscan.com/vulnerability/84be272e-0891-461c-91ad-496b64f92f8f
|
2023-01-31T08:22:33.646Z
|
2023-06-27T13:17:24.246Z
|
2023-06-27T13:17:24.246Z
|
{'Vendor': 'Unknown', 'Product': 'Catalyst Connect Zoho CRM Client Portal', 'Versions': '0'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.