CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-0101
A privilege escalation vulnerability was identified in Nessus versions 8.10.1 through 8.15.8 and 10.0.0 through 10.4.1. An authenticated attacker could potentially execute a specially crafted file to obtain root or NT AUTHORITY / SYSTEM privileges on the Nessus host.
https://www.tenable.com/security/tns-2023-01
2023-01-06T00:00:00
2023-01-20T00:00:00
2023-01-20T00:00:00
{'Vendor': 'n/a', 'Product': 'Nessus', 'Versions': '8.10.1 through 8.15.8, 10.0.0 through 10.4.1'}
CVE-2023-0551
The REST API TO MiniProgram WordPress plugin through 4.6.1 does not have authorisation and CSRF checks in an AJAX action, allowing ay authenticated users, such as subscriber to call and delete arbitrary attachments
https://wpscan.com/vulnerability/de162a46-1fdb-47b9-9a61-f12a2c655a7d
2023-01-27T19:20:34.011Z
2023-08-16T11:03:30.386Z
2023-08-16T11:03:30.386Z
{'Vendor': 'Unknown', 'Product': 'REST API TO MiniProgram', 'Versions': '0'}
CVE-2023-0382
User-controlled operations could have allowed Denial of Service in M-Files Server before 23.4.12528.1 due to uncontrolled memory consumption.
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-0382/
2023-01-18T09:16:46.966Z
2023-04-05T06:13:59.289Z
2023-04-05T06:13:59.289Z
{'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0'}
CVE-2023-0678
Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1.
https://huntr.dev/bounties/8d299377-be00-46dc-bebe-3d439127982f
2023-02-04T00:00:00
2023-02-04T00:00:00
2023-03-02T00:00:00
{'Vendor': 'phpipam', 'Product': 'phpipam/phpipam', 'Versions': 'unspecified'}
CVE-2023-0228
Improper Authentication vulnerability in ABB Symphony Plus S+ Operations.This issue affects Symphony Plus S+ Operations: from 2.X through 2.1 SP2, 2.2, from 3.X through 3.3 SP1, 3.3 SP2.
https://search.abb.com/library/Download.aspx?DocumentID=7PAA006722&LanguageCode=en&DocumentPartId=&Action=Launch
2023-01-12T05:50:16.315Z
2023-03-02T01:44:01.106Z
2023-03-02T12:14:53.597Z
{'Vendor': 'ABB', 'Product': 'Symphony Plus S+ Operations', 'Versions': '2.x, 2.2, 3.x, 3.3 SP2'}
CVE-2023-0697
Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 110.0.5481.77 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html
2023-02-06T00:00:00
2023-02-07T00:00:00
2023-09-30T10:06:48.900930
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0910
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file view_prod.php of the component GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-221476.
https://vuldb.com/?id.221476
2023-02-18T08:42:18.175Z
2023-02-18T08:42:39.749Z
2023-10-20T21:23:43.622Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-0443
The AnyWhere Elementor WordPress plugin before 1.2.8 discloses a Freemius Secret Key which could be used by an attacker to purchase the pro subscription using test credit card numbers without actually paying the amount. Such key has been revoked.
https://wpscan.com/vulnerability/471f3226-8f90-43d1-b826-f11ef4bbd602
2023-01-23T14:36:37.628Z
2023-05-30T07:49:18.666Z
2023-05-30T07:49:18.666Z
{'Vendor': 'Unknown', 'Product': 'AnyWhere Elementor', 'Versions': '1.2.5'}
CVE-2023-0013
The ABAP Keyword Documentation of SAP NetWeaver Application Server - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, for ABAP and ABAP Platform does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. On successful exploitation an attacker can cause limited impact on confidentiality and integrity of the application.
https://launchpad.support.sap.com/#/notes/3283283
2022-12-16T03:13:36.148Z
2023-01-10T02:50:52.294Z
null
{'Vendor': 'SAP', 'Product': 'NetWeaver AS for ABAP and ABAP Platform', 'Versions': '702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757'}
CVE-2023-0506
The web service of ByDemes Group Airspace CCTV Web Service in its 2.616.BY00.11 version, contains a privilege escalation vulnerability, detected in the Camera Control Panel, whose exploitation could allow a low-privileged attacker to gain administrator access.
https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-demes-group-products
2023-01-25T10:12:33.756Z
2023-10-03T13:12:51.965Z
2023-10-03T13:12:51.965Z
{'Vendor': 'ByDemes Group', 'Product': 'Airspace CCTV Web Service', 'Versions': '2.616.BY00.11'}
CVE-2023-0156
The All-In-One Security (AIOS) WordPress plugin before 5.1.5 does not limit what log files to display in it's settings pages, allowing an authorized user (admin+) to view the contents of arbitrary files and list directories anywhere on the server (to which the web server has access). The plugin only displays the last 50 lines of the file.
https://wpscan.com/vulnerability/caf1dbb5-197e-41e9-8f48-ba1f2360a759
2023-01-10T12:05:57.391Z
2023-04-10T13:17:59.914Z
2023-04-10T13:17:59.914Z
{'Vendor': 'Unknown', 'Product': 'All-In-One Security (AIOS)', 'Versions': '0'}
CVE-2023-0855
Buffer overflow in IPP number-up attribute process of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
https://www.canon-europe.com/support/product-security-latest-news/
2023-02-16T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
CVE-2023-0785
A vulnerability classified as problematic was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file check_availability.php. The manipulation of the argument username leads to exposure of sensitive information through data queries. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-220645 was assigned to this vulnerability.
https://vuldb.com/?id.220645
2023-02-12T07:36:36.995Z
2023-02-12T07:37:15.189Z
2023-10-20T21:01:46.193Z
{'Vendor': 'SourceCodester', 'Product': 'Best Online News Portal', 'Versions': '1.0'}
CVE-2023-0290
Rapid7 Velociraptor did not properly sanitize the client ID parameter to the CreateCollection API, allowing a directory traversal in where the collection task could be written. It was possible to provide a client id of "../clients/server" to schedule the collection for the server (as a server artifact), but only require privileges to schedule collections on the client. Normally, to schedule an artifact on the server, the COLLECT_SERVER permission is required. This permission is normally only granted to "administrator" role. Due to this issue, it is sufficient to have the COLLECT_CLIENT privilege, which is normally granted to the "investigator" role. To exploit this vulnerability, the attacker must already have a Velociraptor user account at least "investigator" level, and be able to authenticate to the GUI and issue an API call to the backend. Typically, most users deploy Velociraptor with limited access to a trusted group, and most users will already be administrators within the GUI. This issue affects Velociraptor versions before 0.6.7-5. Version 0.6.7-5, released January 16, 2023, fixes the issue.
https://github.com/Velocidex/velociraptor
2023-01-13T15:10:30.966Z
2023-01-18T21:10:42.929Z
null
{'Vendor': 'Rapid7', 'Product': 'Velociraptor', 'Versions': '0'}
CVE-2023-0087
The Swifty Page Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘spm_plugin_options_page_tree_max_width’ parameter in versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8550a405-9fa2-41a3-b556-05ff9f577ce4
2023-01-05T18:13:54.793Z
2023-01-05T18:13:58.328Z
null
{'Vendor': 'swiftylife', 'Product': 'Swifty Page Manager', 'Versions': '*'}
CVE-2023-0438
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
https://huntr.dev/bounties/07a5b61b-306d-47c4-8ff0-06c540c7dfb3
2023-01-23T00:00:00
2023-01-23T00:00:00
2023-01-23T00:00:00
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-0592
A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory.This issue affects jefferson: before 0.4.1.
https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/
2023-01-31T09:18:23.165Z
2023-01-31T09:25:10.019Z
2023-01-31T09:25:23.588Z
{'Vendor': 'sviehb', 'Product': 'jefferson', 'Versions': '0'}
CVE-2023-0068
The Product GTIN (EAN, UPC, ISBN) for WooCommerce WordPress plugin through 1.1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/4abd1454-380c-4c23-8474-d7da4b2f3b8e
2023-01-05T04:19:25.605Z
2023-03-06T13:34:02.785Z
2023-03-06T13:34:02.785Z
{'Vendor': 'Unknown', 'Product': 'Product GTIN (EAN, UPC, ISBN) for WooCommerce', 'Versions': '0'}
CVE-2023-0341
A stack buffer overflow exists in the ec_glob function of editorconfig-core-c before v0.12.6 which allowed an attacker to arbitrarily write to the stack and possibly allows remote code execution. editorconfig-core-c v0.12.6 resolved this vulnerability by bound checking all write operations over the p_pcre buffer.
https://github.com/editorconfig/editorconfig-core-c/commit/41281ea82fbf24b060a9f69b9c5369350fb0529e
2023-01-17T16:04:01.890Z
2023-01-31T23:22:53.634Z
2023-02-09T21:53:58.452Z
{'Vendor': 'EditorConfig', 'Product': 'EditorConfig C Core', 'Versions': '0'}
CVE-2023-0711
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_state function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the view state of the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c43e93-69a3-407e-860e-ab25af5d7177
2023-02-07T15:41:29.370Z
2023-02-08T01:10:17.727Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0204
NVIDIA ConnectX-5, ConnectX-6, and ConnectX6-DX contain a vulnerability in the NIC firmware, where an unprivileged user can cause improper handling of exceptional conditions, which may lead to denial of service.
https://nvidia.custhelp.com/app/answers/detail/a_id/5459
2023-01-11T05:48:54.210Z
2023-04-22T02:24:54.842Z
2023-04-22T02:24:54.842Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA ConnectX Firmware', 'Versions': 'All versions prior to 35.1012'}
CVE-2023-0654
Due to a misconfiguration, the WARP Mobile Client (< 6.29) for Android was susceptible to a tapjacking attack. In the event that an attacker built a malicious application and managed to install it on a victim's device, the attacker would be able to trick the user into believing that the app shown on the screen was the WARP client when in reality it was the attacker's app.
https://github.com/cloudflare/advisories/security/advisories/GHSA-5r97-pqv6-xpx7
2023-02-02T17:45:39.047Z
2023-08-29T15:05:19.623Z
2023-08-29T15:05:19.623Z
{'Vendor': 'Cloudflare', 'Product': 'WARP Client', 'Versions': '0'}
CVE-2023-0879
Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.12.
https://huntr.dev/bounties/9464e3c6-961d-4e23-8b3d-07cbb31de541
2023-02-17T00:00:00
2023-02-17T00:00:00
2023-10-10T07:21:01.577Z
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
CVE-2023-0480
VitalPBX version 3.2.3-8 allows an unauthenticated external attacker to obtain the instance administrator's account. This is possible because the application is vulnerable to CSRF.
https://fluidattacks.com/advisories/sharp/
2023-01-24T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'VitalPBX', 'Versions': '3.2.3-8'}
CVE-2023-0195
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer driver nvlddmkm.sys, where an can cause CWE-1284, which may lead to hypothetical Information leak of unimportant data such as local variable data of the driver
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:48.742Z
2023-04-01T04:55:08.956Z
2023-04-01T04:55:08.956Z
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Windows), NVIDIA Cloud Gaming (guest driver - Windows)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0896
A default password was reported in Lenovo Smart Clock Essential with Alexa Built In that could allow unauthorized device access to an attacker with local network access.
https://support.lenovo.com/us/en/product_security/LEN-113714
2023-02-17T18:26:05.045Z
2023-05-01T13:52:23.203Z
2023-05-01T13:52:23.203Z
{'Vendor': 'Lenovo', 'Product': 'Lenovo Smart Clock Essential with Alexa Built In', 'Versions': 'Versions prior to v90'}
CVE-2023-0746
The help page in GigaVUE-FM, when using GigaVUE-OS software version 5.0 202, does not require an authenticated user. An attacker could enforce a user into inserting malicious JavaScript code into the URI, that could lead to a Reflected Cross site Scripting.
https://www.incibe-cert.es/en/early-warning/ics-advisories/xss-vulnerability-gigavue-fm
2023-02-08T00:00:00
2023-03-10T00:00:00
2023-03-10T00:00:00
{'Vendor': 'Gigamon', 'Product': 'GigaVUE-FM', 'Versions': 'GigaVUE-OS 5.0 202 5.0 202'}
CVE-2023-0316
Path Traversal: '\..\filename' in GitHub repository froxlor/froxlor prior to 2.0.0.
https://huntr.dev/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244
2023-01-16T00:00:00
2023-01-16T00:00:00
2023-01-16T00:00:00
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-0603
The Sloth Logo Customizer WordPress plugin through 2.0.2 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
https://wpscan.com/vulnerability/1c93ea8f-4e68-4da1-994e-35a5873278ba
2023-01-31T21:03:59.956Z
2023-05-08T13:58:23.850Z
2023-05-08T13:58:23.850Z
{'Vendor': 'Unknown', 'Product': 'Sloth Logo Customizer', 'Versions': '0'}
CVE-2023-0253
The Real Media Library: Media Library Folder & File Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via folder names in versions up to, and including, 4.18.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with author-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/950d71ae-29a1-4b71-b74a-b1a5c9f3326e
2023-01-12T17:24:16.154Z
2023-02-02T14:38:56.927Z
null
{'Vendor': 'devowl', 'Product': 'Real Media Library: Media Library Folder & File Manager', 'Versions': '*'}
CVE-2023-0496
The HT Event WordPress plugin before 1.4.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/451b47d5-7bd2-4a82-9c8e-fe6601bcd2ab
2023-01-25T10:07:14.356Z
2023-03-27T15:37:37.404Z
2023-03-27T15:37:37.404Z
{'Vendor': 'Unknown', 'Product': 'HT Event', 'Versions': '0'}
CVE-2023-0880
Misinterpretation of Input in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c
2023-02-17T00:00:00
2023-02-17T00:00:00
2023-12-18T10:11:04.242Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-0183
NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer where an out-of-bounds write can lead to denial of service and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:41.145Z
2023-04-01T04:34:10.313Z
2023-04-01T04:34:10.313Z
{'Vendor': 'NVIDIA', 'Product': 'vGPU software (guest driver - Linux), vGPU software (Virtual GPU Manager - Citrix Hypervisor, VMware vSphere, Red Hat Enterprise Linux KVM), NVIDIA Cloud Gaming (guest driver - Linux), NVIDIA Cloud Gaming (Virtual GPU Manager - Red Hat Enterprise Linux KVM)', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0479
The Print Invoice & Delivery Notes for WooCommerce WordPress plugin before 4.7.2 is vulnerable to reflected XSS by echoing a GET value in an admin note within the WooCommerce orders page. This means that this vulnerability can be exploited for users with the edit_others_shop_orders capability. WooCommerce must be installed and active. This vulnerability is caused by a urldecode() after cleanup with esc_url_raw(), allowing double encoding.
https://wpscan.com/vulnerability/50963747-ae8e-42b4-bb42-cc848be7b92e/
2023-01-24T18:43:22.807Z
2024-01-16T15:55:08.499Z
2024-01-16T15:55:08.499Z
{'Vendor': 'Unknown', 'Product': 'Print Invoice & Delivery Notes for WooCommerce', 'Versions': '0'}
CVE-2023-0029
A vulnerability was found in Multilaser RE708 RE1200R4GC-2T2R-V3_v3411b_MUL029B. It has been rated as problematic. This issue affects some unknown processing of the component Telnet Service. The manipulation leads to denial of service. The attack may be initiated remotely. The identifier VDB-217169 was assigned to this vulnerability.
https://vuldb.com/?id.217169
2023-01-01T13:45:38.443Z
2023-01-01T13:46:19.323Z
2023-10-20T14:46:38.810Z
{'Vendor': 'Multilaser', 'Product': 'RE708', 'Versions': 'RE1200R4GC-2T2R-V3_v3411b_MUL029B'}
CVE-2023-0300
Cross-site Scripting (XSS) - Reflected in GitHub repository alfio-event/alf.io prior to 2.0-M4-2301.
https://huntr.dev/bounties/0a91fec7-a76e-4ca3-80ba-81de1f10d59d
2023-01-14T00:00:00
2023-01-14T00:00:00
2023-01-14T00:00:00
{'Vendor': 'alfio-event', 'Product': 'alfio-event/alf.io', 'Versions': 'unspecified'}
CVE-2023-0750
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface.  When the device can be accessed over the network an attacker could bypass authentication. This would allow an attacker to : - Change the password, resulting in a DOS of the users - Change the streaming source, compromising the integrity of the stream - Change the streaming destination, compromising the confidentiality of the stream This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.
https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration
2023-02-08T15:13:56.962Z
2023-04-06T13:12:11.304Z
2023-04-06T13:12:11.304Z
{'Vendor': 'Lynx Technik AG', 'Product': 'Yellowbrik', 'Versions': 'PEC 1864'}
CVE-2023-0245
A vulnerability, which was classified as critical, has been found in SourceCodester Online Flight Booking Management System. This issue affects some unknown processing of the file add_contestant.php. The manipulation of the argument add_contestant leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218153 was assigned to this vulnerability.
https://vuldb.com/?id.218153
2023-01-12T14:51:54.408Z
2023-01-12T14:52:10.601Z
2023-10-20T18:10:29.954Z
{'Vendor': 'SourceCodester', 'Product': 'Online Flight Booking Management System', 'Versions': 'n/a'}
CVE-2023-0615
A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled.
https://bugzilla.redhat.com/show_bug.cgi?id=2166287
2023-02-01T00:00:00
2023-02-06T00:00:00
2023-02-06T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.2-rc6'}
CVE-2023-0838
An issue has been discovered in GitLab affecting versions starting from 15.1 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. A maintainer could modify a webhook URL to leak masked webhook secrets by adding a new parameter to the url. This addresses an incomplete fix for CVE-2022-4342.
https://gitlab.com/gitlab-org/gitlab/-/issues/391685
2023-02-15T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.1, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
CVE-2023-0992
The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=cve
2023-02-23T19:18:03.577Z
2023-06-09T05:33:11.185Z
2023-06-09T05:33:11.185Z
{'Vendor': 'paultgoodchild', 'Product': 'Shield Security – Smart Bot Blocking & Intrusion Prevention', 'Versions': '*'}
CVE-2023-0091
A flaw was found in Keycloak, where it did not properly check client tokens for possible revocation in its client credential flow. This flaw allows an attacker to access or modify potentially sensitive information.
https://access.redhat.com/security/cve/CVE-2023-0091
2023-01-05T20:27:38.369Z
2023-01-11T20:44:07.553Z
2023-01-13T04:22:02.451274Z
{'Vendor': 'redhat.com', 'Product': 'Keycloak', 'Versions': 'n/a'}
CVE-2023-0584
The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change the 'vk_font_awesome_version' option to an arbitrary value.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b90b7f6c-df7f-48a5-b283-cf5facbd71e5?source=cve
2023-01-30T18:30:18.184Z
2023-06-03T01:59:28.995Z
2023-06-03T01:59:28.995Z
{'Vendor': 'vektor-inc', 'Product': 'VK Blocks', 'Versions': '*'}
CVE-2023-0707
A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been rated as critical. Affected by this issue is the function delete_record of the file function.php. The manipulation of the argument id leads to sql injection. VDB-220346 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.220346
2023-02-07T12:31:49.996Z
2023-02-07T12:32:24.852Z
2023-10-20T20:52:00.767Z
{'Vendor': 'SourceCodester', 'Product': 'Medical Certificate Generator App', 'Versions': '1.0'}
CVE-2023-0357
Helpy version 2.8.0 allows an unauthenticated remote attacker to exploit an XSS stored in the application. This is possible because the application does not correctly validate the attachments sent by customers in the ticket.
https://fluidattacks.com/advisories/quayle/
2023-01-17T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'Helpy', 'Versions': '2.8.0'}
CVE-2023-0642
Cross-Site Request Forgery (CSRF) in GitHub repository squidex/squidex prior to 7.4.0.
https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d
2023-02-02T00:00:00
2023-02-02T00:00:00
2023-02-02T00:00:00
{'Vendor': 'squidex', 'Product': 'squidex/squidex', 'Versions': 'unspecified'}
CVE-2023-0212
The Advanced Recent Posts WordPress plugin through 0.6.14 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/5fdd44aa-7f3f-423a-9fb0-dc9dc36f33a3
2023-01-11T08:13:20.252Z
2023-03-06T13:34:03.634Z
2023-03-06T13:34:03.634Z
{'Vendor': 'Unknown', 'Product': 'Advanced Recent Posts', 'Versions': '0'}
CVE-2023-0265
Uvdesk version 1.1.1 allows an authenticated remote attacker to execute commands on the server. This is possible because the application does not properly validate profile pictures uploaded by customers.
https://fluidattacks.com/advisories/supply/
2023-01-12T00:00:00
2023-04-04T00:00:00
2023-04-04T00:00:00
{'Vendor': 'n/a', 'Product': 'Uvdesk', 'Versions': '1.1.1'}
CVE-2023-0635
Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.
https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch
2023-02-02T07:19:48.321Z
2023-06-05T03:42:04.704Z
2023-06-05T03:42:04.704Z
{'Vendor': 'ABB Ltd.', 'Product': 'ASPECT®-Enterprise', 'Versions': '3.0;0'}
CVE-2023-0320
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Izmir Katip Celebi University UBYS allows Stored XSS.This issue affects UBYS: before 23.03.16.
https://www.usom.gov.tr/bildirim/tr-23-0159
2023-01-16T12:51:54.497Z
2023-03-20T12:18:36.073Z
2023-04-05T05:57:47.916Z
{'Vendor': 'Izmir Katip Celebi University', 'Product': 'UBYS', 'Versions': '0'}
CVE-2023-0770
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.
https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd
2023-02-09T00:00:00
2023-02-09T00:00:00
2023-05-27T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-0459
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c
2023-01-24T09:43:39.956Z
2023-05-25T13:22:38.338Z
2023-05-25T13:22:38.338Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '4b842e4e25b12951fa10dedb4bc16bc47e3b850c'}
CVE-2023-0009
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
https://security.paloaltonetworks.com/CVE-2023-0009
2022-10-27T18:48:18.633Z
2023-06-14T16:31:58.622Z
2023-07-31T20:36:04.826Z
{'Vendor': 'Palo Alto Networks', 'Product': 'GlobalProtect App', 'Versions': '6.2, 6.1, 6.0, 5.2'}
CVE-2023-0398
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
https://huntr.dev/bounties/0a852351-00ed-44d2-a650-9055b7beed58
2023-01-19T00:00:00
2023-01-19T00:00:00
2023-01-19T00:00:00
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-0662
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space. 
https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv
2023-02-03T18:37:37.552Z
2023-02-16T06:24:01.692Z
2023-02-16T06:24:01.692Z
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.x, 8.1.x, 8.2.x'}
CVE-2023-0232
The ShopLentor WordPress plugin before 2.5.4 unserializes user input from cookies in order to track viewed products and user data, which could lead to PHP Object Injection.
https://wpscan.com/vulnerability/1885a708-0e8a-4f4c-8e26-069bebe9a518
2023-01-12T10:31:18.880Z
2023-02-21T08:51:02.165Z
2023-02-21T08:51:02.165Z
{'Vendor': 'Unknown', 'Product': 'ShopLentor', 'Versions': '0'}
CVE-2023-0727
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_delete_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/62b56928-7125-4211-b233-07b5b51881c1
2023-02-07T17:31:29.982Z
2023-02-07T22:49:27.218Z
null
{'Vendor': 'wickedplugins', 'Product': 'Wicked Folders', 'Versions': '*'}
CVE-2023-0377
The Scriptless Social Sharing WordPress plugin before 3.2.2 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/5b1aacd1-3f75-4a6f-8146-cbb98a713724
2023-01-18T07:24:44.825Z
2023-03-06T13:34:05.264Z
2023-03-06T13:34:05.264Z
{'Vendor': 'Unknown', 'Product': 'Scriptless Social Sharing', 'Versions': '0'}
CVE-2023-0818
Off-by-one Error in GitHub repository gpac/gpac prior to v2.3.0-DEV.
https://huntr.dev/bounties/038e7472-f3e9-46c2-9aea-d6dafb62a18a
2023-02-13T00:00:00
2023-02-13T00:00:00
2023-05-27T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-0224
The GiveWP WordPress plugin before 2.24.1 does not properly escape user input before it reaches SQL queries, which could let unauthenticated attackers perform SQL Injection attacks
https://wpscan.com/vulnerability/d8da539d-0a1b-46ef-b48d-710c59cf68e1/
2023-01-11T20:53:58.072Z
2024-01-16T15:54:45.597Z
2024-01-16T15:54:45.597Z
{'Vendor': 'Unknown', 'Product': 'GiveWP', 'Versions': '0'}
CVE-2023-0674
A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220196.
https://vuldb.com/?id.220196
2023-02-04T07:32:31.476Z
2023-02-04T07:34:05.519Z
2023-10-20T20:45:54.639Z
{'Vendor': 'n/a', 'Product': 'XXL-JOB', 'Versions': '2.3.1'}
CVE-2023-0361
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
https://access.redhat.com/security/cve/CVE-2023-0361
2023-01-18T00:00:00
2023-02-15T00:00:00
2023-07-25T00:00:00
{'Vendor': 'n/a', 'Product': 'gnutls', 'Versions': 'gnutls-3.7.6'}
CVE-2023-0731
The Interactive Geo Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the action content parameter in versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/95ce515a-377c-49b4-8d1b-7ac22769c759
2023-02-07T17:51:46.872Z
2023-02-07T22:48:28.550Z
null
{'Vendor': 'carlosmoreirapt', 'Product': 'Interactive Geo Maps', 'Versions': '*'}
CVE-2023-0418
The Video Central for WordPress plugin through 1.3.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/821751bb-feaf-45b8-91a9-e173cb0c05fc
2023-01-20T08:50:55.673Z
2023-04-24T18:31:00.385Z
2023-04-24T18:31:00.385Z
{'Vendor': 'Unknown', 'Product': 'Video Central for WordPress', 'Versions': '0'}
CVE-2023-0048
Code Injection in GitHub repository lirantal/daloradius prior to master-branch.
https://huntr.dev/bounties/57abd666-4b9c-4f59-825d-1ec832153e79
2023-01-04T00:00:00
2023-01-04T00:00:00
2023-01-04T00:00:00
{'Vendor': 'lirantal', 'Product': 'lirantal/daloradius', 'Versions': 'unspecified'}
CVE-2023-0623
Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04
2023-02-01T22:05:37.370Z
2023-03-09T21:12:00.661Z
2023-03-09T21:12:00.661Z
{'Vendor': 'Horner Automation', 'Product': 'Cscape Envision RV', 'Versions': '4.60'}
CVE-2023-0789
Command Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5
2023-02-12T00:00:00
2023-02-12T00:00:00
2023-12-18T10:08:16.153Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-0273
The Custom Content Shortcode WordPress plugin through 4.0.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/5cafbba6-478f-4f5d-a2d4-60c6a22f2f1e
2023-01-13T08:58:41.728Z
2023-03-20T15:52:21.047Z
2023-03-20T15:52:21.047Z
{'Vendor': 'Unknown', 'Product': 'Custom Content Shortcode', 'Versions': '0'}
CVE-2023-0766
The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce.
https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88
2023-02-09T16:59:39.649Z
2023-05-30T07:49:19.438Z
2023-05-30T07:49:19.438Z
{'Vendor': 'Unknown', 'Product': 'Newsletter Popup', 'Versions': '0'}
CVE-2023-0336
The OoohBoi Steroids for Elementor WordPress plugin before 2.1.5 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber to delete attachment.
https://wpscan.com/vulnerability/ac74df9a-6fbf-4411-a501-97eba1ad1895
2023-01-17T10:34:22.060Z
2023-03-27T15:37:38.218Z
2023-03-29T13:15:17.817Z
{'Vendor': 'Unknown', 'Product': 'OoohBoi Steroids for Elementor', 'Versions': '0'}
CVE-2023-0859
Arbitrary Files can be installed in the Setting Data Import function of Office / Small Office Multifunction Printers and Laser Printers(*). *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
https://www.canon-europe.com/support/product-security-latest-news/
2023-02-16T00:00:00
2023-05-11T00:00:00
2023-05-11T00:00:00
{'Vendor': 'Canon Inc.', 'Product': 'Canon Office/Small Office Multifunction Printers and Laser Printers', 'Versions': 'Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.'}
CVE-2023-0658
A vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220053 was assigned to this vulnerability.
https://vuldb.com/?id.220053
2023-02-02T19:41:39.034Z
2023-02-02T19:42:09.183Z
2023-10-20T20:41:01.889Z
{'Vendor': 'Multilaser', 'Product': 'RE057', 'Versions': '2.1, 2.2'}
CVE-2023-0208
NVIDIA DCGM for Linux contains a vulnerability in HostEngine (server component) where a user may cause a heap-based buffer overflow through the bound socket. A successful exploit of this vulnerability may lead to denial of service and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5453
2023-01-11T05:48:56.988Z
2023-04-01T03:23:19.574Z
2023-04-01T03:23:19.574Z
{'Vendor': 'NVIDIA', 'Product': 'DCGM', 'Versions': 'All versions prior to 3.1.7'}
CVE-2023-0822
The affected product DIAEnergie (versions prior to v1.9.03.001) contains improper authorization, which could allow an unauthorized user to bypass authorization and access privileged functionality.
https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-06
2023-02-14T01:24:31.882Z
2023-02-17T16:46:21.643Z
2023-02-17T16:46:21.643Z
{'Vendor': 'Delta Electronics ', 'Product': 'DIAEnergie ', 'Versions': '0'}
CVE-2023-0988
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability.
https://vuldb.com/?id.221681
2023-02-23T15:19:52.455Z
2023-02-23T15:20:31.596Z
2023-10-20T21:53:05.007Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-0121
A denial of service issue was discovered in GitLab CE/EE affecting all versions starting from 13.2.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2 which allows an attacker to cause high resource consumption using malicious test report artifacts.
https://gitlab.com/gitlab-org/gitlab/-/issues/387549
2023-01-09T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=13.2.4, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-0571
A vulnerability has been found in SourceCodester Canteen Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file createcustomer.php of the component Add Customer. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219730 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.219730
2023-01-29T17:29:35.083Z
2023-01-29T17:30:35.874Z
2023-10-20T19:49:22.222Z
{'Vendor': 'SourceCodester', 'Product': 'Canteen Management System', 'Versions': '1.0'}
CVE-2023-0064
The eVision Responsive Column Layout Shortcodes WordPress plugin through 2.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a
2023-01-05T04:19:07.753Z
2023-03-06T13:34:06.078Z
2023-03-06T13:34:06.078Z
{'Vendor': 'Unknown', 'Product': 'eVision Responsive Column Layout Shortcodes', 'Versions': '0'}
CVE-2023-0434
Improper Input Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev40.
https://huntr.dev/bounties/7d9332d8-6997-483b-9fb9-bcf2ae01dad4
2023-01-21T00:00:00
2023-01-22T00:00:00
2023-01-22T00:00:00
{'Vendor': 'pyload', 'Product': 'pyload/pyload', 'Versions': 'unspecified'}
CVE-2023-0967
Bhima version 1.27.0 allows an attacker authenticated with normal user permissions to view sensitive data of other application users and data that should only be viewed by the administrator. This is possible because the application is vulnerable to IDOR, it does not properly validate user permissions with respect to certain actions the user can perform.
https://github.com/IMA-WorldHealth/bhima/
2023-02-22T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'n/a', 'Product': 'Bhima', 'Versions': '1.27.0'}
CVE-2023-0526
The Post Shortcode WordPress plugin through 2.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/0ec58310-243d-40c8-9fa6-8753947bfa89
2023-01-27T10:22:42.458Z
2023-05-08T13:58:24.790Z
2023-05-08T13:58:24.790Z
{'Vendor': 'Unknown', 'Product': 'Post Shortcode', 'Versions': '0'}
CVE-2023-0176
The Giveaways and Contests by RafflePress WordPress plugin before 1.11.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/a762c25b-5c47-400e-8964-407cf4c94e9f
2023-01-11T03:10:16.372Z
2023-02-06T19:59:46.410Z
null
{'Vendor': 'Unknown', 'Product': 'Giveaways and Contests by RafflePress', 'Versions': '0'}
CVE-2023-0875
The WP Meta SEO WordPress plugin before 4.5.3 does not properly sanitize and escape inputs into SQL queries, leading to a blind SQL Injection vulnerability that can be exploited by subscriber+ users.
https://wpscan.com/vulnerability/d44e9a45-cbdf-46b1-8b48-7d934b617534
2023-02-16T22:49:47.520Z
2023-03-20T15:52:21.908Z
2023-03-20T15:52:21.908Z
{'Vendor': 'Unknown', 'Product': 'WP Meta SEO', 'Versions': '0'}
CVE-2023-0930
Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html
2023-02-20T22:58:57.833Z
2023-02-22T19:54:00.579Z
2023-02-22T19:54:00.579Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '110.0.5481.177'}
CVE-2023-0199
NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer handler, where an out-of-bounds write can lead to denial of service and data tampering.
https://nvidia.custhelp.com/app/answers/detail/a_id/5452
2023-01-11T05:48:51.162Z
2023-04-22T02:19:48.182Z
2023-04-22T02:19:48.182Z
{'Vendor': 'NVIDIA', 'Product': 'NVIDIA GPU Display Driver', 'Versions': 'All versions prior to and including 15.1, 13.6, 11.11, and all versions prior to and including February 2023 release'}
CVE-2023-0463
The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk.
https://devolutions.net/security/advisories/DEVO-2023-0001
2023-01-24T13:11:08.882Z
2023-01-24T16:42:58.172Z
2023-01-26T06:03:10.975661Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '2022.3.29'}
CVE-2023-0033
The PDF Viewer WordPress plugin before 1.0.0 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.
https://wpscan.com/vulnerability/2d9ae43b-75a7-4fcc-bce3-d9e9d7a97ec0
2023-01-03T02:32:07.757Z
2023-01-30T20:31:53.710Z
null
{'Vendor': 'Unknown', 'Product': 'PDF Viewer', 'Versions': '0'}
CVE-2023-0619
The Kraken.io Image Optimizer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset image optimizations.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f94eabc5-6e3b-46df-9e36-d7d0fad833de
2023-02-01T18:14:34.069Z
2023-02-01T19:03:40.110Z
null
{'Vendor': 'karim79', 'Product': 'Kraken.io Image Optimizer', 'Versions': '*'}
CVE-2023-0249
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.
https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-01
2023-01-12T15:55:25.434Z
2023-02-08T22:43:50.324Z
null
{'Vendor': 'Delta Electronics', 'Product': 'DIAScreen', 'Versions': 'All versions'}
CVE-2023-0863
Improper Authentication vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (CE) (Terra AC MID), ABB Terra AC wallbox (CE) Terra AC Juno CE, ABB Terra AC wallbox (CE) Terra AC PTB, ABB Terra AC wallbox (CE) Symbiosis, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): from 1.0;0 through 1.5.5; Terra AC wallbox (UL32A) : from 1.0;0 through 1.6.5; Terra AC wallbox (CE) (Terra AC MID): from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC Juno CE: from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC PTB : from 1.0;0 through 1.5.25; Terra AC wallbox (CE) Symbiosis: from 1.0;0 through 1.2.7; Terra AC wallbox (JP): from 1.0;0 through 1.6.5.
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108468A1415&LanguageCode=en&DocumentPartId=&Action=Launch
2023-02-16T13:04:45.860Z
2023-05-17T07:10:46.122Z
2023-05-17T07:10:46.122Z
{'Vendor': 'ABB', 'Product': 'Terra AC wallbox (UL40/80A)', 'Versions': '1.0;0'}
CVE-2023-0160
A deadlock flaw was found in the Linux kernel’s BPF subsystem. This flaw allows a local user to potentially crash the system.
https://access.redhat.com/security/cve/CVE-2023-0160
2023-01-10T16:03:54.488Z
2023-07-18T16:08:23.653Z
2023-07-18T16:08:23.653Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.4-rc1'}
CVE-2023-0530
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/approve_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219599.
https://vuldb.com/?id.219599
2023-01-27T10:41:36.001Z
2023-01-27T10:42:27.021Z
2023-10-20T19:35:56.859Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-0025
SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources.
https://launchpad.support.sap.com/#/notes/3267442
2022-12-22T15:07:29.566Z
2023-02-14T03:10:47.861Z
2023-04-11T21:20:20.171Z
{'Vendor': 'SAP', 'Product': 'Solution Manager (BSP Application)', 'Versions': '720'}
CVE-2023-0475
HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0.
https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125
2023-01-24T17:05:24.695Z
2023-02-16T18:35:37.518Z
2023-02-16T18:35:37.518Z
{'Vendor': 'HashiCorp', 'Product': 'go-getter', 'Versions': '0, 0'}
CVE-2023-0567
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid. 
https://bugs.php.net/bug.php?id=81744
2023-01-29T07:45:55.380Z
2023-02-16T06:15:50.127Z
2023-03-01T05:45:13.020935Z
{'Vendor': 'PHP Group', 'Product': 'PHP', 'Versions': '8.0.x, 8.1.x, 8.2.x'}
CVE-2023-0137
Heap buffer overflow in Platform Apps in Google Chrome on Chrome OS prior to 109.0.5414.74 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html
2023-01-09T00:00:00
2023-01-10T00:00:00
2023-11-25T11:07:15.083907
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': 'unspecified'}
CVE-2023-0834
Incorrect Permission Assignment for Critical Resource vulnerability in HYPR Workforce Access on MacOS allows Privilege Escalation.This issue affects Workforce Access: from 6.12 before 8.1.
https://www.hypr.com/security-advisories
2023-02-14T21:35:42.403Z
2023-04-28T14:54:53.201Z
2023-04-28T14:54:53.201Z
{'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '6.12'}
CVE-2023-0971
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered.
https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1
2023-02-22T20:49:08.780Z
2023-06-21T19:42:25.906Z
2023-06-21T19:42:25.906Z
{'Vendor': 'Silicon Labs', 'Product': 'Z/IP Gateway', 'Versions': '7.18.03'}
CVE-2023-0422
The Article Directory WordPress plugin through 1.3 does not properly sanitize the `publish_terms_text` setting before displaying it in the administration panel, which may enable administrators to conduct Stored XSS attacks in multisite contexts.
https://wpscan.com/vulnerability/d57f2fb2-5251-4069-8c9a-a4af269c5e62
2023-01-20T08:51:21.017Z
2023-04-10T13:18:01.633Z
2023-04-10T13:18:01.633Z
{'Vendor': 'Unknown', 'Product': 'Article Directory', 'Versions': '0'}
CVE-2023-0588
The Catalyst Connect Zoho CRM Client Portal WordPress plugin before 2.1.0 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admin.
https://wpscan.com/vulnerability/84be272e-0891-461c-91ad-496b64f92f8f
2023-01-31T08:22:33.646Z
2023-06-27T13:17:24.246Z
2023-06-27T13:17:24.246Z
{'Vendor': 'Unknown', 'Product': 'Catalyst Connect Zoho CRM Client Portal', 'Versions': '0'}