CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-48950
An issue in the box_col_len function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
https://github.com/openlink/virtuoso-opensource/issues/1174
2023-11-20T00:00:00
2023-11-29T00:00:00
2023-11-29T20:04:46.807602
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48614
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.402Z
2023-12-15T10:17:33.304Z
2023-12-15T10:17:33.304Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48244
The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.702Z
2024-01-10T10:37:55.300Z
2024-01-10T10:37:55.300Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48751
Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database allows Accessing Functionality Not Properly Constrained by ACLs, Cross Site Request Forgery.This issue affects Participants Database: from n/a through 2.5.5.
https://patchstack.com/database/vulnerability/participants-database/wordpress-participants-database-plugin-2-5-5-broken-access-control-vulnerability
2023-11-18T22:10:05.376Z
2023-12-18T23:44:36.160Z
2023-12-18T23:44:36.160Z
{'Vendor': 'Roland Barker, xnau webdesign', 'Product': 'Participants Database', 'Versions': 'n/a'}
CVE-2023-48301
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6
2023-11-14T17:41:15.571Z
2023-11-21T21:26:21.288Z
2023-11-21T21:26:21.288Z
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.13, >= 26.0.0, < 26.0.8, >= 27.0.0, < 27.1.3'}
CVE-2023-48028
kodbox 1.46.01 has a security flaw that enables user enumeration. This problem is present on the login page, where an attacker can identify valid users based on varying response messages, potentially paving the way for a brute force attack.
https://gist.github.com/bugplorer/9ae8ad7a9f2a3053ebd07a1b7b54deae
2023-11-13T00:00:00
2023-11-17T00:00:00
2023-11-17T23:38:22.467711
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48478
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.371Z
2023-12-15T10:16:14.500Z
2023-12-15T10:16:14.500Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48881
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field Title field at /login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn.
https://github.com/weng-xianhu/eyoucms/issues/53
2023-11-20T00:00:00
2023-11-29T00:00:00
2023-11-29T15:46:26.544949
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48497
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.376Z
2023-12-15T10:16:39.456Z
2023-12-15T10:16:39.456Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48356
In jpg driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.391Z
2024-01-18T02:44:53.563Z
2024-01-18T02:44:53.563Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
CVE-2023-48706
Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.
https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q
2023-11-17T19:43:37.554Z
2023-11-22T22:03:39.503Z
2023-11-22T22:03:39.503Z
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2121'}
CVE-2023-48585
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.394Z
2023-12-15T10:16:09.184Z
2023-12-15T10:16:09.184Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48090
GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leaks in extract_attributes media_tools/m3u8.c:329.
https://github.com/gpac/gpac/issues/2680
2023-11-13T00:00:00
2023-11-20T00:00:00
2023-11-20T14:54:25.243174
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48839
Appointment Scheduler 3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) issues via the name, plugin_sms_api_key, plugin_sms_country_code, calendar_id, title, country name, or customer_name parameter.
https://www.phpjabbers.com/appointment-scheduler/
2023-11-20T00:00:00
2023-12-07T00:00:00
2023-12-07T06:55:59.972750
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48655
An issue was discovered in MISP before 2.4.176. app/Controller/Component/IndexFilterComponent.php does not properly filter out query parameters.
https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176
2023-11-17T00:00:00
2023-11-17T00:00:00
2024-01-09T23:30:02.498454
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48205
Jorani Leave Management System 1.0.2 allows a remote attacker to spoof a Host header associated with password reset emails.
http://packetstormsecurity.com/files/175802
2023-11-13T00:00:00
2023-12-07T00:00:00
2023-12-07T06:09:21.206488
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48340
In video decoder, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
2023-11-15T08:11:00.389Z
2024-01-18T02:44:49.558Z
2024-01-18T02:44:49.558Z
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
CVE-2023-48593
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.397Z
2023-12-15T10:15:33.324Z
2023-12-15T10:15:33.324Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48252
The vulnerability allows an authenticated remote attacker to perform actions exceeding their authorized access via crafted HTTP requests.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.704Z
2024-01-10T13:01:35.579Z
2024-01-10T13:01:35.579Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48602
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.400Z
2023-12-15T10:15:55.036Z
2023-12-15T10:15:55.036Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48317
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vikas Vatsa Display Custom Post allows Stored XSS.This issue affects Display Custom Post: from n/a through 2.2.1.
https://patchstack.com/database/vulnerability/display-custom-post/wordpress-display-custom-post-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-14T21:42:18.494Z
2023-11-30T16:34:38.298Z
2023-11-30T16:34:38.298Z
{'Vendor': 'Vikas Vatsa', 'Product': 'Display Custom Post', 'Versions': 'n/a'}
CVE-2023-48481
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.373Z
2023-12-15T10:17:34.080Z
2023-12-15T10:17:34.080Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48049
A SQL injection vulnerability in Cybrosys Techno Solutions Website Blog Search (aka website_search_blog) v. 13.0 through 13.0.1.0.1 allows a remote attacker to execute arbitrary code and to gain privileges via the name parameter in controllers/main.py component.
https://github.com/luvsn/OdZoo/tree/main/exploits/website_search_blog
2023-11-13T00:00:00
2023-12-14T00:00:00
2023-12-14T23:59:05.080081
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48419
An attacker in the wifi vicinity of a target Google Home can spy on the victim, resulting in Elevation of Privilege 
https://support.google.com/product-documentation/answer/14273332?hl=en&ref_topic=12974021&sjid=4533873659772963473-NA#zippy=%2Cspeakers
2023-11-16T16:28:09.701Z
2024-01-02T18:44:01.180Z
2024-01-02T18:44:01.180Z
{'Vendor': 'Google', 'Product': 'Google Nest Mini', 'Versions': '1.56.356012'}
CVE-2023-48730
A cross-site scripting (xss) vulnerability exists in the navbarMenuAndLogo.php user name functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882
2023-11-30T22:15:02.579Z
2024-01-10T15:48:11.477Z
2024-01-10T18:00:11.219Z
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
CVE-2023-48360
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md
2023-11-28T02:07:56.559Z
2024-01-02T07:24:11.968Z
2024-01-02T07:24:11.968Z
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'}
CVE-2023-48225
Laf is a cloud development platform. Prior to version 1.0.0-beta.13, the control of LAF app enV is not strict enough, and in certain scenarios of privatization environment, it may lead to sensitive information leakage in secret and configmap. In ES6 syntax, if an obj directly references another obj, the name of the obj itself will be used as the key, and the entire object structure will be integrated intact. When constructing the deployment instance of the app, env was found from the database and directly inserted into the template, resulting in controllability here. Sensitive information in the secret and configmap can be read through the k8s envFrom field. In a privatization environment, when `namespaceConf. fixed` is marked, it may lead to the leakage of sensitive information in the system. As of time of publication, it is unclear whether any patches or workarounds exist.
https://github.com/labring/laf/security/advisories/GHSA-hv2g-gxx4-fwxp
2023-11-13T13:25:18.480Z
2023-12-12T20:33:40.959Z
2023-12-12T20:33:40.959Z
{'Vendor': 'labring', 'Product': 'laf', 'Versions': '< 1.0.0-beta13'}
CVE-2023-48858
A Cross-site scripting (XSS) vulnerability in login page php code in Armex ABO.CMS 5.9 allows remote attackers to inject arbitrary web script or HTML via the login.php? URL part.
https://abocms.ru/about/versions/version59/
2023-11-20T00:00:00
2024-01-17T00:00:00
2024-01-17T20:09:55.379525
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48767
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Raghu Goriya MyTube PlayList allows Reflected XSS.This issue affects MyTube PlayList: from n/a through 2.0.3.
https://patchstack.com/database/vulnerability/mytube/wordpress-mytube-playlist-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-18T22:25:22.702Z
2023-12-14T16:43:05.815Z
2023-12-14T16:43:05.815Z
{'Vendor': 'Raghu Goriya', 'Product': 'MyTube PlayList', 'Versions': 'n/a'}
CVE-2023-48272
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yonifre Maspik – Spam Blacklist allows Stored XSS.This issue affects Maspik – Spam Blacklist: from n/a through 0.9.2.
https://patchstack.com/database/vulnerability/contact-forms-anti-spam/wordpress-maspik-spam-blacklist-plugin-0-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-13T17:33:51.624Z
2023-11-30T16:37:39.965Z
2023-11-30T16:37:39.965Z
{'Vendor': 'yonifre', 'Product': 'Maspik – Spam Blacklist', 'Versions': 'n/a'}
CVE-2023-48622
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.404Z
2023-12-15T10:17:37.900Z
2023-12-15T10:17:37.900Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48458
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.369Z
2023-12-15T10:17:05.246Z
2023-12-15T10:17:05.246Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48771
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bruno "Aesqe" Babic File Gallery allows Reflected XSS.This issue affects File Gallery: from n/a through 1.8.5.4.
https://patchstack.com/database/vulnerability/file-gallery/wordpress-file-gallery-plugin-1-8-5-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-18T22:25:22.703Z
2023-12-14T16:54:41.535Z
2023-12-14T16:54:41.535Z
{'Vendor': 'Bruno "Aesqe" Babic', 'Product': 'File Gallery', 'Versions': 'n/a'}
CVE-2023-48321
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ahmed Kaludi, Mohammed Kaludi AMP for WP – Accelerated Mobile Pages allows Stored XSS.This issue affects AMP for WP – Accelerated Mobile Pages: from n/a through 1.0.88.1.
https://patchstack.com/database/vulnerability/accelerated-mobile-pages/wordpress-amp-for-wp-accelerated-mobile-pages-plugin-1-0-88-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-11-14T21:42:18.496Z
2023-11-30T16:28:35.721Z
2023-11-30T16:28:35.721Z
{'Vendor': 'Ahmed Kaludi, Mohammed Kaludi', 'Product': 'AMP for WP – Accelerated Mobile Pages', 'Versions': 'n/a'}
CVE-2023-48634
Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
https://helpx.adobe.com/security/products/after_effects/apsb23-75.html
2023-11-16T23:29:25.406Z
2023-12-13T13:30:57.720Z
2023-12-13T13:30:57.720Z
{'Vendor': 'Adobe', 'Product': 'After Effects', 'Versions': '0'}
CVE-2023-48264
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.708Z
2024-01-10T13:09:10.347Z
2024-01-10T13:09:10.347Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48376
SmartStar Software CWS is a web-based integration platform, its file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.
https://www.twcert.org.tw/tw/cp-132-7595-d58b1-1.html
2023-11-16T03:49:45.971Z
2023-12-15T07:52:31.168Z
2023-12-15T07:52:31.168Z
{'Vendor': 'SmartStar Software', 'Product': 'CWS Web-Base', 'Versions': 'v10.25'}
CVE-2023-48233
Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.
https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj
2023-11-13T13:25:18.481Z
2023-11-16T22:55:31.353Z
2023-11-16T22:55:31.353Z
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2108'}
CVE-2023-48663
Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.
https://www.dell.com/support/kbdoc/en-us/000220427/dsa-2023-443-dell-powermaxos-5978-dell-unisphere-360-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-solutions-enabler-virtual-appliance-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities
2023-11-17T06:14:57.041Z
2023-12-14T16:03:27.167Z
2023-12-14T16:03:27.167Z
{'Vendor': 'Dell', 'Product': 'vApp Manager', 'Versions': 'Versions prior to 9.2.4.x'}
CVE-2023-48399
In ProtocolMiscATCommandAdapter::Init() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:08:52.675Z
2023-12-08T15:39:41.216Z
2023-12-08T15:39:41.216Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48474
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.371Z
2023-12-15T10:17:03.632Z
2023-12-15T10:17:03.632Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48024
Liblisp through commit 4c65969 was discovered to contain a use-after-free vulnerability in void hash_destroy(hash_table_t *h) at hash.c
https://github.com/howerj/liblisp/issues/1
2023-11-13T00:00:00
2023-11-17T00:00:00
2023-11-17T16:12:42.528284
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48531
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.385Z
2023-12-15T10:16:30.286Z
2023-12-15T10:16:30.286Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48161
Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c
https://sourceforge.net/p/giflib/bugs/167/
2023-11-13T00:00:00
2023-11-22T00:00:00
2023-11-22T06:04:28.849099
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48248
The vulnerability allows an authenticated remote attacker to upload a malicious file to the SD card containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned file.
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
2023-11-13T13:44:23.702Z
2024-01-10T10:41:20.413Z
2024-01-10T10:41:20.413Z
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
CVE-2023-48618
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.403Z
2023-12-15T10:17:13.210Z
2023-12-15T10:17:13.210Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48589
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.395Z
2023-12-15T10:17:47.810Z
2023-12-15T10:17:47.810Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48423
In dhcp4_SetPDNAddress of dhcp4_Main.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
https://source.android.com/security/bulletin/pixel/2023-12-01
2023-11-16T16:28:09.701Z
2023-12-08T15:46:09.691Z
2023-12-08T15:46:09.691Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
CVE-2023-48835
Car Rental Script v3.0 is vulnerable to CSV Injection via a Language > Labels > Export action.
https://www.phpjabbers.com/car-rental-script/
2023-11-20T00:00:00
2023-12-07T00:00:00
2023-12-07T06:46:23.733469
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48566
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.391Z
2023-12-15T10:15:41.354Z
2023-12-15T10:15:41.354Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48966
An arbitrary file upload vulnerability in the component /admin/api.upload/file of ThinkAdmin v6.1.53 allows attackers to execute arbitrary code via a crafted Zip file.
https://github.com/1dreamGN/CVE/blob/main/ThinkAdmin%20directory%20traversal%2Bfile%20upload%20getshell.md
2023-11-20T00:00:00
2023-12-04T00:00:00
2023-12-04T15:45:15.032897
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48570
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.391Z
2023-12-15T10:17:02.869Z
2023-12-15T10:17:02.869Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48823
A Blind SQL injection issue in ajax.php in GaatiTrack Courier Management System 1.0 allows an unauthenticated attacker to inject a payload via the email parameter during login.
http://packetstormsecurity.com/files/176030
2023-11-20T00:00:00
2023-12-07T00:00:00
2023-12-07T06:19:47.832511
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48659
An issue was discovered in MISP before 2.4.176. app/Controller/AppController.php mishandles parameter parsing.
https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176
2023-11-17T00:00:00
2023-11-17T00:00:00
2024-01-09T23:30:30.112024
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48462
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.370Z
2023-12-15T10:17:04.387Z
2023-12-15T10:17:04.387Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-48198
A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies.
https://github.com/grocy/grocy
2023-11-13T00:00:00
2023-11-15T00:00:00
2023-11-28T20:24:31.823034
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-48527
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
2023-11-16T23:29:25.385Z
2023-12-15T10:17:30.974Z
2023-12-15T10:17:30.974Z
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
CVE-2023-1952
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0. It has been classified as critical. This affects an unknown part of the file /?p=products of the component Product Search. The manipulation of the argument search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225339.
https://vuldb.com/?id.225339
2023-04-08T06:29:34.201Z
2023-04-08T08:31:03.516Z
2023-10-22T06:37:58.528Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1051
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in As Koc Energy Web Report System allows Reflected XSS.This issue affects Web Report System: before 23.03.10.
https://www.usom.gov.tr/bildirim/tr-23-0166
2023-02-27T08:32:14.427Z
2023-03-23T06:12:01.259Z
2023-04-05T05:58:15.707Z
{'Vendor': 'As Koc Energy', 'Product': 'Web Report System', 'Versions': '0'}
CVE-2023-1401
An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization.
https://gitlab.com/gitlab-org/gitlab/-/issues/396533
2023-03-14T16:20:00.289Z
2023-07-26T06:01:46.447Z
2023-07-26T06:01:46.447Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '3.0.29'}
CVE-2023-1114
Missing Authorization vulnerability in Eskom e-Belediye allows Information Elicitation.This issue affects e-Belediye: from 1.0.0.95 before 1.0.0.100.
https://www.usom.gov.tr/bildirim/tr-23-0113-2
2023-03-01T11:22:02.691Z
2023-03-01T11:50:52.988Z
2023-09-06T14:54:12.095Z
{'Vendor': 'Eskom', 'Product': 'e-Belediye', 'Versions': '1.0.0.95'}
CVE-2023-1544
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
https://bugzilla.redhat.com/show_bug.cgi?id=2180364
2023-03-21T00:00:00
2023-03-23T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'QEMU', 'Versions': 'Affected up to version 7.2.0'}
CVE-2023-1817
Insufficient policy enforcement in Intents in Google Chrome on Android prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:52.924Z
2023-04-04T21:39:34.963Z
2023-04-04T21:39:34.963Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1397
A vulnerability classified as problematic has been found in SourceCodester Online Student Management System 1.0. Affected is an unknown function of the file profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222984.
https://vuldb.com/?id.222984
2023-03-14T14:37:21.160Z
2023-03-14T15:00:05.157Z
2023-10-21T08:36:40.989Z
{'Vendor': 'SourceCodester', 'Product': 'Online Student Management System', 'Versions': '1.0'}
CVE-2023-1728
Unrestricted Upload of File with Dangerous Type vulnerability in Fernus Informatics LMS allows OS Command Injection, Server Side Include (SSI) Injection.This issue affects LMS: before 23.04.03.
https://www.usom.gov.tr/bildirim/tr-23-0194
2023-03-30T14:00:24.628Z
2023-04-04T08:40:51.443Z
2023-09-06T10:45:55.113Z
{'Vendor': 'Fernus Informatics', 'Product': 'LMS', 'Versions': '0'}
CVE-2023-1682
A vulnerability has been found in Xunrui CMS 4.61 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dayrui/My/Config/Install.txt. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224239.
https://vuldb.com/?id.224239
2023-03-28T20:20:52.813Z
2023-03-28T23:31:05.404Z
2023-10-21T13:49:14.004Z
{'Vendor': 'Xunrui', 'Product': 'CMS', 'Versions': '4.61'}
CVE-2023-1378
A vulnerability classified as critical was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. This vulnerability affects unknown code of the file paypalsuccess.php of the component POST Parameter Handler. The manipulation of the argument cusid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222904.
https://vuldb.com/?id.222904
2023-03-13T17:25:00.925Z
2023-03-13T17:25:22.844Z
2023-10-21T08:28:08.590Z
{'Vendor': 'SourceCodester', 'Product': 'Friendly Island Pizza Website and Ordering System', 'Versions': '1.0'}
CVE-2023-1456
A vulnerability, which was classified as critical, has been found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6. This issue affects some unknown processing of the component NAT Configuration Handler. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier VDB-223301 was assigned to this vulnerability. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities.
https://vuldb.com/?id.223301
2023-03-17T00:00:00
2023-03-25T00:00:00
2023-03-27T00:00:00
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.6'}
CVE-2023-1006
A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been classified as problematic. This affects an unknown part of the component New Record Handler. The manipulation of the argument Firstname/Middlename/Lastname/Suffix/Nationality/Doctor Fullname/Doctor Suffix with the input "><script>prompt(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221739.
https://vuldb.com/?id.221739
2023-02-24T08:20:42.276Z
2023-02-24T08:21:31.872Z
2023-10-20T22:02:50.682Z
{'Vendor': 'SourceCodester', 'Product': 'Medical Certificate Generator App', 'Versions': '1.0'}
CVE-2023-1905
The WP Popups WordPress plugin before 2.1.5.1 does not properly escape the href attribute of its spu-facebook-page shortcode before outputting it back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. This is due to an insufficient fix of CVE-2023-24003
https://wpscan.com/vulnerability/b6ac3e15-6f39-4514-a50d-cca7b9457736
2023-04-06T09:52:21.902Z
2023-05-08T13:58:00.447Z
2023-05-08T13:58:00.447Z
{'Vendor': 'Unknown', 'Product': 'WP Popups', 'Versions': '0'}
CVE-2023-1840
The Sp*tify Play Button for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.07 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/308f6887-7c1c-4efd-85e2-b71bb6d26dab?source=cve
2023-04-04T19:00:01.726Z
2023-04-04T19:00:12.852Z
2023-04-04T19:00:12.852Z
{'Vendor': 'jonkastonka', 'Product': 'Sp*tify Play Button for WordPress', 'Versions': '*'}
CVE-2023-1513
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
https://bugzilla.redhat.com/show_bug.cgi?id=2179892
2023-03-20T00:00:00
2023-03-23T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel (KVM)', 'Versions': 'Fixed in kernel 6.2'}
CVE-2023-1143
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:25:51.392Z
2023-03-27T14:46:20.000Z
2023-03-27T14:46:20.000Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1790
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224724.
https://vuldb.com/?id.224724
2023-04-01T08:38:52.910Z
2023-04-01T09:00:04.922Z
2023-10-21T14:25:49.140Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Task Allocation System', 'Versions': '1.0'}
CVE-2023-1285
Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are "16" allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit.
https://mitsubishielectric.in/fa/cnc-pdf/DoS_in_Ethernet_Communication_Extension_Unit_GC_ENET_COM_of_GOC35_Series.pdf
2023-03-09T08:05:46.845Z
2023-04-14T02:17:55.175Z
2023-04-14T02:17:55.175Z
{'Vendor': 'Mitsubishi Electric India', 'Product': 'GC-ENET-COM', 'Versions': 'SN:16XXXXXXXXX'}
CVE-2023-1913
The Maps Widget for Google Maps for WordPress is vulnerable to Stored Cross-Site Scripting via widget settings in versions up to, and including, 4.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/de871598-e4e7-49f6-8530-68243544c06c?source=cve
2023-04-06T14:51:17.451Z
2023-04-06T14:51:26.262Z
2023-04-06T14:51:26.262Z
{'Vendor': 'webfactory', 'Product': 'Maps Widget for Google Maps', 'Versions': '*'}
CVE-2023-1010
A vulnerability classified as critical was found in vox2png 1.0. Affected by this vulnerability is an unknown functionality of the file vox2png.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221743.
https://vuldb.com/?id.221743
2023-02-24T10:33:38.048Z
2023-02-24T10:34:20.736Z
2023-10-20T22:07:43.583Z
{'Vendor': 'n/a', 'Product': 'vox2png', 'Versions': '1.0'}
CVE-2023-1440
A vulnerability, which was classified as critical, was found in SourceCodester Automatic Question Paper Generator System 1.0. Affected is an unknown function of the file users/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223284.
https://vuldb.com/?id.223284
2023-03-17T06:20:38.630Z
2023-03-17T06:21:14.190Z
2023-10-21T08:47:39.855Z
{'Vendor': 'SourceCodester', 'Product': 'Automatic Question Paper Generator System', 'Versions': '1.0'}
CVE-2023-1155
The Cost Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the nd_cc_meta_box_cc_price_icon parameter in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/750be90d-dc12-4974-8921-75259d56c7b3
2023-03-02T17:03:27.600Z
2023-03-02T17:03:45.118Z
2023-03-02T17:03:45.118Z
{'Vendor': 'nicdark', 'Product': 'Cost Calculator', 'Versions': '*'}
CVE-2023-1505
A vulnerability, which was classified as critical, has been found in SourceCodester E-Commerce System 1.0. This issue affects some unknown processing of the file /ecommerce/admin/settings/setDiscount.php. The manipulation of the argument id with the input 201737 AND (SELECT 8973 FROM (SELECT(SLEEP(5)))OoAD) leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-223409 was assigned to this vulnerability.
https://vuldb.com/?id.223409
2023-03-20T07:32:49.171Z
2023-03-20T09:00:06.223Z
2023-10-21T09:48:40.442Z
{'Vendor': 'SourceCodester', 'Product': 'E-Commerce System', 'Versions': '1.0'}
CVE-2023-1856
A vulnerability has been found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/transactions/track_shipment.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224995.
https://vuldb.com/?id.224995
2023-04-05T05:56:42.370Z
2023-04-05T07:40:18.066Z
2023-10-21T17:05:49.619Z
{'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'}
CVE-2023-1786
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b
2023-03-31T20:40:07.757Z
2023-04-26T22:23:47.305Z
2023-04-26T22:23:47.305Z
{'Vendor': 'Canonical Ltd.', 'Product': 'cloud-init', 'Versions': '0'}
CVE-2023-1293
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects the function mysqli_query of the file admin_cs.php. The manipulation leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222647.
https://vuldb.com/?id.222647
2023-03-09T14:29:53.186Z
2023-03-09T14:30:29.708Z
2023-10-21T07:52:44.875Z
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
CVE-2023-1769
A vulnerability, which was classified as problematic, was found in SourceCodester Grade Point Average GPA Calculator 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page with the input php://filter/read=convert.base64-encode/resource=grade_table leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224670 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224670
2023-03-31T10:30:10.900Z
2023-03-31T11:00:04.796Z
2023-10-21T14:17:16.896Z
{'Vendor': 'SourceCodester', 'Product': 'Grade Point Average GPA Calculator', 'Versions': '1.0'}
CVE-2023-1339
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check on the uucss_update_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to update caching rules.
https://www.wordfence.com/threat-intel/vulnerabilities/id/19f126f8-1d59-44b5-8e0e-c37f1fbedf5a
2023-03-10T18:34:03.831Z
2023-03-10T19:19:45.912Z
2023-03-10T19:19:45.912Z
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
CVE-2023-1417
An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible for an unauthorised user to add child epics linked to victim's epic in an unrelated group.
https://gitlab.com/gitlab-org/gitlab/-/issues/396720
2023-03-15T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.9, <15.9.4, >=15.10, <15.10.1'}
CVE-2023-1047
A vulnerability classified as critical was found in TechPowerUp RealTemp 3.7.0.0. This vulnerability affects unknown code in the library WinRing0x64.sys. The manipulation leads to improper initialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-221806 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221806
2023-02-26T12:25:26.714Z
2023-02-26T12:25:51.608Z
2023-10-21T06:59:03.674Z
{'Vendor': 'TechPowerUp', 'Product': 'RealTemp', 'Versions': '3.7.0.0'}
CVE-2023-1944
This vulnerability enables ssh access to minikube container using a default password.
https://github.com/kubernetes/minikube
2023-04-07T00:00:00
2023-05-24T00:00:00
2023-05-24T00:00:00
{'Vendor': 'Kubernetes', 'Product': 'minikube', 'Versions': 'unspecified'}
CVE-2023-1801
The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.
https://github.com/the-tcpdump-group/tcpdump/commit/7578e1c04ee280dda50c4c2813e7d55f539c6501
2023-04-02T11:09:43.663Z
2023-04-07T20:40:55.540Z
2023-04-07T20:40:55.540Z
{'Vendor': 'The Tcpdump Group', 'Product': 'tcpdump', 'Versions': '4.99.3'}
CVE-2023-1552
ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors.  Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user. 
https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2023-03-23_ToolboxST_Deserialization_of_Untrusted_Configuration_Data.pdf
2023-03-21T18:08:24.597Z
2023-04-11T14:38:16.504Z
2023-04-11T14:38:16.504Z
{'Vendor': 'GE Gas Power', 'Product': 'ToolboxST', 'Versions': '0'}
CVE-2023-1381
The WP Meta SEO WordPress plugin before 4.5.5 does not validate image file paths before attempting to manipulate the image files, leading to a PHAR deserialization vulnerability. Furthermore, the plugin contains a gadget chain which may be used in certain configurations to achieve remote code execution.
https://wpscan.com/vulnerability/f140a928-d297-4bd1-8552-bfebcedba536
2023-03-13T19:25:08.399Z
2023-04-10T14:14:39.985Z
2023-04-17T12:17:36.638Z
{'Vendor': 'Unknown', 'Product': 'WP Meta SEO', 'Versions': '0'}
CVE-2023-1694
The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/4/
2023-03-29T09:29:52.497Z
2023-05-20T14:13:46.239Z
2023-05-20T14:13:46.239Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0'}
CVE-2023-1529
Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
2023-03-21T00:43:36.182Z
2023-03-21T20:50:55.930Z
2023-03-21T20:50:55.930Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
CVE-2023-1483
A vulnerability has been found in XiaoBingBy TeaCMS up to 2.0.2 and classified as critical. This vulnerability affects unknown code of the file /admin/getallarticleinfo. The manipulation of the argument searchInfo leads to sql injection. The attack can be initiated remotely. VDB-223366 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223366
2023-03-18T08:39:10.696Z
2023-03-18T09:31:04.547Z
2023-10-21T09:23:03.609Z
{'Vendor': 'XiaoBingBy', 'Product': 'TeaCMS', 'Versions': '2.0.0, 2.0.1, 2.0.2'}
CVE-2023-1179
A vulnerability, which was classified as problematic, was found in SourceCodester Computer Parts Sales and Inventory System 1.0. Affected is an unknown function of the component Add Supplier Handler. The manipulation of the argument company_name/province/city/phone_number leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222330 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222330
2023-03-05T09:48:23.430Z
2023-03-05T09:48:42.798Z
2023-10-21T07:28:20.613Z
{'Vendor': 'SourceCodester', 'Product': 'Computer Parts Sales and Inventory System', 'Versions': '1.0'}
CVE-2023-1196
The Advanced Custom Fields (ACF) Free and Pro WordPress plugins 6.x before 6.1.0 and 5.x before 5.12.5 unserialize user controllable data, which could allow users with a role of Contributor and above to perform PHP Object Injection when a suitable gadget is present.
https://wpscan.com/vulnerability/cf376ca2-92f6-44ff-929a-ace809460a33
2023-03-06T13:01:50.110Z
2023-05-02T08:39:29.005Z
2023-05-02T08:39:29.005Z
{'Vendor': 'Unknown', 'Product': 'Advanced Custom Fields (ACF)', 'Versions': '5.0.0, 6.0.0'}
CVE-2023-1895
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c2a942-c14c-4b59-92a7-6946b2e4731b?source=cve
2023-04-05T19:47:25.037Z
2023-06-09T05:33:38.329Z
2023-06-09T05:33:38.329Z
{'Vendor': 'jetmonsters', 'Product': 'Getwid – Gutenberg Blocks', 'Versions': '*'}
CVE-2023-1315
Cross-site Scripting (XSS) - Reflected in GitHub repository osticket/osticket prior to v1.16.6.
https://huntr.dev/bounties/70a7fd8c-7e6f-4a43-9f8c-163b8967b16e
2023-03-10T00:00:00
2023-03-10T00:00:00
2023-03-10T00:00:00
{'Vendor': 'osticket', 'Product': 'osticket/osticket', 'Versions': 'unspecified'}
CVE-2023-1745
A vulnerability, which was classified as problematic, has been found in KMPlayer 4.2.2.73. This issue affects some unknown processing in the library SHFOLDER.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224633 was assigned to this vulnerability.
https://vuldb.com/?id.224633
2023-03-30T19:26:17.934Z
2023-03-30T23:00:05.358Z
2023-10-21T14:13:37.347Z
{'Vendor': 'n/a', 'Product': 'KMPlayer', 'Versions': '4.2.2.73'}
CVE-2023-1250
Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names This issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
https://otrs.com/release-notes/otrs-security-advisory-2023-02/
2023-03-07T09:36:16.027Z
2023-03-20T08:20:39.331Z
2023-03-20T08:20:39.331Z
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}