CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-48950
|
An issue in the box_col_len function in openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) after running a SELECT statement.
|
https://github.com/openlink/virtuoso-opensource/issues/1174
|
2023-11-20T00:00:00
|
2023-11-29T00:00:00
|
2023-11-29T20:04:46.807602
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48614
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.402Z
|
2023-12-15T10:17:33.304Z
|
2023-12-15T10:17:33.304Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48244
|
The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.702Z
|
2024-01-10T10:37:55.300Z
|
2024-01-10T10:37:55.300Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48751
|
Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database allows Accessing Functionality Not Properly Constrained by ACLs, Cross Site Request Forgery.This issue affects Participants Database: from n/a through 2.5.5.
|
https://patchstack.com/database/vulnerability/participants-database/wordpress-participants-database-plugin-2-5-5-broken-access-control-vulnerability
|
2023-11-18T22:10:05.376Z
|
2023-12-18T23:44:36.160Z
|
2023-12-18T23:44:36.160Z
|
{'Vendor': 'Roland Barker, xnau webdesign', 'Product': 'Participants Database', 'Versions': 'n/a'}
|
CVE-2023-48301
|
Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.
|
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wgpw-qqq2-gwv6
|
2023-11-14T17:41:15.571Z
|
2023-11-21T21:26:21.288Z
|
2023-11-21T21:26:21.288Z
|
{'Vendor': 'nextcloud', 'Product': 'security-advisories', 'Versions': '>= 25.0.0, < 25.0.13, >= 26.0.0, < 26.0.8, >= 27.0.0, < 27.1.3'}
|
CVE-2023-48028
|
kodbox 1.46.01 has a security flaw that enables user enumeration. This problem is present on the login page, where an attacker can identify valid users based on varying response messages, potentially paving the way for a brute force attack.
|
https://gist.github.com/bugplorer/9ae8ad7a9f2a3053ebd07a1b7b54deae
|
2023-11-13T00:00:00
|
2023-11-17T00:00:00
|
2023-11-17T23:38:22.467711
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48478
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.371Z
|
2023-12-15T10:16:14.500Z
|
2023-12-15T10:16:14.500Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48881
|
A stored cross-site scripting (XSS) vulnerability in EyouCMS v1.6.4-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field Title field at /login.php?m=admin&c=Field&a=arctype_add&_ajax=1&lang=cn.
|
https://github.com/weng-xianhu/eyoucms/issues/53
|
2023-11-20T00:00:00
|
2023-11-29T00:00:00
|
2023-11-29T15:46:26.544949
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48497
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.376Z
|
2023-12-15T10:16:39.456Z
|
2023-12-15T10:16:39.456Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48356
|
In jpg driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with System execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.391Z
|
2024-01-18T02:44:53.563Z
|
2024-01-18T02:44:53.563Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12/Android13'}
|
CVE-2023-48706
|
Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.
|
https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q
|
2023-11-17T19:43:37.554Z
|
2023-11-22T22:03:39.503Z
|
2023-11-22T22:03:39.503Z
|
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2121'}
|
CVE-2023-48585
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.394Z
|
2023-12-15T10:16:09.184Z
|
2023-12-15T10:16:09.184Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48090
|
GPAC 2.3-DEV-rev617-g671976fcc-master is vulnerable to memory leaks in extract_attributes media_tools/m3u8.c:329.
|
https://github.com/gpac/gpac/issues/2680
|
2023-11-13T00:00:00
|
2023-11-20T00:00:00
|
2023-11-20T14:54:25.243174
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48839
|
Appointment Scheduler 3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) issues via the name, plugin_sms_api_key, plugin_sms_country_code, calendar_id, title, country name, or customer_name parameter.
|
https://www.phpjabbers.com/appointment-scheduler/
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:55:59.972750
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48655
|
An issue was discovered in MISP before 2.4.176. app/Controller/Component/IndexFilterComponent.php does not properly filter out query parameters.
|
https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176
|
2023-11-17T00:00:00
|
2023-11-17T00:00:00
|
2024-01-09T23:30:02.498454
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48205
|
Jorani Leave Management System 1.0.2 allows a remote attacker to spoof a Host header associated with password reset emails.
|
http://packetstormsecurity.com/files/175802
|
2023-11-13T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:09:21.206488
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48340
|
In video decoder, there is a possible out of bounds write due to improper input validation. This could lead to local denial of service with no additional execution privileges needed
|
https://www.unisoc.com/en_us/secy/announcementDetail/1745735200442220545
|
2023-11-15T08:11:00.389Z
|
2024-01-18T02:44:49.558Z
|
2024-01-18T02:44:49.558Z
|
{'Vendor': 'Unisoc (Shanghai) Technologies Co., Ltd.', 'Product': 'SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000', 'Versions': 'Android11/Android12'}
|
CVE-2023-48593
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.397Z
|
2023-12-15T10:15:33.324Z
|
2023-12-15T10:15:33.324Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48252
|
The vulnerability allows an authenticated remote attacker to perform actions exceeding their authorized access via crafted HTTP requests.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.704Z
|
2024-01-10T13:01:35.579Z
|
2024-01-10T13:01:35.579Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48602
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.400Z
|
2023-12-15T10:15:55.036Z
|
2023-12-15T10:15:55.036Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48317
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vikas Vatsa Display Custom Post allows Stored XSS.This issue affects Display Custom Post: from n/a through 2.2.1.
|
https://patchstack.com/database/vulnerability/display-custom-post/wordpress-display-custom-post-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-14T21:42:18.494Z
|
2023-11-30T16:34:38.298Z
|
2023-11-30T16:34:38.298Z
|
{'Vendor': 'Vikas Vatsa', 'Product': 'Display Custom Post', 'Versions': 'n/a'}
|
CVE-2023-48481
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.373Z
|
2023-12-15T10:17:34.080Z
|
2023-12-15T10:17:34.080Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48049
|
A SQL injection vulnerability in Cybrosys Techno Solutions Website Blog Search (aka website_search_blog) v. 13.0 through 13.0.1.0.1 allows a remote attacker to execute arbitrary code and to gain privileges via the name parameter in controllers/main.py component.
|
https://github.com/luvsn/OdZoo/tree/main/exploits/website_search_blog
|
2023-11-13T00:00:00
|
2023-12-14T00:00:00
|
2023-12-14T23:59:05.080081
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48419
|
An attacker in the wifi vicinity of a target Google Home can spy on the victim, resulting in Elevation of Privilege
|
https://support.google.com/product-documentation/answer/14273332?hl=en&ref_topic=12974021&sjid=4533873659772963473-NA#zippy=%2Cspeakers
|
2023-11-16T16:28:09.701Z
|
2024-01-02T18:44:01.180Z
|
2024-01-02T18:44:01.180Z
|
{'Vendor': 'Google', 'Product': 'Google Nest Mini', 'Versions': '1.56.356012'}
|
CVE-2023-48730
|
A cross-site scripting (xss) vulnerability exists in the navbarMenuAndLogo.php user name functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
|
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1882
|
2023-11-30T22:15:02.579Z
|
2024-01-10T15:48:11.477Z
|
2024-01-10T18:00:11.219Z
|
{'Vendor': 'WWBN', 'Product': 'AVideo', 'Versions': 'dev master commit 15fed957fb'}
|
CVE-2023-48360
|
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia player crash through modify a released pointer.
|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-01.md
|
2023-11-28T02:07:56.559Z
|
2024-01-02T07:24:11.968Z
|
2024-01-02T07:24:11.968Z
|
{'Vendor': 'OpenHarmony', 'Product': 'OpenHarmony', 'Versions': 'v3.2.0'}
|
CVE-2023-48225
|
Laf is a cloud development platform. Prior to version 1.0.0-beta.13, the control of LAF app enV is not strict enough, and in certain scenarios of privatization environment, it may lead to sensitive information leakage in secret and configmap. In ES6 syntax, if an obj directly references another obj, the name of the obj itself will be used as the key, and the entire object structure will be integrated intact. When constructing the deployment instance of the app, env was found from the database and directly inserted into the template, resulting in controllability here. Sensitive information in the secret and configmap can be read through the k8s envFrom field. In a privatization environment, when `namespaceConf. fixed` is marked, it may lead to the leakage of sensitive information in the system. As of time of publication, it is unclear whether any patches or workarounds exist.
|
https://github.com/labring/laf/security/advisories/GHSA-hv2g-gxx4-fwxp
|
2023-11-13T13:25:18.480Z
|
2023-12-12T20:33:40.959Z
|
2023-12-12T20:33:40.959Z
|
{'Vendor': 'labring', 'Product': 'laf', 'Versions': '< 1.0.0-beta13'}
|
CVE-2023-48858
|
A Cross-site scripting (XSS) vulnerability in login page php code in Armex ABO.CMS 5.9 allows remote attackers to inject arbitrary web script or HTML via the login.php? URL part.
|
https://abocms.ru/about/versions/version59/
|
2023-11-20T00:00:00
|
2024-01-17T00:00:00
|
2024-01-17T20:09:55.379525
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48767
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Raghu Goriya MyTube PlayList allows Reflected XSS.This issue affects MyTube PlayList: from n/a through 2.0.3.
|
https://patchstack.com/database/vulnerability/mytube/wordpress-mytube-playlist-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-18T22:25:22.702Z
|
2023-12-14T16:43:05.815Z
|
2023-12-14T16:43:05.815Z
|
{'Vendor': 'Raghu Goriya', 'Product': 'MyTube PlayList', 'Versions': 'n/a'}
|
CVE-2023-48272
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in yonifre Maspik – Spam Blacklist allows Stored XSS.This issue affects Maspik – Spam Blacklist: from n/a through 0.9.2.
|
https://patchstack.com/database/vulnerability/contact-forms-anti-spam/wordpress-maspik-spam-blacklist-plugin-0-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-13T17:33:51.624Z
|
2023-11-30T16:37:39.965Z
|
2023-11-30T16:37:39.965Z
|
{'Vendor': 'yonifre', 'Product': 'Maspik – Spam Blacklist', 'Versions': 'n/a'}
|
CVE-2023-48622
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.404Z
|
2023-12-15T10:17:37.900Z
|
2023-12-15T10:17:37.900Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48458
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.369Z
|
2023-12-15T10:17:05.246Z
|
2023-12-15T10:17:05.246Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48771
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bruno "Aesqe" Babic File Gallery allows Reflected XSS.This issue affects File Gallery: from n/a through 1.8.5.4.
|
https://patchstack.com/database/vulnerability/file-gallery/wordpress-file-gallery-plugin-1-8-5-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-18T22:25:22.703Z
|
2023-12-14T16:54:41.535Z
|
2023-12-14T16:54:41.535Z
|
{'Vendor': 'Bruno "Aesqe" Babic', 'Product': 'File Gallery', 'Versions': 'n/a'}
|
CVE-2023-48321
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ahmed Kaludi, Mohammed Kaludi AMP for WP – Accelerated Mobile Pages allows Stored XSS.This issue affects AMP for WP – Accelerated Mobile Pages: from n/a through 1.0.88.1.
|
https://patchstack.com/database/vulnerability/accelerated-mobile-pages/wordpress-amp-for-wp-accelerated-mobile-pages-plugin-1-0-88-1-cross-site-scripting-xss-vulnerability?_s_id=cve
|
2023-11-14T21:42:18.496Z
|
2023-11-30T16:28:35.721Z
|
2023-11-30T16:28:35.721Z
|
{'Vendor': 'Ahmed Kaludi, Mohammed Kaludi', 'Product': 'AMP for WP – Accelerated Mobile Pages', 'Versions': 'n/a'}
|
CVE-2023-48634
|
Adobe After Effects versions 24.0.3 (and earlier) and 23.6.0 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
https://helpx.adobe.com/security/products/after_effects/apsb23-75.html
|
2023-11-16T23:29:25.406Z
|
2023-12-13T13:30:57.720Z
|
2023-12-13T13:30:57.720Z
|
{'Vendor': 'Adobe', 'Product': 'After Effects', 'Versions': '0'}
|
CVE-2023-48264
|
The vulnerability allows an unauthenticated remote attacker to perform a Denial-of-Service (DoS) attack or, possibly, obtain Remote Code Execution (RCE) via a crafted network request.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.708Z
|
2024-01-10T13:09:10.347Z
|
2024-01-10T13:09:10.347Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48376
|
SmartStar Software CWS is a web-based integration platform, its file uploading function does not restrict upload of file with dangerous type. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary files to perform arbitrary command or disrupt service.
|
https://www.twcert.org.tw/tw/cp-132-7595-d58b1-1.html
|
2023-11-16T03:49:45.971Z
|
2023-12-15T07:52:31.168Z
|
2023-12-15T07:52:31.168Z
|
{'Vendor': 'SmartStar Software', 'Product': 'CWS Web-Base', 'Versions': 'v10.25'}
|
CVE-2023-48233
|
Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj
|
2023-11-13T13:25:18.481Z
|
2023-11-16T22:55:31.353Z
|
2023-11-16T22:55:31.353Z
|
{'Vendor': 'vim', 'Product': 'vim', 'Versions': '< 9.0.2108'}
|
CVE-2023-48663
|
Dell vApp Manager, versions prior to 9.2.4.x contain a command injection vulnerability. A remote malicious user with high privileges could potentially exploit this vulnerability leading to the execution of arbitrary OS commands on the affected system.
|
https://www.dell.com/support/kbdoc/en-us/000220427/dsa-2023-443-dell-powermaxos-5978-dell-unisphere-360-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-solutions-enabler-virtual-appliance-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities
|
2023-11-17T06:14:57.041Z
|
2023-12-14T16:03:27.167Z
|
2023-12-14T16:03:27.167Z
|
{'Vendor': 'Dell', 'Product': 'vApp Manager', 'Versions': 'Versions prior to 9.2.4.x'}
|
CVE-2023-48399
|
In ProtocolMiscATCommandAdapter::Init() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation.
|
https://source.android.com/security/bulletin/pixel/2023-12-01
|
2023-11-16T16:08:52.675Z
|
2023-12-08T15:39:41.216Z
|
2023-12-08T15:39:41.216Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
|
CVE-2023-48474
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.371Z
|
2023-12-15T10:17:03.632Z
|
2023-12-15T10:17:03.632Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48024
|
Liblisp through commit 4c65969 was discovered to contain a use-after-free vulnerability in void hash_destroy(hash_table_t *h) at hash.c
|
https://github.com/howerj/liblisp/issues/1
|
2023-11-13T00:00:00
|
2023-11-17T00:00:00
|
2023-11-17T16:12:42.528284
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48531
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.385Z
|
2023-12-15T10:16:30.286Z
|
2023-12-15T10:16:30.286Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48161
|
Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c
|
https://sourceforge.net/p/giflib/bugs/167/
|
2023-11-13T00:00:00
|
2023-11-22T00:00:00
|
2023-11-22T06:04:28.849099
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48248
|
The vulnerability allows an authenticated remote attacker to upload a malicious file to the SD card containing arbitrary client-side script code and obtain its execution inside a victim’s session via a crafted URL, HTTP request, or simply by waiting for the victim to view the poisoned file.
|
https://psirt.bosch.com/security-advisories/BOSCH-SA-711465.html
|
2023-11-13T13:44:23.702Z
|
2024-01-10T10:41:20.413Z
|
2024-01-10T10:41:20.413Z
|
{'Vendor': 'Rexroth', 'Product': 'Nexo cordless nutrunner NXA015S-36V (0608842001)', 'Versions': 'NEXO-OS V1000-Release'}
|
CVE-2023-48618
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.403Z
|
2023-12-15T10:17:13.210Z
|
2023-12-15T10:17:13.210Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48589
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.395Z
|
2023-12-15T10:17:47.810Z
|
2023-12-15T10:17:47.810Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48423
|
In dhcp4_SetPDNAddress of dhcp4_Main.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
|
https://source.android.com/security/bulletin/pixel/2023-12-01
|
2023-11-16T16:28:09.701Z
|
2023-12-08T15:46:09.691Z
|
2023-12-08T15:46:09.691Z
|
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android kernel'}
|
CVE-2023-48835
|
Car Rental Script v3.0 is vulnerable to CSV Injection via a Language > Labels > Export action.
|
https://www.phpjabbers.com/car-rental-script/
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:46:23.733469
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48566
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.391Z
|
2023-12-15T10:15:41.354Z
|
2023-12-15T10:15:41.354Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48966
|
An arbitrary file upload vulnerability in the component /admin/api.upload/file of ThinkAdmin v6.1.53 allows attackers to execute arbitrary code via a crafted Zip file.
|
https://github.com/1dreamGN/CVE/blob/main/ThinkAdmin%20directory%20traversal%2Bfile%20upload%20getshell.md
|
2023-11-20T00:00:00
|
2023-12-04T00:00:00
|
2023-12-04T15:45:15.032897
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48570
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.391Z
|
2023-12-15T10:17:02.869Z
|
2023-12-15T10:17:02.869Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48823
|
A Blind SQL injection issue in ajax.php in GaatiTrack Courier Management System 1.0 allows an unauthenticated attacker to inject a payload via the email parameter during login.
|
http://packetstormsecurity.com/files/176030
|
2023-11-20T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T06:19:47.832511
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48659
|
An issue was discovered in MISP before 2.4.176. app/Controller/AppController.php mishandles parameter parsing.
|
https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176
|
2023-11-17T00:00:00
|
2023-11-17T00:00:00
|
2024-01-09T23:30:30.112024
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48462
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.370Z
|
2023-12-15T10:17:04.387Z
|
2023-12-15T10:17:04.387Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-48198
|
A Cross-Site Scripting (XSS) vulnerability in the 'product description' component within '/api/stock/products' of Grocy version <= 4.0.3 allows attackers to obtain a victim's cookies.
|
https://github.com/grocy/grocy
|
2023-11-13T00:00:00
|
2023-11-15T00:00:00
|
2023-11-28T20:24:31.823034
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-48527
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html
|
2023-11-16T23:29:25.385Z
|
2023-12-15T10:17:30.974Z
|
2023-12-15T10:17:30.974Z
|
{'Vendor': 'Adobe', 'Product': 'Adobe Experience Manager', 'Versions': '0'}
|
CVE-2023-1952
|
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0. It has been classified as critical. This affects an unknown part of the file /?p=products of the component Product Search. The manipulation of the argument search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225339.
|
https://vuldb.com/?id.225339
|
2023-04-08T06:29:34.201Z
|
2023-04-08T08:31:03.516Z
|
2023-10-22T06:37:58.528Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1051
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in As Koc Energy Web Report System allows Reflected XSS.This issue affects Web Report System: before 23.03.10.
|
https://www.usom.gov.tr/bildirim/tr-23-0166
|
2023-02-27T08:32:14.427Z
|
2023-03-23T06:12:01.259Z
|
2023-04-05T05:58:15.707Z
|
{'Vendor': 'As Koc Energy', 'Product': 'Web Report System', 'Versions': '0'}
|
CVE-2023-1401
|
An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/396533
|
2023-03-14T16:20:00.289Z
|
2023-07-26T06:01:46.447Z
|
2023-07-26T06:01:46.447Z
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '3.0.29'}
|
CVE-2023-1114
|
Missing Authorization vulnerability in Eskom e-Belediye allows Information Elicitation.This issue affects e-Belediye: from 1.0.0.95 before 1.0.0.100.
|
https://www.usom.gov.tr/bildirim/tr-23-0113-2
|
2023-03-01T11:22:02.691Z
|
2023-03-01T11:50:52.988Z
|
2023-09-06T14:54:12.095Z
|
{'Vendor': 'Eskom', 'Product': 'e-Belediye', 'Versions': '1.0.0.95'}
|
CVE-2023-1544
|
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2180364
|
2023-03-21T00:00:00
|
2023-03-23T00:00:00
|
2023-05-11T00:00:00
|
{'Vendor': 'n/a', 'Product': 'QEMU', 'Versions': 'Affected up to version 7.2.0'}
|
CVE-2023-1817
|
Insufficient policy enforcement in Intents in Google Chrome on Android prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:52.924Z
|
2023-04-04T21:39:34.963Z
|
2023-04-04T21:39:34.963Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1397
|
A vulnerability classified as problematic has been found in SourceCodester Online Student Management System 1.0. Affected is an unknown function of the file profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222984.
|
https://vuldb.com/?id.222984
|
2023-03-14T14:37:21.160Z
|
2023-03-14T15:00:05.157Z
|
2023-10-21T08:36:40.989Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Student Management System', 'Versions': '1.0'}
|
CVE-2023-1728
|
Unrestricted Upload of File with Dangerous Type vulnerability in Fernus Informatics LMS allows OS Command Injection, Server Side Include (SSI) Injection.This issue affects LMS: before 23.04.03.
|
https://www.usom.gov.tr/bildirim/tr-23-0194
|
2023-03-30T14:00:24.628Z
|
2023-04-04T08:40:51.443Z
|
2023-09-06T10:45:55.113Z
|
{'Vendor': 'Fernus Informatics', 'Product': 'LMS', 'Versions': '0'}
|
CVE-2023-1682
|
A vulnerability has been found in Xunrui CMS 4.61 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dayrui/My/Config/Install.txt. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224239.
|
https://vuldb.com/?id.224239
|
2023-03-28T20:20:52.813Z
|
2023-03-28T23:31:05.404Z
|
2023-10-21T13:49:14.004Z
|
{'Vendor': 'Xunrui', 'Product': 'CMS', 'Versions': '4.61'}
|
CVE-2023-1378
|
A vulnerability classified as critical was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. This vulnerability affects unknown code of the file paypalsuccess.php of the component POST Parameter Handler. The manipulation of the argument cusid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222904.
|
https://vuldb.com/?id.222904
|
2023-03-13T17:25:00.925Z
|
2023-03-13T17:25:22.844Z
|
2023-10-21T08:28:08.590Z
|
{'Vendor': 'SourceCodester', 'Product': 'Friendly Island Pizza Website and Ordering System', 'Versions': '1.0'}
|
CVE-2023-1456
|
A vulnerability, which was classified as critical, has been found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6. This issue affects some unknown processing of the component NAT Configuration Handler. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier VDB-223301 was assigned to this vulnerability. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities.
|
https://vuldb.com/?id.223301
|
2023-03-17T00:00:00
|
2023-03-25T00:00:00
|
2023-03-27T00:00:00
|
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.6'}
|
CVE-2023-1006
|
A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been classified as problematic. This affects an unknown part of the component New Record Handler. The manipulation of the argument Firstname/Middlename/Lastname/Suffix/Nationality/Doctor Fullname/Doctor Suffix with the input "><script>prompt(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221739.
|
https://vuldb.com/?id.221739
|
2023-02-24T08:20:42.276Z
|
2023-02-24T08:21:31.872Z
|
2023-10-20T22:02:50.682Z
|
{'Vendor': 'SourceCodester', 'Product': 'Medical Certificate Generator App', 'Versions': '1.0'}
|
CVE-2023-1905
|
The WP Popups WordPress plugin before 2.1.5.1 does not properly escape the href attribute of its spu-facebook-page shortcode before outputting it back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. This is due to an insufficient fix of CVE-2023-24003
|
https://wpscan.com/vulnerability/b6ac3e15-6f39-4514-a50d-cca7b9457736
|
2023-04-06T09:52:21.902Z
|
2023-05-08T13:58:00.447Z
|
2023-05-08T13:58:00.447Z
|
{'Vendor': 'Unknown', 'Product': 'WP Popups', 'Versions': '0'}
|
CVE-2023-1840
|
The Sp*tify Play Button for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.07 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/308f6887-7c1c-4efd-85e2-b71bb6d26dab?source=cve
|
2023-04-04T19:00:01.726Z
|
2023-04-04T19:00:12.852Z
|
2023-04-04T19:00:12.852Z
|
{'Vendor': 'jonkastonka', 'Product': 'Sp*tify Play Button for WordPress', 'Versions': '*'}
|
CVE-2023-1513
|
A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2179892
|
2023-03-20T00:00:00
|
2023-03-23T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Linux kernel (KVM)', 'Versions': 'Fixed in kernel 6.2'}
|
CVE-2023-1143
|
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:25:51.392Z
|
2023-03-27T14:46:20.000Z
|
2023-03-27T14:46:20.000Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1790
|
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224724.
|
https://vuldb.com/?id.224724
|
2023-04-01T08:38:52.910Z
|
2023-04-01T09:00:04.922Z
|
2023-10-21T14:25:49.140Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Task Allocation System', 'Versions': '1.0'}
|
CVE-2023-1285
|
Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are "16" allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit.
|
https://mitsubishielectric.in/fa/cnc-pdf/DoS_in_Ethernet_Communication_Extension_Unit_GC_ENET_COM_of_GOC35_Series.pdf
|
2023-03-09T08:05:46.845Z
|
2023-04-14T02:17:55.175Z
|
2023-04-14T02:17:55.175Z
|
{'Vendor': 'Mitsubishi Electric India', 'Product': 'GC-ENET-COM', 'Versions': 'SN:16XXXXXXXXX'}
|
CVE-2023-1913
|
The Maps Widget for Google Maps for WordPress is vulnerable to Stored Cross-Site Scripting via widget settings in versions up to, and including, 4.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/de871598-e4e7-49f6-8530-68243544c06c?source=cve
|
2023-04-06T14:51:17.451Z
|
2023-04-06T14:51:26.262Z
|
2023-04-06T14:51:26.262Z
|
{'Vendor': 'webfactory', 'Product': 'Maps Widget for Google Maps', 'Versions': '*'}
|
CVE-2023-1010
|
A vulnerability classified as critical was found in vox2png 1.0. Affected by this vulnerability is an unknown functionality of the file vox2png.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221743.
|
https://vuldb.com/?id.221743
|
2023-02-24T10:33:38.048Z
|
2023-02-24T10:34:20.736Z
|
2023-10-20T22:07:43.583Z
|
{'Vendor': 'n/a', 'Product': 'vox2png', 'Versions': '1.0'}
|
CVE-2023-1440
|
A vulnerability, which was classified as critical, was found in SourceCodester Automatic Question Paper Generator System 1.0. Affected is an unknown function of the file users/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223284.
|
https://vuldb.com/?id.223284
|
2023-03-17T06:20:38.630Z
|
2023-03-17T06:21:14.190Z
|
2023-10-21T08:47:39.855Z
|
{'Vendor': 'SourceCodester', 'Product': 'Automatic Question Paper Generator System', 'Versions': '1.0'}
|
CVE-2023-1155
|
The Cost Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the nd_cc_meta_box_cc_price_icon parameter in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/750be90d-dc12-4974-8921-75259d56c7b3
|
2023-03-02T17:03:27.600Z
|
2023-03-02T17:03:45.118Z
|
2023-03-02T17:03:45.118Z
|
{'Vendor': 'nicdark', 'Product': 'Cost Calculator', 'Versions': '*'}
|
CVE-2023-1505
|
A vulnerability, which was classified as critical, has been found in SourceCodester E-Commerce System 1.0. This issue affects some unknown processing of the file /ecommerce/admin/settings/setDiscount.php. The manipulation of the argument id with the input 201737 AND (SELECT 8973 FROM (SELECT(SLEEP(5)))OoAD) leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-223409 was assigned to this vulnerability.
|
https://vuldb.com/?id.223409
|
2023-03-20T07:32:49.171Z
|
2023-03-20T09:00:06.223Z
|
2023-10-21T09:48:40.442Z
|
{'Vendor': 'SourceCodester', 'Product': 'E-Commerce System', 'Versions': '1.0'}
|
CVE-2023-1856
|
A vulnerability has been found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/transactions/track_shipment.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224995.
|
https://vuldb.com/?id.224995
|
2023-04-05T05:56:42.370Z
|
2023-04-05T07:40:18.066Z
|
2023-10-21T17:05:49.619Z
|
{'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'}
|
CVE-2023-1786
|
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
|
https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b
|
2023-03-31T20:40:07.757Z
|
2023-04-26T22:23:47.305Z
|
2023-04-26T22:23:47.305Z
|
{'Vendor': 'Canonical Ltd.', 'Product': 'cloud-init', 'Versions': '0'}
|
CVE-2023-1293
|
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0 and classified as critical. This issue affects the function mysqli_query of the file admin_cs.php. The manipulation leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222647.
|
https://vuldb.com/?id.222647
|
2023-03-09T14:29:53.186Z
|
2023-03-09T14:30:29.708Z
|
2023-10-21T07:52:44.875Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
|
CVE-2023-1769
|
A vulnerability, which was classified as problematic, was found in SourceCodester Grade Point Average GPA Calculator 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page with the input php://filter/read=convert.base64-encode/resource=grade_table leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224670 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224670
|
2023-03-31T10:30:10.900Z
|
2023-03-31T11:00:04.796Z
|
2023-10-21T14:17:16.896Z
|
{'Vendor': 'SourceCodester', 'Product': 'Grade Point Average GPA Calculator', 'Versions': '1.0'}
|
CVE-2023-1339
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check on the uucss_update_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to update caching rules.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/19f126f8-1d59-44b5-8e0e-c37f1fbedf5a
|
2023-03-10T18:34:03.831Z
|
2023-03-10T19:19:45.912Z
|
2023-03-10T19:19:45.912Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1417
|
An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible for an unauthorised user to add child epics linked to victim's epic in an unrelated group.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/396720
|
2023-03-15T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-1047
|
A vulnerability classified as critical was found in TechPowerUp RealTemp 3.7.0.0. This vulnerability affects unknown code in the library WinRing0x64.sys. The manipulation leads to improper initialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-221806 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221806
|
2023-02-26T12:25:26.714Z
|
2023-02-26T12:25:51.608Z
|
2023-10-21T06:59:03.674Z
|
{'Vendor': 'TechPowerUp', 'Product': 'RealTemp', 'Versions': '3.7.0.0'}
|
CVE-2023-1944
|
This vulnerability enables ssh access to minikube container using a default password.
|
https://github.com/kubernetes/minikube
|
2023-04-07T00:00:00
|
2023-05-24T00:00:00
|
2023-05-24T00:00:00
|
{'Vendor': 'Kubernetes', 'Product': 'minikube', 'Versions': 'unspecified'}
|
CVE-2023-1801
|
The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.
|
https://github.com/the-tcpdump-group/tcpdump/commit/7578e1c04ee280dda50c4c2813e7d55f539c6501
|
2023-04-02T11:09:43.663Z
|
2023-04-07T20:40:55.540Z
|
2023-04-07T20:40:55.540Z
|
{'Vendor': 'The Tcpdump Group', 'Product': 'tcpdump', 'Versions': '4.99.3'}
|
CVE-2023-1552
|
ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors.
Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user.
|
https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2023-03-23_ToolboxST_Deserialization_of_Untrusted_Configuration_Data.pdf
|
2023-03-21T18:08:24.597Z
|
2023-04-11T14:38:16.504Z
|
2023-04-11T14:38:16.504Z
|
{'Vendor': 'GE Gas Power', 'Product': 'ToolboxST', 'Versions': '0'}
|
CVE-2023-1381
|
The WP Meta SEO WordPress plugin before 4.5.5 does not validate image file paths before attempting to manipulate the image files, leading to a PHAR deserialization vulnerability. Furthermore, the plugin contains a gadget chain which may be used in certain configurations to achieve remote code execution.
|
https://wpscan.com/vulnerability/f140a928-d297-4bd1-8552-bfebcedba536
|
2023-03-13T19:25:08.399Z
|
2023-04-10T14:14:39.985Z
|
2023-04-17T12:17:36.638Z
|
{'Vendor': 'Unknown', 'Product': 'WP Meta SEO', 'Versions': '0'}
|
CVE-2023-1694
|
The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.
|
https://consumer.huawei.com/en/support/bulletin/2023/4/
|
2023-03-29T09:29:52.497Z
|
2023-05-20T14:13:46.239Z
|
2023-05-20T14:13:46.239Z
|
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0'}
|
CVE-2023-1529
|
Out of bounds memory access in WebHID in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a malicious HID device. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
|
2023-03-21T00:43:36.182Z
|
2023-03-21T20:50:55.930Z
|
2023-03-21T20:50:55.930Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
|
CVE-2023-1483
|
A vulnerability has been found in XiaoBingBy TeaCMS up to 2.0.2 and classified as critical. This vulnerability affects unknown code of the file /admin/getallarticleinfo. The manipulation of the argument searchInfo leads to sql injection. The attack can be initiated remotely. VDB-223366 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223366
|
2023-03-18T08:39:10.696Z
|
2023-03-18T09:31:04.547Z
|
2023-10-21T09:23:03.609Z
|
{'Vendor': 'XiaoBingBy', 'Product': 'TeaCMS', 'Versions': '2.0.0, 2.0.1, 2.0.2'}
|
CVE-2023-1179
|
A vulnerability, which was classified as problematic, was found in SourceCodester Computer Parts Sales and Inventory System 1.0. Affected is an unknown function of the component Add Supplier Handler. The manipulation of the argument company_name/province/city/phone_number leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222330 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222330
|
2023-03-05T09:48:23.430Z
|
2023-03-05T09:48:42.798Z
|
2023-10-21T07:28:20.613Z
|
{'Vendor': 'SourceCodester', 'Product': 'Computer Parts Sales and Inventory System', 'Versions': '1.0'}
|
CVE-2023-1196
|
The Advanced Custom Fields (ACF) Free and Pro WordPress plugins 6.x before 6.1.0 and 5.x before 5.12.5 unserialize user controllable data, which could allow users with a role of Contributor and above to perform PHP Object Injection when a suitable gadget is present.
|
https://wpscan.com/vulnerability/cf376ca2-92f6-44ff-929a-ace809460a33
|
2023-03-06T13:01:50.110Z
|
2023-05-02T08:39:29.005Z
|
2023-05-02T08:39:29.005Z
|
{'Vendor': 'Unknown', 'Product': 'Advanced Custom Fields (ACF)', 'Versions': '5.0.0, 6.0.0'}
|
CVE-2023-1895
|
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c2a942-c14c-4b59-92a7-6946b2e4731b?source=cve
|
2023-04-05T19:47:25.037Z
|
2023-06-09T05:33:38.329Z
|
2023-06-09T05:33:38.329Z
|
{'Vendor': 'jetmonsters', 'Product': 'Getwid – Gutenberg Blocks', 'Versions': '*'}
|
CVE-2023-1315
|
Cross-site Scripting (XSS) - Reflected in GitHub repository osticket/osticket prior to v1.16.6.
|
https://huntr.dev/bounties/70a7fd8c-7e6f-4a43-9f8c-163b8967b16e
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
{'Vendor': 'osticket', 'Product': 'osticket/osticket', 'Versions': 'unspecified'}
|
CVE-2023-1745
|
A vulnerability, which was classified as problematic, has been found in KMPlayer 4.2.2.73. This issue affects some unknown processing in the library SHFOLDER.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224633 was assigned to this vulnerability.
|
https://vuldb.com/?id.224633
|
2023-03-30T19:26:17.934Z
|
2023-03-30T23:00:05.358Z
|
2023-10-21T14:13:37.347Z
|
{'Vendor': 'n/a', 'Product': 'KMPlayer', 'Versions': '4.2.2.73'}
|
CVE-2023-1250
|
Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names
This issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
|
https://otrs.com/release-notes/otrs-security-advisory-2023-02/
|
2023-03-07T09:36:16.027Z
|
2023-03-20T08:20:39.331Z
|
2023-03-20T08:20:39.331Z
|
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.