CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-1084
An issue has been discovered in GitLab CE/EE affecting all versions before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A malicious project Maintainer may create a Project Access Token with Owner level privileges using a crafted request.
https://gitlab.com/gitlab-org/gitlab/-/issues/390696
2023-02-28T00:00:00
2023-03-09T00:00:00
2023-03-09T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=0.0, <15.7.8, >=15.8, <15.8.4, >=15.9, <15.9.2'}
CVE-2023-1987
A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this vulnerability is the function update_order_status of the file /classes/Master.php?f=update_order_status. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225535.
https://vuldb.com/?id.225535
2023-04-11T16:40:35.548Z
2023-04-11T18:00:10.904Z
2023-10-22T09:37:54.500Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1968
Instruments with Illumina Universal Copy Service v2.x are vulnerable due to binding to an unrestricted IP address. An unauthenticated malicious actor could use UCS to listen on all IP addresses, including those capable of accepting remote communications.
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-01
2023-04-10T14:51:29.181Z
2023-04-28T18:09:17.372Z
2023-04-28T18:09:17.372Z
{'Vendor': 'Illumina ', 'Product': 'iScan Control Software', 'Versions': '4.0.0, 4.0.5'}
CVE-2023-1591
A vulnerability classified as critical has been found in SourceCodester Automatic Question Paper Generator System 1.0. This affects an unknown part of the file classes/Users.php?f=save_ruser. The manipulation of the argument id/email leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223659.
https://vuldb.com/?id.223659
2023-03-23T08:38:17.771Z
2023-03-23T09:00:07.175Z
2023-10-21T10:57:42.049Z
{'Vendor': 'SourceCodester', 'Product': 'Automatic Question Paper Generator System', 'Versions': '1.0'}
CVE-2023-1712
Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 0.1.30.
https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829
2023-03-30T00:00:00
2023-03-30T00:00:00
2023-03-30T00:00:00
{'Vendor': 'deepset-ai', 'Product': 'deepset-ai/haystack', 'Versions': 'unspecified'}
CVE-2023-1342
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ucss_connect function. This makes it possible for unauthenticated attackers to connect the site to a new license key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7c66894a-8d0f-4946-ae4d-bffd35f3ffb7
2023-03-10T18:49:48.223Z
2023-03-10T19:06:29.768Z
2023-03-10T19:06:29.768Z
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
CVE-2023-1207
This HTTP Headers WordPress plugin before 1.18.8 has an import functionality which executes arbitrary SQL on the server, leading to an SQL Injection vulnerability.
https://wpscan.com/vulnerability/6f3f460b-542a-4d32-8feb-afa1aef57e37
2023-03-06T19:02:36.104Z
2023-05-15T12:15:30.045Z
2023-05-15T12:15:30.045Z
{'Vendor': 'Unknown', 'Product': 'HTTP Headers', 'Versions': '0'}
CVE-2023-1092
The OAuth Single Sign On Free WordPress plugin before 6.24.2, OAuth Single Sign On Standard WordPress plugin before 28.4.9, OAuth Single Sign On Premium WordPress plugin before 38.4.9 and OAuth Single Sign On Enterprise WordPress plugin before 48.4.9 do not have CSRF checks when deleting Identity Providers (IdP), which could allow attackers to make logged in admins delete arbitrary IdP via a CSRF attack
https://wpscan.com/vulnerability/8fbf7efe-0bf2-42c6-aef1-7fcf2708b31b
2023-02-28T14:30:57.803Z
2023-03-27T15:39:36.079Z
2023-03-27T15:39:36.079Z
{'Vendor': 'MiniOrange', 'Product': 'OAuth Single Sign On Free', 'Versions': '0'}
CVE-2023-1568
A vulnerability classified as problematic has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file /admin/reports/index.php of the component GET Parameter Handler. The manipulation of the argument date_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223560.
https://vuldb.com/?id.223560
2023-03-22T10:52:06.833Z
2023-03-22T14:00:05.373Z
2023-10-21T10:47:55.979Z
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
CVE-2023-1138
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain an improper access control vulnerability, which could allow an attacker to retrieve Gateway configuration files to obtain plaintext credentials.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:23:39.800Z
2023-03-27T14:41:48.610Z
2023-03-27T14:41:48.610Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1587
Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11
https://support.norton.com/sp/static/external/tools/security-advisories.html
2023-03-22T22:17:54.665Z
2023-04-19T18:39:52.636Z
2023-04-19T18:39:52.636Z
{'Vendor': 'AVAST', 'Product': 'Avast Antivirus', 'Versions': '22.5'}
CVE-2023-1354
A vulnerability has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file register.php. The manipulation of the argument txtfullname/txtage/txtaddress/txtphone leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222853 was assigned to this vulnerability.
https://vuldb.com/?id.222853
2023-03-11T17:40:04.036Z
2023-03-11T17:41:41.628Z
2023-10-21T08:14:43.198Z
{'Vendor': 'SourceCodester', 'Product': 'Design and Implementation of Covid-19 Directory on Vaccination System', 'Versions': '1.0'}
CVE-2023-1704
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.20.
https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f
2023-03-29T00:00:00
2023-03-29T00:00:00
2023-03-29T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1211
SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2.
https://huntr.dev/bounties/ed569124-2aeb-4b0d-a312-435460892afd
2023-03-06T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'phpipam', 'Product': 'phpipam/phpipam', 'Versions': 'unspecified'}
CVE-2023-1641
A vulnerability, which was classified as problematic, has been found in IObit Malware Fighter 9.4.0.776. This issue affects the function 0x222018 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224021 was assigned to this vulnerability.
https://vuldb.com/?id.224021
2023-03-26T20:12:08.539Z
2023-03-26T21:00:06.025Z
2023-10-21T13:30:56.299Z
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
CVE-2023-1495
A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c9474f84e5f376dd2ade2078e3039961a9425da7. It is recommended to apply a patch to fix this issue. The identifier VDB-223381 was assigned to this vulnerability.
https://vuldb.com/?id.223381
2023-03-18T20:30:22.319Z
2023-03-18T23:31:04.026Z
2023-10-21T09:37:41.808Z
{'Vendor': 'n/a', 'Product': 'Rebuild', 'Versions': '3.2.0, 3.2.1, 3.2.2, 3.2.3'}
CVE-2023-1929
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the wpfc_purgecache_varnish_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to purge the varnish cache.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1e567aec-07e5-494a-936d-93b40d3e3043?source=cve
2023-04-06T20:04:47.372Z
2023-04-06T20:05:33.686Z
2023-04-07T14:06:21.148Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1883
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1180
A vulnerability has been found in SourceCodester Health Center Patient Record Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file hematology_print.php. The manipulation of the argument hem_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222331.
https://vuldb.com/?id.222331
2023-03-05T09:49:58.631Z
2023-03-05T09:50:24.242Z
2023-10-21T07:29:33.836Z
{'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'}
CVE-2023-1753
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/01d6ae23-3a8f-42a8-99f4-10246187d71b
2023-03-31T00:00:00
2023-03-31T00:00:00
2023-12-18T10:12:10.222Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1303
A vulnerability was found in UCMS 1.6 and classified as critical. This issue affects some unknown processing of the file sadmin/fileedit.php of the component System File Management Module. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-222683.
https://vuldb.com/?id.222683
2023-03-09T21:48:27.118Z
2023-03-09T21:48:49.584Z
2023-10-21T07:58:50.869Z
{'Vendor': 'n/a', 'Product': 'UCMS', 'Versions': '1.6'}
CVE-2023-1616
A vulnerability was found in XiaoBingBy TeaCMS up to 2.0.2. It has been classified as problematic. Affected is an unknown function of the component Article Title Handler. The manipulation with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223800.
https://vuldb.com/?id.223800
2023-03-24T07:12:27.538Z
2023-03-24T07:31:04.075Z
2023-10-21T11:12:20.298Z
{'Vendor': 'XiaoBingBy', 'Product': 'TeaCMS', 'Versions': '2.0.0, 2.0.1, 2.0.2'}
CVE-2023-1246
Files or Directories Accessible to External Parties vulnerability in Saysis Starcities allows Collect Data from Common Resource Locations.This issue affects Starcities: through 1.3.
https://www.usom.gov.tr/bildirim/tr-23-0140
2023-03-07T06:57:44.082Z
2023-03-10T10:58:45.107Z
2023-03-26T19:52:21.503Z
{'Vendor': 'Saysis', 'Product': 'Starcities', 'Versions': '0'}
CVE-2023-1231
Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
2023-03-07T00:41:19.709Z
2023-03-07T21:42:18.762Z
2023-03-07T21:42:18.762Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
CVE-2023-1661
The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve
2023-03-27T15:08:10.206Z
2023-05-31T03:36:10.338Z
2023-05-31T03:36:10.338Z
{'Vendor': 'trasweb', 'Product': 'Display post meta, term meta, comment meta, and user meta', 'Versions': '*'}
CVE-2023-1374
The Solidres plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'currency_name' parameter in versions up to, and including, 0.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b13ee51b-9f23-428f-9cef-4a9b9b06b0c4
2023-03-13T12:30:50.965Z
2023-03-13T12:31:14.260Z
2023-03-13T12:31:14.260Z
{'Vendor': 'solidres', 'Product': 'Solidres – Hotel booking plugin for WordPress', 'Versions': '*'}
CVE-2023-1724
Faveo Helpdesk Enterprise version 6.0.1 allows an attacker with agent permissions to perform privilege escalation on the application. This occurs because the application is vulnerable to stored XSS.
https://github.com/ladybirdweb/faveo-helpdesk/
2023-03-30T10:59:15.825Z
2023-06-24T00:13:34.926Z
2023-06-24T00:13:34.926Z
{'Vendor': 'Ladybirdweb', 'Product': 'Faveo Helpdesk', 'Versions': '6.0.1'}
CVE-2023-1548
A CWE-269: Improper Privilege Management vulnerability exists that could cause a local user to perform a denial of service through the console server service that is part of EcoStruxure Control Expert. Affected Products: EcoStruxure Control Expert (V15.1 and above)
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-03.pdf
2023-03-21T13:01:16.404Z
2023-04-18T16:42:18.451Z
2023-05-12T03:14:16.623210Z
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Control Expert', 'Versions': 'V15.1 and above'}
CVE-2023-1118
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17
2023-03-01T00:00:00
2023-03-02T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.3-rc1'}
CVE-2023-1636
A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.
https://access.redhat.com/security/cve/CVE-2023-1636
2023-03-25T18:18:19.615Z
2023-09-24T00:09:03.770Z
2023-09-24T00:09:03.770Z
{'Vendor': 'n/a', 'Product': 'openstack-barbican', 'Versions': ''}
CVE-2023-1289
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
https://bugzilla.redhat.com/show_bug.cgi?id=2176858
2023-03-09T00:00:00
2023-03-23T00:00:00
2023-03-23T00:00:00
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed-in ImageMagick v7.1.1-0'}
CVE-2023-1773
A vulnerability was found in Rockoa 2.3.2. It has been declared as critical. This vulnerability affects unknown code of the file webmainConfig.php of the component Configuration File Handler. The manipulation leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224674 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224674
2023-03-31T10:51:28.696Z
2023-03-31T12:00:06.260Z
2023-10-21T14:22:09.629Z
{'Vendor': 'n/a', 'Product': 'Rockoa', 'Versions': '2.3.2'}
CVE-2023-1323
The Easy Forms for Mailchimp WordPress plugin before 6.8.9 does not sanitise and escape some of its from parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/d3a2af00-719c-4b86-8877-b1d68a589192
2023-03-10T16:04:24.305Z
2023-06-12T17:28:21.059Z
2023-06-13T07:29:03.096Z
{'Vendor': 'Unknown', 'Product': 'Easy Forms for Mailchimp', 'Versions': '0'}
CVE-2023-1909
A vulnerability, which was classified as critical, was found in PHPGurukul BP Monitoring Management System 1.0. Affected is an unknown function of the file profile.php of the component User Profile Update Handler. The manipulation of the argument name/mobno leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225318 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225318
2023-04-06T12:21:29.355Z
2023-04-07T17:00:04.682Z
2023-10-22T06:24:33.763Z
{'Vendor': 'PHPGurukul', 'Product': 'BP Monitoring Management System', 'Versions': '1.0'}
CVE-2023-1270
Cross-site Scripting in GitHub repository btcpayserver/btcpayserver prior to 1.8.3.
https://huntr.dev/bounties/ad1f917f-2b25-40ef-9215-c805354c683b
2023-03-08T00:00:00
2023-03-08T00:00:00
2023-04-26T00:00:00
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
CVE-2023-1620
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
https://cert.vde.com/en/advisories/VDE-2023-006/
2023-03-24T10:12:26.426Z
2023-06-26T06:19:30.928Z
2023-06-26T06:19:30.928Z
{'Vendor': 'Wago', 'Product': '750-8202/xxx-xxx', 'Versions': 'FW1'}
CVE-2023-1335
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the ucss_connect function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to connect a new license key to the site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/eba48c51-87d9-4e7e-b4c1-0205cd96d033
2023-03-10T18:32:08.650Z
2023-03-10T19:20:36.009Z
2023-03-10T19:20:36.009Z
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
CVE-2023-1765
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Akbim Computer Panon allows SQL Injection.This issue affects Panon: before 1.0.2.
https://www.usom.gov.tr/bildirim/tr-23-0193
2023-03-31T07:25:31.105Z
2023-04-03T13:27:25.218Z
2023-04-03T13:27:25.218Z
{'Vendor': 'Akbim Computer', 'Product': 'Panon', 'Versions': '0'}
CVE-2023-1509
The GMAce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.2. This is due to missing nonce validation on the gmace_manager_server function called via the wp_ajax_gmace_manager AJAX action. This makes it possible for unauthenticated attackers to modify arbitrary files and achieve remote code execution via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/826b3913-9a37-4e15-80fd-b35cefb51af8?source=cve
2023-03-20T08:17:02.660Z
2023-03-29T10:14:35.275Z
2023-03-29T10:14:35.275Z
{'Vendor': 'gmdragonx', 'Product': 'GMAce', 'Versions': '*'}
CVE-2023-1159
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via service titles in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4cdf774-c93b-4b94-85ba-aa56bf401873?source=cve
2023-03-02T21:46:01.372Z
2023-06-02T06:06:48.397Z
2023-06-02T06:06:48.397Z
{'Vendor': 'ladela', 'Product': 'WordPress Online Booking and Scheduling Plugin – Bookly', 'Versions': '21.7'}
CVE-2023-1677
A vulnerability was found in DriverGenius 9.70.0.346. It has been rated as problematic. Affected by this issue is the function 0x9c40a0c8/0x9c40a0dc/0x9c40a0e0/0x9c40a0d8/0x9c4060d4/0x9c402004/0x9c402088/0x9c40208c/0x9c4060d0/0x9c4060cc/0x9c4060c4/0x9c402084 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-224234 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224234
2023-03-28T20:16:28.776Z
2023-03-28T21:31:02.900Z
2023-10-21T13:43:08.210Z
{'Vendor': 'n/a', 'Product': 'DriverGenius', 'Versions': '9.70.0.346'}
CVE-2023-1227
Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
2023-03-07T00:41:19.021Z
2023-03-07T21:42:18.106Z
2023-03-07T21:42:18.106Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
CVE-2023-1732
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x
2023-03-30T15:16:57.957Z
2023-05-10T11:41:53.902Z
2023-05-10T11:41:53.902Z
{'Vendor': 'Cloudflare', 'Product': 'CIRCL', 'Versions': '0'}
CVE-2023-1698
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
https://cert.vde.com/en/advisories/VDE-2023-007/
2023-03-29T13:00:05.618Z
2023-05-15T08:51:27.453Z
2023-05-15T08:51:27.453Z
{'Vendor': 'WAGO', 'Product': 'Compact Controller CC100', 'Versions': 'FW20, FW23'}
CVE-2023-1362
Improper Restriction of Rendered UI Layers or Frames in GitHub repository unilogies/bumsys prior to v2.0.2.
https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac
2023-03-13T00:00:00
2023-03-13T00:00:00
2023-03-13T00:00:00
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
CVE-2023-1948
A vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335.
https://vuldb.com/?id.225335
2023-04-08T06:12:04.332Z
2023-04-08T06:31:03.381Z
2023-10-22T06:33:05.993Z
{'Vendor': 'PHPGurukul', 'Product': 'BP Monitoring Management System', 'Versions': '1.0'}
CVE-2023-1749
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01
2023-03-30T20:02:11.282Z
2023-04-04T16:54:46.115Z
2023-04-04T16:54:46.115Z
{'Vendor': 'Nexx', 'Product': 'Smart Alarm NXAL-100', 'Versions': '0'}
CVE-2023-1319
Cross-site Scripting (XSS) - Stored in GitHub repository osticket/osticket prior to v1.16.6.
https://huntr.dev/bounties/a822067a-d90d-4c3e-b9ef-9b2a5c2bc97f
2023-03-10T00:00:00
2023-03-10T00:00:00
2023-03-10T00:00:00
{'Vendor': 'osticket', 'Product': 'osticket/osticket', 'Versions': 'unspecified'}
CVE-2023-1175
Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e
2023-03-04T00:00:00
2023-03-04T00:00:00
2023-06-12T00:00:00
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-1525
The Site Reviews WordPress plugin before 6.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/4ae6bf90-b100-4bb5-bdd7-8acdbd950596
2023-03-20T19:56:06.649Z
2023-05-02T07:04:49.421Z
2023-05-02T07:04:49.421Z
{'Vendor': 'Unknown', 'Product': 'Site Reviews', 'Versions': '0'}
CVE-2023-1876
null
null
2023-04-05T00:00:00
null
2023-04-10T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-1899
Atlas Copco Power Focus 6000 web server is not a secure connection by default, which could allow an attacker to gain sensitive information by monitoring network traffic between user and controller.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01
2023-04-05T20:13:27.814Z
2023-06-12T19:13:51.889Z
2023-06-12T19:13:51.889Z
{'Vendor': 'Atlas Copco', 'Product': 'Power Focus', 'Versions': '6000'}
CVE-2023-1030
A vulnerability has been found in SourceCodester Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221755.
https://vuldb.com/?id.221755
2023-02-24T19:36:30.815Z
2023-02-24T19:36:54.136Z
2023-10-20T22:08:56.715Z
{'Vendor': 'SourceCodester', 'Product': 'Online Boat Reservation System', 'Versions': '1.0'}
CVE-2023-1460
A vulnerability was found in SourceCodester Online Pizza Ordering System 1.0. It has been classified as critical. This affects an unknown part of the file admin/ajax.php?action=save_user of the component Password Change Handler. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The identifier VDB-223305 was assigned to this vulnerability.
https://vuldb.com/?id.223305
2023-03-17T07:50:44.773Z
2023-03-17T07:51:11.507Z
2023-10-21T09:08:24.598Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-1821
Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:53.334Z
2023-04-04T21:39:35.443Z
2023-04-04T21:39:35.443Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1088
The WP Plugin Manager WordPress plugin before 1.1.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/a956f1cd-fce4-4235-b1af-4b7675a60ca2
2023-02-28T13:18:00.789Z
2023-03-27T15:37:18.954Z
2023-03-27T15:37:18.954Z
{'Vendor': 'Unknown', 'Product': 'WP Plugin Manager', 'Versions': '0'}
CVE-2023-1572
A vulnerability has been found in DataGear up to 1.11.1 and classified as problematic. This vulnerability affects unknown code of the component Plugin Handler. The manipulation leads to cross site scripting. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223564.
https://vuldb.com/?id.223564
2023-03-22T11:18:44.982Z
2023-03-22T12:00:51.903Z
2023-10-21T10:52:48.862Z
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '1.11.0, 1.11.1'}
CVE-2023-1122
The Simple Giveaways WordPress plugin before 2.45.1 does not sanitise and escape some of its Giveaways options, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/71f5d630-2726-48c7-b9e5-7bebc786b561
2023-03-01T14:03:37.271Z
2023-04-10T13:17:53.053Z
2023-04-10T13:17:53.053Z
{'Vendor': 'Unknown', 'Product': 'Simple Giveaways', 'Versions': '0'}
CVE-2023-1437
All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02
2023-03-16T22:01:32.632Z
2023-08-02T22:30:43.978Z
2023-10-11T14:34:24.399Z
{'Vendor': 'Advantech', 'Product': 'WebAccess/SCADA', 'Versions': '0'}
CVE-2023-1067
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045
2023-02-27T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1964
A vulnerability classified as critical has been found in PHPGurukul Bank Locker Management System 1.0. Affected is an unknown function of the file recovery.php of the component Password Reset. The manipulation of the argument uname/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225360.
https://vuldb.com/?id.225360
2023-04-09T07:41:39.694Z
2023-04-09T08:31:03.077Z
2023-10-22T09:28:09.042Z
{'Vendor': 'PHPGurukul', 'Product': 'Bank Locker Management System', 'Versions': '1.0'}
CVE-2023-1708
An issue was identified in GitLab CE/EE affecting all versions from 1.0 prior to 15.8.5, 15.9 prior to 15.9.4, and 15.10 prior to 15.10.1 where non-printable characters gets copied from clipboard, allowing unexpected commands to be executed on victim machine.
https://gitlab.com/gitlab-org/gitlab/-/issues/387185
2023-03-29T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=1.0, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
CVE-2023-1358
A vulnerability, which was classified as critical, was found in SourceCodester Gadget Works Online Ordering System 1.0. This affects an unknown part of the file /philosophy/admin/login.php of the component POST Parameter Handler. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222861 was assigned to this vulnerability.
https://vuldb.com/?id.222861
2023-03-12T07:13:51.308Z
2023-03-12T07:31:04.695Z
2023-10-21T08:17:09.551Z
{'Vendor': 'SourceCodester', 'Product': 'Gadget Works Online Ordering System', 'Versions': '1.0'}
CVE-2023-1134
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal vulnerability, which could allow an attacker to read local files, disclose plaintext credentials, and escalate privileges.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:21:06.527Z
2023-03-27T14:47:43.501Z
2023-03-27T14:47:43.501Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1564
A vulnerability was found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/transactions/update_status.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223556.
https://vuldb.com/?id.223556
2023-03-22T10:36:22.994Z
2023-03-22T12:31:04.553Z
2023-10-21T10:43:03.241Z
{'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'}
CVE-2023-1837
Missing Authentication for critical function vulnerability in HYPR Server allows Authentication Bypass when using Legacy APIs.This issue affects HYPR Server: before 8.0 (with enabled Legacy APIs)
https://www.hypr.com/security-advisories
2023-04-04T14:59:55.040Z
2023-05-23T18:23:04.113Z
2023-05-23T18:23:04.113Z
{'Vendor': 'HYPR', 'Product': 'HYPR Server', 'Versions': '0'}
CVE-2023-1972
A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability.
https://bugzilla.redhat.com/show_bug.cgi?id=2185646
2023-04-10T00:00:00
2023-05-17T00:00:00
2023-09-30T09:06:13.775142
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': 'affected at least binutils 2.40'}
CVE-2023-1071
An issue has been discovered in GitLab affecting all versions from 15.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. Due to improper permissions checks it was possible for an unauthorised user to remove an issue from an epic.
https://gitlab.com/gitlab-org/gitlab/-/issues/385434
2023-02-27T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.5, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
CVE-2023-1421
A reflected cross-site scripting vulnerability in the OAuth flow completion endpoints in Mattermost allows an attacker to send AJAX requests on behalf of the victim via sharing a crafted link with a malicious state parameter.
https://mattermost.com/security-updates/
2023-03-15T22:45:54.197Z
2023-03-15T22:51:25.597Z
2023-03-15T22:51:25.597Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '5.32.0, 7.7'}
CVE-2023-1860
A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue.
https://vuldb.com/?id.224998
2023-04-05T06:30:55.565Z
2023-04-05T08:31:03.746Z
2023-10-22T06:22:07.472Z
{'Vendor': 'Keysight', 'Product': 'IXIA Hawkeye', 'Versions': '3.3.16.28'}
CVE-2023-1533
Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
2023-03-21T00:43:37.065Z
2023-03-21T20:50:56.386Z
2023-03-21T20:50:56.386Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
CVE-2023-1499
A vulnerability classified as critical was found in code-projects Simple Art Gallery 1.0. Affected by this vulnerability is an unknown functionality of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223399.
https://vuldb.com/?id.223399
2023-03-19T18:39:23.893Z
2023-03-19T19:31:04.418Z
2023-10-21T09:41:21.452Z
{'Vendor': 'code-projects', 'Product': 'Simple Art Gallery', 'Versions': '1.0'}
CVE-2023-1163
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5 and classified as critical. Affected by this vulnerability is the function getSyslogFile of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222259. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://vuldb.com/?id.222259
2023-03-03T06:49:31.511Z
2023-03-03T06:49:59.427Z
2023-11-22T20:43:38.299Z
{'Vendor': 'DrayTek', 'Product': 'Vigor 2960', 'Versions': '1.5.1.4, 1.5.1.5'}
CVE-2023-1476
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
https://access.redhat.com/errata/RHSA-2023:1659
2023-03-17T16:28:58.171Z
2023-11-03T08:07:00.493Z
2023-11-03T08:07:00.493Z
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '5.14-rc1'}
CVE-2023-1026
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the listPostsCategory function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to get post listings by category as long as those posts are published. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.
https://www.wordfence.com/threat-intel/vulnerabilities/id/978d5715-7993-4f89-8d69-895467633bfb
2023-02-24T19:14:02.330Z
2023-02-28T12:55:23.092Z
2023-02-28T12:55:23.092Z
{'Vendor': 'joomunited', 'Product': 'WP Meta SEO', 'Versions': '*'}
CVE-2023-1925
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_clear_cache_of_allsites_callback function. This makes it possible for unauthenticated attackers to clear caches via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/096257a4-6ee9-41e1-8a59-4ffcd309f83c?source=cve
2023-04-06T19:57:40.504Z
2023-04-06T19:57:44.125Z
2023-04-07T14:04:42.755Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1861
The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810
2023-04-05T07:37:34.049Z
2023-05-02T07:04:50.246Z
2023-05-02T07:04:50.246Z
{'Vendor': 'Unknown', 'Product': 'Limit Login Attempts', 'Versions': '0'}
CVE-2023-1532
Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
2023-03-21T00:43:36.838Z
2023-03-21T20:50:56.271Z
2023-03-21T20:50:56.271Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
CVE-2023-1498
A vulnerability classified as critical has been found in code-projects Responsive Hotel Site 1.0. Affected is an unknown function of the file messages.php of the component Newsletter Log Handler. The manipulation of the argument title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223398 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223398
2023-03-19T18:36:31.749Z
2023-03-19T19:31:03.443Z
2023-10-21T09:40:08.205Z
{'Vendor': 'code-projects', 'Product': 'Responsive Hotel Site', 'Versions': '1.0'}
CVE-2023-1162
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is an unknown function of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument password leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222258 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://vuldb.com/?id.222258
2023-03-03T06:49:22.252Z
2023-03-03T06:49:57.117Z
2023-11-22T20:43:43.932Z
{'Vendor': 'DrayTek', 'Product': 'Vigor 2960', 'Versions': '1.5.1.4, 1.5.1.5'}
CVE-2023-1477
Improper Authentication vulnerability in HYPR Keycloak Authenticator Extension allows Authentication Abuse.This issue affects HYPR Keycloak Authenticator Extension: before 7.10.2, before 8.0.3.
https://www.hypr.com/security-advisories
2023-03-17T17:23:46.243Z
2023-04-28T14:56:02.126Z
2023-04-28T14:56:02.126Z
{'Vendor': 'HYPR', 'Product': 'Keycloak Authenticator Extension', 'Versions': '0, 0'}
CVE-2023-1027
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized sitemap generation due to a missing capability check on the checkAllCategoryInSitemap function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to obtain post categories. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4f589e21-7417-4b43-b580-4f1d3c2041f4
2023-02-24T19:15:52.265Z
2023-02-28T12:54:59.252Z
2023-02-28T12:54:59.252Z
{'Vendor': 'joomunited', 'Product': 'WP Meta SEO', 'Versions': '*'}
CVE-2023-1924
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_toolbar_save_settings_callback function. This makes it possible for unauthenticated attackers to change cache settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a87f610a-c1ef-4365-bd74-569989587d41?source=cve
2023-04-06T19:57:20.292Z
2023-04-06T19:57:24.099Z
2023-04-07T14:04:24.520Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1135
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could set incorrect directory permissions, which could result in local privilege escalation.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:22:12.299Z
2023-03-27T14:59:57.462Z
2023-03-27T14:59:57.462Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1565
A vulnerability was found in FeiFeiCMS 2.7.130201. It has been classified as problematic. This affects an unknown part of the file \Public\system\slide_add.html of the component Extension Tool. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223557 was assigned to this vulnerability.
https://vuldb.com/?id.223557
2023-03-22T10:38:28.985Z
2023-03-22T13:00:04.880Z
2023-10-21T10:44:16.376Z
{'Vendor': 'n/a', 'Product': 'FeiFeiCMS', 'Versions': '2.7.130201'}
CVE-2023-1836
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. When viewing an XML file in a repository in "raw" mode, it can be made to render as HTML if viewed under specific circumstances
https://gitlab.com/gitlab-org/gitlab/-/issues/404613
2023-04-04T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=5.1, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1'}
CVE-2023-1070
External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.
https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c
2023-02-27T00:00:00
2023-02-27T00:00:00
2023-02-27T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-1420
The Ajax Search Lite WordPress plugin before 4.11.1, Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape a parameter before outputting it back in a response of an AJAX action, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/a9a54ee5-2b80-4f55-894c-1047030eea7f
2023-03-15T16:23:23.134Z
2023-04-24T18:30:49.881Z
2023-04-24T18:30:49.881Z
{'Vendor': 'Unknown', 'Product': 'Ajax Search Lite', 'Versions': '0'}
CVE-2023-1709
Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-11
2023-03-29T22:59:38.901Z
2023-06-07T20:36:05.055Z
2023-06-14T20:17:02.964Z
{'Vendor': 'Siemens ', 'Product': 'JT2Go', 'Versions': '0'}
CVE-2023-1359
A vulnerability has been found in SourceCodester Gadget Works Online Ordering System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /philosophy/admin/user/controller.php?action=add of the component Add New User. The manipulation of the argument U_NAME leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222862 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222862
2023-03-12T07:13:53.160Z
2023-03-12T08:00:04.285Z
2023-10-21T08:18:22.803Z
{'Vendor': 'SourceCodester', 'Product': 'Gadget Works Online Ordering System', 'Versions': '1.0'}
CVE-2023-1820
Heap buffer overflow in Browser History in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:53.256Z
2023-04-04T21:39:35.325Z
2023-04-04T21:39:35.325Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1089
The Coupon Zen WordPress plugin before 1.0.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/9787e26f-33fe-4c65-abb3-7f5c76ae8d6f
2023-02-28T13:18:06.558Z
2023-03-27T15:37:20.593Z
2023-03-27T15:37:20.593Z
{'Vendor': 'Unknown', 'Product': 'Coupon Zen', 'Versions': '0'}
CVE-2023-1573
A vulnerability was found in DataGear up to 1.11.1 and classified as problematic. This issue affects some unknown processing of the component Graph Dataset Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-223565 was assigned to this vulnerability.
https://vuldb.com/?id.223565
2023-03-22T11:18:47.126Z
2023-03-22T15:31:05.188Z
2023-10-21T10:54:02.420Z
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '1.11.0, 1.11.1'}
CVE-2023-1436
An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.
https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/
2023-03-16T20:44:44.527Z
2023-03-16T20:59:51.072Z
2023-03-22T04:59:51.072Z
{'Vendor': 'jettison', 'Product': 'jettison', 'Versions': '0'}
CVE-2023-1965
An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn't enabled by default.
https://gitlab.com/gitlab-org/gitlab/-/issues/406235
2023-04-10T00:00:00
2023-05-03T00:00:00
2023-05-03T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=14.2, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1'}
CVE-2023-1174
This vulnerability exposes a network port in minikube running on macOS with Docker driver that could enable unexpected remote access to the minikube container.
https://groups.google.com/g/kubernetes-security-announce/c/2ZkJFMDTKbM
2023-03-03T00:00:00
2023-05-24T00:00:00
2023-05-24T00:00:00
{'Vendor': 'Kubernetes', 'Product': 'minikube', 'Versions': '1.26.0, unspecified'}
CVE-2023-1524
The Download Manager WordPress plugin before 3.2.71 does not adequately validate passwords for password-protected files. Upon validation, a master key is generated and exposed to the user, which may be used to download any password-protected file on the server, allowing a user to download any file with the knowledge of any one file's password.
https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e
2023-03-20T19:21:06.883Z
2023-05-30T07:49:11.466Z
2023-05-30T07:49:11.466Z
{'Vendor': 'Unknown', 'Product': 'Download Manager', 'Versions': '0'}
CVE-2023-1877
Command Injection in GitHub repository microweber/microweber prior to 1.3.3.
https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-1898
Atlas Copco Power Focus 6000 web server uses a small amount of session ID numbers. An attacker could enter a session ID number to retrieve data for an active user’s session.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01
2023-04-05T20:13:11.974Z
2023-06-12T19:16:40.510Z
2023-06-12T19:16:40.510Z
{'Vendor': 'Atlas Copco', 'Product': 'Power Focus', 'Versions': '6000'}
CVE-2023-1031
MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `settings` endpoint and first_name parameter.
https://fluidattacks.com/advisories/napoli
2023-02-24T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'}