CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-1084
|
An issue has been discovered in GitLab CE/EE affecting all versions before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A malicious project Maintainer may create a Project Access Token with Owner level privileges using a crafted request.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/390696
|
2023-02-28T00:00:00
|
2023-03-09T00:00:00
|
2023-03-09T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=0.0, <15.7.8, >=15.8, <15.8.4, >=15.9, <15.9.2'}
|
CVE-2023-1987
|
A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this vulnerability is the function update_order_status of the file /classes/Master.php?f=update_order_status. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225535.
|
https://vuldb.com/?id.225535
|
2023-04-11T16:40:35.548Z
|
2023-04-11T18:00:10.904Z
|
2023-10-22T09:37:54.500Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1968
|
Instruments with Illumina Universal Copy Service v2.x are vulnerable due to binding to an unrestricted IP address. An unauthenticated malicious actor could use UCS to listen on all IP addresses, including those capable of accepting remote communications.
|
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-117-01
|
2023-04-10T14:51:29.181Z
|
2023-04-28T18:09:17.372Z
|
2023-04-28T18:09:17.372Z
|
{'Vendor': 'Illumina ', 'Product': 'iScan Control Software', 'Versions': '4.0.0, 4.0.5'}
|
CVE-2023-1591
|
A vulnerability classified as critical has been found in SourceCodester Automatic Question Paper Generator System 1.0. This affects an unknown part of the file classes/Users.php?f=save_ruser. The manipulation of the argument id/email leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223659.
|
https://vuldb.com/?id.223659
|
2023-03-23T08:38:17.771Z
|
2023-03-23T09:00:07.175Z
|
2023-10-21T10:57:42.049Z
|
{'Vendor': 'SourceCodester', 'Product': 'Automatic Question Paper Generator System', 'Versions': '1.0'}
|
CVE-2023-1712
|
Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 0.1.30.
|
https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829
|
2023-03-30T00:00:00
|
2023-03-30T00:00:00
|
2023-03-30T00:00:00
|
{'Vendor': 'deepset-ai', 'Product': 'deepset-ai/haystack', 'Versions': 'unspecified'}
|
CVE-2023-1342
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ucss_connect function. This makes it possible for unauthenticated attackers to connect the site to a new license key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/7c66894a-8d0f-4946-ae4d-bffd35f3ffb7
|
2023-03-10T18:49:48.223Z
|
2023-03-10T19:06:29.768Z
|
2023-03-10T19:06:29.768Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1207
|
This HTTP Headers WordPress plugin before 1.18.8 has an import functionality which executes arbitrary SQL on the server, leading to an SQL Injection vulnerability.
|
https://wpscan.com/vulnerability/6f3f460b-542a-4d32-8feb-afa1aef57e37
|
2023-03-06T19:02:36.104Z
|
2023-05-15T12:15:30.045Z
|
2023-05-15T12:15:30.045Z
|
{'Vendor': 'Unknown', 'Product': 'HTTP Headers', 'Versions': '0'}
|
CVE-2023-1092
|
The OAuth Single Sign On Free WordPress plugin before 6.24.2, OAuth Single Sign On Standard WordPress plugin before 28.4.9, OAuth Single Sign On Premium WordPress plugin before 38.4.9 and OAuth Single Sign On Enterprise WordPress plugin before 48.4.9 do not have CSRF checks when deleting Identity Providers (IdP), which could allow attackers to make logged in admins delete arbitrary IdP via a CSRF attack
|
https://wpscan.com/vulnerability/8fbf7efe-0bf2-42c6-aef1-7fcf2708b31b
|
2023-02-28T14:30:57.803Z
|
2023-03-27T15:39:36.079Z
|
2023-03-27T15:39:36.079Z
|
{'Vendor': 'MiniOrange', 'Product': 'OAuth Single Sign On Free', 'Versions': '0'}
|
CVE-2023-1568
|
A vulnerability classified as problematic has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file /admin/reports/index.php of the component GET Parameter Handler. The manipulation of the argument date_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223560.
|
https://vuldb.com/?id.223560
|
2023-03-22T10:52:06.833Z
|
2023-03-22T14:00:05.373Z
|
2023-10-21T10:47:55.979Z
|
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
|
CVE-2023-1138
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain an improper access control vulnerability, which could allow an attacker to retrieve Gateway configuration files to obtain plaintext credentials.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:23:39.800Z
|
2023-03-27T14:41:48.610Z
|
2023-03-27T14:41:48.610Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1587
|
Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11
|
https://support.norton.com/sp/static/external/tools/security-advisories.html
|
2023-03-22T22:17:54.665Z
|
2023-04-19T18:39:52.636Z
|
2023-04-19T18:39:52.636Z
|
{'Vendor': 'AVAST', 'Product': 'Avast Antivirus', 'Versions': '22.5'}
|
CVE-2023-1354
|
A vulnerability has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file register.php. The manipulation of the argument txtfullname/txtage/txtaddress/txtphone leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222853 was assigned to this vulnerability.
|
https://vuldb.com/?id.222853
|
2023-03-11T17:40:04.036Z
|
2023-03-11T17:41:41.628Z
|
2023-10-21T08:14:43.198Z
|
{'Vendor': 'SourceCodester', 'Product': 'Design and Implementation of Covid-19 Directory on Vaccination System', 'Versions': '1.0'}
|
CVE-2023-1704
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.20.
|
https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f
|
2023-03-29T00:00:00
|
2023-03-29T00:00:00
|
2023-03-29T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1211
|
SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2.
|
https://huntr.dev/bounties/ed569124-2aeb-4b0d-a312-435460892afd
|
2023-03-06T00:00:00
|
2023-03-06T00:00:00
|
2023-03-06T00:00:00
|
{'Vendor': 'phpipam', 'Product': 'phpipam/phpipam', 'Versions': 'unspecified'}
|
CVE-2023-1641
|
A vulnerability, which was classified as problematic, has been found in IObit Malware Fighter 9.4.0.776. This issue affects the function 0x222018 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224021 was assigned to this vulnerability.
|
https://vuldb.com/?id.224021
|
2023-03-26T20:12:08.539Z
|
2023-03-26T21:00:06.025Z
|
2023-10-21T13:30:56.299Z
|
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
|
CVE-2023-1495
|
A vulnerability classified as critical was found in Rebuild up to 3.2.3. Affected by this vulnerability is the function queryListOfConfig of the file /admin/robot/approval/list. The manipulation of the argument q leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is c9474f84e5f376dd2ade2078e3039961a9425da7. It is recommended to apply a patch to fix this issue. The identifier VDB-223381 was assigned to this vulnerability.
|
https://vuldb.com/?id.223381
|
2023-03-18T20:30:22.319Z
|
2023-03-18T23:31:04.026Z
|
2023-10-21T09:37:41.808Z
|
{'Vendor': 'n/a', 'Product': 'Rebuild', 'Versions': '3.2.0, 3.2.1, 3.2.2, 3.2.3'}
|
CVE-2023-1929
|
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the wpfc_purgecache_varnish_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to purge the varnish cache.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/1e567aec-07e5-494a-936d-93b40d3e3043?source=cve
|
2023-04-06T20:04:47.372Z
|
2023-04-06T20:05:33.686Z
|
2023-04-07T14:06:21.148Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1883
|
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1180
|
A vulnerability has been found in SourceCodester Health Center Patient Record Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file hematology_print.php. The manipulation of the argument hem_id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222331.
|
https://vuldb.com/?id.222331
|
2023-03-05T09:49:58.631Z
|
2023-03-05T09:50:24.242Z
|
2023-10-21T07:29:33.836Z
|
{'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'}
|
CVE-2023-1753
|
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/01d6ae23-3a8f-42a8-99f4-10246187d71b
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
2023-12-18T10:12:10.222Z
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1303
|
A vulnerability was found in UCMS 1.6 and classified as critical. This issue affects some unknown processing of the file sadmin/fileedit.php of the component System File Management Module. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-222683.
|
https://vuldb.com/?id.222683
|
2023-03-09T21:48:27.118Z
|
2023-03-09T21:48:49.584Z
|
2023-10-21T07:58:50.869Z
|
{'Vendor': 'n/a', 'Product': 'UCMS', 'Versions': '1.6'}
|
CVE-2023-1616
|
A vulnerability was found in XiaoBingBy TeaCMS up to 2.0.2. It has been classified as problematic. Affected is an unknown function of the component Article Title Handler. The manipulation with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223800.
|
https://vuldb.com/?id.223800
|
2023-03-24T07:12:27.538Z
|
2023-03-24T07:31:04.075Z
|
2023-10-21T11:12:20.298Z
|
{'Vendor': 'XiaoBingBy', 'Product': 'TeaCMS', 'Versions': '2.0.0, 2.0.1, 2.0.2'}
|
CVE-2023-1246
|
Files or Directories Accessible to External Parties vulnerability in Saysis Starcities allows Collect Data from Common Resource Locations.This issue affects Starcities: through 1.3.
|
https://www.usom.gov.tr/bildirim/tr-23-0140
|
2023-03-07T06:57:44.082Z
|
2023-03-10T10:58:45.107Z
|
2023-03-26T19:52:21.503Z
|
{'Vendor': 'Saysis', 'Product': 'Starcities', 'Versions': '0'}
|
CVE-2023-1231
|
Inappropriate implementation in Autofill in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to potentially spoof the contents of the omnibox via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:19.709Z
|
2023-03-07T21:42:18.762Z
|
2023-03-07T21:42:18.762Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1661
|
The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve
|
2023-03-27T15:08:10.206Z
|
2023-05-31T03:36:10.338Z
|
2023-05-31T03:36:10.338Z
|
{'Vendor': 'trasweb', 'Product': 'Display post meta, term meta, comment meta, and user meta', 'Versions': '*'}
|
CVE-2023-1374
|
The Solidres plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'currency_name' parameter in versions up to, and including, 0.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/b13ee51b-9f23-428f-9cef-4a9b9b06b0c4
|
2023-03-13T12:30:50.965Z
|
2023-03-13T12:31:14.260Z
|
2023-03-13T12:31:14.260Z
|
{'Vendor': 'solidres', 'Product': 'Solidres – Hotel booking plugin for WordPress', 'Versions': '*'}
|
CVE-2023-1724
|
Faveo Helpdesk Enterprise version 6.0.1 allows an attacker with agent permissions to perform privilege escalation on the application. This occurs because the application is vulnerable to stored XSS.
|
https://github.com/ladybirdweb/faveo-helpdesk/
|
2023-03-30T10:59:15.825Z
|
2023-06-24T00:13:34.926Z
|
2023-06-24T00:13:34.926Z
|
{'Vendor': 'Ladybirdweb', 'Product': 'Faveo Helpdesk', 'Versions': '6.0.1'}
|
CVE-2023-1548
|
A CWE-269: Improper Privilege Management vulnerability exists that could cause a local user to
perform a denial of service through the console server service that is part of EcoStruxure Control Expert. Affected Products: EcoStruxure Control Expert (V15.1 and above)
|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-03.pdf
|
2023-03-21T13:01:16.404Z
|
2023-04-18T16:42:18.451Z
|
2023-05-12T03:14:16.623210Z
|
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Control Expert', 'Versions': 'V15.1 and above'}
|
CVE-2023-1118
|
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
|
https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17
|
2023-03-01T00:00:00
|
2023-03-02T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.3-rc1'}
|
CVE-2023-1636
|
A vulnerability was found in OpenStack Barbican containers. This vulnerability is only applicable to deployments that utilize an all-in-one configuration. Barbican containers share the same CGROUP, USER, and NET namespace with the host system and other OpenStack services. If any service is compromised, it could gain access to the data transmitted to and from Barbican.
|
https://access.redhat.com/security/cve/CVE-2023-1636
|
2023-03-25T18:18:19.615Z
|
2023-09-24T00:09:03.770Z
|
2023-09-24T00:09:03.770Z
|
{'Vendor': 'n/a', 'Product': 'openstack-barbican', 'Versions': ''}
|
CVE-2023-1289
|
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2176858
|
2023-03-09T00:00:00
|
2023-03-23T00:00:00
|
2023-03-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed-in ImageMagick v7.1.1-0'}
|
CVE-2023-1773
|
A vulnerability was found in Rockoa 2.3.2. It has been declared as critical. This vulnerability affects unknown code of the file webmainConfig.php of the component Configuration File Handler. The manipulation leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224674 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224674
|
2023-03-31T10:51:28.696Z
|
2023-03-31T12:00:06.260Z
|
2023-10-21T14:22:09.629Z
|
{'Vendor': 'n/a', 'Product': 'Rockoa', 'Versions': '2.3.2'}
|
CVE-2023-1323
|
The Easy Forms for Mailchimp WordPress plugin before 6.8.9 does not sanitise and escape some of its from parameters, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/d3a2af00-719c-4b86-8877-b1d68a589192
|
2023-03-10T16:04:24.305Z
|
2023-06-12T17:28:21.059Z
|
2023-06-13T07:29:03.096Z
|
{'Vendor': 'Unknown', 'Product': 'Easy Forms for Mailchimp', 'Versions': '0'}
|
CVE-2023-1909
|
A vulnerability, which was classified as critical, was found in PHPGurukul BP Monitoring Management System 1.0. Affected is an unknown function of the file profile.php of the component User Profile Update Handler. The manipulation of the argument name/mobno leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225318 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.225318
|
2023-04-06T12:21:29.355Z
|
2023-04-07T17:00:04.682Z
|
2023-10-22T06:24:33.763Z
|
{'Vendor': 'PHPGurukul', 'Product': 'BP Monitoring Management System', 'Versions': '1.0'}
|
CVE-2023-1270
|
Cross-site Scripting in GitHub repository btcpayserver/btcpayserver prior to 1.8.3.
|
https://huntr.dev/bounties/ad1f917f-2b25-40ef-9215-c805354c683b
|
2023-03-08T00:00:00
|
2023-03-08T00:00:00
|
2023-04-26T00:00:00
|
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
|
CVE-2023-1620
|
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
|
https://cert.vde.com/en/advisories/VDE-2023-006/
|
2023-03-24T10:12:26.426Z
|
2023-06-26T06:19:30.928Z
|
2023-06-26T06:19:30.928Z
|
{'Vendor': 'Wago', 'Product': '750-8202/xxx-xxx', 'Versions': 'FW1'}
|
CVE-2023-1335
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the ucss_connect function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to connect a new license key to the site.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/eba48c51-87d9-4e7e-b4c1-0205cd96d033
|
2023-03-10T18:32:08.650Z
|
2023-03-10T19:20:36.009Z
|
2023-03-10T19:20:36.009Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1765
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Akbim Computer Panon allows SQL Injection.This issue affects Panon: before 1.0.2.
|
https://www.usom.gov.tr/bildirim/tr-23-0193
|
2023-03-31T07:25:31.105Z
|
2023-04-03T13:27:25.218Z
|
2023-04-03T13:27:25.218Z
|
{'Vendor': 'Akbim Computer', 'Product': 'Panon', 'Versions': '0'}
|
CVE-2023-1509
|
The GMAce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.2. This is due to missing nonce validation on the gmace_manager_server function called via the wp_ajax_gmace_manager AJAX action. This makes it possible for unauthenticated attackers to modify arbitrary files and achieve remote code execution via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/826b3913-9a37-4e15-80fd-b35cefb51af8?source=cve
|
2023-03-20T08:17:02.660Z
|
2023-03-29T10:14:35.275Z
|
2023-03-29T10:14:35.275Z
|
{'Vendor': 'gmdragonx', 'Product': 'GMAce', 'Versions': '*'}
|
CVE-2023-1159
|
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via service titles in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4cdf774-c93b-4b94-85ba-aa56bf401873?source=cve
|
2023-03-02T21:46:01.372Z
|
2023-06-02T06:06:48.397Z
|
2023-06-02T06:06:48.397Z
|
{'Vendor': 'ladela', 'Product': 'WordPress Online Booking and Scheduling Plugin – Bookly', 'Versions': '21.7'}
|
CVE-2023-1677
|
A vulnerability was found in DriverGenius 9.70.0.346. It has been rated as problematic. Affected by this issue is the function 0x9c40a0c8/0x9c40a0dc/0x9c40a0e0/0x9c40a0d8/0x9c4060d4/0x9c402004/0x9c402088/0x9c40208c/0x9c4060d0/0x9c4060cc/0x9c4060c4/0x9c402084 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-224234 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224234
|
2023-03-28T20:16:28.776Z
|
2023-03-28T21:31:02.900Z
|
2023-10-21T13:43:08.210Z
|
{'Vendor': 'n/a', 'Product': 'DriverGenius', 'Versions': '9.70.0.346'}
|
CVE-2023-1227
|
Use after free in Core in Google Chrome on Lacros prior to 111.0.5563.64 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:19.021Z
|
2023-03-07T21:42:18.106Z
|
2023-03-07T21:42:18.106Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1732
|
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.
The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
|
https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x
|
2023-03-30T15:16:57.957Z
|
2023-05-10T11:41:53.902Z
|
2023-05-10T11:41:53.902Z
|
{'Vendor': 'Cloudflare', 'Product': 'CIRCL', 'Versions': '0'}
|
CVE-2023-1698
|
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
|
https://cert.vde.com/en/advisories/VDE-2023-007/
|
2023-03-29T13:00:05.618Z
|
2023-05-15T08:51:27.453Z
|
2023-05-15T08:51:27.453Z
|
{'Vendor': 'WAGO', 'Product': 'Compact Controller CC100', 'Versions': 'FW20, FW23'}
|
CVE-2023-1362
|
Improper Restriction of Rendered UI Layers or Frames in GitHub repository unilogies/bumsys prior to v2.0.2.
|
https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac
|
2023-03-13T00:00:00
|
2023-03-13T00:00:00
|
2023-03-13T00:00:00
|
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
|
CVE-2023-1948
|
A vulnerability, which was classified as problematic, has been found in PHPGurukul BP Monitoring Management System 1.0. This issue affects some unknown processing of the file add-family-member.php of the component Add New Family Member Handler. The manipulation of the argument Member Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225335.
|
https://vuldb.com/?id.225335
|
2023-04-08T06:12:04.332Z
|
2023-04-08T06:31:03.381Z
|
2023-10-22T06:33:05.993Z
|
{'Vendor': 'PHPGurukul', 'Product': 'BP Monitoring Management System', 'Versions': '1.0'}
|
CVE-2023-1749
|
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01
|
2023-03-30T20:02:11.282Z
|
2023-04-04T16:54:46.115Z
|
2023-04-04T16:54:46.115Z
|
{'Vendor': 'Nexx', 'Product': 'Smart Alarm NXAL-100', 'Versions': '0'}
|
CVE-2023-1319
|
Cross-site Scripting (XSS) - Stored in GitHub repository osticket/osticket prior to v1.16.6.
|
https://huntr.dev/bounties/a822067a-d90d-4c3e-b9ef-9b2a5c2bc97f
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
{'Vendor': 'osticket', 'Product': 'osticket/osticket', 'Versions': 'unspecified'}
|
CVE-2023-1175
|
Incorrect Calculation of Buffer Size in GitHub repository vim/vim prior to 9.0.1378.
|
https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e
|
2023-03-04T00:00:00
|
2023-03-04T00:00:00
|
2023-06-12T00:00:00
|
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
|
CVE-2023-1525
|
The Site Reviews WordPress plugin before 6.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
https://wpscan.com/vulnerability/4ae6bf90-b100-4bb5-bdd7-8acdbd950596
|
2023-03-20T19:56:06.649Z
|
2023-05-02T07:04:49.421Z
|
2023-05-02T07:04:49.421Z
|
{'Vendor': 'Unknown', 'Product': 'Site Reviews', 'Versions': '0'}
|
CVE-2023-1876
| null | null |
2023-04-05T00:00:00
| null |
2023-04-10T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-1899
|
Atlas Copco Power Focus 6000 web server is not a secure connection by default, which could allow an attacker to gain sensitive information by monitoring network traffic between user and controller.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01
|
2023-04-05T20:13:27.814Z
|
2023-06-12T19:13:51.889Z
|
2023-06-12T19:13:51.889Z
|
{'Vendor': 'Atlas Copco', 'Product': 'Power Focus', 'Versions': '6000'}
|
CVE-2023-1030
|
A vulnerability has been found in SourceCodester Online Boat Reservation System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /boat/login.php of the component POST Parameter Handler. The manipulation of the argument un leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221755.
|
https://vuldb.com/?id.221755
|
2023-02-24T19:36:30.815Z
|
2023-02-24T19:36:54.136Z
|
2023-10-20T22:08:56.715Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Boat Reservation System', 'Versions': '1.0'}
|
CVE-2023-1460
|
A vulnerability was found in SourceCodester Online Pizza Ordering System 1.0. It has been classified as critical. This affects an unknown part of the file admin/ajax.php?action=save_user of the component Password Change Handler. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The identifier VDB-223305 was assigned to this vulnerability.
|
https://vuldb.com/?id.223305
|
2023-03-17T07:50:44.773Z
|
2023-03-17T07:51:11.507Z
|
2023-10-21T09:08:24.598Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
|
CVE-2023-1821
|
Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:53.334Z
|
2023-04-04T21:39:35.443Z
|
2023-04-04T21:39:35.443Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1088
|
The WP Plugin Manager WordPress plugin before 1.1.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/a956f1cd-fce4-4235-b1af-4b7675a60ca2
|
2023-02-28T13:18:00.789Z
|
2023-03-27T15:37:18.954Z
|
2023-03-27T15:37:18.954Z
|
{'Vendor': 'Unknown', 'Product': 'WP Plugin Manager', 'Versions': '0'}
|
CVE-2023-1572
|
A vulnerability has been found in DataGear up to 1.11.1 and classified as problematic. This vulnerability affects unknown code of the component Plugin Handler. The manipulation leads to cross site scripting. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223564.
|
https://vuldb.com/?id.223564
|
2023-03-22T11:18:44.982Z
|
2023-03-22T12:00:51.903Z
|
2023-10-21T10:52:48.862Z
|
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '1.11.0, 1.11.1'}
|
CVE-2023-1122
|
The Simple Giveaways WordPress plugin before 2.45.1 does not sanitise and escape some of its Giveaways options, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/71f5d630-2726-48c7-b9e5-7bebc786b561
|
2023-03-01T14:03:37.271Z
|
2023-04-10T13:17:53.053Z
|
2023-04-10T13:17:53.053Z
|
{'Vendor': 'Unknown', 'Product': 'Simple Giveaways', 'Versions': '0'}
|
CVE-2023-1437
|
All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02
|
2023-03-16T22:01:32.632Z
|
2023-08-02T22:30:43.978Z
|
2023-10-11T14:34:24.399Z
|
{'Vendor': 'Advantech', 'Product': 'WebAccess/SCADA', 'Versions': '0'}
|
CVE-2023-1067
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
|
https://huntr.dev/bounties/31d17b34-f80d-49f2-86e7-97ae715cc045
|
2023-02-27T00:00:00
|
2023-02-27T00:00:00
|
2023-02-27T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1964
|
A vulnerability classified as critical has been found in PHPGurukul Bank Locker Management System 1.0. Affected is an unknown function of the file recovery.php of the component Password Reset. The manipulation of the argument uname/mobile leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225360.
|
https://vuldb.com/?id.225360
|
2023-04-09T07:41:39.694Z
|
2023-04-09T08:31:03.077Z
|
2023-10-22T09:28:09.042Z
|
{'Vendor': 'PHPGurukul', 'Product': 'Bank Locker Management System', 'Versions': '1.0'}
|
CVE-2023-1708
|
An issue was identified in GitLab CE/EE affecting all versions from 1.0 prior to 15.8.5, 15.9 prior to 15.9.4, and 15.10 prior to 15.10.1 where non-printable characters gets copied from clipboard, allowing unexpected commands to be executed on victim machine.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/387185
|
2023-03-29T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=1.0, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-1358
|
A vulnerability, which was classified as critical, was found in SourceCodester Gadget Works Online Ordering System 1.0. This affects an unknown part of the file /philosophy/admin/login.php of the component POST Parameter Handler. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222861 was assigned to this vulnerability.
|
https://vuldb.com/?id.222861
|
2023-03-12T07:13:51.308Z
|
2023-03-12T07:31:04.695Z
|
2023-10-21T08:17:09.551Z
|
{'Vendor': 'SourceCodester', 'Product': 'Gadget Works Online Ordering System', 'Versions': '1.0'}
|
CVE-2023-1134
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal vulnerability, which could allow an attacker to read local files, disclose plaintext credentials, and escalate privileges.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:21:06.527Z
|
2023-03-27T14:47:43.501Z
|
2023-03-27T14:47:43.501Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1564
|
A vulnerability was found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/transactions/update_status.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223556.
|
https://vuldb.com/?id.223556
|
2023-03-22T10:36:22.994Z
|
2023-03-22T12:31:04.553Z
|
2023-10-21T10:43:03.241Z
|
{'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'}
|
CVE-2023-1837
|
Missing Authentication for critical function vulnerability in HYPR Server allows Authentication Bypass when using Legacy APIs.This issue affects HYPR Server: before 8.0 (with enabled Legacy APIs)
|
https://www.hypr.com/security-advisories
|
2023-04-04T14:59:55.040Z
|
2023-05-23T18:23:04.113Z
|
2023-05-23T18:23:04.113Z
|
{'Vendor': 'HYPR', 'Product': 'HYPR Server', 'Versions': '0'}
|
CVE-2023-1972
|
A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2185646
|
2023-04-10T00:00:00
|
2023-05-17T00:00:00
|
2023-09-30T09:06:13.775142
|
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': 'affected at least binutils 2.40'}
|
CVE-2023-1071
|
An issue has been discovered in GitLab affecting all versions from 15.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. Due to improper permissions checks it was possible for an unauthorised user to remove an issue from an epic.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/385434
|
2023-02-27T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.5, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-1421
|
A reflected cross-site scripting vulnerability in the OAuth flow completion endpoints in Mattermost allows an attacker to send AJAX requests on behalf of the victim via sharing a crafted link with a malicious state parameter.
|
https://mattermost.com/security-updates/
|
2023-03-15T22:45:54.197Z
|
2023-03-15T22:51:25.597Z
|
2023-03-15T22:51:25.597Z
|
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '5.32.0, 7.7'}
|
CVE-2023-1860
|
A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue.
|
https://vuldb.com/?id.224998
|
2023-04-05T06:30:55.565Z
|
2023-04-05T08:31:03.746Z
|
2023-10-22T06:22:07.472Z
|
{'Vendor': 'Keysight', 'Product': 'IXIA Hawkeye', 'Versions': '3.3.16.28'}
|
CVE-2023-1533
|
Use after free in WebProtect in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
|
2023-03-21T00:43:37.065Z
|
2023-03-21T20:50:56.386Z
|
2023-03-21T20:50:56.386Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
|
CVE-2023-1499
|
A vulnerability classified as critical was found in code-projects Simple Art Gallery 1.0. Affected by this vulnerability is an unknown functionality of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223399.
|
https://vuldb.com/?id.223399
|
2023-03-19T18:39:23.893Z
|
2023-03-19T19:31:04.418Z
|
2023-10-21T09:41:21.452Z
|
{'Vendor': 'code-projects', 'Product': 'Simple Art Gallery', 'Versions': '1.0'}
|
CVE-2023-1163
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5 and classified as critical. Affected by this vulnerability is the function getSyslogFile of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument option leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222259. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
https://vuldb.com/?id.222259
|
2023-03-03T06:49:31.511Z
|
2023-03-03T06:49:59.427Z
|
2023-11-22T20:43:38.299Z
|
{'Vendor': 'DrayTek', 'Product': 'Vigor 2960', 'Versions': '1.5.1.4, 1.5.1.5'}
|
CVE-2023-1476
|
A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
|
https://access.redhat.com/errata/RHSA-2023:1659
|
2023-03-17T16:28:58.171Z
|
2023-11-03T08:07:00.493Z
|
2023-11-03T08:07:00.493Z
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '5.14-rc1'}
|
CVE-2023-1026
|
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the listPostsCategory function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to get post listings by category as long as those posts are published. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/978d5715-7993-4f89-8d69-895467633bfb
|
2023-02-24T19:14:02.330Z
|
2023-02-28T12:55:23.092Z
|
2023-02-28T12:55:23.092Z
|
{'Vendor': 'joomunited', 'Product': 'WP Meta SEO', 'Versions': '*'}
|
CVE-2023-1925
|
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_clear_cache_of_allsites_callback function. This makes it possible for unauthenticated attackers to clear caches via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/096257a4-6ee9-41e1-8a59-4ffcd309f83c?source=cve
|
2023-04-06T19:57:40.504Z
|
2023-04-06T19:57:44.125Z
|
2023-04-07T14:04:42.755Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1861
|
The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810
|
2023-04-05T07:37:34.049Z
|
2023-05-02T07:04:50.246Z
|
2023-05-02T07:04:50.246Z
|
{'Vendor': 'Unknown', 'Product': 'Limit Login Attempts', 'Versions': '0'}
|
CVE-2023-1532
|
Out of bounds read in GPU Video in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
|
2023-03-21T00:43:36.838Z
|
2023-03-21T20:50:56.271Z
|
2023-03-21T20:50:56.271Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
|
CVE-2023-1498
|
A vulnerability classified as critical has been found in code-projects Responsive Hotel Site 1.0. Affected is an unknown function of the file messages.php of the component Newsletter Log Handler. The manipulation of the argument title leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223398 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223398
|
2023-03-19T18:36:31.749Z
|
2023-03-19T19:31:03.443Z
|
2023-10-21T09:40:08.205Z
|
{'Vendor': 'code-projects', 'Product': 'Responsive Hotel Site', 'Versions': '1.0'}
|
CVE-2023-1162
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in DrayTek Vigor 2960 1.5.1.4/1.5.1.5. Affected is an unknown function of the file mainfunction.cgi of the component Web Management Interface. The manipulation of the argument password leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222258 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
https://vuldb.com/?id.222258
|
2023-03-03T06:49:22.252Z
|
2023-03-03T06:49:57.117Z
|
2023-11-22T20:43:43.932Z
|
{'Vendor': 'DrayTek', 'Product': 'Vigor 2960', 'Versions': '1.5.1.4, 1.5.1.5'}
|
CVE-2023-1477
|
Improper Authentication vulnerability in HYPR Keycloak Authenticator Extension allows Authentication Abuse.This issue affects HYPR Keycloak Authenticator Extension: before 7.10.2, before 8.0.3.
|
https://www.hypr.com/security-advisories
|
2023-03-17T17:23:46.243Z
|
2023-04-28T14:56:02.126Z
|
2023-04-28T14:56:02.126Z
|
{'Vendor': 'HYPR', 'Product': 'Keycloak Authenticator Extension', 'Versions': '0, 0'}
|
CVE-2023-1027
|
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized sitemap generation due to a missing capability check on the checkAllCategoryInSitemap function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to obtain post categories. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/4f589e21-7417-4b43-b580-4f1d3c2041f4
|
2023-02-24T19:15:52.265Z
|
2023-02-28T12:54:59.252Z
|
2023-02-28T12:54:59.252Z
|
{'Vendor': 'joomunited', 'Product': 'WP Meta SEO', 'Versions': '*'}
|
CVE-2023-1924
|
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_toolbar_save_settings_callback function. This makes it possible for unauthenticated attackers to change cache settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/a87f610a-c1ef-4365-bd74-569989587d41?source=cve
|
2023-04-06T19:57:20.292Z
|
2023-04-06T19:57:24.099Z
|
2023-04-07T14:04:24.520Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1135
|
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could set incorrect directory permissions, which could result in local privilege escalation.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:22:12.299Z
|
2023-03-27T14:59:57.462Z
|
2023-03-27T14:59:57.462Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1565
|
A vulnerability was found in FeiFeiCMS 2.7.130201. It has been classified as problematic. This affects an unknown part of the file \Public\system\slide_add.html of the component Extension Tool. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223557 was assigned to this vulnerability.
|
https://vuldb.com/?id.223557
|
2023-03-22T10:38:28.985Z
|
2023-03-22T13:00:04.880Z
|
2023-10-21T10:44:16.376Z
|
{'Vendor': 'n/a', 'Product': 'FeiFeiCMS', 'Versions': '2.7.130201'}
|
CVE-2023-1836
|
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. When viewing an XML file in a repository in "raw" mode, it can be made to render as HTML if viewed under specific circumstances
|
https://gitlab.com/gitlab-org/gitlab/-/issues/404613
|
2023-04-04T00:00:00
|
2023-05-03T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=5.1, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1'}
|
CVE-2023-1070
|
External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.
|
https://huntr.dev/bounties/318bfdc4-7782-4979-956f-9ba2cc44889c
|
2023-02-27T00:00:00
|
2023-02-27T00:00:00
|
2023-02-27T00:00:00
|
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
|
CVE-2023-1420
|
The Ajax Search Lite WordPress plugin before 4.11.1, Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape a parameter before outputting it back in a response of an AJAX action, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
https://wpscan.com/vulnerability/a9a54ee5-2b80-4f55-894c-1047030eea7f
|
2023-03-15T16:23:23.134Z
|
2023-04-24T18:30:49.881Z
|
2023-04-24T18:30:49.881Z
|
{'Vendor': 'Unknown', 'Product': 'Ajax Search Lite', 'Versions': '0'}
|
CVE-2023-1709
|
Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-11
|
2023-03-29T22:59:38.901Z
|
2023-06-07T20:36:05.055Z
|
2023-06-14T20:17:02.964Z
|
{'Vendor': 'Siemens ', 'Product': 'JT2Go', 'Versions': '0'}
|
CVE-2023-1359
|
A vulnerability has been found in SourceCodester Gadget Works Online Ordering System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /philosophy/admin/user/controller.php?action=add of the component Add New User. The manipulation of the argument U_NAME leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222862 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222862
|
2023-03-12T07:13:53.160Z
|
2023-03-12T08:00:04.285Z
|
2023-10-21T08:18:22.803Z
|
{'Vendor': 'SourceCodester', 'Product': 'Gadget Works Online Ordering System', 'Versions': '1.0'}
|
CVE-2023-1820
|
Heap buffer overflow in Browser History in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:53.256Z
|
2023-04-04T21:39:35.325Z
|
2023-04-04T21:39:35.325Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1089
|
The Coupon Zen WordPress plugin before 1.0.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/9787e26f-33fe-4c65-abb3-7f5c76ae8d6f
|
2023-02-28T13:18:06.558Z
|
2023-03-27T15:37:20.593Z
|
2023-03-27T15:37:20.593Z
|
{'Vendor': 'Unknown', 'Product': 'Coupon Zen', 'Versions': '0'}
|
CVE-2023-1573
|
A vulnerability was found in DataGear up to 1.11.1 and classified as problematic. This issue affects some unknown processing of the component Graph Dataset Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-223565 was assigned to this vulnerability.
|
https://vuldb.com/?id.223565
|
2023-03-22T11:18:47.126Z
|
2023-03-22T15:31:05.188Z
|
2023-10-21T10:54:02.420Z
|
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '1.11.0, 1.11.1'}
|
CVE-2023-1436
|
An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.
|
https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/
|
2023-03-16T20:44:44.527Z
|
2023-03-16T20:59:51.072Z
|
2023-03-22T04:59:51.072Z
|
{'Vendor': 'jettison', 'Product': 'jettison', 'Versions': '0'}
|
CVE-2023-1965
|
An issue has been discovered in GitLab EE affecting all versions starting from 14.2 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. Lack of verification on RelayState parameter allowed a maliciously crafted URL to obtain access tokens granted for 3rd party Group SAML SSO logins. This feature isn't enabled by default.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/406235
|
2023-04-10T00:00:00
|
2023-05-03T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=14.2, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1'}
|
CVE-2023-1174
|
This vulnerability exposes a network port in minikube running on macOS with Docker driver that could enable unexpected remote access to the minikube container.
|
https://groups.google.com/g/kubernetes-security-announce/c/2ZkJFMDTKbM
|
2023-03-03T00:00:00
|
2023-05-24T00:00:00
|
2023-05-24T00:00:00
|
{'Vendor': 'Kubernetes', 'Product': 'minikube', 'Versions': '1.26.0, unspecified'}
|
CVE-2023-1524
|
The Download Manager WordPress plugin before 3.2.71 does not adequately validate passwords for password-protected files. Upon validation, a master key is generated and exposed to the user, which may be used to download any password-protected file on the server, allowing a user to download any file with the knowledge of any one file's password.
|
https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e
|
2023-03-20T19:21:06.883Z
|
2023-05-30T07:49:11.466Z
|
2023-05-30T07:49:11.466Z
|
{'Vendor': 'Unknown', 'Product': 'Download Manager', 'Versions': '0'}
|
CVE-2023-1877
|
Command Injection in GitHub repository microweber/microweber prior to 1.3.3.
|
https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
|
CVE-2023-1898
|
Atlas Copco Power Focus 6000 web server uses a small amount of session ID numbers. An attacker could enter a session ID number to retrieve data for an active user’s session.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01
|
2023-04-05T20:13:11.974Z
|
2023-06-12T19:16:40.510Z
|
2023-06-12T19:16:40.510Z
|
{'Vendor': 'Atlas Copco', 'Product': 'Power Focus', 'Versions': '6000'}
|
CVE-2023-1031
|
MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `settings` endpoint and first_name parameter.
|
https://fluidattacks.com/advisories/napoli
|
2023-02-24T00:00:00
|
2023-05-08T00:00:00
|
2023-05-08T00:00:00
|
{'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.