CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-1461
|
A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been declared as critical. This vulnerability affects the function query of the file createCategories.php. The manipulation of the argument categoriesStatus leads to sql injection. The attack can be initiated remotely. VDB-223306 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223306
|
2023-03-17T07:51:58.625Z
|
2023-03-17T08:00:10.175Z
|
2023-10-21T09:09:37.853Z
|
{'Vendor': 'SourceCodester', 'Product': 'Canteen Management System', 'Versions': '1.0'}
|
CVE-2023-1748
|
The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01
|
2023-03-30T20:01:18.851Z
|
2023-04-04T16:56:27.851Z
|
2023-04-04T16:56:27.851Z
|
{'Vendor': 'Nexx', 'Product': 'Smart Alarm NXAL-100', 'Versions': '0'}
|
CVE-2023-1318
|
Cross-site Scripting (XSS) - Generic in GitHub repository osticket/osticket prior to v1.16.6.
|
https://huntr.dev/bounties/e58b38e0-4897-4bb0-84e8-a7ad8efab338
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
{'Vendor': 'osticket', 'Product': 'osticket/osticket', 'Versions': 'unspecified'}
|
CVE-2023-1949
|
A vulnerability, which was classified as critical, was found in PHPGurukul BP Monitoring Management System 1.0. Affected is an unknown function of the file change-password.php of the component Change Password Handler. The manipulation of the argument password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225336.
|
https://vuldb.com/?id.225336
|
2023-04-08T06:12:06.804Z
|
2023-04-08T07:00:06.895Z
|
2023-10-22T06:34:19.112Z
|
{'Vendor': 'PHPGurukul', 'Product': 'BP Monitoring Management System', 'Versions': '1.0'}
|
CVE-2023-1676
|
A vulnerability was found in DriverGenius 9.70.0.346. It has been declared as critical. Affected by this vulnerability is the function 0x9C402088 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224233 was assigned to this vulnerability.
|
https://vuldb.com/?id.224233
|
2023-03-28T20:16:25.606Z
|
2023-03-28T21:00:06.183Z
|
2023-10-21T13:41:55.073Z
|
{'Vendor': 'n/a', 'Product': 'DriverGenius', 'Versions': '9.70.0.346'}
|
CVE-2023-1226
|
Insufficient policy enforcement in Web Payments API in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:18.835Z
|
2023-03-07T21:42:17.961Z
|
2023-03-07T21:42:17.961Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1733
|
A denial of service condition exists in the Prometheus server bundled with GitLab affecting all versions from 11.10 to 15.8.5, 15.9 to 15.9.4 and 15.10 to 15.10.1.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/392665
|
2023-03-30T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=11.10, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-1699
|
Rapid7 Nexpose versions 6.6.186 and below suffer from a forced browsing vulnerability. This vulnerability allows an attacker to manipulate URLs to forcefully browse to and access administrative pages. This vulnerability is fixed in version 6.6.187.
|
https://docs.rapid7.com/release-notes/nexpose/20230329/
|
2023-03-29T14:17:15.354Z
|
2023-03-30T09:26:13.515Z
|
2023-03-30T09:26:13.515Z
|
{'Vendor': 'Rapid7', 'Product': 'Nexpose', 'Versions': '0'}
|
CVE-2023-1363
|
A vulnerability, which was classified as problematic, was found in SourceCodester Computer Parts Sales and Inventory System 1.0. Affected is an unknown function of the component Add User Account. The manipulation of the argument username leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222870 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222870
|
2023-03-13T05:41:30.951Z
|
2023-03-13T06:00:04.143Z
|
2023-10-21T08:20:49.131Z
|
{'Vendor': 'SourceCodester', 'Product': 'Computer Parts Sales and Inventory System', 'Versions': '1.0'}
|
CVE-2023-1508
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Adam Retail Automation Systems Mobilmen Terminal Software allows SQL Injection.This issue affects Mobilmen Terminal Software: before 3.
|
https://www.usom.gov.tr/bildirim/tr-23-0284
|
2023-03-20T08:10:52.189Z
|
2023-05-23T20:00:41.023Z
|
2023-05-23T20:00:41.023Z
|
{'Vendor': 'Adam Retail Automation Systems', 'Product': 'Mobilmen Terminal Software', 'Versions': '0'}
|
CVE-2023-1158
|
Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.3, including 8.3.x expose dashboard prompts to users who are not part of the authorization list.
|
https://support.pentaho.com/hc/en-us/articles/14456024873741-IMPORTANT-Resolved-Pentaho-BA-Server-Incorrect-Authorization-Versions-before-9-4-0-1-and-9-3-0-3-including-8-3-x-Impacted-CVE-2023-1158-
|
2023-03-02T19:24:26.670Z
|
2023-05-24T21:26:53.129Z
|
2023-05-24T21:26:53.129Z
|
{'Vendor': 'Hitachi Vantara', 'Product': 'Pentaho Business Analytics Server', 'Versions': '1.0, 9.4.0.0'}
|
CVE-2023-1271
| null | null |
2023-03-08T15:09:02.279Z
| null |
2023-04-13T19:37:47.060Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-1621
|
An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to commit to projects even from a restricted IP address.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/399774
|
2023-03-24T00:00:00
|
2023-06-06T00:00:00
|
2023-06-06T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=12.0, <15.10.5, >=15.11, <15.11.1'}
|
CVE-2023-1334
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the queue_posts function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify the plugin's cache.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/f3108ef4-f889-4ae1-b86f-cedf46dcea19
|
2023-03-10T18:31:39.753Z
|
2023-03-10T19:02:28.268Z
|
2023-03-10T19:02:28.268Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1764
|
Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the communication of the software.
|
https://psirt.canon/advisory-information/cp2023-002/
|
2023-03-31T00:00:00
|
2023-05-17T00:00:00
|
2023-05-17T00:00:00
|
{'Vendor': 'Canon Inc.', 'Product': 'Canon IJ NW Tool', 'Versions': 'Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8)'}
|
CVE-2023-1908
|
A vulnerability was found in SourceCodester Simple Mobile Comparison Website 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/categories/view_category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225150 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.225150
|
2023-04-06T12:12:20.099Z
|
2023-04-06T12:31:03.499Z
|
2023-10-22T06:23:20.612Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Mobile Comparison Website', 'Versions': '1.0'}
|
CVE-2023-1637
|
A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.
|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
|
2023-03-26T00:00:00
|
2023-03-27T00:00:00
|
2023-03-27T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 5.18-rc2'}
|
CVE-2023-1267
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ulkem Company PtteM Kart.This issue affects PtteM Kart: before 2.1.
|
https://www.usom.gov.tr/bildirim/tr-23-0133
|
2023-03-08T08:16:20.262Z
|
2023-03-08T11:03:08.543Z
|
2023-03-08T11:03:08.543Z
|
{'Vendor': 'Ulkem Company', 'Product': 'PtteM Kart', 'Versions': '0'}
|
CVE-2023-1288
|
An XML External Entity injection (XXE) vulnerability in ENOVIA Live Collaboration V6R2013xE allows an attacker to read local files on the server.
|
https://www.3ds.com/vulnerability/advisories
|
2023-03-09T10:29:56.972Z
|
2023-03-09T16:33:09.843Z
|
2023-03-20T13:17:14.853Z
|
{'Vendor': 'Dassault Systèmes', 'Product': 'ENOVIA Live Collaboration', 'Versions': 'V6R2013xE Golden'}
|
CVE-2023-1772
|
A vulnerability was found in DataGear up to 4.5.1. It has been classified as problematic. This affects an unknown part of the component Diagram Type Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224673 was assigned to this vulnerability.
|
https://vuldb.com/?id.224673
|
2023-03-31T10:44:39.600Z
|
2023-03-31T11:31:04.580Z
|
2023-10-21T14:20:56.462Z
|
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '4.5.0, 4.5.1'}
|
CVE-2023-1322
|
A vulnerability was found in lmxcms 1.41 and classified as critical. Affected by this issue is the function reply of the file BookAction.class.php. The manipulation of the argument id with the input 1) and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222728.
|
https://vuldb.com/?id.222728
|
2023-03-10T15:44:14.837Z
|
2023-03-10T15:45:13.848Z
|
2023-10-21T08:06:10.793Z
|
{'Vendor': 'n/a', 'Product': 'lmxcms', 'Versions': '1.41'}
|
CVE-2023-1549
|
The Ad Inserter WordPress plugin before 2.7.27 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present
|
https://wpscan.com/vulnerability/c94b3a68-673b-44d7-9251-f3590cc5ee9e
|
2023-03-21T13:30:49.763Z
|
2023-05-15T12:15:30.894Z
|
2023-05-15T12:15:30.894Z
|
{'Vendor': 'Unknown', 'Product': 'Ad Inserter', 'Versions': '0'}
|
CVE-2023-1119
|
The WP-Optimize WordPress plugin before 3.2.13, SrbTransLatin WordPress plugin before 2.4.1 use a third-party library that removes the escaping on some HTML characters, leading to a cross-site scripting vulnerability.
|
https://wpscan.com/vulnerability/2e78735a-a7fc-41fe-8284-45bf451eff06
|
2023-03-01T14:02:47.733Z
|
2023-07-10T12:40:23.149Z
|
2023-08-14T13:36:14.436Z
|
{'Vendor': 'Unknown', 'Product': 'WP-Optimize', 'Versions': '0'}
|
CVE-2023-1230
|
Inappropriate implementation in WebApp Installs in Google Chrome on Android prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious WebApp to spoof the contents of the PWA installer via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:19.610Z
|
2023-03-07T21:42:18.627Z
|
2023-03-07T21:42:18.627Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1660
|
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in a function hooked to init, allowing unauthenticated users to update some settings, leading to Stored XSS due to the lack of escaping when outputting them in the admin dashboard
|
https://wpscan.com/vulnerability/1a5cbcfc-fa55-433a-a76b-3881b6c4bea2
|
2023-03-27T14:29:14.721Z
|
2023-05-08T13:58:05.324Z
|
2023-05-08T13:58:05.324Z
|
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
|
CVE-2023-1375
|
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized cache deletion in versions up to, and including, 1.1.2 due to a missing capability check in the deleteCacheToolbar function . This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the site's cache.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/ae643666-70cb-4eb4-a183-e1649264ded4?source=cve
|
2023-03-13T13:03:50.579Z
|
2023-06-09T05:33:27.343Z
|
2023-06-09T05:33:27.343Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1725
|
Server-Side Request Forgery (SSRF) vulnerability in Infoline Project Management System allows Server Side Request Forgery.This issue affects Project Management System: before 4.09.31.125.
|
https://www.usom.gov.tr/bildirim/tr-23-0187
|
2023-03-30T11:34:04.285Z
|
2023-03-30T14:30:45.858Z
|
2023-04-06T05:46:03.861Z
|
{'Vendor': 'Infoline', 'Product': 'Project Management System', 'Versions': '0'}
|
CVE-2023-1752
|
The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the device’s MAC address.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01
|
2023-03-30T20:05:30.210Z
|
2023-04-04T16:55:40.229Z
|
2023-04-04T16:55:40.229Z
|
{'Vendor': 'Nexx', 'Product': 'Smart Alarm NXAL-100', 'Versions': '0'}
|
CVE-2023-1302
|
A vulnerability, which was classified as problematic, was found in SourceCodester File Tracker Manager System 1.0. This affects an unknown part of the file normal/borrow1.php. The manipulation of the argument id with the input 1"><script>alert(1111)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222663.
|
https://vuldb.com/?id.222663
|
2023-03-09T21:32:39.217Z
|
2023-03-09T21:33:42.294Z
|
2023-10-21T07:57:37.720Z
|
{'Vendor': 'SourceCodester', 'Product': 'File Tracker Manager System', 'Versions': '1.0'}
|
CVE-2023-1617
|
Improper Authentication vulnerability in B&R Industrial Automation B&R VC4 (VNC-Server modules). This vulnerability may allow an unauthenticated network-based attacker to bypass the authentication mechanism of the VC4 visualization on affected devices. The impact of this vulnerability depends on the functionality provided in the visualization.
This issue affects B&R VC4: from 3.* through 3.96.7, from 4.0* through 4.06.7, from 4.1* through 4.16.3, from 4.2* through 4.26.8, from 4.3* through 4.34.6, from 4.4* through 4.45.1, from 4.5* through 4.45.3, from 4.7* through 4.72.9.
|
https://www.br-automation.com/downloads_br_productcatalogue/assets/1681046878970-en-original-1.0.pdf
|
2023-03-24T07:13:36.844Z
|
2023-04-14T11:48:53.396Z
|
2023-04-14T11:48:53.396Z
|
{'Vendor': 'B&R Industrial Automation', 'Product': 'B&R VC4', 'Versions': '3.*, 4.0*, 4.1*, 4.2*, 4.3*, 4.4*, 4.5*, 4.7*'}
|
CVE-2023-1247
| null | null |
2023-03-07T00:00:00
| null |
2023-03-27T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-1494
|
A vulnerability classified as critical has been found in IBOS 4.5.5. Affected is an unknown function of the file ApiController.php. The manipulation of the argument emailids leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223380.
|
https://vuldb.com/?id.223380
|
2023-03-18T20:26:12.860Z
|
2023-03-18T23:00:06.802Z
|
2023-10-21T09:36:28.651Z
|
{'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'}
|
CVE-2023-1928
|
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the wpfc_preload_single_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to initiate cache creation.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/56a90042-a6c0-4487-811b-ced23c97f9f4?source=cve
|
2023-04-06T20:04:31.090Z
|
2023-04-06T20:05:36.825Z
|
2023-04-07T14:06:05.492Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1882
|
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1181
|
Cross-site Scripting (XSS) - Stored in GitHub repository icret/easyimages2.0 prior to 2.6.7.
|
https://huntr.dev/bounties/f5cb8816-fc12-4282-9571-81f25670e04a
|
2023-03-05T00:00:00
|
2023-03-05T00:00:00
|
2023-03-05T00:00:00
|
{'Vendor': 'icret', 'Product': 'icret/easyimages2.0', 'Versions': 'unspecified'}
|
CVE-2023-1355
|
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1402.
|
https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9
|
2023-03-11T00:00:00
|
2023-03-11T00:00:00
|
2023-04-02T00:00:00
|
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
|
CVE-2023-1210
|
An issue has been discovered in GitLab affecting all versions starting from 12.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible to leak a user's email via an error message for groups that restrict membership by email domain.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/394775
|
2023-03-06T20:10:51.153Z
|
2023-08-01T23:36:25.668Z
|
2023-08-01T23:36:25.668Z
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.9, 16.1.0, 16.2.0'}
|
CVE-2023-1640
|
A vulnerability classified as problematic was found in IObit Malware Fighter 9.4.0.776. This vulnerability affects the function 0x222010 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224020.
|
https://vuldb.com/?id.224020
|
2023-03-26T20:12:05.431Z
|
2023-03-26T21:00:04.960Z
|
2023-10-21T13:29:43.168Z
|
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
|
CVE-2023-1990
|
A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.
|
https://lore.kernel.org/all/20230312160837.2040857-1-zyytlz.wz%40163.com/
|
2023-04-11T00:00:00
|
2023-04-12T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Linux', 'Versions': 'Linux Kernel prior to Kernel 6.3 RC3'}
|
CVE-2023-1093
|
The OAuth Single Sign On WordPress plugin before 6.24.2 does not have CSRF checks when discarding Identify providers (IdP), which could allow attackers to make logged in admins delete all IdP via a CSRF attack
|
https://wpscan.com/vulnerability/1e13b9ea-a3ef-483b-b967-6ec14bd6d54d
|
2023-02-28T14:35:38.935Z
|
2023-03-27T15:37:22.994Z
|
2023-03-27T15:37:22.994Z
|
{'Vendor': 'Unknown', 'Product': 'OAuth Single Sign On', 'Versions': '0'}
|
CVE-2023-1569
|
A vulnerability classified as problematic was found in SourceCodester E-Commerce System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/user/controller.php?action=edit. The manipulation of the argument U_NAME with the input <script>alert('1')</script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223561 was assigned to this vulnerability.
|
https://vuldb.com/?id.223561
|
2023-03-22T10:55:26.366Z
|
2023-03-22T14:00:06.504Z
|
2023-10-21T10:49:09.120Z
|
{'Vendor': 'SourceCodester', 'Product': 'E-Commerce System', 'Versions': '1.0'}
|
CVE-2023-1139
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-gateway service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:24:13.649Z
|
2023-03-27T14:36:28.810Z
|
2023-03-27T14:36:28.810Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1586
|
Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11
|
https://support.norton.com/sp/static/external/tools/security-advisories.html
|
2023-03-22T22:17:51.936Z
|
2023-04-19T18:35:09.013Z
|
2023-04-19T18:40:30.809Z
|
{'Vendor': 'Avast', 'Product': 'Avast Antivirus', 'Versions': '22.5'}
|
CVE-2023-1713
|
Insecure temporary file creation in bitrix/modules/crm/lib/order/import/instagram.php in Bitrix24 22.0.300 hosted on Apache HTTP Server allows remote authenticated attackers to execute arbitrary code via uploading a crafted ".htaccess" file.
|
https://starlabs.sg/advisories/23/23-1713/
|
2023-03-30T09:14:16.052Z
|
2023-11-01T09:02:18.019Z
|
2023-11-01T09:02:18.019Z
|
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
|
CVE-2023-1343
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the attach_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/11f74b86-a050-4247-b310-045bf48fd4bd
|
2023-03-10T18:49:56.180Z
|
2023-03-10T19:06:46.944Z
|
2023-03-10T19:06:46.944Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1656
|
Cleartext Transmission of Sensitive Information vulnerability in ForgeRock Inc. OpenIDM and Java Remote Connector Server (RCS) LDAP Connector on Windows, MacOS, Linux allows Remote Services with Stolen Credentials.This issue affects OpenIDM and Java Remote Connector Server (RCS): from 1.5.20.9 through 1.5.20.13.
|
https://backstage.forgerock.com/knowledge/kb/article/a14149722
|
2023-03-27T14:07:18.820Z
|
2023-03-29T19:55:13.974Z
|
2023-03-29T19:55:21.060Z
|
{'Vendor': 'ForgeRock Inc.', 'Product': 'OpenIDM and Java Remote Connector Server (RCS)', 'Versions': '1.5.20.9'}
|
CVE-2023-1206
|
A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel’s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2175903
|
2023-03-06T00:00:00
|
2023-06-30T00:00:00
|
2024-01-11T19:06:53.711288
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'kernel 6.5-rc1'}
|
CVE-2023-1986
|
A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. Affected is the function delete_order of the file /classes/master.php?f=delete_order. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225534 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.225534
|
2023-04-11T16:40:32.241Z
|
2023-04-11T18:00:09.249Z
|
2023-10-22T09:36:41.344Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1969
|
A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. This vulnerability affects unknown code of the file /admin/inventory/manage_stock.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-225406 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.225406
|
2023-04-10T15:45:27.652Z
|
2023-04-10T16:00:05.059Z
|
2023-10-22T09:29:22.202Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Eyewear Shop', 'Versions': '1.0'}
|
CVE-2023-1590
|
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects the function exec of the file admin/operations/currency.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223655.
|
https://vuldb.com/?id.223655
|
2023-03-23T07:30:43.767Z
|
2023-03-23T08:00:07.323Z
|
2023-10-21T10:56:28.789Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-1314
|
A vulnerability has been discovered in cloudflared's installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory.
An attacker with local access to the device (without Administrator rights) can use symbolic links to trick the MSI installer into deleting files in locations that the attacker would otherwise have no access to. By creating a symlink from the world-writable directory to the target file, the attacker can manipulate the MSI installer's repair functionality to delete the target file during the repair process.
Exploitation of this vulnerability could allow an attacker to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised.
The cloudflared client itself is not affected by this vulnerability, only the installer for 32-bit Windows devices.
|
https://github.com/cloudflare/cloudflared/security/advisories/GHSA-7mjv-x3jf-545x
|
2023-03-10T11:10:40.020Z
|
2023-03-21T11:01:14.062Z
|
2023-03-21T11:01:14.062Z
|
{'Vendor': 'Cloudflare', 'Product': 'cloudflared', 'Versions': '0'}
|
CVE-2023-1744
|
A vulnerability classified as critical was found in IBOS 4.5.5. This vulnerability affects unknown code of the component htaccess Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224632.
|
https://vuldb.com/?id.224632
|
2023-03-30T19:19:49.201Z
|
2023-03-30T22:31:03.950Z
|
2023-10-21T14:12:24.197Z
|
{'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'}
|
CVE-2023-1251
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Akinsoft Wolvox. This issue affects Wolvox: before 8.02.03.
|
https://www.usom.gov.tr/bildirim/tr-23-0136
|
2023-03-07T11:14:40.502Z
|
2023-03-09T07:44:35.863Z
|
2023-03-09T08:20:56.390Z
|
{'Vendor': 'Akinsoft', 'Product': 'Wolvox', 'Versions': '0'}
|
CVE-2023-1601
| null | null |
2023-03-23T00:00:00
| null |
2023-05-24T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-1528
|
Use after free in Passwords in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
|
2023-03-21T00:43:35.906Z
|
2023-03-21T20:50:55.704Z
|
2023-03-21T20:50:55.704Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
|
CVE-2023-1482
|
A vulnerability, which was classified as problematic, was found in HkCms 2.2.4.230206. This affects an unknown part of the file /admin.php/appcenter/local.html?type=addon of the component External Plugin Handler. The manipulation leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223365 was assigned to this vulnerability.
|
https://vuldb.com/?id.223365
|
2023-03-18T08:32:35.313Z
|
2023-03-18T09:31:03.575Z
|
2023-10-21T09:21:50.225Z
|
{'Vendor': 'n/a', 'Product': 'HkCms', 'Versions': '2.2.4.230206'}
|
CVE-2023-1178
|
An issue has been discovered in GitLab CE/EE affecting all versions from 8.6 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. File integrity may be compromised when source code or installation packages are pulled from a tag or from a release containing a ref to another commit.
|
https://hackerone.com/reports/1778009
|
2023-03-04T00:00:00
|
2023-05-03T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=8.6, <15.9.6, >=15.10, <15.10.5, >=15.11, <15.11.1'}
|
CVE-2023-1197
|
Cross-site Scripting (XSS) - Stored in GitHub repository uvdesk/community-skeleton prior to 1.1.0.
|
https://huntr.dev/bounties/97d226ea-2cd8-4f4d-9360-aa46c37fdd26
|
2023-03-06T00:00:00
|
2023-03-06T00:00:00
|
2023-03-06T00:00:00
|
{'Vendor': 'uvdesk', 'Product': 'uvdesk/community-skeleton', 'Versions': 'unspecified'}
|
CVE-2023-1894
|
A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations.
|
https://www.puppet.com/security/cve/cve-2023-1894-puppet-server-redos
|
2023-04-05T19:39:06.485Z
|
2023-05-04T22:13:02.556Z
|
2023-05-04T22:13:02.556Z
|
{'Vendor': 'Puppet', 'Product': 'Puppet Enterprise', 'Versions': '2021.7.1, 2023.0.0'}
|
CVE-2023-1380
|
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2177883
|
2023-03-13T00:00:00
|
2023-03-27T00:00:00
|
2023-10-19T23:07:05.459657
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'unknown'}
|
CVE-2023-1695
|
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
|
https://consumer.huawei.com/en/support/bulletin/2023/7/
|
2023-03-29T09:29:53.740Z
|
2023-07-06T12:51:58.425Z
|
2023-07-06T12:51:58.425Z
|
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 3.1.0, 2.0.1, 2.0.0'}
|
CVE-2023-1416
|
A vulnerability classified as critical has been found in Simple Art Gallery 1.0. Affected is an unknown function of the file adminHome.php. The manipulation of the argument social_facebook leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223128.
|
https://vuldb.com/?id.223128
|
2023-03-15T15:08:12.923Z
|
2023-03-15T15:13:12.962Z
|
2023-10-21T08:41:33.718Z
|
{'Vendor': 'n/a', 'Product': 'Simple Art Gallery', 'Versions': '1.0'}
|
CVE-2023-1046
|
A vulnerability classified as critical has been found in MuYuCMS 2.2. This affects an unknown part of the file /admin.php/update/getFile.html. The manipulation of the argument url leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221805 was assigned to this vulnerability.
|
https://vuldb.com/?id.221805
|
2023-02-26T12:20:26.941Z
|
2023-02-26T12:20:53.065Z
|
2023-10-20T22:23:35.451Z
|
{'Vendor': 'n/a', 'Product': 'MuYuCMS', 'Versions': '2.2'}
|
CVE-2023-1945
|
Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.10 and Firefox ESR < 102.10.
|
https://www.mozilla.org/security/advisories/mfsa2023-15/
|
2023-04-07T00:00:00
|
2023-06-02T00:00:00
|
2023-06-02T00:00:00
|
{'Vendor': 'Mozilla', 'Product': 'Thunderbird', 'Versions': 'unspecified'}
|
CVE-2023-1800
|
A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768.
|
https://vuldb.com/?id.224768
|
2023-04-02T07:49:53.961Z
|
2023-04-02T10:31:03.341Z
|
2023-10-21T14:38:01.404Z
|
{'Vendor': 'sjqzhang', 'Product': 'go-fastdfs', 'Versions': '1.4.0, 1.4.1, 1.4.2, 1.4.3'}
|
CVE-2023-1103
| null | null |
2023-03-01T00:00:00
| null |
2023-04-04T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-1787
|
An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. A search timeout could be triggered if a specific HTML payload was used in the issue description.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/394817
|
2023-03-31T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-1292
|
A vulnerability has been found in SourceCodester Sales Tracker Management System 1.0 and classified as critical. This vulnerability affects the function delete_client of the file classes/Master.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222646 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222646
|
2023-03-09T14:25:42.636Z
|
2023-03-09T14:26:04.112Z
|
2023-10-21T07:51:31.571Z
|
{'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'}
|
CVE-2023-1768
|
Inappropriate error handling in Tribe29 Checkmk <= 2.1.0p25, <= 2.0.0p34, <= 2.2.0b3 (beta), and all versions of Checkmk 1.6.0 causes the symmetric encryption of agent data to fail silently and transmit the data in plaintext in certain configurations.
|
https://checkmk.com/werk/15423
|
2023-03-31T08:10:02.118Z
|
2023-04-04T06:30:29.538Z
|
2023-04-04T06:30:29.538Z
|
{'Vendor': 'Tribe29', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0, 2.0.0, 1.6.0'}
|
CVE-2023-1338
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the attach_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify cache rules.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb55b22-a0d0-424f-8e4f-57d3f239c149
|
2023-03-10T18:33:24.935Z
|
2023-03-10T19:20:19.833Z
|
2023-03-10T19:20:19.833Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1912
|
The Limit Login Attempts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lock logging feature in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the plugin's settings page. This only works when the plugin prioritizes use of the X-FORWARDED-FOR header, which can be configured in its settings.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/cb8c80fc-3b51-4003-b221-6f02e74bead0?source=cve
|
2023-04-06T14:28:30.212Z
|
2023-04-06T14:37:58.264Z
|
2023-04-12T16:22:09.793Z
|
{'Vendor': 'automattic', 'Product': 'Limit Login Attempts', 'Versions': '*'}
|
CVE-2023-1011
|
The AI ChatBot WordPress plugin before 4.4.5 does not escape most of its settings before outputting them back in the dashboard, and does not have a proper CSRF check, allowing attackers to make a logged in admin set XSS payloads in them.
|
https://wpscan.com/vulnerability/d1784446-b3da-4175-9dac-20b030f19984
|
2023-02-24T10:36:58.523Z
|
2023-05-08T13:58:06.876Z
|
2023-05-08T13:58:06.876Z
|
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
|
CVE-2023-1441
|
A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin/courses/view_course.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223285 was assigned to this vulnerability.
|
https://vuldb.com/?id.223285
|
2023-03-17T06:23:39.858Z
|
2023-03-17T06:23:56.037Z
|
2023-10-21T08:48:53.126Z
|
{'Vendor': 'SourceCodester', 'Product': 'Automatic Question Paper Generator System', 'Versions': '1.0'}
|
CVE-2023-1154
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pacsrapor allows Reflected XSS.This issue affects Pacsrapor: before 1.22.
|
https://www.usom.gov.tr/bildirim/tr-23-0163
|
2023-03-02T15:43:20.550Z
|
2023-03-21T11:21:13.622Z
|
2023-03-26T19:51:46.934Z
|
{'Vendor': 'Pacsrapor', 'Product': 'Pacsrapor', 'Versions': '0'}
|
CVE-2023-1504
|
A vulnerability classified as critical was found in SourceCodester Alphaware Simple E-Commerce System 1.0. This vulnerability affects unknown code. The manipulation of the argument email/password with the input test1%40test.com ' AND (SELECT 6077 FROM (SELECT(SLEEP(5)))dltn) AND 'PhRa'='PhRa leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223408.
|
https://vuldb.com/?id.223408
|
2023-03-20T07:28:09.158Z
|
2023-03-20T08:31:03.956Z
|
2023-10-21T09:47:27.298Z
|
{'Vendor': 'SourceCodester', 'Product': 'Alphaware Simple E-Commerce System', 'Versions': '1.0'}
|
CVE-2023-1857
|
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=product/manage_product&id=2. The manipulation of the argument Product Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224996.
|
https://vuldb.com/?id.224996
|
2023-04-05T05:58:40.714Z
|
2023-04-05T07:40:20.707Z
|
2023-10-22T06:19:41.167Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1791
|
A vulnerability has been found in SourceCodester Simple Task Allocation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224743.
|
https://vuldb.com/?id.224743
|
2023-04-02T06:43:55.760Z
|
2023-04-02T07:00:07.231Z
|
2023-10-21T14:27:02.385Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Task Allocation System', 'Versions': '1.0'}
|
CVE-2023-1457
|
A vulnerability, which was classified as critical, was found in Ubiquiti EdgeRouter X 2.0.9-hotfix.6. Affected is an unknown function of the component Static Routing Configuration Handler. The manipulation of the argument next-hop-interface leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. VDB-223302 is the identifier assigned to this vulnerability. NOTE: The vendor position is that post-authentication issues are not accepted as vulnerabilities.
|
https://vuldb.com/?id.223302
|
2023-03-17T00:00:00
|
2023-03-25T00:00:00
|
2023-03-27T00:00:00
|
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.6'}
|
CVE-2023-1007
|
A vulnerability was found in Twister Antivirus 8.17. It has been declared as critical. This vulnerability affects the function 0x801120E4 in the library filmfd.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221740.
|
https://vuldb.com/?id.221740
|
2023-02-24T10:23:07.950Z
|
2023-02-24T10:23:59.178Z
|
2023-10-20T22:04:04.045Z
|
{'Vendor': 'Twister', 'Product': 'Antivirus', 'Versions': '8.17'}
|
CVE-2023-1904
|
In affected versions of Octopus Server it is possible for the OpenID client secret to be logged in clear text during the configuration of Octopus Server.
|
https://advisories.octopus.com/post/2023/sa2023-12/
|
2023-04-06T06:30:38.789Z
|
2023-12-14T07:23:08.589Z
|
2023-12-14T07:23:08.589Z
|
{'Vendor': 'Octopus Deploy', 'Product': 'Octopus Server', 'Versions': '2022.2.7897, unspecified, unspecified, unspecified'}
|
CVE-2023-1142
|
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:25:26.859Z
|
2023-03-27T14:48:55.406Z
|
2023-03-27T14:48:55.406Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1396
|
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin/traveller_details.php. The manipulation of the argument address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222983.
|
https://vuldb.com/?id.222983
|
2023-03-14T14:35:17.663Z
|
2023-03-14T14:35:53.250Z
|
2023-10-21T08:35:27.735Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-1729
|
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
|
https://github.com/LibRaw/LibRaw/issues/557
|
2023-03-30T00:00:00
|
2023-05-15T00:00:00
|
2023-12-22T13:06:23.193897
|
{'Vendor': 'n/a', 'Product': 'LibRaw', 'Versions': 'LibRaw 0.21.1'}
|
CVE-2023-1683
|
A vulnerability was found in Xunrui CMS 4.61 and classified as problematic. Affected by this issue is some unknown functionality of the file /dayrui/Fcms/View/system_log.html. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224240.
|
https://vuldb.com/?id.224240
|
2023-03-28T20:20:55.711Z
|
2023-03-29T01:00:07.062Z
|
2023-10-21T13:50:27.164Z
|
{'Vendor': 'Xunrui', 'Product': 'CMS', 'Versions': '4.61'}
|
CVE-2023-1379
|
A vulnerability was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file addmem.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223127.
|
https://vuldb.com/?id.223127
|
2023-03-13T17:27:58.638Z
|
2023-03-15T15:10:28.308Z
|
2023-10-21T08:29:21.776Z
|
{'Vendor': 'SourceCodester', 'Product': 'Friendly Island Pizza Website and Ordering System', 'Versions': '1.0'}
|
CVE-2023-1953
|
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/sales/index.php. The manipulation of the argument date_start/date_end leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225340.
|
https://vuldb.com/?id.225340
|
2023-04-08T06:29:38.092Z
|
2023-04-08T09:31:03.689Z
|
2023-10-22T06:39:11.647Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1050
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in As Koc Energy Web Report System allows SQL Injection.This issue affects Web Report System: before 23.03.10.
|
https://www.usom.gov.tr/bildirim/tr-23-0166
|
2023-02-27T08:32:12.742Z
|
2023-03-23T06:09:47.644Z
|
2023-03-23T06:09:47.644Z
|
{'Vendor': 'As Koc Energy', 'Product': 'Web Report System', 'Versions': '0'}
|
CVE-2023-1400
|
The Modern Events Calendar Lite WordPress plugin before 6.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
https://wpscan.com/vulnerability/c7feceef-28f1-4cac-b124-4b95e3f17b07
|
2023-03-14T15:23:25.682Z
|
2023-03-27T15:37:25.452Z
|
2023-10-16T08:32:34.573Z
|
{'Vendor': 'Unknown', 'Product': 'Modern Events Calendar Lite', 'Versions': '0'}
|
CVE-2023-1115
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
|
https://huntr.dev/bounties/cfa80332-e4cf-4d64-b3e5-e10298628d17
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1545
|
SQL Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.
|
https://huntr.dev/bounties/942c015f-7486-49b1-94ae-b1538d812bc2
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
|
CVE-2023-1816
|
Incorrect security UI in Picture In Picture in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially perform navigation spoofing via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:52.843Z
|
2023-04-04T21:39:34.781Z
|
2023-04-04T21:39:34.781Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1237
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
https://github.com/answerdev/answer/commit/0566894a2c0e13cf07d877f41467e2e21529fee8
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1667
|
A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.
|
https://access.redhat.com/security/cve/CVE-2023-1667
|
2023-03-27T00:00:00
|
2023-05-26T00:00:00
|
2023-12-22T10:06:17.929046
|
{'Vendor': 'n/a', 'Product': 'libssh', 'Versions': 'libssh-2'}
|
CVE-2023-1688
|
A vulnerability classified as problematic has been found in SourceCodester Earnings and Expense Tracker App 1.0. This affects an unknown part of the file Master.php?a=save_expense. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-224307.
|
https://vuldb.com/?id.224307
|
2023-03-28T21:07:14.275Z
|
2023-03-29T09:00:07.157Z
|
2023-10-21T13:56:32.948Z
|
{'Vendor': 'SourceCodester', 'Product': 'Earnings and Expense Tracker App', 'Versions': '1.0'}
|
CVE-2023-1372
|
The WH Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters such as wh_homepage, wh_text_short, wh_text_full and in versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/b6fe5f1a-787e-4662-915f-c6f04961e194
|
2023-03-13T12:16:00.737Z
|
2023-03-13T12:20:15.984Z
|
2023-03-13T12:20:15.984Z
|
{'Vendor': 'webhostings', 'Product': 'WH Testimonials', 'Versions': '*, 3.0.0'}
|
CVE-2023-1722
|
Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators.
|
https://fluidattacks.com/advisories/wyckoff/
|
2023-03-30T10:27:37.381Z
|
2023-06-24T01:20:25.989Z
|
2023-06-24T01:20:25.989Z
|
{'Vendor': 'Yoga Class Registration System', 'Product': 'Yoga Class Registration System', 'Versions': '1.0'}
|
CVE-2023-1958
|
A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file /classes/Master.php?f=delete_sub_category. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225345 was assigned to this vulnerability.
|
https://vuldb.com/?id.225345
|
2023-04-08T06:29:57.931Z
|
2023-04-08T10:31:04.469Z
|
2023-10-22T06:45:17.526Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1630
|
A vulnerability, which was classified as problematic, has been found in JiangMin Antivirus 16.2.2022.418. Affected by this issue is the function 0x222000 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012.
|
https://vuldb.com/?id.224012
|
2023-03-25T10:06:08.805Z
|
2023-03-25T11:31:03.145Z
|
2023-10-21T11:18:26.197Z
|
{'Vendor': 'JiangMin', 'Product': 'Antivirus', 'Versions': '16.2.2022.418'}
|
CVE-2023-1260
|
An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.
|
https://access.redhat.com/errata/RHSA-2023:3976
|
2023-03-07T20:12:18.360Z
|
2023-09-24T00:07:08.130Z
|
2023-09-24T00:07:08.130Z
|
{'Vendor': 'n/a', 'Product': 'kubernetes', 'Versions': ''}
|
CVE-2023-1775
|
When running in a High Availability configuration, Mattermost fails to sanitize some of the user_updated and post_deleted events broadcast to all users, leading to disclosure of sensitive information to some of the users with currently connected Websocket clients.
|
https://mattermost.com/security-updates/
|
2023-03-31T11:26:09.249Z
|
2023-03-31T11:26:21.640Z
|
2023-03-31T11:26:21.640Z
|
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '3.3.0, 3.3.0, 3.3.0, 7.8.0, 7.7.2, 7.1.6'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.