CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-1325
The Easy Forms for Mailchimp WordPress plugin before 6.8.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/5f37cbf3-2388-4582-876c-6a7b0943c2a7
2023-03-10T16:04:46.132Z
2023-04-17T12:17:39.963Z
2023-04-17T12:17:39.963Z
{'Vendor': 'Unknown', 'Product': 'Easy Forms for Mailchimp', 'Versions': '0'}
CVE-2023-1149
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.8.0.
https://huntr.dev/bounties/2e734209-d7b0-4f57-a8be-c65c82208f2f
2023-03-02T00:00:00
2023-03-02T00:00:00
2023-03-02T00:00:00
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
CVE-2023-1276
A vulnerability, which was classified as critical, has been found in SUL1SS_shop. This issue affects some unknown processing of the file application\merch\controller\Order.php. The manipulation of the argument keyword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222599.
https://vuldb.com/?id.222599
2023-03-08T17:59:59.897Z
2023-03-08T18:00:40.000Z
2023-10-21T07:45:25.149Z
{'Vendor': 'n/a', 'Product': 'SUL1SS_shop', 'Versions': 'n/a'}
CVE-2023-1626
A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been declared as critical. This vulnerability affects unknown code in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224008.
https://vuldb.com/?id.224008
2023-03-25T10:05:56.340Z
2023-03-25T10:31:03.515Z
2023-10-21T11:13:33.477Z
{'Vendor': 'Jianming', 'Product': 'Antivirus', 'Versions': '16.2.2022.418'}
CVE-2023-1333
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_page_cache function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete the plugin's cache.
https://www.wordfence.com/threat-intel/vulnerabilities/id/2cba74f7-7183-4297-8f04-4818c01358ef
2023-03-10T18:25:30.033Z
2023-03-10T19:02:13.023Z
2023-03-10T19:02:13.023Z
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
CVE-2023-1299
HashiCorp Nomad and Nomad Enterprise 1.5.0 allow a job submitter to escalate to management-level privileges using workload identity and task API. Fixed in 1.5.1.
https://discuss.hashicorp.com/t/hcsec-2023-08-nomad-job-submitter-privilege-escalation-using-workload-identity/51389
2023-03-09T20:18:12.180Z
2023-03-14T14:46:41.456Z
2023-03-14T14:46:41.456Z
{'Vendor': 'HashiCorp', 'Product': 'Nomad', 'Versions': '1.5.0'}
CVE-2023-1763
Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the software.
https://psirt.canon/advisory-information/cp2023-002/
2023-03-31T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'Canon Inc.', 'Product': 'Canon IJ NW Tool', 'Versions': 'Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8)'}
CVE-2023-1919
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_preload_single_save_settings_callback function. This makes it possible for unauthenticated attackers to change cache-related settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/024f4058-065b-48b4-a08a-d9732d4375cd?source=cve
2023-04-06T19:55:10.954Z
2023-04-06T19:55:18.921Z
2023-04-07T14:02:43.850Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1671
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce
2023-03-28T00:00:00
2023-04-04T00:00:00
2023-04-26T00:00:00
{'Vendor': 'Sophos', 'Product': 'Sophos Web Appliance', 'Versions': 'unspecified'}
CVE-2023-1221
Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
2023-03-07T00:41:18.110Z
2023-03-07T21:42:17.215Z
2023-03-07T21:42:17.215Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
CVE-2023-1734
A vulnerability classified as critical has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected is an unknown function of the file admin/products/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-224622 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224622
2023-03-30T18:51:32.235Z
2023-03-30T19:00:04.957Z
2023-10-21T14:00:12.532Z
{'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'}
CVE-2023-1364
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222871.
https://vuldb.com/?id.222871
2023-03-13T07:16:05.720Z
2023-03-13T07:31:03.195Z
2023-10-21T08:22:02.520Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-1108
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
https://access.redhat.com/errata/RHSA-2023:1184
2023-03-01T00:27:23.587Z
2023-09-14T14:48:58.869Z
2023-09-14T14:48:58.869Z
{'Vendor': 'n/a', 'Product': 'undertow', 'Versions': '2.2.24.Final, 2.3.5.Final'}
CVE-2023-1558
A vulnerability classified as critical has been found in Simple and Beautiful Shopping Cart System 1.0. This affects an unknown part of the file uploadera.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223551.
https://vuldb.com/?id.223551
2023-03-22T10:00:44.883Z
2023-03-22T11:00:04.528Z
2023-10-21T10:36:57.016Z
{'Vendor': 'n/a', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'}
CVE-2023-1870
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the saveLang function. This makes it possible for unauthenticated attackers to change the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cec0b1-b77c-4d21-a3d2-c79fd3250bb0?source=cve
2023-04-05T13:24:42.451Z
2023-04-05T13:24:49.539Z
2023-04-05T13:24:49.539Z
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
CVE-2023-1489
A vulnerability has been found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54 and classified as critical. Affected by this vulnerability is the function 0x9C402088 in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to improper access controls. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223375.
https://vuldb.com/?id.223375
2023-03-18T20:02:58.141Z
2023-03-18T21:31:03.246Z
2023-10-21T09:30:22.713Z
{'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise System Monitor', 'Versions': '1.5.3.54'}
CVE-2023-1173
null
null
2023-03-03T00:00:00
null
2023-03-10T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-1523
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
https://ubuntu.com/security/notices/USN-6125-1
2023-03-20T17:41:17.600Z
2023-09-01T18:41:47.820Z
2023-09-01T18:41:47.820Z
{'Vendor': 'Canonical Ltd.', 'Product': 'snapd', 'Versions': '2.59.5'}
CVE-2023-1036
A vulnerability was found in SourceCodester Dental Clinic Appointment Reservation System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /APR/signup.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221794 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221794
2023-02-26T11:49:25.605Z
2023-02-26T11:49:57.972Z
2023-10-20T22:11:23.165Z
{'Vendor': 'SourceCodester', 'Product': 'Dental Clinic Appointment Reservation System', 'Versions': '1.0'}
CVE-2023-1466
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(SLEEP(5)))FWlC) AND 'butz'='butz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223325 was assigned to this vulnerability.
https://vuldb.com/?id.223325
2023-03-17T11:44:08.836Z
2023-03-17T11:45:20.312Z
2023-10-21T09:12:04.414Z
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
CVE-2023-1935
ROC800-Series RTU devices are vulnerable to an authentication bypass, which could allow an attacker to gain unauthorized access to data or control of the device and cause a denial-of-service condition.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-206-03
2023-04-07T00:02:59.470Z
2023-08-02T22:40:46.883Z
2023-08-02T22:40:46.883Z
{'Vendor': 'Emerson Electric', 'Product': 'DL8000', 'Versions': 'All'}
CVE-2023-1718
Improper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted "tmp_url".
https://starlabs.sg/advisories/23/23-1718/
2023-03-30T09:17:34.502Z
2023-11-01T09:04:03.276Z
2023-11-01T09:04:03.276Z
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
CVE-2023-1574
Information disclosure in the user creation feature of a MSSQL data source in Devolutions Remote Desktop Manager 2023.1.9 and below on Windows allows an attacker with access to the user interface to obtain sensitive information via the error message dialog that displays the password in clear text.
https://devolutions.net/security/advisories/DEVO-2023-0006
2023-03-22T12:10:40.300Z
2023-03-22T12:50:16.949Z
2023-04-02T18:49:20.069507Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-1124
The Shopping Cart & eCommerce Store WordPress plugin before 5.4.3 does not validate HTTP requests, allowing authenticated users with admin privileges to perform LFI attacks.
https://wpscan.com/vulnerability/229b93cd-544b-4877-8d9f-e6debda9511c
2023-03-01T15:20:23.290Z
2023-04-03T14:38:26.671Z
2023-04-03T14:38:26.671Z
{'Vendor': 'Unknown', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '0'}
CVE-2023-1827
A vulnerability has been found in SourceCodester Centralized Covid Vaccination Records System 1.0 and classified as critical. This vulnerability affects unknown code of the file /vaccinated/admin/maintenance/manage_location.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224842 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224842
2023-04-04T08:41:55.850Z
2023-04-04T09:31:03.874Z
2023-10-21T16:52:24.749Z
{'Vendor': 'SourceCodester', 'Product': 'Centralized Covid Vaccination Records System', 'Versions': '1.0'}
CVE-2023-1962
A vulnerability classified as critical was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225361 was assigned to this vulnerability.
https://vuldb.com/?id.225361
2023-04-08T06:30:20.027Z
2023-04-09T08:00:05.147Z
2023-10-22T09:25:42.770Z
{'Vendor': 'SourceCodester', 'Product': 'Best Online News Portal', 'Versions': '1.0'}
CVE-2023-1431
The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4453bc-557b-4abf-85c6-4aecfd8f4012?source=cve
2023-03-16T12:36:17.785Z
2023-03-16T12:36:27.909Z
2023-03-16T12:36:27.909Z
{'Vendor': 'wptipsntricks', 'Product': 'WordPress Simple Shopping Cart', 'Versions': '4.6.3'}
CVE-2023-1061
A vulnerability, which was classified as critical, has been found in SourceCodester Doctors Appointment System 1.0. This issue affects some unknown processing of the file /admin/edit-doc.php. The manipulation of the argument oldmail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221825 was assigned to this vulnerability.
https://vuldb.com/?id.221825
2023-02-27T11:07:04.245Z
2023-02-27T11:08:30.134Z
2023-10-21T07:08:49.321Z
{'Vendor': 'SourceCodester', 'Product': 'Doctors Appointment System', 'Versions': '1.0'}
CVE-2023-1831
Mattermost fails to redact from audit logs the user password during user creation and the user password hash in other operations if the experimental audit logging configuration was enabled (ExperimentalAuditSettings section in config).
https://mattermost.com/security-updates/
2023-04-04T12:11:43.194Z
2023-04-17T14:21:13.233Z
2023-04-17T14:52:11.171Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.7.3, 7.8.2, 7.9.1'}
CVE-2023-1132
Compiler removal of buffer clearing in sli_se_driver_key_agreement in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.
https://github.com/SiliconLabs/gecko_sdk
2023-03-01T21:51:49.419Z
2023-05-18T18:44:04.702Z
2023-05-18T18:44:04.702Z
{'Vendor': 'silabs.com', 'Product': 'Gecko Platform', 'Versions': '0'}
CVE-2023-1098
An information disclosure vulnerability has been discovered in GitLab EE/CE affecting all versions starting from 11.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1 will allow an admin to leak password from repository mirror configuration.
https://gitlab.com/gitlab-org/gitlab/-/issues/383745
2023-02-28T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=11.5, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
CVE-2023-1562
Mattermost fails to check the "Show Full Name" setting when rendering the result for the /plugins/focalboard/api/v2/users API call, allowing an attacker to learn the full name of a board owner.
https://mattermost.com/security-updates/
2023-03-22T10:13:30.802Z
2023-03-22T10:16:19.862Z
2023-03-22T10:16:19.862Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '7.4.0, 7.5.0'}
CVE-2023-1077
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
2023-02-27T00:00:00
2023-03-27T00:00:00
2024-01-11T19:06:55.294655
{'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': 'unknown'}
CVE-2023-1427
- The Photo Gallery by 10Web WordPress plugin before 1.8.15 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images anywhere in the filesystem via a path traversal vector.
https://wpscan.com/vulnerability/c8917ba2-4cb3-4b09-8a49-b7c612254946
2023-03-16T10:39:16.489Z
2023-04-17T12:17:41.603Z
2023-04-17T12:17:41.603Z
{'Vendor': 'Unknown', 'Product': 'Photo Gallery by 10Web', 'Versions': '0'}
CVE-2023-1974
Exposure of Sensitive Information Through Metadata in GitHub repository answerdev/answer prior to 1.0.8.
https://github.com/answerdev/answer/commit/ac3f2f047ee00b4edaea7530e570ab67ff87cd6a
2023-04-11T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1309
A vulnerability classified as critical was found in SourceCodester Online Graduate Tracer System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/search_it.php. The manipulation of the argument input leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222697 was assigned to this vulnerability.
https://vuldb.com/?id.222697
2023-03-10T07:34:10.706Z
2023-03-10T07:35:24.435Z
2023-10-21T08:01:18.016Z
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
CVE-2023-1759
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1
2023-03-31T00:00:00
2023-03-31T00:00:00
2023-03-31T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1535
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.
https://github.com/answerdev/answer/commit/c3743bad4f2a69f69f8f1e1e5b4b6524fc03da25
2023-03-21T00:00:00
2023-03-21T00:00:00
2023-03-21T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1165
A vulnerability was found in Zhong Bang CRMEB Java 1.3.4. It has been classified as critical. This affects an unknown part of the file /api/admin/system/store/order/list. The manipulation of the argument keywords leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-222261 was assigned to this vulnerability.
https://vuldb.com/?id.222261
2023-03-03T07:00:35.058Z
2023-03-03T07:00:49.188Z
2023-10-21T07:27:07.448Z
{'Vendor': 'Zhong Bang', 'Product': 'CRMEB Java', 'Versions': '1.3.4'}
CVE-2023-1866
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the clearKeys function. This makes it possible for unauthenticated attackers to reset the plugin's channel settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/45851efe-2584-4b5e-8e4c-24f289d3bc32?source=cve
2023-04-05T13:22:48.469Z
2023-04-05T13:23:11.929Z
2023-04-05T13:23:11.929Z
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
CVE-2023-1889
The Directorist plugin for WordPress is vulnerable to an Insecure Direct Object Reference in versions up to, and including, 7.5.4. This is due to improper validation and authorization checks within the listing_task function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b47edd57-cac7-463f-88cc-8922f1b34612?source=cve
2023-04-05T15:54:12.176Z
2023-06-09T05:33:29.454Z
2023-06-09T05:33:29.454Z
{'Vendor': 'wpwax', 'Product': 'Directorist – WordPress Business Directory Plugin with Classified Ads Listings', 'Versions': '*'}
CVE-2023-1923
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_remove_cdn_integration_ajax_request_callback function. This makes it possible for unauthenticated attackers to change cdn settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/49ba5cfa-c2cc-49ac-b22d-7e36ccca6ac5?source=cve
2023-04-06T19:56:56.265Z
2023-04-06T19:57:00.445Z
2023-04-07T14:04:00.466Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1470
The eCommerce Product Catalog plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/26b7438e-438b-41eb-9458-2fba8ab1964d?source=cve
2023-03-17T13:07:56.695Z
2023-03-17T13:13:15.254Z
2023-03-17T13:13:15.254Z
{'Vendor': 'implecode', 'Product': 'eCommerce Product Catalog Plugin for WordPress', 'Versions': '*'}
CVE-2023-1020
The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
https://wpscan.com/vulnerability/4e5aa9a3-65a0-47d6-bc26-a2fb6cb073ff
2023-02-24T16:50:07.451Z
2023-04-24T18:30:51.463Z
2023-04-24T18:30:51.463Z
{'Vendor': 'Unknown', 'Product': 'Steveas WP Live Chat Shoutbox', 'Versions': '0'}
CVE-2023-1057
A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been rated as critical. Affected by this issue is the function edoc of the file login.php. The manipulation of the argument usermail leads to sql injection. VDB-221822 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221822
2023-02-27T11:06:50.796Z
2023-02-27T11:08:24.026Z
2023-10-21T07:05:09.788Z
{'Vendor': 'SourceCodester', 'Product': 'Doctors Appointment System', 'Versions': '1.0'}
CVE-2023-1407
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223111.
https://vuldb.com/?id.223111
2023-03-15T06:31:42.661Z
2023-03-15T06:32:03.080Z
2023-10-21T08:39:07.368Z
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
CVE-2023-1954
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0. It has been rated as critical. This issue affects the function save_inventory of the file /admin/product/manage.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225341 was assigned to this vulnerability.
https://vuldb.com/?id.225341
2023-04-08T06:29:41.842Z
2023-04-08T09:31:04.827Z
2023-10-22T06:40:24.783Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1811
Use after free in Frames in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:52.083Z
2023-04-04T21:39:34.131Z
2023-04-04T21:39:34.131Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1112
A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1 on WordPress. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072.
https://vuldb.com/?id.222072
2023-03-01T09:54:06.136Z
2023-03-01T09:54:38.579Z
2023-10-21T07:14:55.592Z
{'Vendor': 'n/a', 'Product': 'Drag and Drop Multiple File Upload Contact Form 7', 'Versions': '5.0.6.1'}
CVE-2023-1542
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f
2023-03-21T00:00:00
2023-03-21T00:00:00
2023-03-21T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1391
A vulnerability, which was classified as problematic, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file admin/ab.php. The manipulation of the argument img leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222978 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222978
2023-03-14T14:20:45.858Z
2023-03-14T14:21:03.575Z
2023-10-21T08:30:35.008Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-1684
A vulnerability was found in HadSky 7.7.16. It has been classified as problematic. This affects an unknown part of the file upload/index.php?c=app&a=superadmin:index. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224241 was assigned to this vulnerability.
https://vuldb.com/?id.224241
2023-03-28T20:30:13.448Z
2023-03-29T04:00:05.886Z
2023-10-21T13:51:40.303Z
{'Vendor': 'n/a', 'Product': 'HadSky', 'Versions': '7.7.16'}
CVE-2023-1903
SAP HCM Fiori App My Forms (Fiori 2.0) - version 605, does not perform necessary authorization checks for an authenticated user exposing the restricted header data.
https://launchpad.support.sap.com/#/notes/3301457
2023-04-06T05:17:57.486Z
2023-04-11T02:31:13.493Z
2023-04-18T14:51:19.551Z
{'Vendor': 'SAP', 'Product': 'HCM Fiori App My Forms (Fiori 2.0)', 'Versions': '605'}
CVE-2023-1450
A vulnerability was found in MP4v2 2.1.2 and classified as problematic. This issue affects the function DumpTrack of the file mp4trackdump.cpp. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223295.
https://vuldb.com/?id.223295
2023-03-17T06:47:22.882Z
2023-03-17T06:47:51.148Z
2023-10-21T08:59:52.295Z
{'Vendor': 'n/a', 'Product': 'MP4v2', 'Versions': '2.1.2'}
CVE-2023-1515
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.19.
https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282
2023-03-20T00:00:00
2023-03-20T00:00:00
2023-03-20T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1145
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:26:44.830Z
2023-03-27T14:56:30.287Z
2023-03-27T14:57:19.579Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1846
A vulnerability has been found in SourceCodester Online Payroll System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/deduction_row.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224986 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224986
2023-04-05T05:49:52.860Z
2023-04-05T06:31:03.116Z
2023-10-21T16:54:51.032Z
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
CVE-2023-1796
A vulnerability classified as problematic has been found in SourceCodester Employee Payslip Generator 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_position of the component Create News Handler. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224748.
https://vuldb.com/?id.224748
2023-04-02T07:15:32.761Z
2023-04-02T09:00:06.561Z
2023-10-21T14:33:08.580Z
{'Vendor': 'SourceCodester', 'Product': 'Employee Payslip Generator', 'Versions': '1.0'}
CVE-2023-1329
A potential security vulnerability has been identified for certain HP multifunction printers (MFPs). The vulnerability may lead to Buffer Overflow and/or Remote Code Execution when running HP Workpath solutions on potentially affected products.
https://support.hp.com/us-en/document/ish_8585737-8585769-16/hpsbpi03849
2023-03-10T16:49:10.314Z
2023-06-14T20:23:33.516Z
2023-06-14T20:23:33.516Z
{'Vendor': 'HP Inc.', 'Product': 'HP multifunction printers', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-1283
Code Injection in GitHub repository builderio/qwik prior to 0.21.0.
https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8
2023-03-08T00:00:00
2023-03-08T00:00:00
2023-10-10T07:22:36.732Z
{'Vendor': 'builderio', 'Product': 'builderio/qwik', 'Versions': 'unspecified'}
CVE-2023-1779
Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information.
https://cert.vde.com/en/advisories/VDE-2023-008/
2023-03-31T13:00:50.757Z
2023-06-06T10:07:35.354Z
2023-06-06T10:07:35.354Z
{'Vendor': 'MB Connect Line', 'Product': 'mbCONNECT24', 'Versions': '1.0.0'}
CVE-2023-1016
The Intuitive Custom Post Order plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.1.3, due to insufficient escaping on the user supplied 'objects' and 'tags' parameters and lack of sufficient preparation in the 'update_options' function as well as the 'refresh' function which runs queries on the same values. This allows authenticated attackers, with administrator permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Note that this attack may only be practical on configurations where it is possible to bypass addslashes due to the database using a nonstandard character set such as GBK.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc878508-200d-4bc7-aa99-c34e63cba4b3?source=cve
2023-02-24T14:46:15.803Z
2023-06-09T05:33:36.074Z
2023-06-09T05:33:36.074Z
{'Vendor': 'hijiri', 'Product': 'Intuitive Custom Post Order', 'Versions': '*'}
CVE-2023-1446
A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is the function 0x80002004/0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223291.
https://vuldb.com/?id.223291
2023-03-17T06:37:23.281Z
2023-03-17T06:37:43.218Z
2023-10-21T08:54:59.360Z
{'Vendor': 'Watchdog', 'Product': 'Anti-Virus', 'Versions': '1.4.214.0'}
CVE-2023-1915
The Thumbnail carousel slider WordPress plugin before 1.1.10 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting vulnerability which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/0487c3f6-1a3c-4089-a614-15138f52f69b
2023-04-06T18:20:57.534Z
2023-05-15T12:15:33.297Z
2023-05-15T12:15:33.297Z
{'Vendor': 'Unknown', 'Product': 'Thumbnail carousel slider', 'Versions': '0'}
CVE-2023-1850
A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224990 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224990
2023-04-05T05:50:07.604Z
2023-04-05T07:31:03.643Z
2023-10-21T16:59:43.721Z
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
CVE-2023-1153
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pacsrapor allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Pacsrapor: before 1.22.
https://www.usom.gov.tr/bildirim/tr-23-0163
2023-03-02T15:43:11.855Z
2023-03-21T11:19:53.116Z
2023-03-26T19:51:26.174Z
{'Vendor': 'Pacsrapor', 'Product': 'Pacsrapor', 'Versions': '0'}
CVE-2023-1503
A vulnerability classified as critical has been found in SourceCodester Alphaware Simple E-Commerce System 1.0. This affects an unknown part of the file admin/admin_index.php. The manipulation of the argument username/password with the input admin' AND (SELECT 8062 FROM (SELECT(SLEEP(5)))meUD)-- hLiX leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223407.
https://vuldb.com/?id.223407
2023-03-20T07:28:06.427Z
2023-03-20T08:00:05.740Z
2023-10-21T09:46:14.122Z
{'Vendor': 'SourceCodester', 'Product': 'Alphaware Simple E-Commerce System', 'Versions': '1.0'}
CVE-2023-1780
The Companion Sitemap Generator WordPress plugin before 4.5.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3
2023-03-31T13:13:41.996Z
2023-07-10T12:40:32.893Z
2023-07-10T13:05:44.941Z
{'Vendor': 'Unknown', 'Product': 'Companion Sitemap Generator', 'Versions': '0'}
CVE-2023-1295
A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9eac1904d3364254d622bf2c771c4f85cd435fc2
2023-03-09T18:05:20.028Z
2023-06-28T11:08:54.348Z
2023-06-28T11:13:07.332Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.6'}
CVE-2023-1942
A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/?page=user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225319.
https://vuldb.com/?id.225319
2023-04-07T16:39:54.420Z
2023-04-07T18:00:04.607Z
2023-10-22T06:29:26.407Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1041
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Responsive Tourism Website 1.0. This affects an unknown part of the file /tourism/rate_review.php. The manipulation of the argument id with the input 1"><script>alert(1111)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221799.
https://vuldb.com/?id.221799
2023-02-26T11:57:02.866Z
2023-02-26T11:57:58.666Z
2023-10-20T22:17:29.441Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Responsive Tourism Website', 'Versions': '1.0'}
CVE-2023-1554
The Quick Paypal Payments WordPress plugin before 5.7.26.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/0d247a3d-154e-4da7-a147-c1c7e1b5e87e
2023-03-21T21:44:46.824Z
2023-05-02T07:04:51.044Z
2023-05-02T07:04:51.044Z
{'Vendor': 'Unknown', 'Product': 'Quick Paypal Payments', 'Versions': '0'}
CVE-2023-1104
Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.
https://huntr.dev/bounties/a4909b4e-ab3c-41d6-b0d8-1c6e933bf758
2023-03-01T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
CVE-2023-1807
The Elementor Addons, Widgets and Enhancements – Stax plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.3. This is due to missing or incorrect nonce validation on the toggle_widget function. This makes it possible for unauthenticated attackers to enable or disable Elementor widgets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c12094bd-aa23-4f9b-92e1-d1d4284fb2a0?source=cve
2023-04-03T18:29:05.565Z
2023-06-09T05:33:31.920Z
2023-06-09T05:33:31.920Z
{'Vendor': 'staxwp', 'Product': 'Elementor Addons, Widgets and Enhancements – Stax', 'Versions': '*'}
CVE-2023-1387
Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
https://grafana.com/security/security-advisories/cve-2023-1387/
2023-03-14T11:11:01.304Z
2023-04-26T13:47:16.914Z
2023-04-26T13:47:16.914Z
{'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '9.1.0, 9.3.0, 9.4.0'}
CVE-2023-1692
The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/4/
2023-03-29T09:29:50.057Z
2023-05-20T14:10:55.121Z
2023-05-20T14:10:55.121Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 3.1.0, 2.1.0, 2.0.1, 2.0.0'}
CVE-2023-1368
A vulnerability was found in XHCMS 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php of the component POST Parameter Handler. The manipulation of the argument user leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222874 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222874
2023-03-13T07:44:23.662Z
2023-03-13T08:31:04.046Z
2023-10-21T08:25:42.208Z
{'Vendor': 'n/a', 'Product': 'XHCMS', 'Versions': '1.0'}
CVE-2023-1738
A vulnerability has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0 and classified as critical. This vulnerability affects unknown code of the file index.php?q=product. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. VDB-224626 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224626
2023-03-30T18:51:47.395Z
2023-03-30T20:31:03.597Z
2023-10-21T14:05:05.235Z
{'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'}
CVE-2023-1485
A vulnerability classified as problematic has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. This affects an unknown part of the file /bsenordering/index.php of the component GET Parameter Handler. The manipulation of the argument category with the input <script>alert(222)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223371.
https://vuldb.com/?id.223371
2023-03-18T19:56:09.977Z
2023-03-18T20:31:03.602Z
2023-10-21T09:25:29.971Z
{'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'}
CVE-2023-1893
The Login Configurator WordPress plugin through 2.1 does not properly escape a URL parameter before outputting it to the page, leading to a reflected cross-site scripting vulnerability targeting site administrators.
https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7
2023-04-05T17:28:30.974Z
2023-07-17T13:29:53.624Z
2023-07-17T13:29:53.624Z
{'Vendor': 'Unknown', 'Product': 'Login Configurator', 'Versions': '0'}
CVE-2023-1939
No access control for the OTP key   on OTP entries in Devolutions Remote Desktop Manager Windows 2022.3.33.0 and prior versions and Remote Desktop Manager Linux 2022.3.2.0 and prior versions allows non admin users to see OTP keys via the user interface.
https://devolutions.net/security/advisories/DEVO-2023-0009
2023-04-07T13:39:45.374Z
2023-04-11T17:47:49.976Z
2023-04-11T17:47:49.976Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-1190
A vulnerability was found in xiaozhuai imageinfo up to 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file imageinfo.hpp. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-222362 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222362
2023-03-06T07:17:38.080Z
2023-03-06T07:17:50.676Z
2023-10-21T07:38:06.059Z
{'Vendor': 'xiaozhuai', 'Product': 'imageinfo', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3'}
CVE-2023-1313
Unrestricted Upload of File with Dangerous Type in GitHub repository cockpit-hq/cockpit prior to 2.4.1.
https://huntr.dev/bounties/f73eef49-004f-4b3b-9717-90525e65ba61
2023-03-10T00:00:00
2023-03-10T00:00:00
2023-03-10T00:00:00
{'Vendor': 'cockpit-hq', 'Product': 'cockpit-hq/cockpit', 'Versions': 'unspecified'}
CVE-2023-1743
A vulnerability classified as problematic has been found in SourceCodester Grade Point Average GPA Calculator 1.0. This affects an unknown part of the file index.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224631.
https://vuldb.com/?id.224631
2023-03-30T19:12:58.691Z
2023-03-30T22:00:04.661Z
2023-10-21T14:11:11.085Z
{'Vendor': 'SourceCodester', 'Product': 'Grade Point Average GPA Calculator', 'Versions': '1.0'}
CVE-2023-1256
The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit which could allow an unauthenticated user to remotely read data, cause denial of service, and tamper with alarm states.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-04
2023-03-07T16:15:30.636Z
2023-03-16T18:33:52.907Z
2023-03-16T18:33:52.907Z
{'Vendor': 'AVEVA', 'Product': 'AVEVA Plant SCADA', 'Versions': '2023 Update 10'}
CVE-2023-1606
A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223736.
https://vuldb.com/?id.223736
2023-03-23T18:31:32.334Z
2023-03-23T19:00:05.667Z
2023-10-21T11:03:48.116Z
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
CVE-2023-1981
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
https://access.redhat.com/security/cve/CVE-2023-1981
2023-04-11T00:00:00
2023-05-26T00:00:00
2023-05-26T00:00:00
{'Vendor': 'n/a', 'Product': 'avahi', 'Versions': 'avahi-0.7-20'}
CVE-2023-1578
SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.19.
https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e
2023-03-22T00:00:00
2023-03-22T00:00:00
2023-03-22T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1597
The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog.
https://wpscan.com/vulnerability/4eafe111-8874-4560-83ff-394abe7a803b
2023-03-23T09:59:01.878Z
2023-07-10T12:40:40.136Z
2023-07-10T13:05:46.120Z
{'Vendor': 'Unknown', 'Product': 'tagDiv Cloud Library', 'Versions': '0'}
CVE-2023-1714
Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization.
https://starlabs.sg/advisories/23/23-1714/
2023-03-30T09:15:34.398Z
2023-11-01T09:02:47.607Z
2023-11-01T09:02:47.607Z
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
CVE-2023-1344
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the uucss_update_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/263153c9-61c5-4df4-803b-8d274e2a5e35
2023-03-10T18:50:02.744Z
2023-03-10T19:07:04.653Z
2023-03-10T19:07:04.653Z
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
CVE-2023-1651
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS
https://wpscan.com/vulnerability/c88b22ba-4fc2-49ad-a457-224157521bad
2023-03-27T09:57:35.493Z
2023-05-08T13:58:09.550Z
2023-05-08T13:58:09.550Z
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
CVE-2023-1201
Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains.
https://devolutions.net/security/advisories/DEVO-2023-0005
2023-03-06T15:51:14.721Z
2023-03-06T17:15:00.735Z
2023-03-10T20:05:13.704141Z
{'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'}
CVE-2023-1094
MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/food` endpoint and food parameter.
https://fluidattacks.com/advisories/napoli
2023-02-28T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'}
CVE-2023-1997
An OS Command Injection vulnerability exists in SIMULIA 3DOrchestrate from Release 3DEXPERIENCE R2021x through Release 3DEXPERIENCE R2023x. A specially crafted HTTP request can lead to arbitrary command execution.
https://www.3ds.com/vulnerability/advisories
2023-04-12T09:30:38.964Z
2023-08-28T15:37:21.969Z
2023-08-28T15:37:21.969Z
{'Vendor': 'Dassault Systèmes', 'Product': 'SIMULIA 3DOrchestrate', 'Versions': 'Release 3DEXPERIENCE R2021x Golden, Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'}
CVE-2023-1978
The ShiftController Employee Shift Scheduling plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the query string in versions up to, and including, 4.9.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c61212-e68e-4198-b078-18121576b767?source=cve
2023-04-11T11:51:39.639Z
2023-06-09T05:33:29.864Z
2023-06-09T05:33:29.864Z
{'Vendor': 'plainware', 'Product': 'ShiftController Employee Shift Scheduling', 'Versions': '*'}
CVE-2023-1352
A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.
https://vuldb.com/?id.222851
2023-03-11T17:39:51.188Z
2023-03-11T17:41:37.356Z
2023-10-21T08:12:16.666Z
{'Vendor': 'SourceCodester', 'Product': 'Design and Implementation of Covid-19 Directory on Vaccination System', 'Versions': '1.0'}
CVE-2023-1702
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d
2023-03-29T00:00:00
2023-03-29T00:00:00
2023-03-29T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1217
Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
2023-03-07T00:41:17.614Z
2023-03-07T21:42:16.676Z
2023-03-07T21:42:16.676Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
CVE-2023-1647
Improper Access Control in GitHub repository calcom/cal.com prior to 2.7.
https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6
2023-03-26T00:00:00
2023-03-27T00:00:00
2023-10-10T07:18:44.519Z
{'Vendor': 'calcom', 'Product': 'calcom/cal.com', 'Versions': 'unspecified'}