CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-1325
|
The Easy Forms for Mailchimp WordPress plugin before 6.8.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/5f37cbf3-2388-4582-876c-6a7b0943c2a7
|
2023-03-10T16:04:46.132Z
|
2023-04-17T12:17:39.963Z
|
2023-04-17T12:17:39.963Z
|
{'Vendor': 'Unknown', 'Product': 'Easy Forms for Mailchimp', 'Versions': '0'}
|
CVE-2023-1149
|
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.8.0.
|
https://huntr.dev/bounties/2e734209-d7b0-4f57-a8be-c65c82208f2f
|
2023-03-02T00:00:00
|
2023-03-02T00:00:00
|
2023-03-02T00:00:00
|
{'Vendor': 'btcpayserver', 'Product': 'btcpayserver/btcpayserver', 'Versions': 'unspecified'}
|
CVE-2023-1276
|
A vulnerability, which was classified as critical, has been found in SUL1SS_shop. This issue affects some unknown processing of the file application\merch\controller\Order.php. The manipulation of the argument keyword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222599.
|
https://vuldb.com/?id.222599
|
2023-03-08T17:59:59.897Z
|
2023-03-08T18:00:40.000Z
|
2023-10-21T07:45:25.149Z
|
{'Vendor': 'n/a', 'Product': 'SUL1SS_shop', 'Versions': 'n/a'}
|
CVE-2023-1626
|
A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been declared as critical. This vulnerability affects unknown code in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224008.
|
https://vuldb.com/?id.224008
|
2023-03-25T10:05:56.340Z
|
2023-03-25T10:31:03.515Z
|
2023-10-21T11:13:33.477Z
|
{'Vendor': 'Jianming', 'Product': 'Antivirus', 'Versions': '16.2.2022.418'}
|
CVE-2023-1333
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_page_cache function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete the plugin's cache.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/2cba74f7-7183-4297-8f04-4818c01358ef
|
2023-03-10T18:25:30.033Z
|
2023-03-10T19:02:13.023Z
|
2023-03-10T19:02:13.023Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1299
|
HashiCorp Nomad and Nomad Enterprise 1.5.0 allow a job submitter to escalate to management-level privileges using workload identity and task API. Fixed in 1.5.1.
|
https://discuss.hashicorp.com/t/hcsec-2023-08-nomad-job-submitter-privilege-escalation-using-workload-identity/51389
|
2023-03-09T20:18:12.180Z
|
2023-03-14T14:46:41.456Z
|
2023-03-14T14:46:41.456Z
|
{'Vendor': 'HashiCorp', 'Product': 'Nomad', 'Versions': '1.5.0'}
|
CVE-2023-1763
|
Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the software.
|
https://psirt.canon/advisory-information/cp2023-002/
|
2023-03-31T00:00:00
|
2023-05-17T00:00:00
|
2023-05-17T00:00:00
|
{'Vendor': 'Canon Inc.', 'Product': 'Canon IJ NW Tool', 'Versions': 'Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8)'}
|
CVE-2023-1919
|
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_preload_single_save_settings_callback function. This makes it possible for unauthenticated attackers to change cache-related settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/024f4058-065b-48b4-a08a-d9732d4375cd?source=cve
|
2023-04-06T19:55:10.954Z
|
2023-04-06T19:55:18.921Z
|
2023-04-07T14:02:43.850Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1671
|
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
|
https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce
|
2023-03-28T00:00:00
|
2023-04-04T00:00:00
|
2023-04-26T00:00:00
|
{'Vendor': 'Sophos', 'Product': 'Sophos Web Appliance', 'Versions': 'unspecified'}
|
CVE-2023-1221
|
Insufficient policy enforcement in Extensions API in Google Chrome prior to 111.0.5563.64 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:18.110Z
|
2023-03-07T21:42:17.215Z
|
2023-03-07T21:42:17.215Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1734
|
A vulnerability classified as critical has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected is an unknown function of the file admin/products/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-224622 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224622
|
2023-03-30T18:51:32.235Z
|
2023-03-30T19:00:04.957Z
|
2023-10-21T14:00:12.532Z
|
{'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'}
|
CVE-2023-1364
|
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222871.
|
https://vuldb.com/?id.222871
|
2023-03-13T07:16:05.720Z
|
2023-03-13T07:31:03.195Z
|
2023-10-21T08:22:02.520Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
|
CVE-2023-1108
|
A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.
|
https://access.redhat.com/errata/RHSA-2023:1184
|
2023-03-01T00:27:23.587Z
|
2023-09-14T14:48:58.869Z
|
2023-09-14T14:48:58.869Z
|
{'Vendor': 'n/a', 'Product': 'undertow', 'Versions': '2.2.24.Final, 2.3.5.Final'}
|
CVE-2023-1558
|
A vulnerability classified as critical has been found in Simple and Beautiful Shopping Cart System 1.0. This affects an unknown part of the file uploadera.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223551.
|
https://vuldb.com/?id.223551
|
2023-03-22T10:00:44.883Z
|
2023-03-22T11:00:04.528Z
|
2023-10-21T10:36:57.016Z
|
{'Vendor': 'n/a', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'}
|
CVE-2023-1870
|
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the saveLang function. This makes it possible for unauthenticated attackers to change the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cec0b1-b77c-4d21-a3d2-c79fd3250bb0?source=cve
|
2023-04-05T13:24:42.451Z
|
2023-04-05T13:24:49.539Z
|
2023-04-05T13:24:49.539Z
|
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
|
CVE-2023-1489
|
A vulnerability has been found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54 and classified as critical. Affected by this vulnerability is the function 0x9C402088 in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to improper access controls. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223375.
|
https://vuldb.com/?id.223375
|
2023-03-18T20:02:58.141Z
|
2023-03-18T21:31:03.246Z
|
2023-10-21T09:30:22.713Z
|
{'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise System Monitor', 'Versions': '1.5.3.54'}
|
CVE-2023-1173
| null | null |
2023-03-03T00:00:00
| null |
2023-03-10T00:00:00
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-1523
|
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
|
https://ubuntu.com/security/notices/USN-6125-1
|
2023-03-20T17:41:17.600Z
|
2023-09-01T18:41:47.820Z
|
2023-09-01T18:41:47.820Z
|
{'Vendor': 'Canonical Ltd.', 'Product': 'snapd', 'Versions': '2.59.5'}
|
CVE-2023-1036
|
A vulnerability was found in SourceCodester Dental Clinic Appointment Reservation System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /APR/signup.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221794 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221794
|
2023-02-26T11:49:25.605Z
|
2023-02-26T11:49:57.972Z
|
2023-10-20T22:11:23.165Z
|
{'Vendor': 'SourceCodester', 'Product': 'Dental Clinic Appointment Reservation System', 'Versions': '1.0'}
|
CVE-2023-1466
|
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(SLEEP(5)))FWlC) AND 'butz'='butz leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223325 was assigned to this vulnerability.
|
https://vuldb.com/?id.223325
|
2023-03-17T11:44:08.836Z
|
2023-03-17T11:45:20.312Z
|
2023-10-21T09:12:04.414Z
|
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
|
CVE-2023-1935
|
ROC800-Series RTU devices are vulnerable to an authentication bypass, which could allow an attacker to gain unauthorized access to data or control of the device and cause a denial-of-service condition.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-206-03
|
2023-04-07T00:02:59.470Z
|
2023-08-02T22:40:46.883Z
|
2023-08-02T22:40:46.883Z
|
{'Vendor': 'Emerson Electric', 'Product': 'DL8000', 'Versions': 'All'}
|
CVE-2023-1718
|
Improper file stream access in /desktop_app/file.ajax.php?action=uploadfile in Bitrix24 22.0.300 allows unauthenticated remote attackers to cause denial-of-service via a crafted "tmp_url".
|
https://starlabs.sg/advisories/23/23-1718/
|
2023-03-30T09:17:34.502Z
|
2023-11-01T09:04:03.276Z
|
2023-11-01T09:04:03.276Z
|
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
|
CVE-2023-1574
|
Information disclosure in the user creation feature of a MSSQL data source in Devolutions Remote Desktop Manager 2023.1.9 and below on Windows allows an attacker with access to the user interface to obtain sensitive information via the error message dialog that displays the password in clear text.
|
https://devolutions.net/security/advisories/DEVO-2023-0006
|
2023-03-22T12:10:40.300Z
|
2023-03-22T12:50:16.949Z
|
2023-04-02T18:49:20.069507Z
|
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
|
CVE-2023-1124
|
The Shopping Cart & eCommerce Store WordPress plugin before 5.4.3 does not validate HTTP requests, allowing authenticated users with admin privileges to perform LFI attacks.
|
https://wpscan.com/vulnerability/229b93cd-544b-4877-8d9f-e6debda9511c
|
2023-03-01T15:20:23.290Z
|
2023-04-03T14:38:26.671Z
|
2023-04-03T14:38:26.671Z
|
{'Vendor': 'Unknown', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '0'}
|
CVE-2023-1827
|
A vulnerability has been found in SourceCodester Centralized Covid Vaccination Records System 1.0 and classified as critical. This vulnerability affects unknown code of the file /vaccinated/admin/maintenance/manage_location.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224842 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224842
|
2023-04-04T08:41:55.850Z
|
2023-04-04T09:31:03.874Z
|
2023-10-21T16:52:24.749Z
|
{'Vendor': 'SourceCodester', 'Product': 'Centralized Covid Vaccination Records System', 'Versions': '1.0'}
|
CVE-2023-1962
|
A vulnerability classified as critical was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/forgot-password.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225361 was assigned to this vulnerability.
|
https://vuldb.com/?id.225361
|
2023-04-08T06:30:20.027Z
|
2023-04-09T08:00:05.147Z
|
2023-10-22T09:25:42.770Z
|
{'Vendor': 'SourceCodester', 'Product': 'Best Online News Portal', 'Versions': '1.0'}
|
CVE-2023-1431
|
The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4453bc-557b-4abf-85c6-4aecfd8f4012?source=cve
|
2023-03-16T12:36:17.785Z
|
2023-03-16T12:36:27.909Z
|
2023-03-16T12:36:27.909Z
|
{'Vendor': 'wptipsntricks', 'Product': 'WordPress Simple Shopping Cart', 'Versions': '4.6.3'}
|
CVE-2023-1061
|
A vulnerability, which was classified as critical, has been found in SourceCodester Doctors Appointment System 1.0. This issue affects some unknown processing of the file /admin/edit-doc.php. The manipulation of the argument oldmail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221825 was assigned to this vulnerability.
|
https://vuldb.com/?id.221825
|
2023-02-27T11:07:04.245Z
|
2023-02-27T11:08:30.134Z
|
2023-10-21T07:08:49.321Z
|
{'Vendor': 'SourceCodester', 'Product': 'Doctors Appointment System', 'Versions': '1.0'}
|
CVE-2023-1831
|
Mattermost fails to redact from audit logs the user password during user creation and the user password hash in other operations if the experimental audit logging configuration was enabled (ExperimentalAuditSettings section in config).
|
https://mattermost.com/security-updates/
|
2023-04-04T12:11:43.194Z
|
2023-04-17T14:21:13.233Z
|
2023-04-17T14:52:11.171Z
|
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.7.3, 7.8.2, 7.9.1'}
|
CVE-2023-1132
|
Compiler removal of buffer clearing in
sli_se_driver_key_agreement
in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.
|
https://github.com/SiliconLabs/gecko_sdk
|
2023-03-01T21:51:49.419Z
|
2023-05-18T18:44:04.702Z
|
2023-05-18T18:44:04.702Z
|
{'Vendor': 'silabs.com', 'Product': 'Gecko Platform', 'Versions': '0'}
|
CVE-2023-1098
|
An information disclosure vulnerability has been discovered in GitLab EE/CE affecting all versions starting from 11.5 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1 will allow an admin to leak password from repository mirror configuration.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/383745
|
2023-02-28T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=11.5, <15.8.5, >=15.9, <15.9.4, >=15.10, <15.10.1'}
|
CVE-2023-1562
|
Mattermost fails to check the "Show Full Name" setting when rendering the result for the /plugins/focalboard/api/v2/users API call, allowing an attacker to learn the full name of a board owner.
|
https://mattermost.com/security-updates/
|
2023-03-22T10:13:30.802Z
|
2023-03-22T10:16:19.862Z
|
2023-03-22T10:16:19.862Z
|
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '7.4.0, 7.5.0'}
|
CVE-2023-1077
|
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.
|
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
|
2023-02-27T00:00:00
|
2023-03-27T00:00:00
|
2024-01-11T19:06:55.294655
|
{'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': 'unknown'}
|
CVE-2023-1427
|
- The Photo Gallery by 10Web WordPress plugin before 1.8.15 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images anywhere in the filesystem via a path traversal vector.
|
https://wpscan.com/vulnerability/c8917ba2-4cb3-4b09-8a49-b7c612254946
|
2023-03-16T10:39:16.489Z
|
2023-04-17T12:17:41.603Z
|
2023-04-17T12:17:41.603Z
|
{'Vendor': 'Unknown', 'Product': 'Photo Gallery by 10Web', 'Versions': '0'}
|
CVE-2023-1974
|
Exposure of Sensitive Information Through Metadata in GitHub repository answerdev/answer prior to 1.0.8.
|
https://github.com/answerdev/answer/commit/ac3f2f047ee00b4edaea7530e570ab67ff87cd6a
|
2023-04-11T00:00:00
|
2023-04-11T00:00:00
|
2023-04-11T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1309
|
A vulnerability classified as critical was found in SourceCodester Online Graduate Tracer System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/search_it.php. The manipulation of the argument input leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222697 was assigned to this vulnerability.
|
https://vuldb.com/?id.222697
|
2023-03-10T07:34:10.706Z
|
2023-03-10T07:35:24.435Z
|
2023-10-21T08:01:18.016Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
|
CVE-2023-1759
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1535
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.7.
|
https://github.com/answerdev/answer/commit/c3743bad4f2a69f69f8f1e1e5b4b6524fc03da25
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1165
|
A vulnerability was found in Zhong Bang CRMEB Java 1.3.4. It has been classified as critical. This affects an unknown part of the file /api/admin/system/store/order/list. The manipulation of the argument keywords leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-222261 was assigned to this vulnerability.
|
https://vuldb.com/?id.222261
|
2023-03-03T07:00:35.058Z
|
2023-03-03T07:00:49.188Z
|
2023-10-21T07:27:07.448Z
|
{'Vendor': 'Zhong Bang', 'Product': 'CRMEB Java', 'Versions': '1.3.4'}
|
CVE-2023-1866
|
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the clearKeys function. This makes it possible for unauthenticated attackers to reset the plugin's channel settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/45851efe-2584-4b5e-8e4c-24f289d3bc32?source=cve
|
2023-04-05T13:22:48.469Z
|
2023-04-05T13:23:11.929Z
|
2023-04-05T13:23:11.929Z
|
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
|
CVE-2023-1889
|
The Directorist plugin for WordPress is vulnerable to an Insecure Direct Object Reference in versions up to, and including, 7.5.4. This is due to improper validation and authorization checks within the listing_task function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/b47edd57-cac7-463f-88cc-8922f1b34612?source=cve
|
2023-04-05T15:54:12.176Z
|
2023-06-09T05:33:29.454Z
|
2023-06-09T05:33:29.454Z
|
{'Vendor': 'wpwax', 'Product': 'Directorist – WordPress Business Directory Plugin with Classified Ads Listings', 'Versions': '*'}
|
CVE-2023-1923
|
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_remove_cdn_integration_ajax_request_callback function. This makes it possible for unauthenticated attackers to change cdn settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/49ba5cfa-c2cc-49ac-b22d-7e36ccca6ac5?source=cve
|
2023-04-06T19:56:56.265Z
|
2023-04-06T19:57:00.445Z
|
2023-04-07T14:04:00.466Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1470
|
The eCommerce Product Catalog plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/26b7438e-438b-41eb-9458-2fba8ab1964d?source=cve
|
2023-03-17T13:07:56.695Z
|
2023-03-17T13:13:15.254Z
|
2023-03-17T13:13:15.254Z
|
{'Vendor': 'implecode', 'Product': 'eCommerce Product Catalog Plugin for WordPress', 'Versions': '*'}
|
CVE-2023-1020
|
The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
|
https://wpscan.com/vulnerability/4e5aa9a3-65a0-47d6-bc26-a2fb6cb073ff
|
2023-02-24T16:50:07.451Z
|
2023-04-24T18:30:51.463Z
|
2023-04-24T18:30:51.463Z
|
{'Vendor': 'Unknown', 'Product': 'Steveas WP Live Chat Shoutbox', 'Versions': '0'}
|
CVE-2023-1057
|
A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been rated as critical. Affected by this issue is the function edoc of the file login.php. The manipulation of the argument usermail leads to sql injection. VDB-221822 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221822
|
2023-02-27T11:06:50.796Z
|
2023-02-27T11:08:24.026Z
|
2023-10-21T07:05:09.788Z
|
{'Vendor': 'SourceCodester', 'Product': 'Doctors Appointment System', 'Versions': '1.0'}
|
CVE-2023-1407
|
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223111.
|
https://vuldb.com/?id.223111
|
2023-03-15T06:31:42.661Z
|
2023-03-15T06:32:03.080Z
|
2023-10-21T08:39:07.368Z
|
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
|
CVE-2023-1954
|
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0. It has been rated as critical. This issue affects the function save_inventory of the file /admin/product/manage.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225341 was assigned to this vulnerability.
|
https://vuldb.com/?id.225341
|
2023-04-08T06:29:41.842Z
|
2023-04-08T09:31:04.827Z
|
2023-10-22T06:40:24.783Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1811
|
Use after free in Frames in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:52.083Z
|
2023-04-04T21:39:34.131Z
|
2023-04-04T21:39:34.131Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1112
|
A vulnerability was found in Drag and Drop Multiple File Upload Contact Form 7 5.0.6.1 on WordPress. It has been classified as critical. Affected is an unknown function of the file admin-ajax.php. The manipulation of the argument upload_name leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222072.
|
https://vuldb.com/?id.222072
|
2023-03-01T09:54:06.136Z
|
2023-03-01T09:54:38.579Z
|
2023-10-21T07:14:55.592Z
|
{'Vendor': 'n/a', 'Product': 'Drag and Drop Multiple File Upload Contact Form 7', 'Versions': '5.0.6.1'}
|
CVE-2023-1542
|
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
|
https://huntr.dev/bounties/d947417c-5a12-407a-9a2f-fa696f65126f
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1391
|
A vulnerability, which was classified as problematic, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file admin/ab.php. The manipulation of the argument img leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222978 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222978
|
2023-03-14T14:20:45.858Z
|
2023-03-14T14:21:03.575Z
|
2023-10-21T08:30:35.008Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
|
CVE-2023-1684
|
A vulnerability was found in HadSky 7.7.16. It has been classified as problematic. This affects an unknown part of the file upload/index.php?c=app&a=superadmin:index. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224241 was assigned to this vulnerability.
|
https://vuldb.com/?id.224241
|
2023-03-28T20:30:13.448Z
|
2023-03-29T04:00:05.886Z
|
2023-10-21T13:51:40.303Z
|
{'Vendor': 'n/a', 'Product': 'HadSky', 'Versions': '7.7.16'}
|
CVE-2023-1903
|
SAP HCM Fiori App My Forms (Fiori 2.0) - version 605, does not perform necessary authorization checks for an authenticated user exposing the restricted header data.
|
https://launchpad.support.sap.com/#/notes/3301457
|
2023-04-06T05:17:57.486Z
|
2023-04-11T02:31:13.493Z
|
2023-04-18T14:51:19.551Z
|
{'Vendor': 'SAP', 'Product': 'HCM Fiori App My Forms (Fiori 2.0)', 'Versions': '605'}
|
CVE-2023-1450
|
A vulnerability was found in MP4v2 2.1.2 and classified as problematic. This issue affects the function DumpTrack of the file mp4trackdump.cpp. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223295.
|
https://vuldb.com/?id.223295
|
2023-03-17T06:47:22.882Z
|
2023-03-17T06:47:51.148Z
|
2023-10-21T08:59:52.295Z
|
{'Vendor': 'n/a', 'Product': 'MP4v2', 'Versions': '2.1.2'}
|
CVE-2023-1515
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.19.
|
https://huntr.dev/bounties/ae0f2ec4-a245-4d0b-9d4d-bd8310dd6282
|
2023-03-20T00:00:00
|
2023-03-20T00:00:00
|
2023-03-20T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1145
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:26:44.830Z
|
2023-03-27T14:56:30.287Z
|
2023-03-27T14:57:19.579Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1846
|
A vulnerability has been found in SourceCodester Online Payroll System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/deduction_row.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224986 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224986
|
2023-04-05T05:49:52.860Z
|
2023-04-05T06:31:03.116Z
|
2023-10-21T16:54:51.032Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
|
CVE-2023-1796
|
A vulnerability classified as problematic has been found in SourceCodester Employee Payslip Generator 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_position of the component Create News Handler. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224748.
|
https://vuldb.com/?id.224748
|
2023-04-02T07:15:32.761Z
|
2023-04-02T09:00:06.561Z
|
2023-10-21T14:33:08.580Z
|
{'Vendor': 'SourceCodester', 'Product': 'Employee Payslip Generator', 'Versions': '1.0'}
|
CVE-2023-1329
|
A potential security vulnerability has been identified for certain HP multifunction printers (MFPs). The vulnerability may lead to Buffer Overflow and/or Remote Code Execution when running HP Workpath solutions on potentially affected products.
|
https://support.hp.com/us-en/document/ish_8585737-8585769-16/hpsbpi03849
|
2023-03-10T16:49:10.314Z
|
2023-06-14T20:23:33.516Z
|
2023-06-14T20:23:33.516Z
|
{'Vendor': 'HP Inc.', 'Product': 'HP multifunction printers', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
|
CVE-2023-1283
|
Code Injection in GitHub repository builderio/qwik prior to 0.21.0.
|
https://huntr.dev/bounties/63f1ff91-48f3-4886-a179-103f1ddd8ff8
|
2023-03-08T00:00:00
|
2023-03-08T00:00:00
|
2023-10-10T07:22:36.732Z
|
{'Vendor': 'builderio', 'Product': 'builderio/qwik', 'Versions': 'unspecified'}
|
CVE-2023-1779
|
Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information.
|
https://cert.vde.com/en/advisories/VDE-2023-008/
|
2023-03-31T13:00:50.757Z
|
2023-06-06T10:07:35.354Z
|
2023-06-06T10:07:35.354Z
|
{'Vendor': 'MB Connect Line', 'Product': 'mbCONNECT24', 'Versions': '1.0.0'}
|
CVE-2023-1016
|
The Intuitive Custom Post Order plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 3.1.3, due to insufficient escaping on the user supplied 'objects' and 'tags' parameters and lack of sufficient preparation in the 'update_options' function as well as the 'refresh' function which runs queries on the same values. This allows authenticated attackers, with administrator permissions, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Note that this attack may only be practical on configurations where it is possible to bypass addslashes due to the database using a nonstandard character set such as GBK.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc878508-200d-4bc7-aa99-c34e63cba4b3?source=cve
|
2023-02-24T14:46:15.803Z
|
2023-06-09T05:33:36.074Z
|
2023-06-09T05:33:36.074Z
|
{'Vendor': 'hijiri', 'Product': 'Intuitive Custom Post Order', 'Versions': '*'}
|
CVE-2023-1446
|
A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is the function 0x80002004/0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223291.
|
https://vuldb.com/?id.223291
|
2023-03-17T06:37:23.281Z
|
2023-03-17T06:37:43.218Z
|
2023-10-21T08:54:59.360Z
|
{'Vendor': 'Watchdog', 'Product': 'Anti-Virus', 'Versions': '1.4.214.0'}
|
CVE-2023-1915
|
The Thumbnail carousel slider WordPress plugin before 1.1.10 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting vulnerability which could be used against high privilege users such as admin.
|
https://wpscan.com/vulnerability/0487c3f6-1a3c-4089-a614-15138f52f69b
|
2023-04-06T18:20:57.534Z
|
2023-05-15T12:15:33.297Z
|
2023-05-15T12:15:33.297Z
|
{'Vendor': 'Unknown', 'Product': 'Thumbnail carousel slider', 'Versions': '0'}
|
CVE-2023-1850
|
A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224990 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224990
|
2023-04-05T05:50:07.604Z
|
2023-04-05T07:31:03.643Z
|
2023-10-21T16:59:43.721Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
|
CVE-2023-1153
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Pacsrapor allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Pacsrapor: before 1.22.
|
https://www.usom.gov.tr/bildirim/tr-23-0163
|
2023-03-02T15:43:11.855Z
|
2023-03-21T11:19:53.116Z
|
2023-03-26T19:51:26.174Z
|
{'Vendor': 'Pacsrapor', 'Product': 'Pacsrapor', 'Versions': '0'}
|
CVE-2023-1503
|
A vulnerability classified as critical has been found in SourceCodester Alphaware Simple E-Commerce System 1.0. This affects an unknown part of the file admin/admin_index.php. The manipulation of the argument username/password with the input admin' AND (SELECT 8062 FROM (SELECT(SLEEP(5)))meUD)-- hLiX leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223407.
|
https://vuldb.com/?id.223407
|
2023-03-20T07:28:06.427Z
|
2023-03-20T08:00:05.740Z
|
2023-10-21T09:46:14.122Z
|
{'Vendor': 'SourceCodester', 'Product': 'Alphaware Simple E-Commerce System', 'Versions': '1.0'}
|
CVE-2023-1780
|
The Companion Sitemap Generator WordPress plugin before 4.5.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3
|
2023-03-31T13:13:41.996Z
|
2023-07-10T12:40:32.893Z
|
2023-07-10T13:05:44.941Z
|
{'Vendor': 'Unknown', 'Product': 'Companion Sitemap Generator', 'Versions': '0'}
|
CVE-2023-1295
|
A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.
|
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9eac1904d3364254d622bf2c771c4f85cd435fc2
|
2023-03-09T18:05:20.028Z
|
2023-06-28T11:08:54.348Z
|
2023-06-28T11:13:07.332Z
|
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.6'}
|
CVE-2023-1942
|
A vulnerability has been found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/?page=user of the component Avatar Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225319.
|
https://vuldb.com/?id.225319
|
2023-04-07T16:39:54.420Z
|
2023-04-07T18:00:04.607Z
|
2023-10-22T06:29:26.407Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1041
|
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Responsive Tourism Website 1.0. This affects an unknown part of the file /tourism/rate_review.php. The manipulation of the argument id with the input 1"><script>alert(1111)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221799.
|
https://vuldb.com/?id.221799
|
2023-02-26T11:57:02.866Z
|
2023-02-26T11:57:58.666Z
|
2023-10-20T22:17:29.441Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Responsive Tourism Website', 'Versions': '1.0'}
|
CVE-2023-1554
|
The Quick Paypal Payments WordPress plugin before 5.7.26.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/0d247a3d-154e-4da7-a147-c1c7e1b5e87e
|
2023-03-21T21:44:46.824Z
|
2023-05-02T07:04:51.044Z
|
2023-05-02T07:04:51.044Z
|
{'Vendor': 'Unknown', 'Product': 'Quick Paypal Payments', 'Versions': '0'}
|
CVE-2023-1104
|
Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.
|
https://huntr.dev/bounties/a4909b4e-ab3c-41d6-b0d8-1c6e933bf758
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
|
CVE-2023-1807
|
The Elementor Addons, Widgets and Enhancements – Stax plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.3. This is due to missing or incorrect nonce validation on the toggle_widget function. This makes it possible for unauthenticated attackers to enable or disable Elementor widgets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/c12094bd-aa23-4f9b-92e1-d1d4284fb2a0?source=cve
|
2023-04-03T18:29:05.565Z
|
2023-06-09T05:33:31.920Z
|
2023-06-09T05:33:31.920Z
|
{'Vendor': 'staxwp', 'Product': 'Elementor Addons, Widgets and Enhancements – Stax', 'Versions': '*'}
|
CVE-2023-1387
|
Grafana is an open-source platform for monitoring and observability.
Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token.
By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
|
https://grafana.com/security/security-advisories/cve-2023-1387/
|
2023-03-14T11:11:01.304Z
|
2023-04-26T13:47:16.914Z
|
2023-04-26T13:47:16.914Z
|
{'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '9.1.0, 9.3.0, 9.4.0'}
|
CVE-2023-1692
|
The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality.
|
https://consumer.huawei.com/en/support/bulletin/2023/4/
|
2023-03-29T09:29:50.057Z
|
2023-05-20T14:10:55.121Z
|
2023-05-20T14:10:55.121Z
|
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 3.1.0, 2.1.0, 2.0.1, 2.0.0'}
|
CVE-2023-1368
|
A vulnerability was found in XHCMS 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php of the component POST Parameter Handler. The manipulation of the argument user leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222874 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222874
|
2023-03-13T07:44:23.662Z
|
2023-03-13T08:31:04.046Z
|
2023-10-21T08:25:42.208Z
|
{'Vendor': 'n/a', 'Product': 'XHCMS', 'Versions': '1.0'}
|
CVE-2023-1738
|
A vulnerability has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0 and classified as critical. This vulnerability affects unknown code of the file index.php?q=product. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. VDB-224626 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224626
|
2023-03-30T18:51:47.395Z
|
2023-03-30T20:31:03.597Z
|
2023-10-21T14:05:05.235Z
|
{'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'}
|
CVE-2023-1485
|
A vulnerability classified as problematic has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. This affects an unknown part of the file /bsenordering/index.php of the component GET Parameter Handler. The manipulation of the argument category with the input <script>alert(222)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223371.
|
https://vuldb.com/?id.223371
|
2023-03-18T19:56:09.977Z
|
2023-03-18T20:31:03.602Z
|
2023-10-21T09:25:29.971Z
|
{'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'}
|
CVE-2023-1893
|
The Login Configurator WordPress plugin through 2.1 does not properly escape a URL parameter before outputting it to the page, leading to a reflected cross-site scripting vulnerability targeting site administrators.
|
https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7
|
2023-04-05T17:28:30.974Z
|
2023-07-17T13:29:53.624Z
|
2023-07-17T13:29:53.624Z
|
{'Vendor': 'Unknown', 'Product': 'Login Configurator', 'Versions': '0'}
|
CVE-2023-1939
|
No access control for the OTP key
on OTP entries
in Devolutions Remote Desktop Manager Windows 2022.3.33.0 and prior versions and Remote Desktop Manager Linux 2022.3.2.0 and prior versions allows non admin users to see OTP keys via the user interface.
|
https://devolutions.net/security/advisories/DEVO-2023-0009
|
2023-04-07T13:39:45.374Z
|
2023-04-11T17:47:49.976Z
|
2023-04-11T17:47:49.976Z
|
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
|
CVE-2023-1190
|
A vulnerability was found in xiaozhuai imageinfo up to 3.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the file imageinfo.hpp. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-222362 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222362
|
2023-03-06T07:17:38.080Z
|
2023-03-06T07:17:50.676Z
|
2023-10-21T07:38:06.059Z
|
{'Vendor': 'xiaozhuai', 'Product': 'imageinfo', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3'}
|
CVE-2023-1313
|
Unrestricted Upload of File with Dangerous Type in GitHub repository cockpit-hq/cockpit prior to 2.4.1.
|
https://huntr.dev/bounties/f73eef49-004f-4b3b-9717-90525e65ba61
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
{'Vendor': 'cockpit-hq', 'Product': 'cockpit-hq/cockpit', 'Versions': 'unspecified'}
|
CVE-2023-1743
|
A vulnerability classified as problematic has been found in SourceCodester Grade Point Average GPA Calculator 1.0. This affects an unknown part of the file index.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224631.
|
https://vuldb.com/?id.224631
|
2023-03-30T19:12:58.691Z
|
2023-03-30T22:00:04.661Z
|
2023-10-21T14:11:11.085Z
|
{'Vendor': 'SourceCodester', 'Product': 'Grade Point Average GPA Calculator', 'Versions': '1.0'}
|
CVE-2023-1256
|
The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server are vulnerable to an improper authorization exploit which could allow an unauthenticated user to remotely read data, cause denial of service, and tamper with alarm states.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-04
|
2023-03-07T16:15:30.636Z
|
2023-03-16T18:33:52.907Z
|
2023-03-16T18:33:52.907Z
|
{'Vendor': 'AVEVA', 'Product': 'AVEVA Plant SCADA', 'Versions': '2023 Update 10'}
|
CVE-2023-1606
|
A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223736.
|
https://vuldb.com/?id.223736
|
2023-03-23T18:31:32.334Z
|
2023-03-23T19:00:05.667Z
|
2023-10-21T11:03:48.116Z
|
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
|
CVE-2023-1981
|
A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
|
https://access.redhat.com/security/cve/CVE-2023-1981
|
2023-04-11T00:00:00
|
2023-05-26T00:00:00
|
2023-05-26T00:00:00
|
{'Vendor': 'n/a', 'Product': 'avahi', 'Versions': 'avahi-0.7-20'}
|
CVE-2023-1578
|
SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.19.
|
https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e
|
2023-03-22T00:00:00
|
2023-03-22T00:00:00
|
2023-03-22T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1597
|
The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog.
|
https://wpscan.com/vulnerability/4eafe111-8874-4560-83ff-394abe7a803b
|
2023-03-23T09:59:01.878Z
|
2023-07-10T12:40:40.136Z
|
2023-07-10T13:05:46.120Z
|
{'Vendor': 'Unknown', 'Product': 'tagDiv Cloud Library', 'Versions': '0'}
|
CVE-2023-1714
|
Unsafe variable extraction in bitrix/modules/main/classes/general/user_options.php in Bitrix24 22.0.300 allows remote authenticated attackers to execute arbitrary code via (1) appending arbitrary content to existing PHP files or (2) PHAR deserialization.
|
https://starlabs.sg/advisories/23/23-1714/
|
2023-03-30T09:15:34.398Z
|
2023-11-01T09:02:47.607Z
|
2023-11-01T09:02:47.607Z
|
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
|
CVE-2023-1344
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the uucss_update_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/263153c9-61c5-4df4-803b-8d274e2a5e35
|
2023-03-10T18:50:02.744Z
|
2023-03-10T19:07:04.653Z
|
2023-03-10T19:07:04.653Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1651
|
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS
|
https://wpscan.com/vulnerability/c88b22ba-4fc2-49ad-a457-224157521bad
|
2023-03-27T09:57:35.493Z
|
2023-05-08T13:58:09.550Z
|
2023-05-08T13:58:09.550Z
|
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
|
CVE-2023-1201
|
Improper access control in the secure messages feature in Devolutions Server 2022.3.12 and below allows an authenticated attacker that possesses the message UUID to access the data it contains.
|
https://devolutions.net/security/advisories/DEVO-2023-0005
|
2023-03-06T15:51:14.721Z
|
2023-03-06T17:15:00.735Z
|
2023-03-10T20:05:13.704141Z
|
{'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'}
|
CVE-2023-1094
|
MonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/food` endpoint and food parameter.
|
https://fluidattacks.com/advisories/napoli
|
2023-02-28T00:00:00
|
2023-05-08T00:00:00
|
2023-05-08T00:00:00
|
{'Vendor': 'n/a', 'Product': 'MonicaHQ', 'Versions': '4.0.0'}
|
CVE-2023-1997
|
An OS Command Injection vulnerability exists in SIMULIA 3DOrchestrate from Release 3DEXPERIENCE R2021x through Release 3DEXPERIENCE R2023x. A specially crafted HTTP request can lead to arbitrary command execution.
|
https://www.3ds.com/vulnerability/advisories
|
2023-04-12T09:30:38.964Z
|
2023-08-28T15:37:21.969Z
|
2023-08-28T15:37:21.969Z
|
{'Vendor': 'Dassault Systèmes', 'Product': 'SIMULIA 3DOrchestrate', 'Versions': 'Release 3DEXPERIENCE R2021x Golden, Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'}
|
CVE-2023-1978
|
The ShiftController Employee Shift Scheduling plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the query string in versions up to, and including, 4.9.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/b5c61212-e68e-4198-b078-18121576b767?source=cve
|
2023-04-11T11:51:39.639Z
|
2023-06-09T05:33:29.864Z
|
2023-06-09T05:33:29.864Z
|
{'Vendor': 'plainware', 'Product': 'ShiftController Employee Shift Scheduling', 'Versions': '*'}
|
CVE-2023-1352
|
A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.
|
https://vuldb.com/?id.222851
|
2023-03-11T17:39:51.188Z
|
2023-03-11T17:41:37.356Z
|
2023-10-21T08:12:16.666Z
|
{'Vendor': 'SourceCodester', 'Product': 'Design and Implementation of Covid-19 Directory on Vaccination System', 'Versions': '1.0'}
|
CVE-2023-1702
|
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
|
https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d
|
2023-03-29T00:00:00
|
2023-03-29T00:00:00
|
2023-03-29T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1217
|
Stack buffer overflow in Crash reporting in Google Chrome on Windows prior to 111.0.5563.64 allowed a remote attacker who had compromised the renderer process to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:17.614Z
|
2023-03-07T21:42:16.676Z
|
2023-03-07T21:42:16.676Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1647
|
Improper Access Control in GitHub repository calcom/cal.com prior to 2.7.
|
https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6
|
2023-03-26T00:00:00
|
2023-03-27T00:00:00
|
2023-10-10T07:18:44.519Z
|
{'Vendor': 'calcom', 'Product': 'calcom/cal.com', 'Versions': 'unspecified'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.