CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-1493
A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been rated as problematic. This issue affects the function 0x220019 in the library MaxProctetor64.sys of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223379.
https://vuldb.com/?id.223379
2023-03-18T20:20:48.073Z
2023-03-18T23:00:05.752Z
2023-10-21T09:35:15.509Z
{'Vendor': 'Max Secure', 'Product': 'Anti Virus Plus', 'Versions': '19.0.2.1'}
CVE-2023-1169
The OoohBoi Steroids for Elementor plugin for WordPress is vulnerable to missing authorization due to a missing capability check on the 'file_uploader_callback' function in versions up to, and including, 2.1.4. This makes it possible for subscriber-level attackers to upload image attachments to the site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c56ed896-9267-49e6-a207-fe5362fe18cd?source=cve
2023-03-03T19:08:15.506Z
2023-06-09T05:33:32.336Z
2023-06-09T05:33:32.336Z
{'Vendor': 'ooohboi', 'Product': 'OoohBoi Steroids for Elementor', 'Versions': '*'}
CVE-2023-1539
Improper Restriction of Excessive Authentication Attempts in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/b4df67f4-14ea-4051-97d4-26690c979a28
2023-03-21T00:00:00
2023-03-21T00:00:00
2023-04-26T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1186
A vulnerability has been found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This vulnerability affects the function 0x222010/0x222018 in the library ftwebcam.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-222358 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222358
2023-03-06T07:09:24.663Z
2023-03-06T07:09:57.318Z
2023-10-21T07:33:13.410Z
{'Vendor': 'FabulaTech', 'Product': 'Webcam for Remote Desktop', 'Versions': '2.8.42'}
CVE-2023-1885
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/bce84c02-abb2-474f-a67b-1468c9dcabb8
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-12-18T10:20:28.599Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1755
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a
2023-03-31T00:00:00
2023-03-31T00:00:00
2023-03-31T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1305
An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
https://docs.divvycloud.com/changelog/23321-release-notes
2023-03-09T22:23:15.209Z
2023-03-21T16:51:43.225Z
2023-03-21T16:51:43.225Z
{'Vendor': 'Rapid7', 'Product': 'InsightCloudSec', 'Versions': '0'}
CVE-2023-1610
A vulnerability, which was classified as critical, has been found in Rebuild up to 3.2.3. Affected by this issue is some unknown functionality of the file /project/tasks/list. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223742 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223742
2023-03-23T18:41:46.050Z
2023-03-23T20:00:06.354Z
2023-10-21T11:08:40.796Z
{'Vendor': 'n/a', 'Product': 'Rebuild', 'Versions': '3.2.0, 3.2.1, 3.2.2, 3.2.3'}
CVE-2023-1240
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/a24f57a4-22e3-4a17-8227-6a410a11498a
2023-03-07T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1754
Improper Neutralization of Input During Web Page Generation in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28
2023-03-31T00:00:00
2023-03-31T00:00:00
2023-04-26T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1304
An authenticated attacker can leverage an exposed getattr() method via a Jinja template to smuggle OS commands and perform other actions that are normally expected to be private methods. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
https://docs.divvycloud.com/changelog/23321-release-notes
2023-03-09T22:23:14.145Z
2023-03-21T16:45:49.560Z
2023-03-21T16:45:49.560Z
{'Vendor': 'Rapid7', 'Product': 'InsightCloudSec', 'Versions': '0'}
CVE-2023-1611
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea
https://bugzilla.redhat.com/show_bug.cgi?id=2181342
2023-03-23T00:00:00
2023-04-03T00:00:00
2023-07-23T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'unknown'}
CVE-2023-1241
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
https://github.com/answerdev/answer/commit/90bfa0dcc7b49482f1d1e31aee3ab073f3c13dd9
2023-03-07T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1492
A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been declared as problematic. This vulnerability affects the function 0x220019 in the library MaxProc64.sys of the component IoControlCode Handler. The manipulation of the argument SystemBuffer leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-223378 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223378
2023-03-18T20:20:37.430Z
2023-03-18T22:31:03.586Z
2023-10-21T09:34:02.324Z
{'Vendor': 'Max Secure', 'Product': 'Anti Virus Plus', 'Versions': '19.0.2.1'}
CVE-2023-1168
An authenticated remote code execution vulnerability exists in the AOS-CX Network Analytics Engine. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system, leading to a complete compromise of the switch running AOS-CX.
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-004.txt
2023-03-03T16:58:46.073Z
2023-03-21T20:22:09.558Z
2023-03-22T04:38:44.935401Z
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba CX 10000 Switch Series, Aruba CX 9300 Switch Series, Aruba CX 8400 Switch Series, Aruba CX 8360 Switch Series, Aruba CX 8325 Switch Series, Aruba CX 8320 Switch Series, Aruba CX 6400 Switch Series, Aruba CX 6300 Switch Series, Aruba CX 6200F Switch Series', 'Versions': 'AOS-CX 10.10.xxxx: 10.10.1020 and below., AOS-CX 10.09.xxxx: 10.09.1020 and below., AOS-CX 10.08.xxxx: 10.08.1070 and below., AOS-CX 10.06.xxxx: 10.06.0230 and below.'}
CVE-2023-1538
Observable Timing Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
https://github.com/answerdev/answer/commit/813ad0b9894673b1bdd489a2e9ab60a44fe990af
2023-03-21T00:00:00
2023-03-21T00:00:00
2023-03-21T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1187
A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This issue affects some unknown processing in the library ftwebcam.sys of the component Global Variable Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222359.
https://vuldb.com/?id.222359
2023-03-06T07:09:29.942Z
2023-03-06T07:09:59.304Z
2023-10-21T07:34:26.550Z
{'Vendor': 'FabulaTech', 'Product': 'Webcam for Remote Desktop', 'Versions': '2.8.42'}
CVE-2023-1884
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1353
A vulnerability, which was classified as problematic, was found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. Affected is an unknown function of the file verification.php. The manipulation of the argument txtvaccinationID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222852.
https://vuldb.com/?id.222852
2023-03-11T17:39:57.531Z
2023-03-11T17:41:39.477Z
2023-10-21T08:13:29.897Z
{'Vendor': 'SourceCodester', 'Product': 'Design and Implementation of Covid-19 Directory on Vaccination System', 'Versions': '1.0'}
CVE-2023-1703
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
https://huntr.dev/bounties/d12d105c-18fa-4d08-b591-b0e89e39eec1
2023-03-29T00:00:00
2023-03-29T00:00:00
2023-03-29T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1216
Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
2023-03-07T00:41:17.514Z
2023-03-07T21:42:16.442Z
2023-03-07T21:42:16.442Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
CVE-2023-1646
A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been declared as critical. This vulnerability affects the function 0x8018E000/0x8018E004 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224026 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224026
2023-03-26T20:12:29.000Z
2023-03-26T22:31:03.470Z
2023-10-21T13:37:02.485Z
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
CVE-2023-1095
In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.
https://bugzilla.redhat.com/show_bug.cgi?id=2173973
2023-02-28T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel netfilter subsystem.', 'Versions': 'Fixed in 6.0-rc1'}
CVE-2023-1996
A reflected Cross-site Scripting (XSS) vulnerability in Release 3DEXPERIENCE R2018x through Release 3DEXPERIENCE R2023x allows an attacker to execute arbitrary script code.
https://www.3ds.com/vulnerability/advisories
2023-04-12T09:28:12.107Z
2023-05-19T16:37:20.133Z
2023-07-12T07:19:15.343Z
{'Vendor': 'Dassault Systèmes', 'Product': '3DEXPERIENCE', 'Versions': 'Release 3DEXPERIENCE R2018x - All levels, Release 3DEXPERIENCE R2019x - All levels, Release 3DEXPERIENCE R2020x Golden, Release 3DEXPERIENCE R2021x Golden, Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'}
CVE-2023-1979
The Web Stories for WordPress plugin supports the WordPress built-in functionality of protecting content with a password. The content is then only accessible to website visitors after entering the password. In WordPress, users with the "Author" role can create stories, but don't have the ability to edit password protected stories. The vulnerability allowed users with said role to bypass this permission check when trying to duplicate the protected story in the plugin's own dashboard, giving them access to the seemingly protected content. We recommend upgrading to version 1.32 or beyond commit  ad49781c2a35c5c92ef704d4b621ab4e5cb77d68 https://github.com/GoogleForCreators/web-stories-wp/commit/ad49781c2a35c5c92ef704d4b621ab4e5cb77d68
https://github.com/GoogleForCreators/web-stories-wp/commit/ad49781c2a35c5c92ef704d4b621ab4e5cb77d68
2023-04-11T13:40:52.885Z
2023-05-08T16:28:53.574Z
2023-05-08T16:28:53.574Z
{'Vendor': 'Google', 'Product': 'Web Stories for WordPress', 'Versions': '0'}
CVE-2023-1580
Uncontrolled resource consumption in the logging feature in Devolutions Gateway 2023.1.1 and earlier allows an attacker to cause a denial of service by filling up the disk and render the system unusable.
https://devolutions.net/security/advisories/DEVO-2023-0007
2023-03-22T16:19:10.855Z
2023-03-22T17:49:11.291Z
2023-04-02T18:49:20.069507Z
{'Vendor': 'Devolutions', 'Product': 'Gateway', 'Versions': '0'}
CVE-2023-1715
A logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload.
https://starlabs.sg/advisories/23/23-1715/
2023-03-30T09:16:12.108Z
2023-11-01T09:03:05.343Z
2023-11-01T09:03:05.343Z
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
CVE-2023-1345
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the queue_posts function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d16fa590-1409-4f04-b8b7-0cce17412a5f
2023-03-10T18:50:10.054Z
2023-03-10T19:07:23.931Z
2023-03-10T19:07:23.931Z
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
CVE-2023-1650
The AI ChatBot WordPress plugin before 4.4.7 unserializes user input from cookies via an AJAX action available to unauthenticated users, which could allow them to perform PHP Object Injection when a suitable gadget is present on the blog
https://wpscan.com/vulnerability/7d7fe498-0aa3-4fa7-b560-610b42b2abed
2023-03-27T09:16:48.102Z
2023-05-08T13:58:12.709Z
2023-05-08T13:58:12.709Z
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
CVE-2023-1200
A vulnerability was found in ehuacui bbs. It has been declared as problematic. This vulnerability affects unknown code. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-222388.
https://vuldb.com/?id.222388
2023-03-06T15:49:24.589Z
2023-03-06T15:49:43.418Z
2023-10-21T07:40:32.433Z
{'Vendor': 'ehuacui', 'Product': 'bbs', 'Versions': 'n/a'}
CVE-2023-1980
Two factor authentication bypass on login in Devolutions Remote Desktop Manager 2022.3.35 and earlier allow user to cancel the two factor authentication via the application user interface and open entries.
https://devolutions.net/security/advisories/DEVO-2023-0009
2023-04-11T13:57:51.445Z
2023-04-11T17:44:15.373Z
2023-04-24T13:13:29.808Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-1129
The WP FEvents Book WordPress plugin through 0.46 does not ensures that bookings to be updated belong to the user making the request, allowing any authenticated user to book, add notes, or cancel booking on behalf of other users.
https://wpscan.com/vulnerability/d40479de-fb04-41b8-9fb0-41b9eefbd8af
2023-03-01T18:23:38.681Z
2023-04-24T18:30:52.240Z
2023-04-24T18:30:52.240Z
{'Vendor': 'Unknown', 'Product': 'WP FEvents Book', 'Versions': '0'}
CVE-2023-1579
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
https://sourceware.org/bugzilla/show_bug.cgi?id=29988
2023-03-22T00:00:00
2023-04-03T00:00:00
2023-09-30T09:06:15.292635
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': 'unknown'}
CVE-2023-1596
The tagDiv Composer WordPress plugin before 4.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/cada9be9-522a-4ce8-847d-c8fff2ddcc07
2023-03-23T09:58:56.210Z
2023-05-15T12:15:36.699Z
2023-05-15T12:15:36.699Z
{'Vendor': 'Unknown', 'Product': 'tagDiv Composer', 'Versions': '0'}
CVE-2023-1312
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19.
https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356
2023-03-10T00:00:00
2023-03-10T00:00:00
2023-03-10T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1742
A vulnerability was found in IBOS 4.5.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /?r=report/api/getlist of the component Report Search. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224630 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224630
2023-03-30T19:08:00.703Z
2023-03-30T21:31:03.698Z
2023-10-21T14:09:57.912Z
{'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'}
CVE-2023-1257
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04
2023-03-07T16:16:20.728Z
2023-03-07T16:54:21.053Z
2023-03-07T16:54:21.053Z
{'Vendor': 'MOXA', 'Product': 'UC-8580 Series', 'Versions': 'V1.1'}
CVE-2023-1607
A vulnerability was found in novel-plus 3.6.2. It has been classified as critical. This affects an unknown part of the file /common/sysFile/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223737 was assigned to this vulnerability.
https://vuldb.com/?id.223737
2023-03-23T18:33:07.539Z
2023-03-23T19:31:03.194Z
2023-10-21T11:05:01.299Z
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
CVE-2023-1484
A vulnerability was found in xzjie cms up to 1.0.3 and classified as critical. This issue affects some unknown processing of the file /api/upload. The manipulation of the argument uploadFile leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-223367.
https://vuldb.com/?id.223367
2023-03-18T08:44:23.312Z
2023-03-18T10:00:05.087Z
2023-10-21T09:24:16.776Z
{'Vendor': 'xzjie', 'Product': 'cms', 'Versions': '1.0.0, 1.0.1, 1.0.2, 1.0.3'}
CVE-2023-1892
Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq prior to 7.0.8.
https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-04-21T00:00:00
{'Vendor': 'sidekiq', 'Product': 'sidekiq/sidekiq', 'Versions': '7.0.4, unspecified'}
CVE-2023-1938
The WP Fastest Cache WordPress plugin before 1.1.5 does not have CSRF check in an AJAX action, and does not validate user input before using it in the wp_remote_get() function, leading to a Blind SSRF issue
https://wpscan.com/vulnerability/92b1c6d8-51db-46aa-bde6-abdfb091aab5
2023-04-07T09:44:12.557Z
2023-05-30T07:49:14.686Z
2023-05-30T07:49:14.686Z
{'Vendor': 'Unknown', 'Product': 'WP Fastest Cache', 'Versions': '0'}
CVE-2023-1191
A vulnerability classified as problematic has been found in fastcms. This affects an unknown part of the file admin/TemplateController.java of the component ZIP File Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222363.
https://vuldb.com/?id.222363
2023-03-06T07:21:24.612Z
2023-03-06T07:21:45.248Z
2023-10-21T07:39:19.257Z
{'Vendor': 'n/a', 'Product': 'fastcms', 'Versions': 'n/a'}
CVE-2023-1386
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
https://access.redhat.com/security/cve/CVE-2023-1386
2023-03-14T10:31:59.556Z
2023-07-24T15:19:25.843Z
2024-01-23T10:47:17.587Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-1693
The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/4/
2023-03-29T09:29:51.236Z
2023-05-20T14:12:33.342Z
2023-05-20T14:12:33.342Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0'}
CVE-2023-1369
A vulnerability was found in TG Soft Vir.IT eXplorer 9.4.86.0. It has been rated as problematic. This issue affects the function 0x82730088 in the library VIRAGTLT.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 9.5 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222875.
https://vuldb.com/?id.222875
2023-03-13T07:48:22.653Z
2023-03-13T09:00:05.427Z
2023-10-21T08:26:55.375Z
{'Vendor': 'TG Soft', 'Product': 'Vir.IT eXplorer', 'Versions': '9.4.86.0'}
CVE-2023-1739
A vulnerability was found in SourceCodester Simple and Beautiful Shopping Cart System 1.0 and classified as critical. This issue affects some unknown processing of the file upload.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224627.
https://vuldb.com/?id.224627
2023-03-30T18:55:20.890Z
2023-03-30T20:31:04.713Z
2023-10-21T14:06:18.412Z
{'Vendor': 'SourceCodester', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'}
CVE-2023-1943
Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode.
https://github.com/kubernetes/kops/issues/15539
2023-04-07T20:38:48.430Z
2023-10-11T23:01:50.876Z
2023-10-11T23:01:50.876Z
{'Vendor': 'Kubernetes', 'Product': 'kops', 'Versions': '0, 1.25.3, 1.26.0, 1.26.2'}
CVE-2023-1410
Grafana is an open-source platform for monitoring and observability.  Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description.  Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
https://grafana.com/security/security-advisories/cve-2023-1410/
2023-03-15T11:11:52.860Z
2023-03-23T07:48:56.246Z
2023-04-04T10:16:07.471Z
{'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '8.0.0, 9.0.0, 9.3.0'}
CVE-2023-1040
A vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. Affected by this issue is some unknown functionality of the file tracking/admin/add_acc.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-221798 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221798
2023-02-26T11:54:43.175Z
2023-02-26T11:55:02.741Z
2023-10-20T22:16:16.292Z
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
CVE-2023-1555
An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A namespace-level banned user can access the API.
https://gitlab.com/gitlab-org/gitlab/-/issues/398587
2023-03-22T09:18:21.197Z
2023-09-01T10:01:36.711Z
2023-09-01T10:01:36.711Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.2, 16.2, 16.3'}
CVE-2023-1105
External Control of File Name or Path in GitHub repository flatpressblog/flatpress prior to 1.3.
https://github.com/flatpressblog/flatpress/commit/5d5c7f6d8f072d14926fc2c3a97cdd763802f170
2023-03-01T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
CVE-2023-1806
The WP Inventory Manager WordPress plugin before 2.1.0.12 does not sanitise and escape the message parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators.
https://wpscan.com/vulnerability/38d99c7d-2d10-4910-b95a-1cb545b813c4
2023-04-03T13:41:59.220Z
2023-05-08T13:58:13.983Z
2023-05-08T13:58:13.983Z
{'Vendor': 'Unknown', 'Product': 'WP Inventory Manager', 'Versions': '0'}
CVE-2023-1294
A vulnerability was found in SourceCodester File Tracker Manager System 1.0. It has been classified as critical. Affected is an unknown function of the file /file_manager/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222648.
https://vuldb.com/?id.222648
2023-03-09T14:38:40.214Z
2023-03-09T14:39:23.579Z
2023-10-21T07:53:58.183Z
{'Vendor': 'SourceCodester', 'Product': 'File Tracker Manager System', 'Versions': '1.0'}
CVE-2023-1017
An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf
2023-02-24T16:02:22.626Z
2023-02-28T18:02:27.064Z
2023-02-28T19:09:18.722Z
{'Vendor': 'Trusted Computing Group', 'Product': 'TPM2.0', 'Versions': '1.59'}
CVE-2023-1447
A vulnerability, which was classified as problematic, has been found in SourceCodester Medicine Tracker System 1.0. Affected by this issue is some unknown functionality of the file app/?page=medicines/manage_medicine. The manipulation of the argument name/description with the input <script>alert('2')</script> leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-223292.
https://vuldb.com/?id.223292
2023-03-17T06:38:46.165Z
2023-03-17T06:39:45.927Z
2023-10-21T08:56:12.617Z
{'Vendor': 'SourceCodester', 'Product': 'Medicine Tracker System', 'Versions': '1.0'}
CVE-2023-1851
A vulnerability classified as problematic has been found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_add.php. The manipulation of the argument of leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224991.
https://vuldb.com/?id.224991
2023-04-05T05:50:11.217Z
2023-04-05T07:39:29.593Z
2023-10-21T17:00:56.862Z
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
CVE-2023-1152
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Utarit Information Technologies Persolus allows SQL Injection. This issue affects Persolus: before 2.03.93.
https://www.usom.gov.tr/bildirim/tr-23-0154-2
2023-03-02T15:43:10.230Z
2023-03-17T08:21:19.538Z
2023-03-17T08:37:15.219Z
{'Vendor': 'Utarit Information Technologies', 'Product': 'Persolus', 'Versions': '0'}
CVE-2023-1502
A vulnerability was found in SourceCodester Alphaware Simple E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file function/edit_customer.php. The manipulation of the argument firstname/mi/lastname with the input a' RLIKE SLEEP(5) AND 'dAbu'='dAbu leads to sql injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-223406 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223406
2023-03-20T07:28:03.847Z
2023-03-20T08:00:04.628Z
2023-10-21T09:45:00.936Z
{'Vendor': 'SourceCodester', 'Product': 'Alphaware Simple E-Commerce System', 'Versions': '1.0'}
CVE-2023-1797
A vulnerability classified as critical was found in OTCMS 6.0.1. Affected by this vulnerability is an unknown functionality of the file sysCheckFile.php?mudi=sql. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224749 was assigned to this vulnerability.
https://vuldb.com/?id.224749
2023-04-02T07:27:18.541Z
2023-04-02T09:00:07.864Z
2023-10-21T14:34:21.879Z
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0.1'}
CVE-2023-1328
A vulnerability was found in Guizhou 115cms 4.2. It has been classified as problematic. Affected is an unknown function of the file /admin/content/index. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222738 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222738
2023-03-10T16:41:17.723Z
2023-03-10T16:42:19.180Z
2023-10-21T08:07:23.940Z
{'Vendor': 'Guizhou', 'Product': '115cms', 'Versions': '4.2'}
CVE-2023-1282
The Drag and Drop Multiple File Upload PRO - Contact Form 7 Standard WordPress plugin before 2.11.1 and Drag and Drop Multiple File Upload PRO - Contact Form 7 with Remote Storage Integrations WordPress plugin before 5.0.6.4 do not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admins.
https://wpscan.com/vulnerability/8a9548c5-59ea-46b0-bfa5-a0f7a259351a
2023-03-08T20:34:25.298Z
2023-04-17T12:17:42.385Z
2023-04-17T12:17:42.385Z
{'Vendor': 'Unknown', 'Product': 'Drag and Drop Multiple File Upload PRO - Contact Form 7 Standard', 'Versions': '2.0.0'}
CVE-2023-1778
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems. The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0119
2023-03-31T11:56:48.453Z
2023-04-27T09:33:19.070Z
2023-04-28T11:05:32.435Z
{'Vendor': 'GajShield', 'Product': 'Data Security Firewall', 'Versions': '4.5, 4.21'}
CVE-2023-1902
The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx9g-8fr2-q899
2023-04-05T22:24:28.688Z
2023-07-10T04:30:14.243Z
2023-07-10T04:30:14.243Z
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
CVE-2023-1451
A vulnerability was found in MP4v2 2.1.2. It has been classified as problematic. Affected is the function mp4v2::impl::MP4Track::GetSampleFileOffset of the file mp4track.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223296.
https://vuldb.com/?id.223296
2023-03-17T06:48:48.619Z
2023-03-17T06:49:07.914Z
2023-10-21T09:01:05.519Z
{'Vendor': 'n/a', 'Product': 'MP4v2', 'Versions': '2.1.2'}
CVE-2023-1514
A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000152&languageCode=en&Preview=true
2023-03-20T12:32:04.973Z
2023-12-19T14:22:37.619Z
2023-12-19T14:22:37.619Z
{'Vendor': 'Hitachi Energy', 'Product': 'RTU500 Scripting Interface', 'Versions': '1.0.1.30, 1.0.2, 1.1.1'}
CVE-2023-1144
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:26:19.893Z
2023-03-27T14:43:11.987Z
2023-03-27T14:43:11.987Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1847
A vulnerability was found in SourceCodester Online Payroll System 1.0 and classified as critical. This issue affects some unknown processing of the file attendance.php. The manipulation of the argument employee leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224987.
https://vuldb.com/?id.224987
2023-04-05T05:49:56.140Z
2023-04-05T06:57:33.916Z
2023-10-21T16:56:04.297Z
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
CVE-2023-1390
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5
2023-03-14T00:00:00
2023-03-16T00:00:00
2023-04-20T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel (TIPC kernel module)', 'Versions': 'Fixed in kernel 5.11-rc4'}
CVE-2023-1685
A vulnerability was found in HadSky up to 7.11.8. It has been declared as critical. This vulnerability affects unknown code of the file /install/index.php of the component Installation Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224242 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224242
2023-03-28T20:30:15.614Z
2023-03-29T06:00:06.947Z
2023-10-21T13:52:53.427Z
{'Vendor': 'n/a', 'Product': 'HadSky', 'Versions': '7.11.0, 7.11.1, 7.11.2, 7.11.3, 7.11.4, 7.11.5, 7.11.6, 7.11.7, 7.11.8'}
CVE-2023-1056
A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edoc/doctor/patient.php. The manipulation of the argument search12 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221821 was assigned to this vulnerability.
https://vuldb.com/?id.221821
2023-02-27T11:06:45.545Z
2023-02-27T11:08:22.362Z
2023-10-21T07:03:56.503Z
{'Vendor': 'SourceCodester', 'Product': 'Doctors Appointment System', 'Versions': '1.0'}
CVE-2023-1406
The JetEngine WordPress plugin before 3.1.3.1 includes uploaded files without adequately ensuring that they are not executable, leading to a remote code execution vulnerability.
https://wpscan.com/vulnerability/2a81b6b1-2339-4889-9c28-1af133df8b65
2023-03-14T23:14:31.835Z
2023-04-10T13:17:54.722Z
2023-04-24T12:09:13.222Z
{'Vendor': 'Unknown', 'Product': 'JetEngine', 'Versions': '0'}
CVE-2023-1955
A vulnerability classified as critical has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected is an unknown function of the file login.php of the component User Registration. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225342 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225342
2023-04-08T06:29:45.793Z
2023-04-08T10:00:06.587Z
2023-10-22T06:41:38.103Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1810
Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:51.943Z
2023-04-04T21:39:33.940Z
2023-04-04T21:39:33.940Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1113
A vulnerability was found in SourceCodester Simple Payroll System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file admin/?page=admin of the component POST Parameter Handler. The manipulation of the argument fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222073 was assigned to this vulnerability.
https://vuldb.com/?id.222073
2023-03-01T09:57:27.422Z
2023-03-01T09:57:48.233Z
2023-10-21T07:16:08.814Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Payroll System', 'Versions': '1.0'}
CVE-2023-1543
Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/f82388d6-dfc3-4fbc-bea6-eb40cf5b2683
2023-03-21T00:00:00
2023-03-21T00:00:00
2023-03-21T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1534
Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
2023-03-21T00:43:37.256Z
2023-03-21T20:50:56.608Z
2023-03-21T20:50:56.608Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
CVE-2023-1164
A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.
https://vuldb.com/?id.222260
2023-03-03T06:54:45.992Z
2023-03-03T06:56:06.175Z
2023-10-21T07:25:54.270Z
{'Vendor': 'KylinSoft', 'Product': 'kylin-activation', 'Versions': 'n/a'}
CVE-2023-1867
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4c20db2d-f73d-4e52-a275-ab1975ae4b17?source=cve
2023-04-05T13:23:25.433Z
2023-04-05T13:23:35.413Z
2023-04-05T13:23:35.413Z
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
CVE-2023-1888
The Directorist plugin for WordPress is vulnerable to an arbitrary user password reset in versions up to, and including, 7.5.4. This is due to a lack of validation checks within login.php. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset the password of an arbitrary user and gain elevated (e.g., administrator) privileges.
https://www.wordfence.com/threat-intel/vulnerabilities/id/01943559-e05b-4dca-b322-d880b2729ee7?source=cve
2023-04-05T15:53:10.476Z
2023-06-09T05:33:09.400Z
2023-06-09T05:33:09.400Z
{'Vendor': 'wpwax', 'Product': 'Directorist – WordPress Business Directory Plugin with Classified Ads Listings', 'Versions': '*'}
CVE-2023-1922
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_pause_cdn_integration_ajax_request_callback function. This makes it possible for unauthenticated attackers to change cdn settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a1743b26-861e-4a61-80de-b8cc82308228?source=cve
2023-04-06T19:56:30.928Z
2023-04-06T19:56:34.794Z
2023-04-07T14:03:36.727Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1471
The WP Popup Banners plugin for WordPress is vulnerable to SQL Injection via the 'banner_id' parameter in versions up to, and including, 1.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with minimal permissions, such as a subscrber, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8281cb20-73d3-4ab5-910e-d353b2a5cbd8?source=cve
2023-03-17T13:08:06.054Z
2023-03-17T13:08:10.311Z
2023-03-17T13:08:10.311Z
{'Vendor': 'access-keys', 'Product': 'WP Popup Banners', 'Versions': '*'}
CVE-2023-1021
The amr ical events lists WordPress plugin through 6.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/91d04f96-11b2-46dc-860c-dc6c26360bf3
2023-02-24T18:10:30.431Z
2023-05-02T07:04:51.880Z
2023-05-02T07:04:51.880Z
{'Vendor': 'Unknown', 'Product': 'amr ical events lists', 'Versions': '0'}
CVE-2023-1308
A vulnerability classified as critical has been found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/adminlog.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222696.
https://vuldb.com/?id.222696
2023-03-10T07:34:08.398Z
2023-03-10T07:35:22.681Z
2023-10-21T08:00:04.773Z
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
CVE-2023-1758
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c
2023-03-31T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1133
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which the Device-status service listens on port 10100/ UDP by default. The service accepts the unverified UDP packets and deserializes the content, which could allow an unauthenticated attacker to remotely execute arbitrary code.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:15:47.425Z
2023-03-27T14:33:18.921Z
2023-03-27T14:33:18.921Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1099
A vulnerability was found in SourceCodester Online Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file eduauth/edit-class-detail.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222002 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222002
2023-02-28T20:02:55.025Z
2023-02-28T20:03:21.662Z
2023-10-21T07:12:29.190Z
{'Vendor': 'SourceCodester', 'Product': 'Online Student Management System', 'Versions': '1.0'}
CVE-2023-1563
A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/assign/assign.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223555.
https://vuldb.com/?id.223555
2023-03-22T10:33:37.524Z
2023-03-22T12:31:03.435Z
2023-10-21T10:41:49.723Z
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
CVE-2023-1076
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff
2023-02-27T00:00:00
2023-03-27T00:00:00
2023-05-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': 'unknown'}
CVE-2023-1426
The WP Tiles WordPress plugin through 1.1.2 does not ensure that posts to be displayed are not draft/private, allowing any authenticated users, such as subscriber to retrieve the titles of draft and privates posts for example. AN attacker could also retrieve the title of any other type of post.
https://wpscan.com/vulnerability/fdd79bb4-d434-4635-bb2b-84d079ecc746
2023-03-16T09:45:42.499Z
2023-04-10T13:17:55.647Z
2023-04-10T13:17:55.647Z
{'Vendor': 'Unknown', 'Product': 'WP Tiles', 'Versions': '0'}
CVE-2023-1975
Insertion of Sensitive Information Into Sent Data in GitHub repository answerdev/answer prior to 1.0.8.
https://huntr.dev/bounties/829cab7a-4ed7-465c-aa96-29f4f73dbfff
2023-04-11T00:00:00
2023-04-11T00:00:00
2023-04-11T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1575
The Mega Main Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a44ce6a3-0a9d-4bce-9251-f3a38b000645?source=cve
2023-03-22T13:29:05.763Z
2023-03-29T14:19:22.627Z
2023-03-29T14:19:22.627Z
{'Vendor': 'MegaMain', 'Product': 'Mega Main Menu', 'Versions': '*'}
CVE-2023-1125
The Ruby Help Desk WordPress plugin before 1.3.4 does not ensure that the ticket being modified belongs to the user making the request, allowing an attacker to close and/or add files and replies to tickets other than their own.
https://wpscan.com/vulnerability/e8a4b6ab-47f8-495d-a22c-dcf914dfb58c
2023-03-01T15:29:51.344Z
2023-05-02T07:04:52.700Z
2023-05-02T07:04:52.700Z
{'Vendor': 'Unknown', 'Product': 'Ruby Help Desk', 'Versions': '0'}
CVE-2023-1826
A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file php-ocls\admin\system_info\index.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-224841 was assigned to this vulnerability.
https://vuldb.com/?id.224841
2023-04-04T08:35:01.639Z
2023-04-04T09:00:05.968Z
2023-10-21T16:51:11.623Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1963
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php of the component Search. The manipulation of the argument searchinput leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225359.
https://vuldb.com/?id.225359
2023-04-09T07:41:37.385Z
2023-04-09T08:00:06.739Z
2023-10-22T09:26:55.901Z
{'Vendor': 'PHPGurukul', 'Product': 'Bank Locker Management System', 'Versions': '1.0'}
CVE-2023-1430
The FluentCRM - Marketing Automation For WordPress plugin for WordPress is vulnerable to unauthorized modification of data in versions up to, and including, 2.7.40 due to the use of an MD5 hash without a salt to control subscriptions. This makes it possible for unauthenticated attackers to unsubscribe users from lists and manage subscriptions, granted they gain access to any targeted subscribers email address.
https://www.wordfence.com/threat-intel/vulnerabilities/id/de6da87e-8f7d-4120-8a1b-390ef7733d84?source=cve
2023-03-16T12:19:40.945Z
2023-06-09T05:33:37.287Z
2023-06-09T05:33:37.287Z
{'Vendor': 'techjewel', 'Product': 'Email Marketing, Newsletter, Email Automation and CRM Plugin for WordPress by FluentCRM', 'Versions': '2.7.40'}
CVE-2023-1060
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YKM YKM CRM allows Reflected XSS.This issue affects YKM CRM: before 23.03.30.
https://www.usom.gov.tr/bildirim/tr-23-0189
2023-02-27T11:07:03.550Z
2023-03-31T09:02:04.236Z
2023-03-31T09:02:04.236Z
{'Vendor': 'YKM', 'Product': 'YKM CRM', 'Versions': '0'}
CVE-2023-1349
A vulnerability, which was classified as problematic, has been found in Hsycms 3.1. Affected by this issue is some unknown functionality of the file controller\cate.php of the component Add Category Module. The manipulation of the argument title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222842 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222842
2023-03-11T08:05:17.339Z
2023-03-11T08:05:31.504Z
2023-10-21T08:08:37.063Z
{'Vendor': 'n/a', 'Product': 'Hsycms', 'Versions': '3.1'}
CVE-2023-1719
Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.
https://starlabs.sg/advisories/23/23-1719/
2023-03-30T09:19:45.104Z
2023-11-01T09:04:19.695Z
2023-11-01T09:04:19.695Z
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
CVE-2023-1871
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the deleteLang function. This makes it possible for unauthenticated attackers to reset the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ae863c-4638-49ab-bb1f-52346884c3aa?source=cve
2023-04-05T13:25:18.361Z
2023-04-05T13:25:27.638Z
2023-04-05T13:25:27.638Z
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
CVE-2023-1488
A vulnerability, which was classified as problematic, was found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54. Affected is the function 0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-223374 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223374
2023-03-18T20:02:54.286Z
2023-03-18T21:00:06.112Z
2023-10-21T09:29:09.540Z
{'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise System Monitor', 'Versions': '1.5.3.54'}